Home
last modified time | relevance | path

Searched refs:sk_pair (Results 1 – 6 of 6) sorted by relevance

/linux-6.12.1/tools/testing/selftests/pidfd/
Dpidfd_getfd_test.c138 int ret, sk_pair[2]; in FIXTURE_SETUP() local
140 ASSERT_EQ(0, socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair)) { in FIXTURE_SETUP()
143 self->sk = sk_pair[0]; in FIXTURE_SETUP()
149 close(sk_pair[0]); in FIXTURE_SETUP()
150 if (child(sk_pair[1])) in FIXTURE_SETUP()
155 close(sk_pair[1]); in FIXTURE_SETUP()
164 ret = recv(sk_pair[0], &self->remote_fd, sizeof(self->remote_fd), 0); in FIXTURE_SETUP()
/linux-6.12.1/net/unix/
Dunix_bpf.c165 struct sock *sk_pair; in unix_stream_bpf_update_proto() local
185 if (!psock->sk_pair) { in unix_stream_bpf_update_proto()
186 sk_pair = unix_peer(sk); in unix_stream_bpf_update_proto()
187 sock_hold(sk_pair); in unix_stream_bpf_update_proto()
188 psock->sk_pair = sk_pair; in unix_stream_bpf_update_proto()
/linux-6.12.1/samples/seccomp/
Duser-trap.c207 int sk_pair[2], ret = 1, status, listener; in main() local
210 if (socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair) < 0) { in main()
241 if (send_fd(sk_pair[1], listener) < 0) in main()
277 listener = recv_fd(sk_pair[0]); in main()
376 close(sk_pair[0]); in main()
377 close(sk_pair[1]); in main()
/linux-6.12.1/tools/testing/selftests/seccomp/
Dseccomp_bpf.c3546 int status, listener, sk_pair[2]; in TEST() local
3556 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST()
3566 close(sk_pair[0]); in TEST()
3567 handled = sk_pair[1]; in TEST()
3582 close(sk_pair[1]); in TEST()
3594 EXPECT_EQ(read(sk_pair[0], &c, 1), 1); in TEST()
4621 int listener, status, sk_pair[2]; in TEST() local
4636 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST()
4652 close(sk_pair[0]); in TEST()
4653 handled = sk_pair[1]; in TEST()
[all …]
/linux-6.12.1/include/linux/
Dskmsg.h118 struct sock *sk_pair; member
/linux-6.12.1/net/core/
Dskmsg.c830 if (psock->sk_pair) in sk_psock_destroy()
831 sock_put(psock->sk_pair); in sk_psock_destroy()