/kernel/ |
D | audit_watch.c | 39 char *path; /* insertion path */ member 110 kfree(watch->path); in audit_put_watch() 125 return watch->path; in audit_watch_path() 136 static struct audit_parent *audit_init_parent(const struct path *path) in audit_init_parent() argument 138 struct inode *inode = d_backing_inode(path->dentry); in audit_init_parent() 160 static struct audit_watch *audit_init_watch(char *path) in audit_init_watch() argument 170 watch->path = path; in audit_init_watch() 178 int audit_to_watch(struct audit_krule *krule, char *path, int len, u32 op) in audit_to_watch() argument 185 if (path[0] != '/' || path[len-1] == '/' || in audit_to_watch() 192 watch = audit_init_watch(path); in audit_to_watch() [all …]
|
D | audit_fsnotify.c | 29 char *path; /* insertion path */ member 43 kfree(audit_mark->path); in audit_fsnotify_mark_free() 57 return mark->path; in audit_mark_path() 77 struct path path; in audit_alloc_mark() local 85 dentry = kern_path_locked(pathname, &path); in audit_alloc_mark() 88 inode = path.dentry->d_inode; in audit_alloc_mark() 99 audit_mark->path = pathname; in audit_alloc_mark() 105 audit_mark->path = NULL; in audit_alloc_mark() 111 path_put(&path); in audit_alloc_mark() 127 audit_log_untrustedstring(ab, audit_mark->path); in audit_mark_log_rule_change() [all …]
|
D | umh.c | 113 retval = kernel_execve(sub_info->path, in call_usermodehelper_exec_async() 359 struct subprocess_info *call_usermodehelper_setup(const char *path, char **argv, in call_usermodehelper_setup() argument 373 sub_info->path = CONFIG_STATIC_USERMODEHELPER_PATH; in call_usermodehelper_setup() 375 sub_info->path = path; in call_usermodehelper_setup() 411 if (!sub_info->path) { in call_usermodehelper_exec() 426 if (strlen(sub_info->path) == 0) in call_usermodehelper_exec() 486 int call_usermodehelper(const char *path, char **argv, char **envp, int wait) in call_usermodehelper() argument 491 info = call_usermodehelper_setup(path, argv, envp, gfp_mask, in call_usermodehelper()
|
D | audit_tree.c | 685 struct path path; in audit_trim_trees() local 695 err = kern_path(tree->pathname, 0, &path); in audit_trim_trees() 699 root_mnt = collect_mounts(&path); in audit_trim_trees() 700 path_put(&path); in audit_trim_trees() 803 struct path path; in audit_add_tree_rule() local 828 err = kern_path(tree->pathname, 0, &path); in audit_add_tree_rule() 831 mnt = collect_mounts(&path); in audit_add_tree_rule() 832 path_put(&path); in audit_add_tree_rule() 874 struct path path1, path2; in audit_tag_tree()
|
D | audit.h | 130 struct path pwd; 234 extern int parent_len(const char *path); 235 extern int audit_compare_dname_path(const struct qstr *dname, const char *path, int plen); 269 extern int audit_to_watch(struct audit_krule *krule, char *path, int len,
|
D | auditfilter.c | 1276 int parent_len(const char *path) in parent_len() argument 1281 plen = strlen(path); in parent_len() 1287 p = path + plen - 1; in parent_len() 1288 while ((*p == '/') && (p > path)) in parent_len() 1292 while ((*p != '/') && (p > path)) in parent_len() 1299 return p - path; in parent_len() 1310 int audit_compare_dname_path(const struct qstr *dname, const char *path, int parentlen) in audit_compare_dname_path() argument 1316 pathlen = strlen(path); in audit_compare_dname_path() 1320 parentlen = parentlen == AUDIT_NAME_FULL ? parent_len(path) : parentlen; in audit_compare_dname_path() 1324 p = path + parentlen; in audit_compare_dname_path()
|
D | audit.c | 2143 const struct path *path) in audit_log_d_path() argument 2156 p = d_path(path, pathname, PATH_MAX+11); in audit_log_d_path()
|
D | auditsc.c | 1510 const struct path *path, int record_num, int *call_panic) in audit_log_name() argument 1520 if (path) in audit_log_name() 1521 audit_log_d_path(ab, " name=", path); in audit_log_name()
|
/kernel/bpf/ |
D | inode.c | 443 struct path path; in bpf_obj_do_pin() local 447 dentry = user_path_create(AT_FDCWD, pathname, &path, 0); in bpf_obj_do_pin() 453 ret = security_path_mknod(&path, dentry, mode, 0); in bpf_obj_do_pin() 457 dir = d_inode(path.dentry); in bpf_obj_do_pin() 477 done_path_create(&path, dentry); in bpf_obj_do_pin() 502 struct path path; in bpf_obj_do_get() local 506 ret = user_path_at(AT_FDCWD, pathname, LOOKUP_FOLLOW, &path); in bpf_obj_do_get() 510 inode = d_backing_inode(path.dentry); in bpf_obj_do_get() 511 ret = path_permission(&path, ACC_MODE(flags)); in bpf_obj_do_get() 521 touch_atime(&path); in bpf_obj_do_get() [all …]
|
D | offload.c | 300 struct path ns_path; in bpf_prog_offload_info_fill() 525 struct path ns_path; in bpf_map_offload_info_fill()
|
/kernel/trace/ |
D | trace_uprobe.c | 60 struct path path; member 370 path_put(&tu->path); in free_trace_uprobe() 416 struct inode *comp_inode = d_real_inode(comp->path.dentry); in trace_uprobe_has_same_uprobe() 420 if (comp_inode != d_real_inode(orig->path.dentry) || in trace_uprobe_has_same_uprobe() 479 struct inode *new_inode = d_real_inode(new->path.dentry); in validate_ref_ctr_offset() 482 if (new_inode == d_real_inode(tmp->path.dentry) && in validate_ref_ctr_offset() 548 struct path path; in __trace_uprobe_create() local 589 ret = kern_path(filename, LOOKUP_FOLLOW, &path); in __trace_uprobe_create() 596 if (!d_is_reg(path.dentry)) { in __trace_uprobe_create() 688 tu->path = path; in __trace_uprobe_create() [all …]
|
D | trace_event_perf.c | 306 char *path = NULL; in perf_uprobe_init() local 312 path = strndup_user(u64_to_user_ptr(p_event->attr.uprobe_path), in perf_uprobe_init() 314 if (IS_ERR(path)) { in perf_uprobe_init() 315 ret = PTR_ERR(path); in perf_uprobe_init() 318 if (path[0] == '\0') { in perf_uprobe_init() 323 tp_event = create_local_trace_uprobe(path, p_event->attr.probe_offset, in perf_uprobe_init() 341 kfree(path); in perf_uprobe_init()
|
D | trace_seq.c | 324 int trace_seq_path(struct trace_seq *s, const struct path *path) in trace_seq_path() argument 338 seq_buf_path(&s->seq, path, "\n"); in trace_seq_path()
|
D | bpf_trace.c | 909 BPF_CALL_3(bpf_d_path, struct path *, path, char *, buf, u32, sz) in BPF_CALL_3() argument 911 struct path copy; in BPF_CALL_3() 923 len = copy_from_kernel_nofault(©, path, sizeof(*path)); in BPF_CALL_3() 967 BTF_ID_LIST_SINGLE(bpf_d_path_btf_ids, struct, path)
|
D | Kconfig | 472 path that can cause thread delay. 544 into the C conditionals to test which path a branch takes. 669 recursion or any unexpected execution path which leads to a kernel
|
/kernel/module/ |
D | Kconfig | 281 set the path where that binary is found. This can be changed 312 set here is the path to a text file containing the list of symbols, 313 one per line. The path can be absolute, or relative to the kernel
|
/kernel/sched/ |
D | debug.c | 501 static void task_group_path(struct task_group *tg, char *path, int plen) in task_group_path() argument 503 if (autogroup_path(tg, path, plen)) in task_group_path() 506 cgroup_path(tg->css.cgroup, path, plen); in task_group_path()
|
/kernel/gcov/ |
D | fs.c | 413 static char *link_target(const char *dir, const char *path, const char *ext) in link_target() argument 419 copy = kstrdup(path, GFP_KERNEL); in link_target()
|
/kernel/events/ |
D | core.c | 7817 if (filter->path.dentry) { in perf_event_addr_filters_exec() 8204 struct path ns_path; in perf_fill_ns_link_info() 8281 char *path; member 8286 char path[]; member 8314 __output_copy(&handle, cgroup_event->path, cgroup_event->path_size); in perf_event_cgroup_output() 8346 cgroup_event.path = path_enomem; in perf_event_cgroup() 8350 cgroup_event.path = pathname; in perf_event_cgroup() 8358 size = strlen(cgroup_event.path) + 1; in perf_event_cgroup() 8360 cgroup_event.path[size++] = '\0'; in perf_event_cgroup() 8606 if (!filter->path.dentry) in perf_addr_filter_match() [all …]
|
/kernel/dma/ |
D | Kconfig | 17 # mapping fast path should select this option and set the dma_ops_bypass
|
/kernel/cgroup/ |
D | cgroup.c | 6853 struct cgroup *cgroup_get_from_path(const char *path) in cgroup_get_from_path() argument 6860 kn = kernfs_walk_and_get(root_cgrp->kn, path); in cgroup_get_from_path()
|