Searched refs:xattrs (Results 1 - 24 of 24) sorted by relevance

/linux-master/fs/overlayfs/
H A DMakefile9 copy_up.o export.o params.o xattrs.o
/linux-master/include/linux/
H A Dxattr.h116 void simple_xattrs_init(struct simple_xattrs *xattrs);
117 void simple_xattrs_free(struct simple_xattrs *xattrs, size_t *freed_space);
121 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name,
123 struct simple_xattr *simple_xattr_set(struct simple_xattrs *xattrs,
126 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs,
128 void simple_xattr_add(struct simple_xattrs *xattrs,
H A Dlsm_hooks.h85 * @xattrs: array storing LSM-provided xattrs
86 * @xattr_count: number of already stored xattrs (updated)
88 * Retrieve the first available slot in the @xattrs array to fill with an xattr,
91 * Return: The slot to fill in @xattrs if non-NULL, NULL otherwise.
93 static inline struct xattr *lsm_get_xattr_slot(struct xattr *xattrs, argument
96 if (unlikely(!xattrs))
98 return &xattrs[(*xattr_count)++];
H A Devm.h22 const struct qstr *qstr, struct xattr *xattrs,
56 struct xattr *xattrs,
54 evm_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, struct xattr *xattrs, int *xattr_count) argument
H A Dshmem_fs.h35 struct simple_xattrs xattrs; /* list of xattrs */ member in struct:shmem_inode_info
H A Dlsm_hook_defs.h118 struct inode *dir, const struct qstr *qstr, struct xattr *xattrs,
H A Dsecurity.h235 /* security_inode_init_security callback function to write xattrs */
802 const initxattrs xattrs,
799 security_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, const initxattrs xattrs, void *fs_data) argument
/linux-master/fs/
H A Dxattr.c88 * Check whether the inode allows writing xattrs. Specifically, we can never
466 * This function returns the names of all xattrs associated with the
473 * xattrs.
989 * @dentry: dentry to list the xattrs
1143 * @xattrs: the header of the xattr object
1156 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, argument
1163 read_lock(&xattrs->lock);
1164 rbp = rb_find(name, &xattrs->rb_root, rbtree_simple_xattr_cmp);
1175 read_unlock(&xattrs->lock);
1181 * @xattrs
1205 simple_xattr_set(struct simple_xattrs *xattrs, const char *name, const void *value, size_t size, int flags) argument
1307 simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, char *buffer, size_t size) argument
1362 simple_xattr_add(struct simple_xattrs *xattrs, struct simple_xattr *new_xattr) argument
1376 simple_xattrs_init(struct simple_xattrs *xattrs) argument
1390 simple_xattrs_free(struct simple_xattrs *xattrs, size_t *freed_space) argument
[all...]
/linux-master/fs/kernfs/
H A Dinode.c49 simple_xattrs_init(&kn->iattr->xattrs);
148 return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size);
302 return simple_xattr_get(&attrs->xattrs, name, value, size);
313 old_xattr = simple_xattr_set(&attrs->xattrs, name, value, size, flags);
345 struct simple_xattrs *xattrs,
363 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags);
384 struct simple_xattrs *xattrs,
391 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags);
422 return kernfs_vfs_user_xattr_add(kn, full_name, &attrs->xattrs,
425 return kernfs_vfs_user_xattr_rm(kn, full_name, &attrs->xattrs,
343 kernfs_vfs_user_xattr_add(struct kernfs_node *kn, const char *full_name, struct simple_xattrs *xattrs, const void *value, size_t size, int flags) argument
382 kernfs_vfs_user_xattr_rm(struct kernfs_node *kn, const char *full_name, struct simple_xattrs *xattrs, const void *value, size_t size, int flags) argument
[all...]
H A Dkernfs-internal.h29 struct simple_xattrs xattrs; member in struct:kernfs_iattrs
H A Ddir.c539 simple_xattrs_free(&kn->iattr->xattrs, NULL);
/linux-master/fs/smb/client/
H A Dreparse.c207 struct wsl_xattr xattrs[] = { local
222 num_xattrs = ARRAY_SIZE(xattrs) - 1;
224 num_xattrs = ARRAY_SIZE(xattrs);
227 xattrs[i].next = ALIGN(sizeof(*ea) + name_size +
228 xattrs[i].size, 4);
229 dlen += xattrs[i].next;
239 next = xattrs[i].next;
243 ea->ea_value_length = cpu_to_le16(xattrs[i].size);
244 memcpy(ea->ea_data, xattrs[i].name, name_size);
246 &xattrs[
[all...]
/linux-master/security/integrity/evm/
H A Devm.h60 /* List of EVM protected security xattrs */
82 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs,
H A Devm_main.c89 int i, xattrs; local
91 xattrs = ARRAY_SIZE(evm_config_default_xattrnames);
94 for (i = 0; i < xattrs; i++) {
118 * attrs/xattrs being found invalid will not make them valid.
332 * @dentry: dentry of the read xattrs
548 * Writing other xattrs is safe for portable signatures, as portable
589 /* Policy permits modification of the protected xattrs even though
618 /* Policy permits modification of the protected xattrs even though
674 /* Policy permits modification of the protected xattrs even though
691 * Writing other xattrs i
959 evm_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, struct xattr *xattrs, int *xattr_count) argument
[all...]
H A Devm_crypto.c214 * Calculate the HMAC value across the set of protected security xattrs.
253 * Skip non-enabled xattrs for locally calculated
388 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs, argument
400 for (xattr = xattrs; xattr->name; xattr++) {
/linux-master/fs/ceph/
H A Dxattr.c30 * These define virtual xattrs exposing the recursive directory
116 * The convention with strings in xattrs is that they should not be NULL
803 struct ceph_inode_xattr **xattrs = NULL; variable in typeref:struct:ceph_inode_xattr
824 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *),
827 if (!xattrs)
831 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr),
833 if (!xattrs[i])
841 kfree(xattrs[i]); variable
842 kfree(xattrs); variable
843 xattrs
862 kfree(xattrs); variable
873 kfree(xattrs[i]); variable
874 kfree(xattrs); variable
[all...]
/linux-master/security/apparmor/include/
H A Dpolicy.h183 * @xattr_count: number of xattrs in table
184 * @xattrs: table of xattrs
191 char **xattrs; member in struct:aa_attachment
/linux-master/security/apparmor/
H A Dpolicy_unpack.c538 if (aa_unpack_nameX(e, AA_STRUCT, "xattrs")) {
545 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL);
546 if (!profile->attach.xattrs)
549 if (!aa_unpack_strdup(e, &profile->attach.xattrs[i], NULL))
973 info = "failed to unpack profile xattrs";
H A Dpolicy.c238 kfree_sensitive(attach->xattrs[i]);
239 kfree_sensitive(attach->xattrs);
H A Ddomain.c299 * aa_xattrs_match - check whether a file matches the xattrs defined in profile
324 size = vfs_getxattr_alloc(&nop_mnt_idmap, d, attach->xattrs[i],
448 * Fail matching if the xattrs don't
469 * xattrs, or a longer match
479 * as xattrs. no more searching required
/linux-master/mm/
H A Dshmem.c1263 simple_xattrs_free(&info->xattrs, sbinfo->max_inodes ? &freed : NULL);
2528 simple_xattrs_init(&info->xattrs);
3626 * support from the LSM "for free". As soon as we have any other xattrs
3632 * Callback for security_inode_init_security() for acquiring xattrs.
3679 simple_xattr_add(&info->xattrs, new_xattr);
3688 simple_xattrs_free(&info->xattrs, NULL);
3702 return simple_xattr_get(&info->xattrs, name, buffer, size);
3729 old_xattr = simple_xattr_set(&info->xattrs, name, value, size, flags);
3776 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size);
/linux-master/fs/bcachefs/
H A Dbcachefs_format.h1491 x(xattrs, 3, BTREE_ID_SNAPSHOTS, \
/linux-master/security/smack/
H A Dsmack_lsm.c58 * Smack uses multiple xattrs.
987 * @xattrs: where to put the attributes
988 * @xattr_count: current number of LSM-provided xattrs (updated)
994 struct xattr *xattrs, int *xattr_count)
1001 struct xattr *xattr = lsm_get_xattr_slot(xattrs, xattr_count);
1036 xattr_transmute = lsm_get_xattr_slot(xattrs,
1286 * smack_inode_setxattr - Smack check for setting xattrs
1542 * smack_inode_getsecurity - get smack xattrs
1574 * The rest of the Smack xattrs are only on sockets.
2838 * smack_inode_setsecurity - set smack xattrs
992 smack_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, struct xattr *xattrs, int *xattr_count) argument
[all...]
/linux-master/security/selinux/
H A Dhooks.c2917 struct xattr *xattrs, int *xattr_count)
2921 struct xattr *xattr = lsm_get_xattr_slot(xattrs, xattr_count);
3537 * xattrs up. Instead, filter out SELinux-related xattrs following
2915 selinux_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, struct xattr *xattrs, int *xattr_count) argument

Completed in 271 milliseconds