/linux-6.6.21/include/linux/ |
D | xattr.h | 116 void simple_xattrs_init(struct simple_xattrs *xattrs); 117 void simple_xattrs_free(struct simple_xattrs *xattrs, size_t *freed_space); 121 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, 123 struct simple_xattr *simple_xattr_set(struct simple_xattrs *xattrs, 126 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, 128 void simple_xattr_add(struct simple_xattrs *xattrs,
|
D | lsm_hooks.h | 80 static inline struct xattr *lsm_get_xattr_slot(struct xattr *xattrs, in lsm_get_xattr_slot() argument 83 if (unlikely(!xattrs)) in lsm_get_xattr_slot() 85 return &xattrs[(*xattr_count)++]; in lsm_get_xattr_slot()
|
D | evm.h | 61 const struct qstr *qstr, struct xattr *xattrs, 163 struct xattr *xattrs, in evm_inode_init_security() argument
|
D | shmem_fs.h | 30 struct simple_xattrs xattrs; /* list of xattrs */ member
|
/linux-6.6.21/fs/ |
D | xattr.c | 1157 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, in simple_xattr_get() argument 1164 read_lock(&xattrs->lock); in simple_xattr_get() 1165 rbp = rb_find(name, &xattrs->rb_root, rbtree_simple_xattr_cmp); in simple_xattr_get() 1176 read_unlock(&xattrs->lock); in simple_xattr_get() 1206 struct simple_xattr *simple_xattr_set(struct simple_xattrs *xattrs, in simple_xattr_set() argument 1227 write_lock(&xattrs->lock); in simple_xattr_set() 1228 rbp = &xattrs->rb_root.rb_node; in simple_xattr_set() 1251 &new_xattr->rb_node, &xattrs->rb_root); in simple_xattr_set() 1253 rb_erase(&old_xattr->rb_node, &xattrs->rb_root); in simple_xattr_set() 1267 rb_insert_color(&new_xattr->rb_node, &xattrs->rb_root); in simple_xattr_set() [all …]
|
/linux-6.6.21/security/integrity/evm/ |
D | Kconfig | 31 bool "Additional SMACK xattrs" 35 Include additional SMACK xattrs for HMAC calculation. 37 In addition to the original security xattrs (eg. security.selinux, 40 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and 52 Allow userland to provide additional xattrs for HMAC calculation. 54 When this option is enabled, root can add additional xattrs to the
|
D | evm_main.c | 90 int i, xattrs; in evm_init_config() local 92 xattrs = ARRAY_SIZE(evm_config_default_xattrnames); in evm_init_config() 95 for (i = 0; i < xattrs; i++) { in evm_init_config() 871 const struct qstr *qstr, struct xattr *xattrs, in evm_inode_init_security() argument 879 if (!(evm_initialized & EVM_INIT_HMAC) || !xattrs) in evm_inode_init_security() 887 for (xattr = xattrs; xattr->name; xattr++) { in evm_inode_init_security() 896 evm_xattr = lsm_get_xattr_slot(xattrs, xattr_count); in evm_inode_init_security() 910 rc = evm_init_hmac(inode, xattrs, xattr_data->digest); in evm_inode_init_security()
|
D | evm.h | 63 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs,
|
D | evm_crypto.c | 388 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs, in evm_init_hmac() argument 400 for (xattr = xattrs; xattr->name; xattr++) { in evm_init_hmac()
|
/linux-6.6.21/fs/kernfs/ |
D | inode.c | 49 simple_xattrs_init(&kn->iattr->xattrs); in __kernfs_iattrs() 148 return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size); in kernfs_iop_listxattr() 302 return simple_xattr_get(&attrs->xattrs, name, value, size); in kernfs_xattr_get() 313 old_xattr = simple_xattr_set(&attrs->xattrs, name, value, size, flags); in kernfs_xattr_set() 345 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_add() argument 363 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); in kernfs_vfs_user_xattr_add() 384 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_rm() argument 391 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); in kernfs_vfs_user_xattr_rm() 422 return kernfs_vfs_user_xattr_add(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set() 425 return kernfs_vfs_user_xattr_rm(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set()
|
D | kernfs-internal.h | 29 struct simple_xattrs xattrs; member
|
/linux-6.6.21/fs/ceph/ |
D | xattr.c | 797 struct ceph_inode_xattr **xattrs = NULL; in __build_xattrs() local 818 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), in __build_xattrs() 821 if (!xattrs) in __build_xattrs() 825 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), in __build_xattrs() 827 if (!xattrs[i]) in __build_xattrs() 835 kfree(xattrs[i]); in __build_xattrs() 836 kfree(xattrs); in __build_xattrs() 837 xattrs = NULL; in __build_xattrs() 851 0, 0, &xattrs[numattr]); in __build_xattrs() 856 kfree(xattrs); in __build_xattrs() [all …]
|
/linux-6.6.21/Documentation/filesystems/ |
D | erofs.rst | 168 | ... | inode | xattrs | extents | data inline | ... | inode ... 178 | xattr_ibody_header | shared xattrs | inline xattrs | 214 The size of the optional xattrs is indicated by i_xattr_count in inode 215 header. Large xattrs or xattrs shared by many different files can be 216 stored in shared xattrs metadata rather than inlined right after inode. 218 2. Shared xattrs metadata space 220 Shared xattrs space is similar to the above inode space, started with 276 only a few common prefixes (such as overlayfs xattrs). The predefined prefixes
|
D | overlayfs.rst | 374 appropriate REDIRECT and METACOPY xattrs, and gain access to file on lower 376 "trusted." xattrs will require CAP_SYS_ADMIN. But it should be possible 429 When a layer containing verity xattrs is used, it means that any such 688 filesystem that supports xattrs.
|
D | fsverity.rst | 340 metadata such as owner, mode, timestamps, and xattrs are still 583 support paging multi-gigabyte xattrs into memory, and to support 584 encrypting xattrs. Note that the verity metadata *must* be encrypted 866 filesystems assume that all xattrs fit into a single 4K 868 encrypt xattrs, yet the Merkle tree *must* be encrypted when the
|
/linux-6.6.21/Documentation/admin-guide/cifs/ |
D | todo.rst | 35 (stat, statfs, create, unlink, mkdir, xattrs) already have been improved by 48 h) implement support for security and trusted categories of xattrs
|
/linux-6.6.21/security/apparmor/include/ |
D | policy.h | 165 char **xattrs; member
|
/linux-6.6.21/fs/ubifs/ |
D | Kconfig | 70 Saying Y here includes support for extended attributes (xattrs).
|
/linux-6.6.21/Documentation/ABI/testing/ |
D | evm | 6 EVM protects a file's security extended attributes(xattrs)
|
/linux-6.6.21/fs/erofs/ |
D | Kconfig | 11 xattrs/data, chunk-based deduplication, multiple devices, etc.) for
|
/linux-6.6.21/security/apparmor/ |
D | policy_unpack.c | 545 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs() 546 if (!profile->attach.xattrs) in unpack_xattrs() 549 if (!aa_unpack_strdup(e, &profile->attach.xattrs[i], NULL)) in unpack_xattrs()
|
D | policy.c | 201 kfree_sensitive(attach->xattrs[i]); in free_attachment() 202 kfree_sensitive(attach->xattrs); in free_attachment()
|
/linux-6.6.21/Documentation/filesystems/ext4/ |
D | attributes.rst | 6 Extended attributes (xattrs) are typically stored in a separate data
|
/linux-6.6.21/mm/ |
D | shmem.c | 1281 simple_xattrs_free(&info->xattrs, sbinfo->max_inodes ? &freed : NULL); in shmem_evict_inode() 2493 simple_xattrs_init(&info->xattrs); in __shmem_get_inode() 3647 simple_xattr_add(&info->xattrs, new_xattr); in shmem_initxattrs() 3656 simple_xattrs_free(&info->xattrs, NULL); in shmem_initxattrs() 3670 return simple_xattr_get(&info->xattrs, name, buffer, size); in shmem_xattr_handler_get() 3697 old_xattr = simple_xattr_set(&info->xattrs, name, value, size, flags); in shmem_xattr_handler_set() 3744 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size); in shmem_listxattr()
|
/linux-6.6.21/fs/squashfs/ |
D | Kconfig | 146 Saying Y here includes support for extended attributes (xattrs).
|