Home
last modified time | relevance | path

Searched refs:NLM_F_CAPPED (Results 1 – 6 of 6) sorted by relevance

/linux-6.3-rc2/tools/include/uapi/linux/
A Dnetlink.h77 #define NLM_F_CAPPED 0x100 /* request was capped */ macro
/linux-6.3-rc2/tools/lib/bpf/
A Dnlattr.c177 if (!(nlh->nlmsg_flags & NLM_F_CAPPED)) in libbpf_nla_dump_errormsg()
/linux-6.3-rc2/include/uapi/linux/
A Dnetlink.h86 #define NLM_F_CAPPED 0x100 /* request was capped */ macro
/linux-6.3-rc2/tools/net/ynl/lib/
A Dynl.py35 NLM_F_CAPPED = 0x100 variable in Netlink
/linux-6.3-rc2/Documentation/userspace-api/netlink/
A Dintro.rst219 is indicated by ``NLM_F_CAPPED`` in :c:member:`nlmsghdr.nlmsg_flags`.
330 __u16 nlmsg_flags: NLM_F_CAPPED /* There won't be a payload */
/linux-6.3-rc2/net/netlink/
A Daf_netlink.c2505 flags |= NLM_F_CAPPED; in netlink_ack()
2523 if (!(flags & NLM_F_CAPPED)) { in netlink_ack()

Completed in 18 milliseconds