/kernel/ |
D | audit_watch.c | 51 char *path; /* insertion path */ member 122 kfree(watch->path); in audit_put_watch() 137 return watch->path; in audit_watch_path() 148 static struct audit_parent *audit_init_parent(struct path *path) in audit_init_parent() argument 150 struct inode *inode = d_backing_inode(path->dentry); in audit_init_parent() 172 static struct audit_watch *audit_init_watch(char *path) in audit_init_watch() argument 182 watch->path = path; in audit_init_watch() 190 int audit_to_watch(struct audit_krule *krule, char *path, int len, u32 op) in audit_to_watch() argument 197 if (path[0] != '/' || path[len-1] == '/' || in audit_to_watch() 203 watch = audit_init_watch(path); in audit_to_watch() [all …]
|
D | audit_fsnotify.c | 38 char *path; /* insertion path */ member 52 kfree(audit_mark->path); in audit_fsnotify_mark_free() 66 return mark->path; in audit_mark_path() 86 struct path path; in audit_alloc_mark() local 94 dentry = kern_path_locked(pathname, &path); in audit_alloc_mark() 97 inode = path.dentry->d_inode; in audit_alloc_mark() 108 audit_mark->path = pathname; in audit_alloc_mark() 119 path_put(&path); in audit_alloc_mark() 138 audit_log_untrustedstring(ab, audit_mark->path); in audit_mark_log_rule_change() 183 inode = ((struct path *)data)->dentry->d_inode; in audit_mark_handle_event() [all …]
|
D | audit.h | 132 struct path pwd; 215 struct audit_names *n, struct path *path, 235 extern int parent_len(const char *path); 236 extern int audit_compare_dname_path(const char *dname, const char *path, int plen); 273 extern int audit_to_watch(struct audit_krule *krule, char *path, int len, u32 op);
|
D | kmod.c | 252 retval = do_execve(getname_kernel(sub_info->path), in call_usermodehelper_exec_async() 519 struct subprocess_info *call_usermodehelper_setup(char *path, char **argv, in call_usermodehelper_setup() argument 531 sub_info->path = path; in call_usermodehelper_setup() 560 if (!sub_info->path) { in call_usermodehelper_exec() 616 int call_usermodehelper(char *path, char **argv, char **envp, int wait) in call_usermodehelper() argument 621 info = call_usermodehelper_setup(path, argv, envp, gfp_mask, in call_usermodehelper()
|
D | audit_tree.c | 593 struct path path; in audit_trim_trees() local 604 err = kern_path(tree->pathname, 0, &path); in audit_trim_trees() 608 root_mnt = collect_mounts(&path); in audit_trim_trees() 609 path_put(&path); in audit_trim_trees() 710 struct path path; in audit_add_tree_rule() local 735 err = kern_path(tree->pathname, 0, &path); in audit_add_tree_rule() 738 mnt = collect_mounts(&path); in audit_add_tree_rule() 739 path_put(&path); in audit_add_tree_rule() 781 struct path path1, path2; in audit_tag_tree()
|
D | auditfilter.c | 1240 int parent_len(const char *path) in parent_len() argument 1245 plen = strlen(path); in parent_len() 1251 p = path + plen - 1; in parent_len() 1252 while ((*p == '/') && (p > path)) in parent_len() 1256 while ((*p != '/') && (p > path)) in parent_len() 1263 return p - path; in parent_len() 1274 int audit_compare_dname_path(const char *dname, const char *path, int parentlen) in audit_compare_dname_path() argument 1280 pathlen = strlen(path); in audit_compare_dname_path() 1284 parentlen = parentlen == AUDIT_NAME_FULL ? parent_len(path) : parentlen; in audit_compare_dname_path() 1288 p = path + parentlen; in audit_compare_dname_path()
|
D | sysctl_binary.c | 1214 static const struct bin_table *get_sysctl(const int *name, int nlen, char *path) in get_sysctl() argument 1223 memcpy(path, "sys/", 4); in get_sysctl() 1224 path += 4; in get_sysctl() 1246 memcpy(path, dev->name, len); in get_sysctl() 1253 memcpy(path, table->procname, len); in get_sysctl() 1256 path += len; in get_sysctl() 1258 *path++ = '/'; in get_sysctl() 1262 *path = '\0'; in get_sysctl()
|
D | audit.c | 1648 const struct path *path) in audit_log_d_path() argument 1661 p = d_path(path, pathname, PATH_MAX+11); in audit_log_d_path() 1763 struct path *path, int record_num, int *call_panic) in audit_log_name() argument 1772 if (path) in audit_log_name() 1773 audit_log_d_path(ab, " name=", path); in audit_log_name() 1951 void audit_log_link_denied(const char *operation, struct path *link) in audit_log_link_denied()
|
D | cgroup.c | 6245 struct cgroup *cgroup_get_from_path(const char *path) in cgroup_get_from_path() argument 6252 kn = kernfs_walk_and_get(cgrp_dfl_root.cgrp.kn, path); in cgroup_get_from_path()
|
/kernel/bpf/ |
D | inode.c | 202 struct path path; in bpf_obj_do_pin() local 207 dentry = kern_path_create(AT_FDCWD, pathname->name, &path, 0); in bpf_obj_do_pin() 214 ret = security_path_mknod(&path, dentry, mode, devt); in bpf_obj_do_pin() 218 dir = d_inode(path.dentry); in bpf_obj_do_pin() 228 done_path_create(&path, dentry); in bpf_obj_do_pin() 261 struct path path; in bpf_obj_do_get() local 265 ret = kern_path(pathname->name, LOOKUP_FOLLOW, &path); in bpf_obj_do_get() 269 inode = d_backing_inode(path.dentry); in bpf_obj_do_get() 280 touch_atime(&path); in bpf_obj_do_get() 282 path_put(&path); in bpf_obj_do_get() [all …]
|
/kernel/trace/ |
D | trace_seq.c | 326 int trace_seq_path(struct trace_seq *s, const struct path *path) in trace_seq_path() argument 340 seq_buf_path(&s->seq, path, "\n"); in trace_seq_path()
|
D | trace_uprobe.c | 365 struct path path; in create_trace_uprobe() local 442 ret = kern_path(filename, LOOKUP_FOLLOW, &path); in create_trace_uprobe() 446 inode = igrab(d_inode(path.dentry)); in create_trace_uprobe() 447 path_put(&path); in create_trace_uprobe()
|
D | Kconfig | 325 into the C conditionals to test which path a branch takes.
|
/kernel/gcov/ |
D | fs.c | 303 static char *link_target(const char *dir, const char *path, const char *ext) in link_target() argument 309 copy = kstrdup(path, GFP_KERNEL); in link_target()
|
/kernel/events/ |
D | core.c | 8147 struct path path; in perf_event_parse_addr_filter() local 8238 ret = kern_path(filename, LOOKUP_FOLLOW, &path); in perf_event_parse_addr_filter() 8242 filter->inode = igrab(d_inode(path.dentry)); in perf_event_parse_addr_filter() 8243 path_put(&path); in perf_event_parse_addr_filter()
|