Home
last modified time | relevance | path

Searched full:socket (Results 1 – 25 of 179) sorted by relevance

12345678

/Documentation/networking/
Dkcm.rst15 | KCM socket | | KCM socket | | KCM socket | | KCM socket |
46 written on a KCM socket are sent atomically on an appropriate TCP socket.
47 Similarly, in the receive path, messages are constructed on each TCP socket
48 (Psock) and complete messages are steered to a KCM socket.
54 for each bound TCP socket, this structure holds the state for constructing
63 can be used to send and receive messages from the KCM socket.
65 Socket types
68 KCM supports SOCK_DGRAM and SOCK_SEQPACKET socket types.
79 Filter (BPF) is used for this. When attaching a TCP socket to a multiplexor a
84 to a KCM socket.
[all …]
Dl2tp.rst28 associated with a socket. Each session is associated with a virtual
40 1) Create a tunnel socket. Exchange L2TP control protocol messages
41 with the peer over that socket in order to establish a tunnel.
47 tunnel socket in order to establish a session.
62 To create a tunnel socket for use by L2TP, the standard POSIX
63 socket API is used.
67 int sockfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
71 int sockfd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_L2TP);
73 UDP socket programming doesn't need to be covered here.
76 subsystem. The L2TPIP socket address is defined in struct
[all …]
Dphonet.rst12 and RPC. With the Linux Phonet socket family, Linux host processes can
80 The Phonet socket address family maps the Phonet packet header::
97 Applications can send Phonet messages using the Phonet datagram socket
98 protocol from the PF_PHONET family. Each socket is bound to one of the
109 fd = socket(PF_PHONET, SOCK_DGRAM, 0);
125 A Phonet datagram socket can be subscribed to any number of 8-bits
132 control request, or when the socket is closed.
134 Note that no more than one socket can be subscribed to any given
143 socket paradigm. The listening socket is bound to an unique free object
144 ID. Each listening socket can handle up to 255 simultaneous
[all …]
Dstrparser.rst21 callback of a TCP socket. Messages are parsed and delivered as they are
22 received on the socket.
48 socket associated with the stream parser for use with receive
99 the lower socket for strparser to process. This should be called
100 from a data_ready callback that is set on the socket. Note that
101 maximum messages size is the limit of the receive socket
102 buffer and message timeout is the receive timeout for the socket.
108 strp_check_rcv is called to check for new messages on the socket.
136 kernel, return control of the socket to userspace which
140 is unrecoverable (application expected to close TCP socket)
[all …]
Drds.rst21 applications to use a single socket to talk to any other process in the
23 to N*N if you use a connection-oriented socket transport like TCP.
34 the end point of a connection. All socket operations that involve
46 * Socket interface
49 socket. The next section will cover the details. At any rate,
50 all I/O is performed through the standard BSD socket API.
57 attaches it to the socket. Once bound, the transport assignment
67 Socket Interface
71 AF_RDS and PF_RDS are the domain type to be used with socket(2)
72 to create RDS sockets. SOL_RDS is the socket-level to be used
[all …]
Dmsg_zerocopy.rst9 The MSG_ZEROCOPY flag enables copy avoidance for socket send calls.
20 underlying copy avoidance mechanism to common socket send calls.
53 [PATCH net-next v4 0/9] socket sendmsg MSG_ZEROCOPY
63 Socket Setup
69 this flag, a process must first signal intent by setting a socket option:
87 the socket exceeds its optmem limit or the user exceeds their ulimit on
105 socket error queue, akin to the transmit timestamping interface.
107 The notification itself is a simple scalar value. Each socket
144 the socket. A socket that has an error queued would normally block
167 may arrive out of order on retransmission and socket teardown.
[all …]
Drxrpc.rst22 (#) Socket options.
174 connections are handled transparently. One client socket may be used to
175 make multiple simultaneous calls to the same service. One server socket
185 (#) Each internal UDP socket is retained [tunable] for a certain amount of
206 Interaction with the user of the RxRPC socket:
208 (#) A socket is made into a server socket by binding an address with a
219 socket. This may be overridden by supplying an alternate address to the
225 (#) A server socket may also be used to make client calls. To do this, the
271 (#) The server application has to provide the server socket with a keyring of
279 nominated by a socket option.
[all …]
Dtls-handshake.rst35 An open socket is passed to a handshake agent via a netlink operation,
36 which creates a socket descriptor in the agent's file descriptor table.
38 the socket to use the TLS ULP and sets the session information using the
39 SOL_TLS socket options. The handshake agent returns the socket to the
47 socket by invoking one of the tls_client_hello() functions. First, it
53 struct socket *ta_sock;
65 The @ta_sock field references an open and connected socket. The consumer
66 must hold a reference on the socket to prevent it from being destroyed
81 socket to be fully closed once both the kernel and the handshake agent
102 for this socket. The function returns a negative errno if the handshake
[all …]
Daf_xdp.rst23 An AF_XDP socket (XSK) is created with the normal socket()
25 TX ring. A socket can receive packets on the RX ring and it can send
28 to have at least one of these rings for each socket. An RX or TX
53 The socket is then finally bound with a bind() call to a device and a
61 with as well as its own newly created XSK socket. The new process will
65 process has to create its own socket with associated RX and TX rings,
93 In order to use an AF_XDP socket, a number of associated objects need
115 An AF_XDP is socket linked to a single UMEM, but one UMEM can have
116 multiple AF_XDP sockets. To share an UMEM created via one socket A,
117 the next socket B can do this by setting the XDP_SHARED_UMEM flag in
[all …]
Dtls.rst19 First create a new TCP socket and set the TLS ULP.
23 sock = socket(AF_INET, SOCK_STREAM, 0);
26 Setting the TLS ULP allows us to set/get TLS socket options. Currently
29 data-path to the kernel. There is a separate socket option for moving
67 After setting the TLS_TX socket option all application data sent over this
68 socket is encrypted using TLS and the parameters provided in the socket option.
96 -ENOMEM and some data was left on the socket buffer from a previous
97 call using MSG_MORE, the MSG_MORE data is left on the socket buffer.
102 After setting the TLS_RX socket option, all recv family socket calls
128 These messages can be sent over the socket by providing the TLS record type
[all …]
Dcan.rst13 socket API, the Linux network stack and implements the CAN device
14 drivers as network interfaces. The CAN socket API has been designed
22 Motivation / Why Using the Socket API
41 protocol family has been implemented which provides a socket interface
58 selects that protocol when opening the socket, and then can read and
67 socket(2) and using bind(2) to select a CAN interface and CAN ID, an
109 provide a socket interface to user space applications which builds
129 application opens a CAN RAW socket, the raw protocol module itself
176 separate socket. See sockopts from the CAN RAW sockets in :ref:`socketcan-raw-sockets`.
209 Like TCP/IP, you first need to open a socket for communicating over a
[all …]
Dmctp.rst11 The core code provides a socket-based interface to send and receive MCTP
12 messages, through an AF_MCTP, SOCK_DGRAM socket.
46 int sd = socket(AF_MCTP, SOCK_DGRAM, 0);
50 As with all socket address families, source and destination addresses are
77 socket system calls. These behaviours have been chosen to map closely to the
80 ``bind()`` : set local socket address
98 This establishes the local address of the socket. Incoming MCTP messages that
99 match the network, address, and message type will be received by this socket.
100 The reference to 'incoming' is important here; a bound socket will only receive
105 this socket. Given the above, the only valid value is ``MCTP_TAG_OWNER``, which
[all …]
Dsnmp_counter.rst33 ICMP and so on. If no one listens on a raw socket, only kernel
35 socket, all valid IP packets will be delivered.
95 raw socket, kernel will always deliver the packet to the raw socket
138 ICMP output path will check the header of a raw socket, so the
345 TCP socket is in LISTEN state, and kernel need to drop a packet,
356 stack will keep the socket in the TCP half-open queue. As it is in the
359 queue is still full, if it is not full, moves the socket to the accept
360 queue, if it is full, keeps the socket in the half-open queue, at next
361 time client replies ACK, this socket will get another chance to move
398 The socket receives a RST packet in Establish or CloseWait state.
[all …]
Dtproxy.rst8 To use it, enable the socket match and the TPROXY target in your kernel config.
17 socket on your box, set the packet mark to a certain value::
20 # iptables -t mangle -A PREROUTING -p tcp -m socket --transparent -j DIVERT
28 # nft add rule filter divert meta l4proto tcp socket transparent 1 meta mark set 1 accept
38 addresses. All you have to do is enable the (SOL_IP, IP_TRANSPARENT) socket
41 fd = socket(AF_INET, SOCK_STREAM, 0);
77 IP_TRANSPARENT) for the listening socket.
Dmptcp.rst40 Technically, when a new socket is created with the ``IPPROTO_MPTCP`` protocol
95 ``socket``:
99 int sd = socket(AF_INET(6), SOCK_STREAM, IPPROTO_MPTCP);
119 Socket options
122 MPTCP supports most socket options handled by TCP. It is possible some less
129 There are some MPTCP specific socket options at the ``SOL_MPTCP`` (284) level to
143 Note that at the TCP level, ``TCP_IS_MPTCP`` socket option can be used to know
150 A new socket type has been added for MPTCP for the userspace-facing socket. The
Ddccp.rst11 - Socket options
51 Socket options
75 service codes (RFC 4340, sec. 8.1.2); if this socket option is not set,
76 the socket will fall back to 0 (which means that no meaningful service code
92 time, combining the operation of the next two socket options. This option is
95 understood. This socket option takes as argument at least one uint8_t value, or
97 must be registered on the socket before calling connect() or listen().
105 DCCP_SOCKOPT_SERVER_TIMEWAIT enables the server (listening socket) to hold
108 state. When this boolean socket option is on, the server sends a Close instead
127 settings are inherited to the child socket after accept().
[all …]
/Documentation/bpf/
Dmap_sk_storage.rst11 ``BPF_MAP_TYPE_SK_STORAGE`` is used to provide socket-local storage for BPF
13 to be provided and acts as the handle for accessing the socket-local
15 locally with each socket instead of with the map. The kernel is responsible for
16 allocating storage for a socket when requested and for freeing the storage when
17 either the map or the socket is deleted.
22 socket-local storage.
37 Socket-local storage for ``map`` can be retrieved from socket ``sk`` using the
56 Socket-local storage for ``map`` can be deleted from socket ``sk`` using the
70 Socket-local storage for map ``map_fd`` can be added or updated locally to a
71 socket using the ``bpf_map_update_elem()`` libbpf function. The socket is
[all …]
Dprog_sk_lookup.rst8 into the socket lookup performed by the transport layer when a packet is to be
11 When invoked BPF sk_lookup program can select a socket that will receive the
20 binding sockets to an address with ``bind()`` socket call is impractical, such
29 Such setups would require creating and ``bind()``'ing one socket to each of the
31 latency spikes during socket lookup.
47 find a listening (TCP) or an unconnected (UDP) socket for an incoming packet.
54 ``SK_PASS`` signifies that the socket lookup should continue on to regular
58 A BPF sk_lookup program can also select a socket to receive the packet by
59 calling ``bpf_sk_assign()`` BPF helper. Typically, the program looks up a socket
62 selection. Selecting a socket only takes effect if the program has terminated
[all …]
Dmap_sockmap.rst13 redirect skbs between sockets or to apply policy at the socket level based on
19 index to look up a reference to a ``struct sock``. The map values are socket
21 holds references to sockets via their socket descriptors.
25 returning socket cookies to userspace. Returning the ``struct sock *`` that
34 When a socket is inserted into one of these maps, its socket callbacks are
89 This helper is used in programs implementing policies at the socket level. If
91 returns ``SK_PASS``), redirect it to the socket referenced by ``map`` (of type
105 Redirect the packet to the socket referenced by ``map`` (of type
119 socket entries of type ``struct sock *`` can be retrieved using the
137 by the socket being added. If the socket is already attached to BPF programs,
[all …]
Dprog_cgroup_sockopt.rst15 The context (``struct bpf_sockopt``) has associated socket (``sk``) and
24 and socket local storage.
50 This hook has access to the cgroup and socket local storage.
115 /* Custom socket option. */
123 /* Modify kernel's socket option. */
141 /* Custom socket option. */
148 /* Modify kernel's socket option. */
162 of BPF program that handles socket options.
/Documentation/admin-guide/perf/
Dnvidia-pmu.rst37 see /sys/bus/event_sources/devices/nvidia_scf_pmu_<socket-id>.
41 * Count event id 0x0 in socket 0::
45 * Count event id 0x0 in socket 1::
69 see /sys/bus/event_sources/devices/nvidia_nvlink_c2c0_pmu_<socket-id>.
73 * Count event id 0x0 from the GPU/CPU connected with socket 0::
77 * Count event id 0x0 from the GPU/CPU connected with socket 1::
81 * Count event id 0x0 from the GPU/CPU connected with socket 2::
85 * Count event id 0x0 from the GPU/CPU connected with socket 3::
99 see /sys/bus/event_sources/devices/nvidia_nvlink_c2c1_pmu_<socket-id>.
103 * Count event id 0x0 from the GPU connected with socket 0::
[all …]
Dqcom_l3_pmu.rst7 by all cores within a socket. Each slice is exposed as a separate uncore perf
8 PMU with device name l3cache_<socket>_<instance>. User space is responsible
14 consisting of one CPU per socket which will be used to handle all the PMU
15 events on that socket.
/Documentation/netlabel/
Dcipso_ipv4.rst23 adding the CIPSO label to the socket. This causes all packets leaving the
24 system through the socket to have the CIPSO IP option applied. The socket's
26 that it is set upon the socket's creation. The LSM can set the socket's CIPSO
29 generated and attached to the socket.
38 This is typically done at the socket layer using the 'socket_sock_rcv_skb()'
/Documentation/security/
DSCTP.rst74 addresses on a socket.
80 on an SCTP socket using multiple
112 Called whenever a new socket is created by **accept**\(2)
113 (i.e. a TCP style socket) or when a socket is 'peeled off' e.g userspace
177 | socket security_sctp_sk_clone() is
178 | called to clone the new socket.
219 Set the sctp ``@asoc sid`` to socket's sid (from ``asoc->base.sk``) with
221 TCP style sockets and peeled off connections as they cause a new socket
225 options are set on the socket.
260 Called whenever a new socket is created by **accept**\(2) (i.e. a TCP style
[all …]
/Documentation/hwmon/
Dk10temp.rst8 Socket F: Quad-Core/Six-Core/Embedded Opteron (but see below)
10 Socket AM2+: Quad-Core Opteron, Phenom (II) X3/X4, Athlon X2 (but see below)
12 Socket AM3: Quad-Core Opteron, Athlon/Phenom II X2/X3/X4, Sempron II
14 Socket S1G3: Athlon II, Sempron, Turion II
18 Socket S1G2: Athlon (X2), Sempron (X2), Turion X2 (Ultra)
93 All these processors have a sensor, but on those for Socket F or AM2+,
99 socket type, not the processor's actual capabilities. Therefore, if you

12345678