| /linux/tools/testing/selftests/net/ |
| H A D | ipsec.c | 296 } else if (answer.hdr.nlmsg_type != NLMSG_ERROR) { in netlink_check_answer() 297 printk("expected NLMSG_ERROR, got %d", (int)answer.hdr.nlmsg_type); in netlink_check_answer() 300 printk("NLMSG_ERROR: %d: %s", in netlink_check_answer() 1051 if (answer.nh.nlmsg_type == NLMSG_ERROR) { in xfrm_state_check() 1052 printk("NLMSG_ERROR: %d: %s", in xfrm_state_check() 1317 } else if (answer.nh.nlmsg_type != NLMSG_ERROR) { in xfrm_state_allocspi() 1318 printk("expected NLMSG_ERROR, got %d", (int)answer.nh.nlmsg_type); in xfrm_state_allocspi() 1322 printk("NLMSG_ERROR: %d: %s", answer.error, strerror(-answer.error)); in xfrm_state_allocspi() 1406 } else if (req.nh.nlmsg_type != NLMSG_ERROR) { in xfrm_monitor_acquire() 1407 printk("expected NLMSG_ERROR, got %d", (int)req.nh.nlmsg_type); in xfrm_monitor_acquire() [all …]
|
| H A D | netlink-dumps.c | 55 if (nlh->nlmsg_type == NLMSG_ERROR) in nl_get_extack()
|
| /linux/Documentation/userspace-api/netlink/ |
| H A D | intro.rst | 184 - ``NLMSG_ERROR`` - carries the return code of an operation; 188 ``NLMSG_ERROR`` and ``NLMSG_DONE`` are of practical importance. 191 with ``NLMSG_ERROR`` if there is no error. To avoid having to special-case 194 The format of ``NLMSG_ERROR`` is described by struct nlmsgerr:: 209 and second of the request. ``NLMSG_ERROR`` carries the information about 221 The second optional element of ``NLMSG_ERROR`` are the extended ACK 333 __u16 nlmsg_type: NLMSG_ERROR 361 in ``NLMSG_ERROR`` and ``NLMSG_DONE`` messages. To maintain backward 443 user) and does not involve any control messages like ``NLMSG_ERROR`` or
|
| /linux/tools/testing/selftests/net/tcp_ao/lib/ |
| H A D | netlink.c | 45 } else if (answer.hdr.nlmsg_type != NLMSG_ERROR) { in netlink_check_answer() 46 test_print("expected NLMSG_ERROR, got %d", in netlink_check_answer() 51 test_print("NLMSG_ERROR: %d: %s", in netlink_check_answer()
|
| /linux/tools/testing/vsock/ |
| H A D | vsock_diag_test.c | 287 if (h->nlmsg_type == NLMSG_ERROR) { in read_vsock_stat() 291 fprintf(stderr, "NLMSG_ERROR\n"); in read_vsock_stat() 294 perror("NLMSG_ERROR"); in read_vsock_stat()
|
| /linux/tools/testing/selftests/connector/ |
| H A D | proc_filter.c | 140 if (hdr->nlmsg_type == NLMSG_ERROR) { in handle_packet() 141 perror("NLMSG_ERROR error\n"); in handle_packet()
|
| /linux/tools/testing/selftests/landlock/ |
| H A D | audit.h | 105 if (msg->header.nlmsg_type == NLMSG_ERROR) in audit_recv() 135 } while (reply->header.nlmsg_type != NLMSG_ERROR && in audit_request()
|
| /linux/tools/testing/selftests/net/netfilter/ |
| H A D | audit_logread.c | 42 rep->nlh.nlmsg_type == NLMSG_ERROR) /* short-cut for now */ in audit_recv()
|
| /linux/include/uapi/linux/ |
| H A D | wireguard.h | |
| H A D | netlink.h | 113 #define NLMSG_ERROR 0x2 /* Error */ macro
|
| /linux/tools/testing/selftests/nci/ |
| H A D | nci_dev.c | 196 if (ans.n.nlmsg_type == NLMSG_ERROR || resp_len < 0 || in get_family_id() 267 if (msg->n.nlmsg_type == NLMSG_ERROR || in get_nci_devid() 664 if (ans.n.nlmsg_type == NLMSG_ERROR || resp_len < 0 || in get_taginfo()
|
| /linux/samples/connector/ |
| H A D | ucon.c | 217 case NLMSG_ERROR: in main()
|
| /linux/tools/accounting/ |
| H A D | getdelays.c | 182 if (ans.n.nlmsg_type == NLMSG_ERROR || in get_family_id() 526 if (msg.n.nlmsg_type == NLMSG_ERROR || in main()
|
| H A D | delaytop.c | 487 if (ans.n.nlmsg_type == NLMSG_ERROR || in get_family_id() 679 if (rc < 0 || resp.n.nlmsg_type == NLMSG_ERROR) { in fetch_and_fill_task_info() 838 if (rc < 0 || resp.n.nlmsg_type == NLMSG_ERROR) { in get_container_stats()
|
| /linux/tools/testing/selftests/net/mptcp/ |
| H A D | pm_nl_ctl.c | 138 if (nh->nlmsg_type == NLMSG_ERROR) in capture_events() 139 error(1, NLMSG_ERROR, "received invalid NL message"); in capture_events() 247 if (nh->nlmsg_type == NLMSG_ERROR && nl_error(nh)) in do_nl_req() 1093 if (nh->nlmsg_type == NLMSG_ERROR) in print_addrs() 1229 if (nh->nlmsg_type == NLMSG_ERROR) in print_limits()
|
| H A D | mptcp_diag.c | 328 } else if (nlh->nlmsg_type == NLMSG_ERROR) { in recv_nlmsg()
|
| /linux/tools/include/uapi/linux/ |
| H A D | netlink.h | 103 #define NLMSG_ERROR 0x2 /* Error */ macro
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | netlink_helpers.c | 215 if (h->nlmsg_type == NLMSG_ERROR) { in __rtnl_talk_iov()
|
| H A D | xsk.c | 373 case NLMSG_ERROR: in netlink_recv()
|
| /linux/tools/net/ynl/pyynl/lib/ |
| H A D | ynl.py | 35 NLMSG_ERROR = 2 212 if self.nl_type == Netlink.NLMSG_ERROR: 36 NLMSG_ERROR = 2 global() variable in Netlink
|
| /linux/net/ncsi/ |
| H A D | ncsi-netlink.c | 581 NLMSG_ERROR, sizeof(*nle), 0); in ncsi_send_netlink_err()
|
| /linux/tools/lib/bpf/ |
| H A D | netlink.c | 187 case NLMSG_ERROR: in libbpf_netlink_recv()
|
| /linux/tools/bpf/bpftool/ |
| H A D | net.c | 186 case NLMSG_ERROR: in netlink_recv()
|
| /linux/tools/net/ynl/lib/ |
| H A D | ynl.c | 600 case NLMSG_ERROR: in __ynl_sock_read_msgs()
|
| /linux/net/ipv6/ |
| H A D | ip6mr.c | 801 nlh->nlmsg_type = NLMSG_ERROR; in ip6mr_destroy_unres() 1043 nlh->nlmsg_type = NLMSG_ERROR; in ip6mr_cache_resolve()
|