Home
last modified time | relevance | path

Searched refs:sk_pair (Results 1 – 6 of 6) sorted by relevance

/linux/tools/testing/selftests/pidfd/
H A Dpidfd_getfd_test.c138 int ret, sk_pair[2]; in FIXTURE_SETUP() local
140 ASSERT_EQ(0, socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair)) { in FIXTURE_SETUP()
143 self->sk = sk_pair[0]; in FIXTURE_SETUP()
149 close(sk_pair[0]); in FIXTURE_SETUP()
150 if (child(sk_pair[1])) in FIXTURE_SETUP()
155 close(sk_pair[1]); in FIXTURE_SETUP()
164 ret = recv(sk_pair[0], &self->remote_fd, sizeof(self->remote_fd), 0); in FIXTURE_SETUP()
/linux/net/unix/
H A Dunix_bpf.c165 struct sock *sk_pair; in unix_stream_bpf_update_proto() local
185 if (!psock->sk_pair) { in unix_stream_bpf_update_proto()
186 sk_pair = unix_peer(sk); in unix_stream_bpf_update_proto()
187 sock_hold(sk_pair); in unix_stream_bpf_update_proto()
188 psock->sk_pair = sk_pair; in unix_stream_bpf_update_proto()
/linux/samples/seccomp/
H A Duser-trap.c207 int sk_pair[2], ret = 1, status, listener; in main() local
210 if (socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair) < 0) { in main()
241 if (send_fd(sk_pair[1], listener) < 0) in main()
277 listener = recv_fd(sk_pair[0]); in main()
376 close(sk_pair[0]); in main()
377 close(sk_pair[1]); in main()
/linux/tools/testing/selftests/seccomp/
H A Dseccomp_bpf.c3551 int status, listener, sk_pair[2]; in TEST() local
3561 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST()
3571 close(sk_pair[0]); in TEST()
3572 handled = sk_pair[1]; in TEST()
3587 close(sk_pair[1]); in TEST()
3599 EXPECT_EQ(read(sk_pair[0], &c, 1), 1); in TEST()
4626 int listener, status, sk_pair[2]; in TEST() local
4641 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST()
4657 close(sk_pair[0]); in TEST()
4658 handled = sk_pair[1]; in TEST()
[all …]
/linux/include/linux/
H A Dskmsg.h120 struct sock *sk_pair; member
/linux/net/core/
H A Dskmsg.c838 if (psock->sk_pair) in sk_psock_destroy()
839 sock_put(psock->sk_pair); in sk_psock_destroy()