| /linux/tools/testing/selftests/pidfd/ |
| H A D | pidfd_getfd_test.c | 138 int ret, sk_pair[2]; in FIXTURE_SETUP() local 140 ASSERT_EQ(0, socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair)) { in FIXTURE_SETUP() 143 self->sk = sk_pair[0]; in FIXTURE_SETUP() 149 close(sk_pair[0]); in FIXTURE_SETUP() 150 if (child(sk_pair[1])) in FIXTURE_SETUP() 155 close(sk_pair[1]); in FIXTURE_SETUP() 164 ret = recv(sk_pair[0], &self->remote_fd, sizeof(self->remote_fd), 0); in FIXTURE_SETUP()
|
| /linux/net/unix/ |
| H A D | unix_bpf.c | 166 struct sock *sk_pair; in unix_stream_bpf_update_proto() local 168 /* Restore does not decrement the sk_pair reference yet because we must in unix_stream_bpf_update_proto() 186 if (!psock->sk_pair) { in unix_stream_bpf_update_proto() 187 sk_pair = unix_peer(sk); in unix_stream_bpf_update_proto() 188 if (unlikely(!sk_pair)) in unix_stream_bpf_update_proto() 191 sock_hold(sk_pair); in unix_stream_bpf_update_proto() 192 psock->sk_pair = sk_pair; in unix_stream_bpf_update_proto()
|
| /linux/samples/seccomp/ |
| H A D | user-trap.c | 207 int sk_pair[2], ret = 1, status, listener; in main() local 210 if (socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair) < 0) { in main() 241 if (send_fd(sk_pair[1], listener) < 0) in main() 277 listener = recv_fd(sk_pair[0]); in main() 376 close(sk_pair[0]); in main() 377 close(sk_pair[1]); in main()
|
| /linux/tools/testing/selftests/net/tcp_ao/ |
| H A D | connect-deny.c | 7 static volatile int sk_pair; variable 55 err = test_skpair_wait_poll(lsk, 0, poll_cnt, &sk_pair); in try_accept() 57 sk_pair = err; in try_accept() 186 ret = test_skpair_connect_poll(sk, this_ip_dest, port, cnt_expected, &sk_pair); in try_connect() 189 sk_pair = ret; in try_connect()
|
| H A D | unsigned-md5.c | 9 static volatile int sk_pair; variable 72 err = test_skpair_wait_poll(lsk, 0, poll_cnt, &sk_pair); in try_accept() 75 sk_pair = err; in try_accept() 291 ret = test_skpair_connect_poll(sk, this_ip_dest, port, 0, &sk_pair); in try_connect() 294 sk_pair = ret; in try_connect() 457 ret = test_skpair_connect_poll(sk, this_ip_dest, port, 0, &sk_pair); in try_to_add()
|
| /linux/tools/testing/selftests/seccomp/ |
| H A D | seccomp_bpf.c | 3573 int status, listener, sk_pair[2]; in TEST() 3583 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST() 3593 close(sk_pair[0]); in TEST() 3594 handled = sk_pair[1]; in TEST() 3609 close(sk_pair[1]); in TEST() 3621 EXPECT_EQ(read(sk_pair[0], &c, 1), 1); in TEST() 4648 int listener, status, sk_pair[2]; in TEST() 4663 ASSERT_EQ(socketpair(PF_LOCAL, SOCK_SEQPACKET, 0, sk_pair), 0); in TEST() 4679 close(sk_pair[0]); in TEST() 4680 handled = sk_pair[ in TEST() 3567 int status, listener, sk_pair[2]; TEST() local 4642 int listener, status, sk_pair[2]; TEST() local 4714 int listener, status, sk_pair[2]; TEST() local [all...] |
| /linux/net/core/ |
| H A D | skmsg.c | 882 if (psock->sk_pair) in sk_psock_destroy() 883 sock_put(psock->sk_pair); in sk_psock_destroy()
|
| /linux/include/linux/ |
| H A D | skmsg.h | 122 struct sock *sk_pair; member
|