Changes between Version 7 and Version 8 of LindSysCallManual


Ignore:
Timestamp:
Jan 18, 2013 2:04:05 PM (5 years ago)
Author:
nitin
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • LindSysCallManual

    v7 v8  
    579579 * Unit Test: 
    580580 
    581      No.      
     581     No. 
     582 
     583==== recv(2) ==== 
     584The call is used to receive messages from a socket. It is normally used on connected sockets. 
     585 
     586 * recv_syscall(fd, length, flags): 
     587 
     588     fd: File descriptor returned by socket syscall. 
     589     length: read length no. of bytes from socket. 
     590     flags: MSG_PEEK, O_NONBLOCK 
     591 
     592 * Return: 
     593 
     594     A string of size length. 
     595 
     596 * Errors: 
     597 
     598     EBADF, ENOTSOCK 
     599 
     600 * Status: 
     601 
     602     Actual. Syscall ref. no.: 36 
     603 
     604 * Unit Test: 
     605 
     606     No. 
     607 
     608==== recvfrom(2) ==== 
     609The call is used to receive messages from a socket, and may be used to receive data on a socket whether or not it is connection-oriented. 
     610 
     611 * recvfrom_syscall(fd, length, flags): 
     612 
     613     fd: File descriptor returned by socket syscall. 
     614     length: read length no. of bytes from socket. 
     615     flags: MSG_PEEK, O_NONBLOCK 
     616 
     617 * Return: 
     618 
     619     A string of size length. 
     620 
     621 * Errors: 
     622 
     623     EBADF, ENOTSOCK, ENOTCONN 
     624 
     625 * Status: 
     626 
     627     Actual. Syscall ref. no.: 37 
     628 
     629 * Unit Test: 
     630 
     631     Yes. Filename: [https://seattle.cs.washington.edu/browser/seattle/branches/nacl_repy/seattlelib/tests/ut_lind_net_recvfrom.py ut_lind_net_recvfrom.py] 
     632 
     633 * Know Bugs: 
     634   * Calling this with UDP and without binding raises an error. 
     635 
     636==== connect(2) ==== 
     637The connect system call connects the socket referred to by the file descriptor fd to the address specified. 
     638 
     639 * connect_syscall(fd, remoteip, remoteport): 
     640 
     641     fd: File descriptor returned by socket syscall. 
     642     remoteip: A string which represents IPv4 address. 
     643     remoteport: A positive integer 
     644 
     645 * Returns: 
     646 
     647     0 on success. 
     648 
     649 * Errors: 
     650 
     651     EBADF, ENOTSOCK, EISCONN, ENETUNREACH, ETIMEDOUT, EADDRINUSE, ECONNREFUSED 
     652 
     653 * Status: 
     654 
     655     Actual. Syscall ref. no.: 38 
     656 
     657 * Unit Test: 
     658 
     659     Yes. Filename: [https://seattle.cs.washington.edu/browser/seattle/branches/nacl_repy/seattlelib/tests/ut_lind_net_connect_basic_udp.py ut_lind_net_connect_basic_udp.py] 
     660 
     661==== listen(2) ==== 
     662listen marks the socket referred to by fd as a passive socket, that is, as a socket that will be used to accept incoming connection requests using accept(2). 
     663 
     664 * listen_syscall(fd, backlog): 
     665 
     666     fd: File descriptor returned by socket syscall. 
     667     backlog: a positive integer. 
     668 
     669 * Returns: 
     670 
     671     0 on success. 
     672 
     673 * Errors: 
     674 
     675     EBADF, ENOTSOCK, EOPNOTSUPP, EADDRINUSE 
     676 
     677 * Status: 
     678 
     679     Actual. Syscall ref. no.: 39 
     680 
     681 * Unit Test: 
     682 
     683     Yes. Filename: [https://seattle.cs.washington.edu/browser/seattle/branches/nacl_repy/seattlelib/tests/ut_lind_net_listen.py ut_lind_net_listen.py] 
     684 
    582685 
    583686=== Misc functions ===