| /OK3568_Linux_fs/kernel/tools/testing/selftests/net/ |
| H A D | msg_zerocopy.c | 334 if (domain != PF_PACKET && domain != PF_RDS) in do_setup_tx() 496 if (domain == PF_PACKET) { in do_tx() 523 if (domain == PF_PACKET || protocol == IPPROTO_RAW) { in do_tx() 577 if (domain == PF_PACKET) in do_setup_rx() 680 if (cfg_cork && (domain == PF_PACKET || type != SOCK_DGRAM)) in do_test() 794 do_test(PF_PACKET, SOCK_RAW, 0); in main() 796 do_test(PF_PACKET, SOCK_DGRAM, 0); in main()
|
| H A D | txring_overwrite.c | 79 fdr = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_IP)); in setup_rx() 92 fdt = socket(PF_PACKET, SOCK_RAW, 0); in setup_tx()
|
| H A D | psock_tpacket.c | 101 int ret, sock = socket(PF_PACKET, SOCK_RAW, 0); in pfsocket() 378 .sll_family = PF_PACKET, in walk_tx() 395 rcv_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); in walk_tx() 732 ring->ll.sll_family = PF_PACKET; in bind_ring()
|
| H A D | psock_snd.c | 223 fd = socket(PF_PACKET, cfg_use_dgram ? SOCK_DGRAM : SOCK_RAW, 0); in do_tx() 295 fd = socket(PF_PACKET, SOCK_RAW, 0); in setup_sniffer()
|
| H A D | psock_fanout.c | 66 fd = socket(PF_PACKET, SOCK_RAW, 0); in sock_fanout_open()
|
| H A D | txtimestamp.c | 515 fd = socket(cfg_use_pf_packet ? PF_PACKET : family, in do_test()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/bits/ |
| H A D | socket.h | 61 #define PF_PACKET 17 /* Packet family. */ macro 112 #define AF_PACKET PF_PACKET
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/bits/ |
| H A D | socket.h | 61 #define PF_PACKET 17 /* Packet family. */ macro 112 #define AF_PACKET PF_PACKET
|
| /OK3568_Linux_fs/kernel/samples/bpf/ |
| H A D | sock_example.h | 18 sock = socket(PF_PACKET, SOCK_RAW | SOCK_NONBLOCK | SOCK_CLOEXEC, htons(ETH_P_ALL)); in open_raw_sock()
|
| /OK3568_Linux_fs/kernel/net/packet/ |
| H A D | Kconfig | 24 Support for PF_PACKET sockets monitoring interface used by the ss tool.
|
| H A D | af_packet.c | 1514 if (sk->sk_family != PF_PACKET) in match_fanout_group() 3299 sk = sk_alloc(net, PF_PACKET, GFP_KERNEL, &packet_proto, kern); in packet_create() 3311 sk->sk_family = PF_PACKET; in packet_create() 4553 .family = PF_PACKET, 4573 .family = PF_PACKET, 4595 .family = PF_PACKET, 4689 sock_unregister(PF_PACKET); in packet_exit() 4715 sock_unregister(PF_PACKET); in packet_init() 4725 MODULE_ALIAS_NETPROTO(PF_PACKET);
|
| /OK3568_Linux_fs/kernel/Documentation/networking/ |
| H A D | packet_mmap.rst | 83 int fd = socket(PF_PACKET, mode, htons(ETH_P_ALL)); 126 int fd = socket(PF_PACKET, mode, 0); 875 ll.sll_family = PF_PACKET; 1015 This has the side-effect, that packets sent through PF_PACKET will bypass the 1018 and such packets are also not visible to other PF_PACKET sockets anymore. So, 1023 on PF_PACKET sockets. 1052 software fallback was invoked *within* PF_PACKET's processing code (less
|
| H A D | filter.rst | 132 sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); 143 The above example code attaches a socket filter for a PF_PACKET socket 151 Note that socket filters are not restricted to PF_PACKET sockets only,
|
| H A D | can.rst | 252 PF_PACKET socket, that also binds to a specific interface: 1430 - Uwe Koppe (CAN netdevices with PF_PACKET approach)
|
| /OK3568_Linux_fs/u-boot/arch/sandbox/cpu/ |
| H A D | eth-raw-os.c | 49 priv->sd = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); in _raw_packet_start()
|
| /OK3568_Linux_fs/app/forlinx/quectelCM/libmnl/dhcp/ |
| H A D | packet.c | 39 if((s = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP))) < 0) { in open_raw_socket()
|
| /OK3568_Linux_fs/kernel/tools/perf/trace/beauty/include/linux/ |
| H A D | socket.h | 249 #define PF_PACKET AF_PACKET macro
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | socket.h | 249 #define PF_PACKET AF_PACKET macro
|
| /OK3568_Linux_fs/kernel/net/ |
| H A D | socket.c | 1369 family = PF_PACKET; in __sock_create()
|
| /OK3568_Linux_fs/kernel/net/core/ |
| H A D | rtnetlink.c | 3766 if (idx < s_idx || idx == PF_PACKET) in rtnl_dump_all()
|
| /OK3568_Linux_fs/kernel/security/selinux/ |
| H A D | hooks.c | 1217 case PF_PACKET: in socket_type_to_security_class()
|