Searched refs:errmsg (Results 1 – 11 of 11) sorted by relevance
| /net/netfilter/ |
| A D | xt_addrtype.c | 158 const char *errmsg = "both incoming and outgoing interface limitation cannot be selected"; in addrtype_mt_checkentry_v1() local 168 errmsg = "output interface limitation not valid in PREROUTING and INPUT"; in addrtype_mt_checkentry_v1() 175 errmsg = "input interface limitation not valid in POSTROUTING and OUTPUT"; in addrtype_mt_checkentry_v1() 182 errmsg = "ipv6 BLACKHOLE matching not supported"; in addrtype_mt_checkentry_v1() 186 errmsg = "ipv6 PROHIBIT (THROW, NAT ..) matching not supported"; in addrtype_mt_checkentry_v1() 190 errmsg = "ipv6 does not support BROADCAST matching"; in addrtype_mt_checkentry_v1() 197 pr_info_ratelimited("%s\n", errmsg); in addrtype_mt_checkentry_v1()
|
| A D | nf_conntrack_timeout.c | 70 const char *errmsg = NULL; in nf_ct_set_timeout() local 77 errmsg = "Timeout policy base is empty"; in nf_ct_set_timeout() 119 if (errmsg) in nf_ct_set_timeout() 120 pr_info_ratelimited("%s\n", errmsg); in nf_ct_set_timeout()
|
| A D | xt_policy.c | 132 const char *errmsg = "neither incoming nor outgoing policy selected"; in policy_mt_check() local 139 errmsg = "output policy not valid in PREROUTING and INPUT"; in policy_mt_check() 144 errmsg = "input policy not valid in POSTROUTING and OUTPUT"; in policy_mt_check() 148 errmsg = "too many policy elements"; in policy_mt_check() 153 pr_info_ratelimited("%s\n", errmsg); in policy_mt_check()
|
| A D | xt_HMARK.c | 310 const char *errmsg = "proto mask must be zero with L3 mode"; in hmark_tg_check() local 327 errmsg = "spi-set and port-set can't be combined"; in hmark_tg_check() 332 pr_info_ratelimited("%s\n", errmsg); in hmark_tg_check()
|
| /net/smc/ |
| A D | smc_stats.c | 278 goto errmsg; in smc_nl_get_stats() 283 goto errmsg; in smc_nl_get_stats() 323 errmsg: in smc_nl_get_stats() 349 goto errmsg; in smc_nl_get_fback_details() 383 errmsg: in smc_nl_get_fback_details()
|
| A D | smc_core.c | 267 goto errmsg; in smc_nl_get_sys_info() 304 errmsg: in smc_nl_get_sys_info() 432 goto errmsg; in smc_nl_fill_lgr_link() 474 errmsg: in smc_nl_fill_lgr_link() 490 goto errmsg; in smc_nl_handle_lgr() 508 errmsg: in smc_nl_handle_lgr() 550 goto errmsg; in smc_nl_fill_smcd_lgr() 602 errmsg: in smc_nl_fill_smcd_lgr()
|
| A D | smc_ism.c | 310 goto errmsg; in smc_nl_handle_smcd_dev() 353 errmsg: in smc_nl_handle_smcd_dev()
|
| A D | smc_ib.c | 568 goto errmsg; in smc_nl_handle_smcr_dev() 601 errmsg: in smc_nl_handle_smcr_dev()
|
| /net/caif/ |
| A D | cfpkt_skbuff.c | 17 #define PKT_ERROR(pkt, errmsg) \ argument 21 pr_warn(errmsg); \
|
| /net/netlink/ |
| A D | af_netlink.c | 2470 struct nlmsgerr *errmsg; in netlink_ack() local 2471 size_t payload = sizeof(*errmsg); in netlink_ack() 2494 NLMSG_ERROR, sizeof(*errmsg), flags); in netlink_ack() 2497 errmsg = nlmsg_data(rep); in netlink_ack() 2498 errmsg->error = err; in netlink_ack() 2499 errmsg->msg = *nlh; in netlink_ack() 2505 memcpy(nlmsg_data(&errmsg->msg), nlmsg_data(nlh), in netlink_ack()
|
| /net/netfilter/ipset/ |
| A D | ip_set_core.c | 1765 struct nlmsgerr *errmsg; in call_ad() local 1767 sizeof(*errmsg) + nlmsg_len(nlh)); in call_ad() 1778 errmsg = nlmsg_data(rep); in call_ad() 1779 errmsg->error = ret; in call_ad() 1780 unsafe_memcpy(&errmsg->msg, nlh, nlh->nlmsg_len, in call_ad() 1783 cmdattr = (void *)&errmsg->msg + min_len; in call_ad()
|
Completed in 34 milliseconds