Home
last modified time | relevance | path

Searched refs:path (Results 1 – 21 of 21) sorted by relevance

/kernel/
Daudit_watch.c39 char *path; /* insertion path */ member
110 kfree(watch->path); in audit_put_watch()
125 return watch->path; in audit_watch_path()
136 static struct audit_parent *audit_init_parent(const struct path *path) in audit_init_parent() argument
138 struct inode *inode = d_backing_inode(path->dentry); in audit_init_parent()
160 static struct audit_watch *audit_init_watch(char *path) in audit_init_watch() argument
170 watch->path = path; in audit_init_watch()
178 int audit_to_watch(struct audit_krule *krule, char *path, int len, u32 op) in audit_to_watch() argument
185 if (path[0] != '/' || path[len-1] == '/' || in audit_to_watch()
192 watch = audit_init_watch(path); in audit_to_watch()
[all …]
Daudit_fsnotify.c29 char *path; /* insertion path */ member
43 kfree(audit_mark->path); in audit_fsnotify_mark_free()
57 return mark->path; in audit_mark_path()
77 struct path path; in audit_alloc_mark() local
85 dentry = kern_path_locked(pathname, &path); in audit_alloc_mark()
88 inode = path.dentry->d_inode; in audit_alloc_mark()
99 audit_mark->path = pathname; in audit_alloc_mark()
105 audit_mark->path = NULL; in audit_alloc_mark()
111 path_put(&path); in audit_alloc_mark()
127 audit_log_untrustedstring(ab, audit_mark->path); in audit_mark_log_rule_change()
[all …]
Dumh.c113 retval = kernel_execve(sub_info->path, in call_usermodehelper_exec_async()
359 struct subprocess_info *call_usermodehelper_setup(const char *path, char **argv, in call_usermodehelper_setup() argument
373 sub_info->path = CONFIG_STATIC_USERMODEHELPER_PATH; in call_usermodehelper_setup()
375 sub_info->path = path; in call_usermodehelper_setup()
411 if (!sub_info->path) { in call_usermodehelper_exec()
426 if (strlen(sub_info->path) == 0) in call_usermodehelper_exec()
486 int call_usermodehelper(const char *path, char **argv, char **envp, int wait) in call_usermodehelper() argument
491 info = call_usermodehelper_setup(path, argv, envp, gfp_mask, in call_usermodehelper()
Daudit_tree.c685 struct path path; in audit_trim_trees() local
695 err = kern_path(tree->pathname, 0, &path); in audit_trim_trees()
699 root_mnt = collect_mounts(&path); in audit_trim_trees()
700 path_put(&path); in audit_trim_trees()
803 struct path path; in audit_add_tree_rule() local
828 err = kern_path(tree->pathname, 0, &path); in audit_add_tree_rule()
831 mnt = collect_mounts(&path); in audit_add_tree_rule()
832 path_put(&path); in audit_add_tree_rule()
874 struct path path1, path2; in audit_tag_tree()
Daudit.h130 struct path pwd;
234 extern int parent_len(const char *path);
235 extern int audit_compare_dname_path(const struct qstr *dname, const char *path, int plen);
269 extern int audit_to_watch(struct audit_krule *krule, char *path, int len,
Dauditfilter.c1276 int parent_len(const char *path) in parent_len() argument
1281 plen = strlen(path); in parent_len()
1287 p = path + plen - 1; in parent_len()
1288 while ((*p == '/') && (p > path)) in parent_len()
1292 while ((*p != '/') && (p > path)) in parent_len()
1299 return p - path; in parent_len()
1310 int audit_compare_dname_path(const struct qstr *dname, const char *path, int parentlen) in audit_compare_dname_path() argument
1316 pathlen = strlen(path); in audit_compare_dname_path()
1320 parentlen = parentlen == AUDIT_NAME_FULL ? parent_len(path) : parentlen; in audit_compare_dname_path()
1324 p = path + parentlen; in audit_compare_dname_path()
Daudit.c2143 const struct path *path) in audit_log_d_path() argument
2156 p = d_path(path, pathname, PATH_MAX+11); in audit_log_d_path()
Dauditsc.c1510 const struct path *path, int record_num, int *call_panic) in audit_log_name() argument
1520 if (path) in audit_log_name()
1521 audit_log_d_path(ab, " name=", path); in audit_log_name()
/kernel/bpf/
Dinode.c443 struct path path; in bpf_obj_do_pin() local
447 dentry = user_path_create(AT_FDCWD, pathname, &path, 0); in bpf_obj_do_pin()
453 ret = security_path_mknod(&path, dentry, mode, 0); in bpf_obj_do_pin()
457 dir = d_inode(path.dentry); in bpf_obj_do_pin()
477 done_path_create(&path, dentry); in bpf_obj_do_pin()
502 struct path path; in bpf_obj_do_get() local
506 ret = user_path_at(AT_FDCWD, pathname, LOOKUP_FOLLOW, &path); in bpf_obj_do_get()
510 inode = d_backing_inode(path.dentry); in bpf_obj_do_get()
511 ret = path_permission(&path, ACC_MODE(flags)); in bpf_obj_do_get()
521 touch_atime(&path); in bpf_obj_do_get()
[all …]
Doffload.c300 struct path ns_path; in bpf_prog_offload_info_fill()
525 struct path ns_path; in bpf_map_offload_info_fill()
/kernel/trace/
Dtrace_uprobe.c60 struct path path; member
370 path_put(&tu->path); in free_trace_uprobe()
416 struct inode *comp_inode = d_real_inode(comp->path.dentry); in trace_uprobe_has_same_uprobe()
420 if (comp_inode != d_real_inode(orig->path.dentry) || in trace_uprobe_has_same_uprobe()
479 struct inode *new_inode = d_real_inode(new->path.dentry); in validate_ref_ctr_offset()
482 if (new_inode == d_real_inode(tmp->path.dentry) && in validate_ref_ctr_offset()
548 struct path path; in __trace_uprobe_create() local
589 ret = kern_path(filename, LOOKUP_FOLLOW, &path); in __trace_uprobe_create()
596 if (!d_is_reg(path.dentry)) { in __trace_uprobe_create()
688 tu->path = path; in __trace_uprobe_create()
[all …]
Dtrace_event_perf.c306 char *path = NULL; in perf_uprobe_init() local
312 path = strndup_user(u64_to_user_ptr(p_event->attr.uprobe_path), in perf_uprobe_init()
314 if (IS_ERR(path)) { in perf_uprobe_init()
315 ret = PTR_ERR(path); in perf_uprobe_init()
318 if (path[0] == '\0') { in perf_uprobe_init()
323 tp_event = create_local_trace_uprobe(path, p_event->attr.probe_offset, in perf_uprobe_init()
341 kfree(path); in perf_uprobe_init()
Dtrace_seq.c324 int trace_seq_path(struct trace_seq *s, const struct path *path) in trace_seq_path() argument
338 seq_buf_path(&s->seq, path, "\n"); in trace_seq_path()
Dbpf_trace.c909 BPF_CALL_3(bpf_d_path, struct path *, path, char *, buf, u32, sz) in BPF_CALL_3() argument
911 struct path copy; in BPF_CALL_3()
923 len = copy_from_kernel_nofault(&copy, path, sizeof(*path)); in BPF_CALL_3()
967 BTF_ID_LIST_SINGLE(bpf_d_path_btf_ids, struct, path)
DKconfig472 path that can cause thread delay.
544 into the C conditionals to test which path a branch takes.
669 recursion or any unexpected execution path which leads to a kernel
/kernel/module/
DKconfig281 set the path where that binary is found. This can be changed
312 set here is the path to a text file containing the list of symbols,
313 one per line. The path can be absolute, or relative to the kernel
/kernel/sched/
Ddebug.c501 static void task_group_path(struct task_group *tg, char *path, int plen) in task_group_path() argument
503 if (autogroup_path(tg, path, plen)) in task_group_path()
506 cgroup_path(tg->css.cgroup, path, plen); in task_group_path()
/kernel/gcov/
Dfs.c413 static char *link_target(const char *dir, const char *path, const char *ext) in link_target() argument
419 copy = kstrdup(path, GFP_KERNEL); in link_target()
/kernel/events/
Dcore.c7817 if (filter->path.dentry) { in perf_event_addr_filters_exec()
8204 struct path ns_path; in perf_fill_ns_link_info()
8281 char *path; member
8286 char path[]; member
8314 __output_copy(&handle, cgroup_event->path, cgroup_event->path_size); in perf_event_cgroup_output()
8346 cgroup_event.path = path_enomem; in perf_event_cgroup()
8350 cgroup_event.path = pathname; in perf_event_cgroup()
8358 size = strlen(cgroup_event.path) + 1; in perf_event_cgroup()
8360 cgroup_event.path[size++] = '\0'; in perf_event_cgroup()
8606 if (!filter->path.dentry) in perf_addr_filter_match()
[all …]
/kernel/dma/
DKconfig17 # mapping fast path should select this option and set the dma_ops_bypass
/kernel/cgroup/
Dcgroup.c6853 struct cgroup *cgroup_get_from_path(const char *path) in cgroup_get_from_path() argument
6860 kn = kernfs_walk_and_get(root_cgrp->kn, path); in cgroup_get_from_path()