/linux-master/fs/overlayfs/ |
H A D | Makefile | 9 copy_up.o export.o params.o xattrs.o
|
/linux-master/include/linux/ |
H A D | xattr.h | 116 void simple_xattrs_init(struct simple_xattrs *xattrs); 117 void simple_xattrs_free(struct simple_xattrs *xattrs, size_t *freed_space); 121 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, 123 struct simple_xattr *simple_xattr_set(struct simple_xattrs *xattrs, 126 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, 128 void simple_xattr_add(struct simple_xattrs *xattrs,
|
H A D | lsm_hooks.h | 85 * @xattrs: array storing LSM-provided xattrs 86 * @xattr_count: number of already stored xattrs (updated) 88 * Retrieve the first available slot in the @xattrs array to fill with an xattr, 91 * Return: The slot to fill in @xattrs if non-NULL, NULL otherwise. 93 static inline struct xattr *lsm_get_xattr_slot(struct xattr *xattrs, argument 96 if (unlikely(!xattrs)) 98 return &xattrs[(*xattr_count)++];
|
H A D | evm.h | 22 const struct qstr *qstr, struct xattr *xattrs, 56 struct xattr *xattrs, 54 evm_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, struct xattr *xattrs, int *xattr_count) argument
|
H A D | shmem_fs.h | 35 struct simple_xattrs xattrs; /* list of xattrs */ member in struct:shmem_inode_info
|
H A D | lsm_hook_defs.h | 118 struct inode *dir, const struct qstr *qstr, struct xattr *xattrs,
|
H A D | security.h | 235 /* security_inode_init_security callback function to write xattrs */ 802 const initxattrs xattrs, 799 security_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, const initxattrs xattrs, void *fs_data) argument
|
/linux-master/fs/ |
H A D | xattr.c | 88 * Check whether the inode allows writing xattrs. Specifically, we can never 466 * This function returns the names of all xattrs associated with the 473 * xattrs. 989 * @dentry: dentry to list the xattrs 1143 * @xattrs: the header of the xattr object 1156 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, argument 1163 read_lock(&xattrs->lock); 1164 rbp = rb_find(name, &xattrs->rb_root, rbtree_simple_xattr_cmp); 1175 read_unlock(&xattrs->lock); 1181 * @xattrs 1205 simple_xattr_set(struct simple_xattrs *xattrs, const char *name, const void *value, size_t size, int flags) argument 1307 simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, char *buffer, size_t size) argument 1362 simple_xattr_add(struct simple_xattrs *xattrs, struct simple_xattr *new_xattr) argument 1376 simple_xattrs_init(struct simple_xattrs *xattrs) argument 1390 simple_xattrs_free(struct simple_xattrs *xattrs, size_t *freed_space) argument [all...] |
/linux-master/fs/kernfs/ |
H A D | inode.c | 49 simple_xattrs_init(&kn->iattr->xattrs); 148 return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size); 302 return simple_xattr_get(&attrs->xattrs, name, value, size); 313 old_xattr = simple_xattr_set(&attrs->xattrs, name, value, size, flags); 345 struct simple_xattrs *xattrs, 363 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); 384 struct simple_xattrs *xattrs, 391 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); 422 return kernfs_vfs_user_xattr_add(kn, full_name, &attrs->xattrs, 425 return kernfs_vfs_user_xattr_rm(kn, full_name, &attrs->xattrs, 343 kernfs_vfs_user_xattr_add(struct kernfs_node *kn, const char *full_name, struct simple_xattrs *xattrs, const void *value, size_t size, int flags) argument 382 kernfs_vfs_user_xattr_rm(struct kernfs_node *kn, const char *full_name, struct simple_xattrs *xattrs, const void *value, size_t size, int flags) argument [all...] |
H A D | kernfs-internal.h | 29 struct simple_xattrs xattrs; member in struct:kernfs_iattrs
|
H A D | dir.c | 539 simple_xattrs_free(&kn->iattr->xattrs, NULL);
|
/linux-master/fs/smb/client/ |
H A D | reparse.c | 207 struct wsl_xattr xattrs[] = { local 222 num_xattrs = ARRAY_SIZE(xattrs) - 1; 224 num_xattrs = ARRAY_SIZE(xattrs); 227 xattrs[i].next = ALIGN(sizeof(*ea) + name_size + 228 xattrs[i].size, 4); 229 dlen += xattrs[i].next; 239 next = xattrs[i].next; 243 ea->ea_value_length = cpu_to_le16(xattrs[i].size); 244 memcpy(ea->ea_data, xattrs[i].name, name_size); 246 &xattrs[ [all...] |
/linux-master/security/integrity/evm/ |
H A D | evm.h | 60 /* List of EVM protected security xattrs */ 82 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs,
|
H A D | evm_main.c | 89 int i, xattrs; local 91 xattrs = ARRAY_SIZE(evm_config_default_xattrnames); 94 for (i = 0; i < xattrs; i++) { 118 * attrs/xattrs being found invalid will not make them valid. 332 * @dentry: dentry of the read xattrs 548 * Writing other xattrs is safe for portable signatures, as portable 589 /* Policy permits modification of the protected xattrs even though 618 /* Policy permits modification of the protected xattrs even though 674 /* Policy permits modification of the protected xattrs even though 691 * Writing other xattrs i 959 evm_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, struct xattr *xattrs, int *xattr_count) argument [all...] |
H A D | evm_crypto.c | 214 * Calculate the HMAC value across the set of protected security xattrs. 253 * Skip non-enabled xattrs for locally calculated 388 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs, argument 400 for (xattr = xattrs; xattr->name; xattr++) {
|
/linux-master/fs/ceph/ |
H A D | xattr.c | 30 * These define virtual xattrs exposing the recursive directory 116 * The convention with strings in xattrs is that they should not be NULL 803 struct ceph_inode_xattr **xattrs = NULL; variable in typeref:struct:ceph_inode_xattr 824 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), 827 if (!xattrs) 831 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), 833 if (!xattrs[i]) 841 kfree(xattrs[i]); variable 842 kfree(xattrs); variable 843 xattrs 862 kfree(xattrs); variable 873 kfree(xattrs[i]); variable 874 kfree(xattrs); variable [all...] |
/linux-master/security/apparmor/include/ |
H A D | policy.h | 183 * @xattr_count: number of xattrs in table 184 * @xattrs: table of xattrs 191 char **xattrs; member in struct:aa_attachment
|
/linux-master/security/apparmor/ |
H A D | policy_unpack.c | 538 if (aa_unpack_nameX(e, AA_STRUCT, "xattrs")) { 545 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); 546 if (!profile->attach.xattrs) 549 if (!aa_unpack_strdup(e, &profile->attach.xattrs[i], NULL)) 973 info = "failed to unpack profile xattrs";
|
H A D | policy.c | 238 kfree_sensitive(attach->xattrs[i]); 239 kfree_sensitive(attach->xattrs);
|
H A D | domain.c | 299 * aa_xattrs_match - check whether a file matches the xattrs defined in profile 324 size = vfs_getxattr_alloc(&nop_mnt_idmap, d, attach->xattrs[i], 448 * Fail matching if the xattrs don't 469 * xattrs, or a longer match 479 * as xattrs. no more searching required
|
/linux-master/mm/ |
H A D | shmem.c | 1263 simple_xattrs_free(&info->xattrs, sbinfo->max_inodes ? &freed : NULL); 2528 simple_xattrs_init(&info->xattrs); 3626 * support from the LSM "for free". As soon as we have any other xattrs 3632 * Callback for security_inode_init_security() for acquiring xattrs. 3679 simple_xattr_add(&info->xattrs, new_xattr); 3688 simple_xattrs_free(&info->xattrs, NULL); 3702 return simple_xattr_get(&info->xattrs, name, buffer, size); 3729 old_xattr = simple_xattr_set(&info->xattrs, name, value, size, flags); 3776 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size);
|
/linux-master/fs/bcachefs/ |
H A D | bcachefs_format.h | 1491 x(xattrs, 3, BTREE_ID_SNAPSHOTS, \
|
/linux-master/security/smack/ |
H A D | smack_lsm.c | 58 * Smack uses multiple xattrs. 987 * @xattrs: where to put the attributes 988 * @xattr_count: current number of LSM-provided xattrs (updated) 994 struct xattr *xattrs, int *xattr_count) 1001 struct xattr *xattr = lsm_get_xattr_slot(xattrs, xattr_count); 1036 xattr_transmute = lsm_get_xattr_slot(xattrs, 1286 * smack_inode_setxattr - Smack check for setting xattrs 1542 * smack_inode_getsecurity - get smack xattrs 1574 * The rest of the Smack xattrs are only on sockets. 2838 * smack_inode_setsecurity - set smack xattrs 992 smack_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, struct xattr *xattrs, int *xattr_count) argument [all...] |
/linux-master/security/selinux/ |
H A D | hooks.c | 2917 struct xattr *xattrs, int *xattr_count) 2921 struct xattr *xattr = lsm_get_xattr_slot(xattrs, xattr_count); 3537 * xattrs up. Instead, filter out SELinux-related xattrs following 2915 selinux_inode_init_security(struct inode *inode, struct inode *dir, const struct qstr *qstr, struct xattr *xattrs, int *xattr_count) argument
|