/kernel/linux/linux-5.10/tools/testing/selftests/pidfd/ |
H A D | pidfd_getfd_test.c | 136 int ret, sk_pair[2]; in FIXTURE_SETUP() local 138 ASSERT_EQ(0, socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair)) { in FIXTURE_SETUP() 141 self->sk = sk_pair[0]; in FIXTURE_SETUP() 147 close(sk_pair[0]); in FIXTURE_SETUP() 148 if (child(sk_pair[1])) in FIXTURE_SETUP() 153 close(sk_pair[1]); in FIXTURE_SETUP() 162 ret = recv(sk_pair[0], &self->remote_fd, sizeof(self->remote_fd), 0); in FIXTURE_SETUP()
|
/kernel/linux/linux-6.6/tools/testing/selftests/pidfd/ |
H A D | pidfd_getfd_test.c | 136 int ret, sk_pair[2]; in FIXTURE_SETUP() local 138 ASSERT_EQ(0, socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair)) { in FIXTURE_SETUP() 141 self->sk = sk_pair[0]; in FIXTURE_SETUP() 147 close(sk_pair[0]); in FIXTURE_SETUP() 148 if (child(sk_pair[1])) in FIXTURE_SETUP() 153 close(sk_pair[1]); in FIXTURE_SETUP() 162 ret = recv(sk_pair[0], &self->remote_fd, sizeof(self->remote_fd), 0); in FIXTURE_SETUP()
|
/kernel/linux/linux-6.6/net/unix/ |
H A D | unix_bpf.c | 162 struct sock *sk_pair; in unix_stream_bpf_update_proto() local 164 /* Restore does not decrement the sk_pair reference yet because we must in unix_stream_bpf_update_proto() 182 if (!psock->sk_pair) { in unix_stream_bpf_update_proto() 183 sk_pair = unix_peer(sk); in unix_stream_bpf_update_proto() 184 sock_hold(sk_pair); in unix_stream_bpf_update_proto() 185 psock->sk_pair = sk_pair; in unix_stream_bpf_update_proto()
|
/kernel/linux/linux-5.10/samples/seccomp/ |
H A D | user-trap.c | 203 int sk_pair[2], ret = 1, status, listener; in main() local 206 if (socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair) < 0) { in main() 237 if (send_fd(sk_pair[1], listener) < 0) in main() 273 listener = recv_fd(sk_pair[0]); in main() 372 close(sk_pair[0]); in main() 373 close(sk_pair[1]); in main()
|
/kernel/linux/linux-6.6/samples/seccomp/ |
H A D | user-trap.c | 203 int sk_pair[2], ret = 1, status, listener; in main() local 206 if (socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair) < 0) { in main() 237 if (send_fd(sk_pair[1], listener) < 0) in main() 273 listener = recv_fd(sk_pair[0]); in main() 372 close(sk_pair[0]); in main() 373 close(sk_pair[1]); in main()
|
/kernel/linux/linux-6.6/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 3545 int status, listener, sk_pair[2]; in TEST() local 3555 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST() 3565 close(sk_pair[0]); in TEST() 3566 handled = sk_pair[1]; in TEST() 3581 close(sk_pair[1]); in TEST() 3593 EXPECT_EQ(read(sk_pair[0], &c, 1), 1); in TEST() 4545 int listener, status, sk_pair[2]; in TEST() local 4560 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST() 4576 close(sk_pair[0]); in TEST() 4577 handled = sk_pair[ in TEST() 4617 int listener, status, sk_pair[2]; TEST() local [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 3478 int status, listener, sk_pair[2]; in TEST() local 3488 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST() 3498 close(sk_pair[0]); in TEST() 3499 handled = sk_pair[1]; in TEST() 3514 close(sk_pair[1]); in TEST() 3526 EXPECT_EQ(read(sk_pair[0], &c, 1), 1); in TEST()
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | skmsg.h | 109 struct sock *sk_pair; member
|
/kernel/linux/linux-6.6/net/core/ |
H A D | skmsg.c | 829 if (psock->sk_pair) in sk_psock_destroy() 830 sock_put(psock->sk_pair); in sk_psock_destroy()
|