/linux/samples/bpf/ |
A D | sock_flags_kern.c | 24 sk->type == SOCK_RAW && in bpf_prog1() 42 sk->type == SOCK_RAW && in bpf_prog2()
|
A D | sock_example.h | 18 sock = socket(PF_PACKET, SOCK_RAW | SOCK_NONBLOCK | SOCK_CLOEXEC, htons(ETH_P_ALL)); in open_raw_sock()
|
A D | xdp_router_ipv4_user.c | 332 sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); in get_route_table() 482 sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); in get_arp_table() 544 sock = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); in monitor_route() 562 sock_arp = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE); in monitor_route()
|
/linux/include/linux/ |
A D | sock_diag.h | 53 if (sk->sk_type == SOCK_RAW) in sock_diag_destroy_group() 65 if (sk->sk_type == SOCK_RAW) in sock_diag_destroy_group()
|
A D | net.h | 64 SOCK_RAW = 3, enumerator
|
/linux/security/tomoyo/ |
A D | network.c | 36 [SOCK_RAW] = "raw", 151 [SOCK_RAW] = { 530 if (address->protocol == SOCK_RAW) in tomoyo_check_inet_address() 698 case SOCK_RAW: in tomoyo_socket_connect_permission() 735 case SOCK_RAW: in tomoyo_socket_bind_permission() 766 (type != SOCK_DGRAM && type != SOCK_RAW)) in tomoyo_socket_sendmsg_permission()
|
/linux/net/nfc/ |
A D | rawsock.c | 66 if (sock->type == SOCK_RAW) in rawsock_release() 328 if ((sock->type != SOCK_SEQPACKET) && (sock->type != SOCK_RAW)) in rawsock_create() 331 if (sock->type == SOCK_RAW) { in rawsock_create() 347 if (sock->type == SOCK_RAW) in rawsock_create()
|
A D | llcp_sock.c | 641 if (sock->type == SOCK_RAW) in llcp_sock_release() 886 sk->sk_type == SOCK_RAW) { in llcp_sock_recvmsg() 1023 sock->type != SOCK_RAW) in llcp_sock_create() 1026 if (sock->type == SOCK_RAW) { in llcp_sock_create()
|
/linux/tools/testing/selftests/net/ |
A D | msg_zerocopy.c | 500 if (type == SOCK_RAW) { in do_tx() 580 if (type == SOCK_RAW && protocol == IPPROTO_RAW) in do_setup_rx() 633 if (cfg_family == PF_INET && type == SOCK_RAW) { in do_flush_datagram() 794 do_test(PF_PACKET, SOCK_RAW, 0); in main() 798 do_test(cfg_family, SOCK_RAW, IPPROTO_EGP); in main() 800 do_test(cfg_family, SOCK_RAW, IPPROTO_RAW); in main()
|
A D | txring_overwrite.c | 79 fdr = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_IP)); in setup_rx() 92 fdt = socket(PF_PACKET, SOCK_RAW, 0); in setup_tx()
|
A D | txtimestamp.c | 496 if (cfg_use_pf_packet || cfg_proto == SOCK_RAW) { in do_test() 581 if (cfg_use_pf_packet || cfg_proto == SOCK_RAW) { in do_test() 755 cfg_proto = SOCK_RAW; in parse_opt() 760 cfg_proto = SOCK_RAW; in parse_opt() 846 type = cfg_proto == SOCK_RAW ? SOCK_DGRAM : cfg_proto; in do_listen()
|
A D | rxtimestamp.c | 63 { "ip", SOCK_RAW, IPPROTO_EGP }, 290 port = (s->type == SOCK_RAW) ? 0 : next_port++; in run_test_case() 297 if (s->type == SOCK_RAW) in run_test_case()
|
A D | psock_snd.c | 223 fd = socket(PF_PACKET, cfg_use_dgram ? SOCK_DGRAM : SOCK_RAW, 0); in do_tx() 295 fd = socket(PF_PACKET, SOCK_RAW, 0); in setup_sniffer()
|
A D | psock_tpacket.c | 101 int ret, sock = socket(PF_PACKET, SOCK_RAW, 0); in pfsocket() 395 rcv_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); in walk_tx()
|
/linux/arch/mips/include/asm/ |
A D | socket.h | 32 SOCK_RAW = 3, enumerator
|
/linux/arch/um/drivers/ |
A D | vector_user.c | 168 fd = socket(AF_PACKET, SOCK_RAW, flags); in create_raw_fd() 560 dsthints.ai_socktype = SOCK_RAW; in user_init_socket_fds() 568 dsthints.ai_socktype = SOCK_RAW; in user_init_socket_fds()
|
/linux/net/ipv6/ |
A D | ipv6_sockglue.c | 65 if (sk->sk_type != SOCK_RAW || inet_sk(sk)->inet_num != IPPROTO_RAW) in ip6_ra_control() 431 if (sk->sk_type == SOCK_RAW) in do_ipv6_setsockopt() 1006 if (level == SOL_IP && sk->sk_type != SOCK_RAW) in ipv6_setsockopt() 1480 if (level == SOL_IP && sk->sk_type != SOCK_RAW) in ipv6_getsockopt()
|
/linux/net/bluetooth/bnep/ |
A D | sock.c | 204 if (sock->type != SOCK_RAW) in bnep_sock_create()
|
/linux/net/bluetooth/cmtp/ |
A D | sock.c | 207 if (sock->type != SOCK_RAW) in cmtp_sock_create()
|
/linux/net/bluetooth/hidp/ |
A D | sock.c | 255 if (sock->type != SOCK_RAW) in hidp_sock_create()
|
/linux/Documentation/networking/ |
A D | packet_mmap.rst | 85 where mode is SOCK_RAW for the raw interface were link level 175 So, whatever you choose for the socket mode (SOCK_DGRAM or SOCK_RAW), 181 the frame (for payload alignment with SOCK_RAW mode for instance) you 182 can set tp_net (with SOCK_DGRAM) or tp_mac (with SOCK_RAW). In order 645 int err, fd = socket(AF_PACKET, SOCK_RAW, htons(ETH_P_IP)); 832 fd = socket(AF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
|
/linux/tools/testing/selftests/uevent/ |
A D | uevent_filtering.c | 92 sk_fd = socket(AF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, in uevent_listener()
|
/linux/net/ipv4/ |
A D | ip_sockglue.c | 343 if (sk->sk_type != SOCK_RAW || inet_sk(sk)->inet_num == IPPROTO_RAW) in ip_ra_control() 1039 if (sk->sk_type != SOCK_RAW && sk->sk_type != SOCK_DGRAM) in do_ip_setsockopt() 1057 if (sk->sk_type != SOCK_RAW) { in do_ip_setsockopt() 1064 if (sk->sk_type != SOCK_RAW) { in do_ip_setsockopt()
|
/linux/net/bluetooth/ |
A D | l2cap_sock.c | 612 && sk->sk_type != SOCK_RAW) { in l2cap_sock_getsockopt() 1777 case SOCK_RAW: in l2cap_sock_init() 1859 sock->type != SOCK_DGRAM && sock->type != SOCK_RAW) in l2cap_sock_create() 1862 if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW)) in l2cap_sock_create()
|
/linux/tools/testing/vsock/ |
A D | vsock_diag_test.c | 259 fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_SOCK_DIAG); in read_vsock_stat()
|