Home
last modified time | relevance | path

Searched refs:sk_pair (Results 1 - 9 of 9) sorted by relevance

/kernel/linux/linux-5.10/tools/testing/selftests/pidfd/
H A Dpidfd_getfd_test.c136 int ret, sk_pair[2]; in FIXTURE_SETUP() local
138 ASSERT_EQ(0, socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair)) { in FIXTURE_SETUP()
141 self->sk = sk_pair[0]; in FIXTURE_SETUP()
147 close(sk_pair[0]); in FIXTURE_SETUP()
148 if (child(sk_pair[1])) in FIXTURE_SETUP()
153 close(sk_pair[1]); in FIXTURE_SETUP()
162 ret = recv(sk_pair[0], &self->remote_fd, sizeof(self->remote_fd), 0); in FIXTURE_SETUP()
/kernel/linux/linux-6.6/tools/testing/selftests/pidfd/
H A Dpidfd_getfd_test.c136 int ret, sk_pair[2]; in FIXTURE_SETUP() local
138 ASSERT_EQ(0, socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair)) { in FIXTURE_SETUP()
141 self->sk = sk_pair[0]; in FIXTURE_SETUP()
147 close(sk_pair[0]); in FIXTURE_SETUP()
148 if (child(sk_pair[1])) in FIXTURE_SETUP()
153 close(sk_pair[1]); in FIXTURE_SETUP()
162 ret = recv(sk_pair[0], &self->remote_fd, sizeof(self->remote_fd), 0); in FIXTURE_SETUP()
/kernel/linux/linux-6.6/net/unix/
H A Dunix_bpf.c162 struct sock *sk_pair; in unix_stream_bpf_update_proto() local
164 /* Restore does not decrement the sk_pair reference yet because we must in unix_stream_bpf_update_proto()
182 if (!psock->sk_pair) { in unix_stream_bpf_update_proto()
183 sk_pair = unix_peer(sk); in unix_stream_bpf_update_proto()
184 sock_hold(sk_pair); in unix_stream_bpf_update_proto()
185 psock->sk_pair = sk_pair; in unix_stream_bpf_update_proto()
/kernel/linux/linux-5.10/samples/seccomp/
H A Duser-trap.c203 int sk_pair[2], ret = 1, status, listener; in main() local
206 if (socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair) < 0) { in main()
237 if (send_fd(sk_pair[1], listener) < 0) in main()
273 listener = recv_fd(sk_pair[0]); in main()
372 close(sk_pair[0]); in main()
373 close(sk_pair[1]); in main()
/kernel/linux/linux-6.6/samples/seccomp/
H A Duser-trap.c203 int sk_pair[2], ret = 1, status, listener; in main() local
206 if (socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair) < 0) { in main()
237 if (send_fd(sk_pair[1], listener) < 0) in main()
273 listener = recv_fd(sk_pair[0]); in main()
372 close(sk_pair[0]); in main()
373 close(sk_pair[1]); in main()
/kernel/linux/linux-6.6/tools/testing/selftests/seccomp/
H A Dseccomp_bpf.c3545 int status, listener, sk_pair[2]; in TEST() local
3555 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST()
3565 close(sk_pair[0]); in TEST()
3566 handled = sk_pair[1]; in TEST()
3581 close(sk_pair[1]); in TEST()
3593 EXPECT_EQ(read(sk_pair[0], &c, 1), 1); in TEST()
4545 int listener, status, sk_pair[2]; in TEST() local
4560 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST()
4576 close(sk_pair[0]); in TEST()
4577 handled = sk_pair[ in TEST()
4617 int listener, status, sk_pair[2]; TEST() local
[all...]
/kernel/linux/linux-5.10/tools/testing/selftests/seccomp/
H A Dseccomp_bpf.c3478 int status, listener, sk_pair[2]; in TEST() local
3488 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST()
3498 close(sk_pair[0]); in TEST()
3499 handled = sk_pair[1]; in TEST()
3514 close(sk_pair[1]); in TEST()
3526 EXPECT_EQ(read(sk_pair[0], &c, 1), 1); in TEST()
/kernel/linux/linux-6.6/include/linux/
H A Dskmsg.h109 struct sock *sk_pair; member
/kernel/linux/linux-6.6/net/core/
H A Dskmsg.c829 if (psock->sk_pair) in sk_psock_destroy()
830 sock_put(psock->sk_pair); in sk_psock_destroy()

Completed in 16 milliseconds