Symbol: unix_sk
include/net/af_unix.h
58
#define unix_peer(sk) (unix_sk(sk)->peer)
include/net/af_unix.h
60
#define unix_state_lock(s) spin_lock(&unix_sk(s)->lock)
include/net/af_unix.h
61
#define unix_state_unlock(s) spin_unlock(&unix_sk(s)->lock)
net/unix/af_unix.c
1114
u = unix_sk(sk);
net/unix/af_unix.c
1263
dentry = unix_sk(sk)->path.dentry;
net/unix/af_unix.c
1265
touch_atime(&unix_sk(sk)->path);
net/unix/af_unix.c
1286
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
1351
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
1418
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
1526
if (unix_may_passcred(sk) && !READ_ONCE(unix_sk(sk)->addr)) {
net/unix/af_unix.c
1605
struct unix_sock *u = unix_sk(other);
net/unix/af_unix.c
1629
struct unix_sock *u = unix_sk(sk), *newu, *otheru;
net/unix/af_unix.c
1742
newu = unix_sk(newsk);
net/unix/af_unix.c
1745
otheru = unix_sk(other);
net/unix/af_unix.c
1865
wake_up_interruptible(&unix_sk(sk)->peer_wait);
net/unix/af_unix.c
1872
unix_update_edges(unix_sk(tsk));
net/unix/af_unix.c
188
if (a->sk_state == TCP_LISTEN && unix_sk(b)->listener == a)
net/unix/af_unix.c
1901
addr = smp_load_acquire(&unix_sk(sk)->addr);
net/unix/af_unix.c
192
if (b->sk_state == TCP_LISTEN && unix_sk(a)->listener == b)
net/unix/af_unix.c
2050
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
2061
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
2077
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
2310
struct unix_sock *ousk = unix_sk(other);
net/unix/af_unix.c
2403
otheru = unix_sk(other);
net/unix/af_unix.c
2544
struct unix_address *addr = smp_load_acquire(&unix_sk(sk)->addr);
net/unix/af_unix.c
2557
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
2677
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
2748
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
2798
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
2850
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
2927
u = unix_sk(sk);
net/unix/af_unix.c
3238
return READ_ONCE(unix_sk(sk)->inq_len);
net/unix/af_unix.c
3266
if (!smp_load_acquire(&unix_sk(sk)->addr))
net/unix/af_unix.c
3269
if (!unix_sk(sk)->path.dentry)
net/unix/af_unix.c
3272
return FD_ADD(O_CLOEXEC, dentry_open(&unix_sk(sk)->path, O_PATH, current_cred()));
net/unix/af_unix.c
3299
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
3364
if (READ_ONCE(unix_sk(sk)->oob_skb))
net/unix/af_unix.c
3539
struct unix_sock *u = unix_sk(s);
net/unix/af_unix.c
3596
__bpf_md_ptr(struct unix_sock *, unix_sk);
net/unix/af_unix.c
3601
struct unix_sock *unix_sk, uid_t uid)
net/unix/af_unix.c
3607
ctx.unix_sk = unix_sk;
net/unix/af_unix.c
3847
struct unix_sock *unix_sk, uid_t uid)
net/unix/af_unix.c
387
smp_store_release(&unix_sk(sk)->addr, addr);
net/unix/af_unix.c
3902
{ offsetof(struct bpf_iter__unix, unix_sk),
net/unix/af_unix.c
432
struct unix_sock *u = unix_sk(s);
net/unix/af_unix.c
462
struct dentry *dentry = unix_sk(s)->path.dentry;
net/unix/af_unix.c
507
__remove_wait_queue(&unix_sk(u->peer_wake.private)->peer_wait,
net/unix/af_unix.c
524
u = unix_sk(sk);
net/unix/af_unix.c
525
u_other = unix_sk(other);
net/unix/af_unix.c
545
u = unix_sk(sk);
net/unix/af_unix.c
546
u_other = unix_sk(other);
net/unix/af_unix.c
622
wake_up_interruptible_all(&unix_sk(sk)->peer_wait);
net/unix/af_unix.c
637
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
667
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
796
lockdep_assert_held(&unix_sk(peersk)->lock);
net/unix/af_unix.c
813
struct unix_sock *u = unix_sk(sk);
net/unix/af_unix.c
884
u = unix_sk(skb->sk);
net/unix/af_unix.c
902
u = unix_sk(sk);
net/unix/af_unix.c
933
struct unix_sock *u = unix_sk(sock->sk);
net/unix/diag.c
19
struct unix_address *addr = smp_load_acquire(&unix_sk(sk)->addr);
net/unix/diag.c
36
dentry = unix_sk(sk)->path.dentry;
net/unix/garbage.c
107
return unix_sk(sk);
net/unix/garbage.c
119
return unix_sk(edge->successor->listener)->vertex;
net/unix/garbage.c
276
unix_update_graph(unix_sk(receiver->listener)->vertex);
net/unix/unix_bpf.c
20
struct unix_sock *u = unix_sk(sk);
net/unix/unix_bpf.c
54
struct unix_sock *u = unix_sk(sk);
security/apparmor/af_unix.c
242
&unix_sk(sk)->path);
security/apparmor/af_unix.c
244
state = match_to_sk(rules->policy, state, request, unix_sk(sk),
security/apparmor/af_unix.c
304
&unix_sk(sk)->path);
security/apparmor/af_unix.c
307
unix_sk(sk), CMD_LISTEN, &p, &ad->info);
security/apparmor/af_unix.c
339
&unix_sk(sk)->path);
security/apparmor/af_unix.c
342
unix_sk(sk), &p, &ad->info);
security/apparmor/af_unix.c
370
&unix_sk(sk)->path);
security/apparmor/af_unix.c
372
state = match_to_cmd(rules->policy, state, request, unix_sk(sk),
security/apparmor/af_unix.c
416
unix_sk(sk),
security/apparmor/af_unix.c
470
is_unix_fs(sock->sk) ? &unix_sk(sock->sk)->path : NULL);
security/apparmor/af_unix.c
628
struct unix_sock *peeru = unix_sk(peer_sk);
security/apparmor/af_unix.c
629
struct unix_sock *u = unix_sk(sk);
security/apparmor/af_unix.c
631
struct sockaddr_un *paddr = aa_sunaddr(unix_sk(peer_sk), &plen);
security/apparmor/af_unix.c
662
spin_lock(&unix_sk(sk)->lock);
security/apparmor/af_unix.c
664
lockdep_is_held(&unix_sk(sk)->lock));
security/apparmor/af_unix.c
674
old = rcu_dereference_protected(ctx->peer, lockdep_is_held(&unix_sk(sk)->lock));
security/apparmor/af_unix.c
684
spin_unlock(&unix_sk(sk)->lock);
security/apparmor/af_unix.c
692
spin_lock(&unix_sk(sk)->lock);
security/apparmor/af_unix.c
694
lockdep_is_held(&unix_sk(sk)->lock));
security/apparmor/af_unix.c
703
spin_unlock(&unix_sk(sk)->lock);
security/apparmor/af_unix.c
737
addr = aa_sunaddr(unix_sk(sock->sk), &addrlen);
security/apparmor/af_unix.c
738
path = unix_sk(sock->sk)->path;
security/apparmor/af_unix.c
751
peer_addr = aa_sunaddr(unix_sk(peer_sk), &peer_addrlen);
security/apparmor/af_unix.c
755
peer_path = unix_sk(peer_sk)->path;
security/apparmor/include/af_unix.h
22
#define unix_peer(sk) (unix_sk(sk)->peer)
security/apparmor/include/af_unix.h
28
#define is_unix_anonymous(U) (!unix_sk(U)->addr)
security/apparmor/include/af_unix.h
30
unix_sk(U)->addr->name->sun_path[0])
security/apparmor/lsm.c
1133
lockdep_is_held(&unix_sk(peer_sk)->lock)));
security/apparmor/lsm.c
1138
lockdep_is_held(&unix_sk(peer_sk)->lock)),
security/apparmor/net.c
100
const struct unix_sock *u = unix_sk(sk);
security/landlock/task.c
241
lockdep_assert_held(&unix_sk(other)->lock);
security/landlock/task.c
249
struct unix_address *addr = unix_sk(sock)->addr;
security/lsm_audit.c
319
u = unix_sk(sk);
tools/testing/selftests/bpf/progs/bpf_iter_setsockopt_unix.c
16
static inline int cmpname(struct unix_sock *unix_sk)
tools/testing/selftests/bpf/progs/bpf_iter_setsockopt_unix.c
21
if (unix_sk->addr->name->sun_path[i] != sun_path[i])
tools/testing/selftests/bpf/progs/bpf_iter_setsockopt_unix.c
31
struct unix_sock *unix_sk = ctx->unix_sk;
tools/testing/selftests/bpf/progs/bpf_iter_setsockopt_unix.c
34
if (!unix_sk || !unix_sk->addr)
tools/testing/selftests/bpf/progs/bpf_iter_setsockopt_unix.c
37
if (unix_sk->addr->name->sun_path[0])
tools/testing/selftests/bpf/progs/bpf_iter_setsockopt_unix.c
40
if (cmpname(unix_sk))
tools/testing/selftests/bpf/progs/bpf_iter_setsockopt_unix.c
44
err = bpf_setsockopt(unix_sk, SOL_SOCKET, SO_SNDBUF,
tools/testing/selftests/bpf/progs/bpf_iter_setsockopt_unix.c
50
err = bpf_getsockopt(unix_sk, SOL_SOCKET, SO_SNDBUF,
tools/testing/selftests/bpf/progs/bpf_iter_unix.c
27
struct unix_sock *unix_sk = ctx->unix_sk;
tools/testing/selftests/bpf/progs/bpf_iter_unix.c
28
struct sock *sk = (struct sock *)unix_sk;
tools/testing/selftests/bpf/progs/bpf_iter_unix.c
32
if (!unix_sk)
tools/testing/selftests/bpf/progs/bpf_iter_unix.c
41
unix_sk,
tools/testing/selftests/bpf/progs/bpf_iter_unix.c
51
if (unix_sk->addr) {
tools/testing/selftests/bpf/progs/bpf_iter_unix.c
52
if (unix_sk->addr->name->sun_path[0]) {
tools/testing/selftests/bpf/progs/bpf_iter_unix.c
53
BPF_SEQ_PRINTF(seq, " %s", unix_sk->addr->name->sun_path);
tools/testing/selftests/bpf/progs/bpf_iter_unix.c
61
len = unix_sk->addr->len - sizeof(short);
tools/testing/selftests/bpf/progs/bpf_iter_unix.c
71
unix_sk->addr->name->sun_path[i] ?:
tools/testing/selftests/bpf/progs/test_skc_to_unix_sock.c
16
struct unix_sock *unix_sk;
tools/testing/selftests/bpf/progs/test_skc_to_unix_sock.c
22
unix_sk = (struct unix_sock *)bpf_skc_to_unix_sock(sock->sk);
tools/testing/selftests/bpf/progs/test_skc_to_unix_sock.c
23
if (!unix_sk)
tools/testing/selftests/bpf/progs/test_skc_to_unix_sock.c
26
if (unix_sk->addr->name->sun_path[0])
tools/testing/selftests/bpf/progs/test_skc_to_unix_sock.c
29
len = unix_sk->addr->len - sizeof(short);
tools/testing/selftests/bpf/progs/test_skc_to_unix_sock.c
35
path[i] = unix_sk->addr->name->sun_path[i];