Home
last modified time | relevance | path

Searched refs:PF_PACKET (Results 1 – 14 of 14) sorted by relevance

/Linux-v4.19/tools/testing/selftests/net/
Dmsg_zerocopy.c335 if (domain != PF_PACKET && domain != PF_RDS) in do_setup_tx()
497 if (domain == PF_PACKET) { in do_tx()
524 if (domain == PF_PACKET || protocol == IPPROTO_RAW) { in do_tx()
578 if (domain == PF_PACKET) in do_setup_rx()
680 if (cfg_cork && (domain == PF_PACKET || type != SOCK_DGRAM)) in do_test()
794 do_test(PF_PACKET, SOCK_RAW, 0); in main()
796 do_test(PF_PACKET, SOCK_DGRAM, 0); in main()
Dpsock_tpacket.c115 int ret, sock = socket(PF_PACKET, SOCK_RAW, 0); in pfsocket()
392 .sll_family = PF_PACKET, in walk_tx()
409 rcv_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); in walk_tx()
746 ring->ll.sll_family = PF_PACKET; in bind_ring()
Dpsock_snd.c223 fd = socket(PF_PACKET, cfg_use_dgram ? SOCK_DGRAM : SOCK_RAW, 0); in do_tx()
295 fd = socket(PF_PACKET, SOCK_RAW, 0); in setup_sniffer()
Dpsock_fanout.c80 fd = socket(PF_PACKET, SOCK_RAW, 0); in sock_fanout_open()
/Linux-v4.19/samples/bpf/
Dsock_example.h18 sock = socket(PF_PACKET, SOCK_RAW | SOCK_NONBLOCK | SOCK_CLOEXEC, htons(ETH_P_ALL)); in open_raw_sock()
/Linux-v4.19/net/packet/
DKconfig23 Support for PF_PACKET sockets monitoring interface used by the ss tool.
Daf_packet.c1498 if (sk->sk_family != PF_PACKET) in match_fanout_group()
3199 sk = sk_alloc(net, PF_PACKET, GFP_KERNEL, &packet_proto, kern); in packet_create()
3210 sk->sk_family = PF_PACKET; in packet_create()
4429 .family = PF_PACKET,
4450 .family = PF_PACKET,
4474 .family = PF_PACKET,
4566 sock_unregister(PF_PACKET); in packet_exit()
4587 MODULE_ALIAS_NETPROTO(PF_PACKET);
/Linux-v4.19/Documentation/networking/
Dpacket_mmap.txt78 int fd = socket(PF_PACKET, mode, htons(ETH_P_ALL));
122 int fd = socket(PF_PACKET, mode, 0);
849 ll.sll_family = PF_PACKET;
990 This has the side-effect, that packets sent through PF_PACKET will bypass the
993 and such packets are also not visible to other PF_PACKET sockets anymore. So,
998 on PF_PACKET sockets.
1026 software fallback was invoked *within* PF_PACKET's processing code (less
Dfilter.txt125 sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
136 The above example code attaches a socket filter for a PF_PACKET socket
144 Note that socket filters are not restricted to PF_PACKET sockets only,
Dcan.rst252 PF_PACKET socket, that also binds to a specific interface:
1430 - Uwe Koppe (CAN netdevices with PF_PACKET approach)
/Linux-v4.19/include/linux/
Dsocket.h234 #define PF_PACKET AF_PACKET macro
/Linux-v4.19/net/
Dsocket.c1229 family = PF_PACKET; in __sock_create()
/Linux-v4.19/net/core/
Drtnetlink.c3277 if (idx < s_idx || idx == PF_PACKET) in rtnl_dump_all()
/Linux-v4.19/security/selinux/
Dhooks.c1408 case PF_PACKET: in socket_type_to_security_class()