| /linux/Documentation/userspace-api/netlink/ |
| H A D | intro.rst | 62 if (nl_msg.nlmsg_type == NLMSG_DONE) 185 - ``NLMSG_DONE`` - marks the end of a dump; 188 ``NLMSG_ERROR`` and ``NLMSG_DONE`` are of practical importance. 226 ``NLMSG_DONE`` is simpler, the request is never echoed but the extended 237 Note that some implementations may issue custom ``NLMSG_DONE`` messages 361 in ``NLMSG_ERROR`` and ``NLMSG_DONE`` messages. To maintain backward 395 (including the ``NLMSG_DONE`` message) if the dump was interrupted and 444 ``NLMSG_DONE``.
|
| /linux/include/uapi/linux/ |
| H A D | wireguard.h | |
| H A D | netlink.h | 63 #define NLM_F_MULTI 0x02 /* Multipart message, terminated by NLMSG_DONE */ 114 #define NLMSG_DONE 0x3 /* End of a dump */ macro
|
| /linux/samples/connector/ |
| H A D | ucon.c | 59 nlh->nlmsg_type = NLMSG_DONE; in netlink_send() 221 case NLMSG_DONE: in main()
|
| H A D | cn_test.c | 59 nlh = nlmsg_put(skb, 0, 0x123, NLMSG_DONE, size - sizeof(*nlh), 0);
|
| /linux/tools/include/uapi/linux/ |
| H A D | netlink.h | 55 #define NLM_F_MULTI 0x02 /* Multipart message, terminated by NLMSG_DONE */ 104 #define NLMSG_DONE 0x3 /* End of a dump */ macro
|
| /linux/tools/testing/selftests/connector/ |
| H A D | proc_filter.c | 51 hdr->nlmsg_type = NLMSG_DONE; in send_message() 143 } else if (hdr->nlmsg_type == NLMSG_DONE) { in handle_packet()
|
| /linux/drivers/infiniband/core/ |
| H A D | iwpm_util.c | 627 pr_warn("%s Unable to put NLMSG_DONE\n", __func__); in send_nlmsg_done() 631 nlh->nlmsg_type = NLMSG_DONE; in send_nlmsg_done() 704 /* and leave room for NLMSG_DONE */ in iwpm_send_mapinfo()
|
| /linux/tools/testing/selftests/net/mptcp/ |
| H A D | mptcp_diag.c | 325 if (nlh->nlmsg_type == NLMSG_DONE) { in recv_nlmsg() 326 printf("NLMSG_DONE\n"); in recv_nlmsg()
|
| H A D | pm_nl_ctl.c | 244 if (nh->nlmsg_type == NLMSG_DONE) in do_nl_req() 1091 if (nh->nlmsg_type == NLMSG_DONE) in print_addrs() 1227 if (nh->nlmsg_type == NLMSG_DONE) in print_limits()
|
| /linux/tools/testing/selftests/net/ |
| H A D | netlink-dumps.c | 57 else if (nlh->nlmsg_type == NLMSG_DONE) in nl_get_extack()
|
| H A D | ipsec.c | 1055 } else if (answer.nh.nlmsg_type == NLMSG_DONE) { in xfrm_state_check()
|
| /linux/drivers/connector/ |
| H A D | connector.c | 101 nlh = nlmsg_put(skb, 0, msg->seq, NLMSG_DONE, size, 0); in cn_netlink_send_mult()
|
| /linux/net/netfilter/ |
| H A D | nfnetlink_log.c | 365 NLMSG_DONE, in __nfulnl_send() 733 + nla_total_size(sizeof(struct nfgenmsg)); /* NLMSG_DONE */ in nfulnl_log_packet()
|
| /linux/tools/testing/vsock/ |
| H A D | vsock_diag_test.c | 284 if (h->nlmsg_type == NLMSG_DONE) in read_vsock_stat()
|
| /linux/tools/net/ynl/pyynl/lib/ |
| H A D | ynl.py | 36 NLMSG_DONE = 3 216 elif self.nl_type == Netlink.NLMSG_DONE: 37 NLMSG_DONE = 3 global() variable in Netlink
|
| /linux/samples/bpf/ |
| H A D | xdp_router_ipv4_user.c | 75 if (nh->nlmsg_type == NLMSG_DONE) in recv_msg()
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | xsk.c | 379 case NLMSG_DONE: in netlink_recv()
|
| /linux/tools/lib/bpf/ |
| H A D | netlink.c | 194 case NLMSG_DONE: in libbpf_netlink_recv()
|
| /linux/tools/bpf/bpftool/ |
| H A D | net.c | 193 case NLMSG_DONE: in netlink_recv()
|
| /linux/tools/net/ynl/lib/ |
| H A D | ynl.c | 603 case NLMSG_DONE: in __ynl_sock_read_msgs()
|
| /linux/drivers/net/team/ |
| H A D | team_core.c | 2411 nlh = nlmsg_put(skb, portid, seq, NLMSG_DONE, 0, flags | NLM_F_MULTI); in team_nl_send_options_get() 2709 nlh = nlmsg_put(skb, portid, seq, NLMSG_DONE, 0, flags | NLM_F_MULTI); in team_nl_send_port_list_get()
|
| /linux/net/tipc/ |
| H A D | node.c | 2339 * handler. Resulting in the NLMSG_DONE message having in tipc_nl_node_dump() 2705 * handler. Resulting in the last NLMSG_DONE message in tipc_nl_node_dump_link()
|
| /linux/tools/testing/selftests/net/ovpn/ |
| H A D | ovpn-cli.c | 1282 if (h->nlmsg_type == NLMSG_DONE) { in ovpn_rt_send()
|
| /linux/kernel/ |
| H A D | audit.c | 981 int t = done ? NLMSG_DONE : type; in audit_make_reply()
|