Home
last modified time | relevance | path

Searched refs:sk_pair (Results 1 – 6 of 6) sorted by relevance

/linux-6.6.21/tools/testing/selftests/pidfd/
Dpidfd_getfd_test.c136 int ret, sk_pair[2]; in FIXTURE_SETUP() local
138 ASSERT_EQ(0, socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair)) { in FIXTURE_SETUP()
141 self->sk = sk_pair[0]; in FIXTURE_SETUP()
147 close(sk_pair[0]); in FIXTURE_SETUP()
148 if (child(sk_pair[1])) in FIXTURE_SETUP()
153 close(sk_pair[1]); in FIXTURE_SETUP()
162 ret = recv(sk_pair[0], &self->remote_fd, sizeof(self->remote_fd), 0); in FIXTURE_SETUP()
/linux-6.6.21/net/unix/
Dunix_bpf.c162 struct sock *sk_pair; in unix_stream_bpf_update_proto() local
182 if (!psock->sk_pair) { in unix_stream_bpf_update_proto()
183 sk_pair = unix_peer(sk); in unix_stream_bpf_update_proto()
184 sock_hold(sk_pair); in unix_stream_bpf_update_proto()
185 psock->sk_pair = sk_pair; in unix_stream_bpf_update_proto()
/linux-6.6.21/samples/seccomp/
Duser-trap.c203 int sk_pair[2], ret = 1, status, listener; in main() local
206 if (socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair) < 0) { in main()
237 if (send_fd(sk_pair[1], listener) < 0) in main()
273 listener = recv_fd(sk_pair[0]); in main()
372 close(sk_pair[0]); in main()
373 close(sk_pair[1]); in main()
/linux-6.6.21/tools/testing/selftests/seccomp/
Dseccomp_bpf.c3545 int status, listener, sk_pair[2]; in TEST() local
3555 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST()
3565 close(sk_pair[0]); in TEST()
3566 handled = sk_pair[1]; in TEST()
3581 close(sk_pair[1]); in TEST()
3593 EXPECT_EQ(read(sk_pair[0], &c, 1), 1); in TEST()
4545 int listener, status, sk_pair[2]; in TEST() local
4560 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST()
4576 close(sk_pair[0]); in TEST()
4577 handled = sk_pair[1]; in TEST()
[all …]
/linux-6.6.21/include/linux/
Dskmsg.h109 struct sock *sk_pair; member
/linux-6.6.21/net/core/
Dskmsg.c829 if (psock->sk_pair) in sk_psock_destroy()
830 sock_put(psock->sk_pair); in sk_psock_destroy()