| /Linux-v5.4/samples/bpf/ |
| D | sock_flags_kern.c | 24 sk->type == SOCK_RAW && in bpf_prog1() 42 sk->type == SOCK_RAW && in bpf_prog2()
|
| D | sock_example.h | 18 sock = socket(PF_PACKET, SOCK_RAW | SOCK_NONBLOCK | SOCK_CLOEXEC, htons(ETH_P_ALL)); in open_raw_sock()
|
| D | xdp_router_ipv4_user.c | 328 sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); in get_route_table() 467 sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); in get_arp_table() 529 sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); in monitor_route() 547 sock_arp = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); in monitor_route()
|
| /Linux-v5.4/include/linux/ |
| D | sock_diag.h | 41 if (sk->sk_type == SOCK_RAW) in sock_diag_destroy_group() 53 if (sk->sk_type == SOCK_RAW) in sock_diag_destroy_group()
|
| D | net.h | 62 SOCK_RAW = 3, enumerator
|
| /Linux-v5.4/security/tomoyo/ |
| D | network.c | 36 [SOCK_RAW] = "raw", 151 [SOCK_RAW] = { 530 if (address->protocol == SOCK_RAW) in tomoyo_check_inet_address() 698 case SOCK_RAW: in tomoyo_socket_connect_permission() 735 case SOCK_RAW: in tomoyo_socket_bind_permission() 766 (type != SOCK_DGRAM && type != SOCK_RAW)) in tomoyo_socket_sendmsg_permission()
|
| /Linux-v5.4/net/nfc/ |
| D | rawsock.c | 66 if (sock->type == SOCK_RAW) in rawsock_release() 332 if ((sock->type != SOCK_SEQPACKET) && (sock->type != SOCK_RAW)) in rawsock_create() 335 if (sock->type == SOCK_RAW) in rawsock_create() 348 if (sock->type == SOCK_RAW) in rawsock_create()
|
| D | llcp_sock.c | 635 if (sock->type == SOCK_RAW) in llcp_sock_release() 870 sk->sk_type == SOCK_RAW) { in llcp_sock_recvmsg() 1009 sock->type != SOCK_RAW) in llcp_sock_create() 1012 if (sock->type == SOCK_RAW) { in llcp_sock_create()
|
| /Linux-v5.4/tools/testing/selftests/net/ |
| D | txring_overwrite.c | 79 fdr = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_IP)); in setup_rx() 92 fdt = socket(PF_PACKET, SOCK_RAW, 0); in setup_tx()
|
| D | msg_zerocopy.c | 501 if (type == SOCK_RAW) { in do_tx() 581 if (type == SOCK_RAW && protocol == IPPROTO_RAW) in do_setup_rx() 634 if (cfg_family == PF_INET && type == SOCK_RAW) { in do_flush_datagram() 795 do_test(PF_PACKET, SOCK_RAW, 0); in main() 799 do_test(cfg_family, SOCK_RAW, IPPROTO_EGP); in main() 801 do_test(cfg_family, SOCK_RAW, IPPROTO_RAW); in main()
|
| D | psock_snd.c | 223 fd = socket(PF_PACKET, cfg_use_dgram ? SOCK_DGRAM : SOCK_RAW, 0); in do_tx() 295 fd = socket(PF_PACKET, SOCK_RAW, 0); in setup_sniffer()
|
| D | psock_tpacket.c | 101 int ret, sock = socket(PF_PACKET, SOCK_RAW, 0); in pfsocket() 395 rcv_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); in walk_tx()
|
| /Linux-v5.4/arch/mips/include/asm/ |
| D | socket.h | 32 SOCK_RAW = 3, enumerator
|
| /Linux-v5.4/tools/testing/selftests/networking/timestamping/ |
| D | rxtimestamp.c | 62 { "ip", SOCK_RAW, IPPROTO_EGP }, 274 int port = (s.type == SOCK_RAW) ? 0 : next_port++; in run_test_case() 315 if (s.type == SOCK_RAW) in run_test_case()
|
| D | txtimestamp.c | 397 if (cfg_use_pf_packet || cfg_proto == SOCK_RAW) { in do_test() 468 if (cfg_use_pf_packet || cfg_proto == SOCK_RAW) { in do_test() 618 cfg_proto = SOCK_RAW; in parse_opt() 623 cfg_proto = SOCK_RAW; in parse_opt() 701 type = cfg_proto == SOCK_RAW ? SOCK_DGRAM : cfg_proto; in do_listen()
|
| /Linux-v5.4/net/ipv6/ |
| D | ipv6_sockglue.c | 63 if (sk->sk_type != SOCK_RAW || inet_sk(sk)->inet_num != IPPROTO_RAW) in ip6_ra_control() 176 if (sk->sk_type == SOCK_RAW) in do_ipv6_setsockopt() 938 if (level == SOL_IP && sk->sk_type != SOCK_RAW) in ipv6_setsockopt() 961 if (level == SOL_IP && sk->sk_type != SOCK_RAW) { in compat_ipv6_setsockopt() 1385 if (level == SOL_IP && sk->sk_type != SOCK_RAW) in ipv6_getsockopt() 1415 if (level == SOL_IP && sk->sk_type != SOCK_RAW) { in compat_ipv6_getsockopt()
|
| /Linux-v5.4/arch/um/drivers/ |
| D | vector_user.c | 160 fd = socket(AF_PACKET, SOCK_RAW, flags); in create_raw_fd() 471 dsthints.ai_socktype = SOCK_RAW; in user_init_socket_fds() 479 dsthints.ai_socktype = SOCK_RAW; in user_init_socket_fds()
|
| /Linux-v5.4/net/bluetooth/bnep/ |
| D | sock.c | 206 if (sock->type != SOCK_RAW) in bnep_sock_create()
|
| /Linux-v5.4/net/bluetooth/cmtp/ |
| D | sock.c | 209 if (sock->type != SOCK_RAW) in cmtp_sock_create()
|
| /Linux-v5.4/net/bluetooth/hidp/ |
| D | sock.c | 257 if (sock->type != SOCK_RAW) in hidp_sock_create()
|
| /Linux-v5.4/tools/testing/selftests/uevent/ |
| D | uevent_filtering.c | 93 sk_fd = socket(AF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, in uevent_listener()
|
| /Linux-v5.4/tools/lib/bpf/ |
| D | xsk.c | 157 umem->fd = socket(AF_XDP, SOCK_RAW, 0); in xsk_umem__create_v0_0_4() 510 xsk->fd = socket(AF_XDP, SOCK_RAW, 0); in xsk_socket__create()
|
| /Linux-v5.4/net/ipv4/ |
| D | ip_sockglue.c | 342 if (sk->sk_type != SOCK_RAW || inet_sk(sk)->inet_num == IPPROTO_RAW) in ip_ra_control() 738 if (sk->sk_type != SOCK_RAW && sk->sk_type != SOCK_DGRAM) in do_ip_setsockopt() 764 if (sk->sk_type != SOCK_RAW) { in do_ip_setsockopt() 771 if (sk->sk_type != SOCK_RAW) { in do_ip_setsockopt()
|
| /Linux-v5.4/net/bluetooth/ |
| D | l2cap_sock.c | 563 && sk->sk_type != SOCK_RAW) { in l2cap_sock_getsockopt() 1549 case SOCK_RAW: in l2cap_sock_init() 1631 sock->type != SOCK_DGRAM && sock->type != SOCK_RAW) in l2cap_sock_create() 1634 if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW)) in l2cap_sock_create()
|
| /Linux-v5.4/Documentation/networking/ |
| D | packet_mmap.txt | 80 where mode is SOCK_RAW for the raw interface were link level 170 So, whatever you choose for the socket mode (SOCK_DGRAM or SOCK_RAW), 175 the frame (for payload alignment with SOCK_RAW mode for instance) you 176 can set tp_net (with SOCK_DGRAM) or tp_mac (with SOCK_RAW). In order 620 int err, fd = socket(AF_PACKET, SOCK_RAW, htons(ETH_P_IP)); 807 fd = socket(AF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
|