Home
last modified time | relevance | path

Searched refs:PF_PACKET (Results 1 – 23 of 23) sorted by relevance

/openbmc/linux/tools/testing/selftests/net/
H A Dmsg_zerocopy.c337 if (domain != PF_PACKET && domain != PF_RDS) in do_setup_tx()
500 if (domain == PF_PACKET) { in do_tx()
527 if (domain == PF_PACKET || protocol == IPPROTO_RAW) { in do_tx()
584 if (domain == PF_PACKET) in do_setup_rx()
687 if (cfg_cork && (domain == PF_PACKET || type != SOCK_DGRAM)) in do_test()
804 do_test(PF_PACKET, SOCK_RAW, 0); in main()
806 do_test(PF_PACKET, SOCK_DGRAM, 0); in main()
H A Dtxring_overwrite.c79 fdr = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_IP)); in setup_rx()
92 fdt = socket(PF_PACKET, SOCK_RAW, 0); in setup_tx()
H A Dpsock_tpacket.c101 int ret, sock = socket(PF_PACKET, SOCK_RAW, 0); in pfsocket()
378 .sll_family = PF_PACKET, in walk_tx()
395 rcv_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); in walk_tx()
732 ring->ll.sll_family = PF_PACKET; in bind_ring()
H A Dpsock_snd.c223 fd = socket(PF_PACKET, cfg_use_dgram ? SOCK_DGRAM : SOCK_RAW, 0); in do_tx()
295 fd = socket(PF_PACKET, SOCK_RAW, 0); in setup_sniffer()
H A Dcsum.c378 fd = socket(PF_PACKET, SOCK_RAW, 0); in open_packet()
550 fd = socket(PF_PACKET, SOCK_DGRAM, 0); in recv_prepare_packet()
H A Dpsock_fanout.c70 fd = socket(PF_PACKET, SOCK_RAW, 0); in sock_fanout_open()
H A Dtoeplitz.c346 fd = socket(PF_PACKET, SOCK_DGRAM, 0); in create_ring()
H A Dgro.c809 txfd = socket(PF_PACKET, SOCK_RAW, IPPROTO_RAW); in gro_sender()
912 rxfd = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_NONE)); in gro_receiver()
H A Dtxtimestamp.c515 fd = socket(cfg_use_pf_packet ? PF_PACKET : family, in do_test()
/openbmc/linux/samples/bpf/
H A Dsock_example.h18 sock = socket(PF_PACKET, SOCK_RAW | SOCK_NONBLOCK | SOCK_CLOEXEC, htons(ETH_P_ALL)); in open_raw_sock()
/openbmc/linux/net/packet/
H A DKconfig24 Support for PF_PACKET sockets monitoring interface used by the ss tool.
H A Daf_packet.c1615 if (sk->sk_family != PF_PACKET) in match_fanout_group()
3423 sk = sk_alloc(net, PF_PACKET, GFP_KERNEL, &packet_proto, kern); in packet_create()
3435 sk->sk_family = PF_PACKET; in packet_create()
4702 .family = PF_PACKET,
4721 .family = PF_PACKET,
4742 .family = PF_PACKET,
4836 sock_unregister(PF_PACKET); in packet_exit()
4874 MODULE_ALIAS_NETPROTO(PF_PACKET);
/openbmc/u-boot/arch/sandbox/cpu/
H A Deth-raw-os.c89 priv->sd = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); in _raw_packet_start()
/openbmc/linux/Documentation/networking/
H A Dpacket_mmap.rst83 int fd = socket(PF_PACKET, mode, htons(ETH_P_ALL));
126 int fd = socket(PF_PACKET, mode, 0);
874 ll.sll_family = PF_PACKET;
1014 This has the side-effect, that packets sent through PF_PACKET will bypass the
1017 and such packets are also not visible to other PF_PACKET sockets anymore. So,
1022 on PF_PACKET sockets.
1051 software fallback was invoked *within* PF_PACKET's processing code (less
H A Dfilter.rst139 sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
150 The above example code attaches a socket filter for a PF_PACKET socket
158 Note that socket filters are not restricted to PF_PACKET sockets only,
H A Dcan.rst268 PF_PACKET socket, that also binds to a specific interface:
1501 - Uwe Koppe (CAN netdevices with PF_PACKET approach)
/openbmc/linux/tools/perf/trace/beauty/include/linux/
H A Dsocket.h265 #define PF_PACKET AF_PACKET macro
/openbmc/linux/include/linux/
H A Dsocket.h265 #define PF_PACKET AF_PACKET macro
/openbmc/inarp/
H A Dinarp.c117 addr.sll_family = PF_PACKET; in send_arp_packet()
/openbmc/linux/net/
H A Dsocket.c192 [PF_PACKET] = "PF_PACKET",
1523 family = PF_PACKET; in __sock_create()
/openbmc/qemu/linux-user/
H A Dstrace.c455 case PF_PACKET: in print_socket_domain()
/openbmc/linux/net/core/
H A Drtnetlink.c3988 if (idx < s_idx || idx == PF_PACKET) in rtnl_dump_all()
/openbmc/linux/security/selinux/
H A Dhooks.c1230 case PF_PACKET: in socket_type_to_security_class()