Home
last modified time | relevance | path

Searched refs:xattrs (Results 1 – 25 of 32) sorted by relevance

12

/linux/fs/
H A Dpidfs.c51 struct simple_xattrs *xattrs; member
184 struct simple_xattrs *xattrs __free(kfree) = NULL; in pidfs_free_pid()
203 xattrs = no_free_ptr(attr->xattrs); in pidfs_free_pid()
204 if (xattrs) in pidfs_free_pid()
205 simple_xattrs_free(xattrs, NULL); in pidfs_free_pid()
765 struct simple_xattrs *xattrs; in pidfs_listxattr() local
767 xattrs = READ_ONCE(attr->xattrs); in pidfs_listxattr()
768 if (!xattrs) in pidfs_listxattr()
771 return simple_xattr_list(inode, xattrs, buf, size); in pidfs_listxattr()
1008 struct simple_xattrs *xattrs; in pidfs_xattr_get() local
[all …]
/linux/security/integrity/evm/
H A DKconfig32 bool "Additional SMACK xattrs"
36 Include additional SMACK xattrs for HMAC calculation.
38 In addition to the original security xattrs (eg. security.selinux,
41 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and
53 Allow userland to provide additional xattrs for HMAC calculation.
55 When this option is enabled, root can add additional xattrs to the
H A Devm_main.c89 int i, xattrs; in evm_init_config() local
91 xattrs = ARRAY_SIZE(evm_config_default_xattrnames); in evm_init_config()
94 for (i = 0; i < xattrs; i++) { in evm_init_config()
1014 const struct qstr *qstr, struct xattr *xattrs, in evm_inode_init_security() argument
1022 if (!(evm_initialized & EVM_INIT_HMAC) || !xattrs) in evm_inode_init_security()
1030 for (xattr = xattrs; xattr->name; xattr++) { in evm_inode_init_security()
1039 evm_xattr = lsm_get_xattr_slot(xattrs, xattr_count); in evm_inode_init_security()
1053 rc = evm_init_hmac(inode, xattrs, xattr_data->digest); in evm_inode_init_security()
H A Devm.h84 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs,
H A Devm_crypto.c215 * Calculate the HMAC value across the set of protected security xattrs.
256 * Skip non-enabled xattrs for locally calculated in evm_calc_hmac_or_hash()
400 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs, in evm_init_hmac()
415 for (xattr = xattrs; xattr->name; xattr++) { in evm_init_hmac()
399 evm_init_hmac(struct inode * inode,const struct xattr * xattrs,char * hmac_val) evm_init_hmac() argument
/linux/fs/kernfs/
H A Dinode.c48 simple_xattrs_init(&ret->xattrs); in __kernfs_iattrs()
149 return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size); in kernfs_iop_listxattr()
304 return simple_xattr_get(&attrs->xattrs, name, value, size); in kernfs_xattr_get()
317 old_xattr = simple_xattr_set(&attrs->xattrs, name, value, size, flags); in kernfs_xattr_set()
349 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_add() argument
368 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); in kernfs_vfs_user_xattr_add()
389 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_rm() argument
397 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); in kernfs_vfs_user_xattr_rm()
428 return kernfs_vfs_user_xattr_add(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set()
431 return kernfs_vfs_user_xattr_rm(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set()
H A Dkernfs-internal.h29 struct simple_xattrs xattrs; member
H A Ddir.c551 simple_xattrs_free(&kn->iattr->xattrs, NULL); in kernfs_free_rcu()
685 simple_xattrs_free(&kn->iattr->xattrs, NULL); in __kernfs_new_node()
/linux/Documentation/translations/zh_CN/security/
H A Dipe.rst25 控制机制,因此扩展属性(xattrs)也必须受到保护。这就引出了
49 那么攻击者就可以清除所有的扩展属性(xattrs)——包括
52 使用DM-Verity,由于xattrs被保存为Merkel树的一部分,
/linux/include/linux/
H A Devm.h22 const struct qstr *qstr, struct xattr *xattrs,
58 struct xattr *xattrs, in evm_inode_init_security() argument
H A Dshmem_fs.h51 struct simple_xattrs xattrs; /* list of xattrs */ member
/linux/fs/smb/client/
H A Dreparse.c609 struct wsl_xattr xattrs[] = { in wsl_set_xattrs() local
624 num_xattrs = ARRAY_SIZE(xattrs) - 1; in wsl_set_xattrs()
626 num_xattrs = ARRAY_SIZE(xattrs); in wsl_set_xattrs()
629 xattrs[i].next = ALIGN(sizeof(*ea) + name_size + in wsl_set_xattrs()
630 xattrs[i].size, 4); in wsl_set_xattrs()
631 dlen += xattrs[i].next; in wsl_set_xattrs()
641 next = xattrs[i].next; in wsl_set_xattrs()
645 ea->ea_value_length = cpu_to_le16(xattrs[i].size); in wsl_set_xattrs()
646 memcpy(ea->ea_data, xattrs[i].name, name_size); in wsl_set_xattrs()
648 &xattrs[i].value, xattrs[i].size); in wsl_set_xattrs()
/linux/fs/ceph/
H A Dxattr.c801 struct ceph_inode_xattr **xattrs = NULL; in __build_xattrs() local
822 xattrs = kzalloc_objs(struct ceph_inode_xattr *, numattr, in __build_xattrs()
825 if (!xattrs) in __build_xattrs()
829 xattrs[i] = kmalloc_obj(struct ceph_inode_xattr, in __build_xattrs()
831 if (!xattrs[i]) in __build_xattrs()
839 kfree(xattrs[i]); in __build_xattrs()
840 kfree(xattrs); in __build_xattrs()
841 xattrs = NULL; in __build_xattrs()
855 0, 0, &xattrs[numattr]); in __build_xattrs()
860 kfree(xattrs); in __build_xattrs()
[all …]
/linux/fs/overlayfs/
H A DMakefile9 copy_up.o export.o params.o xattrs.o
/linux/Documentation/admin-guide/cifs/
H A Dtodo.rst36 (stat, statfs, create, unlink, mkdir, xattrs) already have been improved by
49 h) implement support for security and trusted categories of xattrs
/linux/fs/ubifs/
H A DKconfig70 Saying Y here includes support for extended attributes (xattrs).
/linux/security/apparmor/include/
H A Dpolicy.h219 char **xattrs; member
/linux/Documentation/ABI/testing/
H A Devm6 EVM protects a file's security extended attributes(xattrs)
/linux/Documentation/security/
H A Dipe.rst21 as a result, xattrs would have to be protected. This lead to a selection
46 modify filesystem offline, the attacker could wipe all the xattrs -
50 With DM-Verity, as the xattrs are saved as part of the Merkel tree, if
/linux/security/apparmor/
H A Dpolicy_unpack.c600 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs()
601 if (!profile->attach.xattrs) in unpack_xattrs()
604 if (!aa_unpack_strdup(e, &profile->attach.xattrs[i], NULL)) in unpack_xattrs()
H A Dpolicy.c275 kfree_sensitive(attach->xattrs[i]); in free_attachment()
276 kfree_sensitive(attach->xattrs); in free_attachment()
/linux/Documentation/filesystems/ext4/
H A Dattributes.rst6 Extended attributes (xattrs) are typically stored in a separate data
/linux/mm/
H A Dshmem.c1428 simple_xattrs_free(&info->xattrs, sbinfo->max_inodes ? &freed : NULL); in shmem_evict_inode()
3104 simple_xattrs_init(&info->xattrs); in __shmem_get_inode()
4297 simple_xattr_add(&info->xattrs, new_xattr); in shmem_initxattrs()
4306 simple_xattrs_free(&info->xattrs, NULL); in shmem_initxattrs()
4320 return simple_xattr_get(&info->xattrs, name, buffer, size); in shmem_xattr_handler_get()
4347 old_xattr = simple_xattr_set(&info->xattrs, name, value, size, flags); in shmem_xattr_handler_set()
4394 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size); in shmem_listxattr()
/linux/security/smack/
H A Dsmack_lsm.c984 xattr_dupval(struct xattr *xattrs, int *xattr_count, in xattr_dupval() argument
987 struct xattr * const xattr = lsm_get_xattr_slot(xattrs, xattr_count); in xattr_dupval()
1013 struct xattr *xattrs, int *xattr_count) in smack_inode_init_security() argument
1060 if (xattr_dupval(xattrs, xattr_count, in smack_inode_init_security()
1070 if (xattr_dupval(xattrs, xattr_count, in smack_inode_init_security()
/linux/fs/squashfs/
H A DKconfig146 Saying Y here includes support for extended attributes (xattrs).

12