| /kernel/ |
| A D | audit_watch.c | 110 kfree(watch->path); in audit_put_watch() 125 return watch->path; in audit_watch_path() 136 static struct audit_parent *audit_init_parent(const struct path *path) in audit_init_parent() argument 170 watch->path = path; in audit_init_watch() 185 if (path[0] != '/' || path[len-1] == '/' || in audit_to_watch() 205 char *path; in audit_dupe_watch() local 208 path = kstrdup(old->path, GFP_KERNEL); in audit_dupe_watch() 209 if (unlikely(!path)) in audit_dupe_watch() 214 kfree(path); in audit_dupe_watch() 378 if (strcmp(watch->path, w->path)) in audit_add_to_parent() [all …]
|
| A D | audit_fsnotify.c | 29 char *path; /* insertion path */ member 43 kfree(audit_mark->path); in audit_fsnotify_mark_free() 57 return mark->path; in audit_mark_path() 77 struct path path; in audit_alloc_mark() local 85 dentry = kern_path_locked(pathname, &path); in audit_alloc_mark() 88 inode = path.dentry->d_inode; in audit_alloc_mark() 99 audit_mark->path = pathname; in audit_alloc_mark() 105 audit_mark->path = NULL; in audit_alloc_mark() 111 path_put(&path); in audit_alloc_mark() 127 audit_log_untrustedstring(ab, audit_mark->path); in audit_mark_log_rule_change() [all …]
|
| A D | umh.c | 109 retval = kernel_execve(sub_info->path, in call_usermodehelper_exec_async() 355 struct subprocess_info *call_usermodehelper_setup(const char *path, char **argv, in call_usermodehelper_setup() argument 369 sub_info->path = CONFIG_STATIC_USERMODEHELPER_PATH; in call_usermodehelper_setup() 371 sub_info->path = path; in call_usermodehelper_setup() 407 if (!sub_info->path) { in call_usermodehelper_exec() 422 if (strlen(sub_info->path) == 0) in call_usermodehelper_exec() 482 int call_usermodehelper(const char *path, char **argv, char **envp, int wait) in call_usermodehelper() argument 487 info = call_usermodehelper_setup(path, argv, envp, gfp_mask, in call_usermodehelper()
|
| A D | audit_tree.c | 679 struct path path; in audit_trim_trees() local 681 struct path *paths; in audit_trim_trees() 682 struct path array[16]; in audit_trim_trees() 695 path_put(&path); in audit_trim_trees() 806 struct path path; in audit_add_tree_rule() local 807 struct path array[16]; in audit_add_tree_rule() 808 struct path *paths; in audit_add_tree_rule() 836 path_put(&path); in audit_add_tree_rule() 878 struct path path1, path2; in audit_tag_tree() 879 struct path array[16]; in audit_tag_tree() [all …]
|
| A D | audit.h | 131 struct path pwd; 235 extern int parent_len(const char *path); 236 extern int audit_compare_dname_path(const struct qstr *dname, const char *path, int plen); 270 extern int audit_to_watch(struct audit_krule *krule, char *path, int len,
|
| A D | auditfilter.c | 1278 int parent_len(const char *path) in parent_len() argument 1283 plen = strlen(path); in parent_len() 1289 p = path + plen - 1; in parent_len() 1290 while ((*p == '/') && (p > path)) in parent_len() 1294 while ((*p != '/') && (p > path)) in parent_len() 1301 return p - path; in parent_len() 1312 int audit_compare_dname_path(const struct qstr *dname, const char *path, int parentlen) in audit_compare_dname_path() argument 1318 pathlen = strlen(path); in audit_compare_dname_path() 1323 parentlen = parent_len(path); in audit_compare_dname_path() 1325 p = path + parentlen; in audit_compare_dname_path()
|
| A D | Makefile | 184 find "$${d}/generated" ! -path "include/generated/utsversion.h" -a -name "*.h" -print; \ 193 find "$(srctree)/$${d}" -path "$(srctree)/$${d}/generated" -prune -o -name "*.h" -print; \
|
| A D | Kconfig.kexec | 169 For the kexec_file_load() syscall path, specify the maximum number of 181 For the kexec_load() syscall path, CRASH_MAX_MEMORY_RANGES is part of
|
| A D | audit.c | 2141 const struct path *path) in audit_log_d_path() argument 2154 p = d_path(path, pathname, PATH_MAX+11); in audit_log_d_path()
|
| A D | auditsc.c | 1513 const struct path *path, int record_num, int *call_panic) in audit_log_name() argument 1523 if (path) in audit_log_name() 1524 audit_log_d_path(ab, " name=", path); in audit_log_name()
|
| /kernel/bpf/ |
| A D | inode.c | 441 struct path path; in bpf_obj_do_pin() local 449 dir = d_inode(path.dentry); in bpf_obj_do_pin() 474 done_path_create(&path, dentry); in bpf_obj_do_pin() 499 struct path path; in bpf_obj_do_get() local 507 inode = d_backing_inode(path.dentry); in bpf_obj_do_get() 518 touch_atime(&path); in bpf_obj_do_get() 520 path_put(&path); in bpf_obj_do_get() 523 path_put(&path); in bpf_obj_do_get() 586 struct path path; in bpf_prog_get_type_path() local 592 touch_atime(&path); in bpf_prog_get_type_path() [all …]
|
| A D | token.c | 119 struct path path; in bpf_token_create() local 127 path = fd_file(f)->f_path; in bpf_token_create() 128 sb = path.dentry->d_sb; in bpf_token_create() 130 if (path.dentry != sb->s_root) in bpf_token_create() 134 err = path_permission(&path, MAY_ACCESS); in bpf_token_create() 169 file = alloc_file_pseudo(inode, path.mnt, BPF_TOKEN_INODE_NAME, O_RDWR, &bpf_token_fops); in bpf_token_create() 191 err = security_bpf_token_create(token, attr, &path); in bpf_token_create()
|
| A D | offload.c | 471 struct path ns_path; in bpf_prog_offload_info_fill() 681 struct path ns_path; in bpf_map_offload_info_fill()
|
| /kernel/trace/ |
| A D | trace_uprobe.c | 63 struct path path; member 374 path_put(&tu->path); in free_trace_uprobe() 550 struct path path; in __trace_uprobe_create() local 603 if (!d_is_reg(path.dentry)) { in __trace_uprobe_create() 700 tu->path = path; in __trace_uprobe_create() 739 path_put(&path); in __trace_uprobe_create() 1643 struct path path; in create_local_trace_uprobe() local 1650 if (!d_is_reg(path.dentry)) { in create_local_trace_uprobe() 1651 path_put(&path); in create_local_trace_uprobe() 1666 path_put(&path); in create_local_trace_uprobe() [all …]
|
| A D | trace_event_perf.c | 302 char *path = NULL; in perf_uprobe_init() local 308 path = strndup_user(u64_to_user_ptr(p_event->attr.uprobe_path), in perf_uprobe_init() 310 if (IS_ERR(path)) { in perf_uprobe_init() 311 ret = PTR_ERR(path); in perf_uprobe_init() 314 if (path[0] == '\0') { in perf_uprobe_init() 319 tp_event = create_local_trace_uprobe(path, p_event->attr.probe_offset, in perf_uprobe_init() 337 kfree(path); in perf_uprobe_init()
|
| A D | trace_seq.c | 322 int trace_seq_path(struct trace_seq *s, const struct path *path) in trace_seq_path() argument 336 seq_buf_path(&s->seq, path, "\n"); in trace_seq_path()
|
| A D | bpf_trace.c | 903 BPF_CALL_3(bpf_d_path, struct path *, path, char *, buf, u32, sz) in BPF_CALL_3() argument 905 struct path copy; in BPF_CALL_3() 917 len = copy_from_kernel_nofault(©, path, sizeof(*path)); in BPF_CALL_3() 3070 struct path path; member 3102 path_put(&umulti_link->path); in bpf_uprobe_multi_link_release() 3195 p = d_path(&umulti_link->path, buf, PATH_MAX); in bpf_uprobe_multi_show_fdinfo() 3336 struct path path; in bpf_uprobe_multi_link_attach() local 3378 err = kern_path(name, LOOKUP_FOLLOW, &path); in bpf_uprobe_multi_link_attach() 3383 if (!d_is_reg(path.dentry)) { in bpf_uprobe_multi_link_attach() 3438 link->path = path; in bpf_uprobe_multi_link_attach() [all …]
|
| A D | Kconfig | 546 path that can cause thread delay. 618 into the C conditionals to test which path a branch takes. 769 recursion or any unexpected execution path which leads to a kernel
|
| /kernel/gcov/ |
| A D | fs.c | 413 static char *link_target(const char *dir, const char *path, const char *ext) in link_target() argument 419 copy = kstrdup(path, GFP_KERNEL); in link_target()
|
| /kernel/sched/ |
| A D | debug.c | 697 static void task_group_path(struct task_group *tg, char *path, int plen) in task_group_path() argument 699 if (autogroup_path(tg, path, plen)) in task_group_path() 702 cgroup_path(tg->css.cgroup, path, plen); in task_group_path()
|
| /kernel/module/ |
| A D | Kconfig | 427 set the path where that binary is found. This can be changed 457 set here is the path to a text file containing the list of symbols, 458 one per line. The path can be absolute, or relative to the kernel
|
| /kernel/events/ |
| A D | core.c | 8650 if (filter->path.dentry) { in perf_event_addr_filters_exec() 9082 struct path ns_path; in perf_fill_ns_link_info() 9159 char *path; member 9164 char path[]; member 9224 cgroup_event.path = path_enomem; in perf_event_cgroup() 9228 cgroup_event.path = pathname; in perf_event_cgroup() 9473 if (!filter->path.dentry) in perf_addr_filter_match() 11330 path_put(&filter->path); in free_filters_list() 11425 if (filter->path.dentry) { in perf_event_addr_filters_apply() 11624 &filter->path); in perf_event_parse_addr_filter() [all …]
|
| /kernel/dma/ |
| A D | Kconfig | 16 # mapping fast path should select this option and set the dma_ops_bypass
|
| /kernel/cgroup/ |
| A D | cgroup.c | 6994 struct cgroup *cgroup_get_from_path(const char *path) in cgroup_get_from_path() argument 7001 kn = kernfs_walk_and_get(root_cgrp->kn, path); in cgroup_get_from_path()
|