Searched refs:PF_PACKET (Results 1 – 13 of 13) sorted by relevance
/linux-4.4.14/net/packet/ |
D | Kconfig | 23 Support for PF_PACKET sockets monitoring interface used by the ss tool.
|
D | af_packet.c | 1522 if (sk->sk_family != PF_PACKET) in match_fanout_group() 3063 sk = sk_alloc(net, PF_PACKET, GFP_KERNEL, &packet_proto, kern); in packet_create() 3074 sk->sk_family = PF_PACKET; in packet_create() 4271 .family = PF_PACKET, 4292 .family = PF_PACKET, 4313 .family = PF_PACKET, 4418 sock_unregister(PF_PACKET); in packet_exit() 4439 MODULE_ALIAS_NETPROTO(PF_PACKET);
|
/linux-4.4.14/tools/testing/selftests/net/ |
D | psock_tpacket.c | 113 int ret, sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); in pfsocket() 360 .sll_family = PF_PACKET, in walk_v1_v2_tx() 367 rcv_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); in walk_v1_v2_tx() 688 ring->ll.sll_family = PF_PACKET; in bind_ring()
|
D | psock_fanout.c | 78 fd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP)); in sock_fanout_open()
|
/linux-4.4.14/samples/bpf/ |
D | libbpf.c | 130 sock = socket(PF_PACKET, SOCK_RAW | SOCK_NONBLOCK | SOCK_CLOEXEC, htons(ETH_P_ALL)); in open_raw_sock()
|
/linux-4.4.14/include/linux/ |
D | socket.h | 225 #define PF_PACKET AF_PACKET macro
|
/linux-4.4.14/Documentation/networking/ |
D | packet_mmap.txt | 90 int fd = socket(PF_PACKET, mode, htons(ETH_P_ALL)); 134 int fd = socket(PF_PACKET, mode, 0); 856 ll.sll_family = PF_PACKET; 997 This has the side-effect, that packets sent through PF_PACKET will bypass the 1000 and such packets are also not visible to other PF_PACKET sockets anymore. So, 1005 on PF_PACKET sockets. 1033 software fallback was invoked *within* PF_PACKET's processing code (less
|
D | filter.txt | 125 sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); 136 The above example code attaches a socket filter for a PF_PACKET socket 144 Note that socket filters are not restricted to PF_PACKET sockets only,
|
D | can.txt | 284 PF_PACKET socket, that also binds to a specific interface: 1269 Uwe Koppe (CAN netdevices with PF_PACKET approach)
|
/linux-4.4.14/drivers/staging/lustre/lnet/lnet/ |
D | lib-socket.c | 529 rc = sock_create_lite(PF_PACKET, sock->type, IPPROTO_TCP, &newsock); in lnet_sock_accept()
|
/linux-4.4.14/net/ |
D | socket.c | 1115 family = PF_PACKET; in __sock_create()
|
/linux-4.4.14/net/core/ |
D | rtnetlink.c | 2500 if (idx < s_idx || idx == PF_PACKET) in rtnl_dump_all()
|
/linux-4.4.14/security/selinux/ |
D | hooks.c | 1241 case PF_PACKET: in socket_type_to_security_class()
|