| /linux/fs/ |
| H A D | pidfs.c | 49 struct simple_xattrs *xattrs; member 153 struct simple_xattrs *xattrs __free(kfree) = NULL; in pidfs_free_pid() 172 xattrs = no_free_ptr(attr->xattrs); in pidfs_free_pid() 173 if (xattrs) in pidfs_free_pid() 174 simple_xattrs_free(xattrs, NULL); in pidfs_free_pid() 718 struct simple_xattrs *xattrs; in pidfs_listxattr() local 720 xattrs = READ_ONCE(attr->xattrs); in pidfs_listxattr() 721 if (!xattrs) in pidfs_listxattr() 724 return simple_xattr_list(inode, xattrs, buf, size); in pidfs_listxattr() 979 struct simple_xattrs *xattrs; in pidfs_xattr_get() local [all …]
|
| /linux/security/integrity/evm/ |
| H A D | Kconfig | 32 bool "Additional SMACK xattrs" 36 Include additional SMACK xattrs for HMAC calculation. 38 In addition to the original security xattrs (eg. security.selinux, 41 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and 53 Allow userland to provide additional xattrs for HMAC calculation. 55 When this option is enabled, root can add additional xattrs to the
|
| H A D | evm_main.c | 89 int i, xattrs; in evm_init_config() local 91 xattrs = ARRAY_SIZE(evm_config_default_xattrnames); in evm_init_config() 94 for (i = 0; i < xattrs; i++) { in evm_init_config() 1014 const struct qstr *qstr, struct xattr *xattrs, in evm_inode_init_security() argument 1022 if (!(evm_initialized & EVM_INIT_HMAC) || !xattrs) in evm_inode_init_security() 1030 for (xattr = xattrs; xattr->name; xattr++) { in evm_inode_init_security() 1039 evm_xattr = lsm_get_xattr_slot(xattrs, xattr_count); in evm_inode_init_security() 1053 rc = evm_init_hmac(inode, xattrs, xattr_data->digest); in evm_inode_init_security()
|
| H A D | evm.h | 84 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs,
|
| H A D | evm_crypto.c | 399 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs, in evm_init_hmac() argument 411 for (xattr = xattrs; xattr->name; xattr++) { in evm_init_hmac()
|
| /linux/fs/kernfs/ |
| H A D | inode.c | 48 simple_xattrs_init(&ret->xattrs); in __kernfs_iattrs() 149 return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size); in kernfs_iop_listxattr() 304 return simple_xattr_get(&attrs->xattrs, name, value, size); in kernfs_xattr_get() 317 old_xattr = simple_xattr_set(&attrs->xattrs, name, value, size, flags); in kernfs_xattr_set() 349 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_add() argument 368 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); in kernfs_vfs_user_xattr_add() 389 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_rm() argument 397 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); in kernfs_vfs_user_xattr_rm() 428 return kernfs_vfs_user_xattr_add(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set() 431 return kernfs_vfs_user_xattr_rm(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set()
|
| H A D | kernfs-internal.h | 29 struct simple_xattrs xattrs; member
|
| /linux/include/linux/ |
| H A D | lsm_hooks.h | 210 static inline struct xattr *lsm_get_xattr_slot(struct xattr *xattrs, in lsm_get_xattr_slot() argument 213 if (unlikely(!xattrs)) in lsm_get_xattr_slot() 215 return &xattrs[(*xattr_count)++]; in lsm_get_xattr_slot()
|
| H A D | evm.h | 22 const struct qstr *qstr, struct xattr *xattrs, 58 struct xattr *xattrs, in evm_inode_init_security() argument
|
| H A D | shmem_fs.h | 51 struct simple_xattrs xattrs; /* list of xattrs */ member
|
| /linux/Documentation/translations/zh_CN/security/ |
| H A D | ipe.rst | 25 控制机制,因此扩展属性(xattrs)也必须受到保护。这就引出了 49 那么攻击者就可以清除所有的扩展属性(xattrs)——包括 52 使用DM-Verity,由于xattrs被保存为Merkel树的一部分,
|
| /linux/fs/smb/client/ |
| H A D | reparse.c | 608 struct wsl_xattr xattrs[] = { in wsl_set_xattrs() local 623 num_xattrs = ARRAY_SIZE(xattrs) - 1; in wsl_set_xattrs() 625 num_xattrs = ARRAY_SIZE(xattrs); in wsl_set_xattrs() 628 xattrs[i].next = ALIGN(sizeof(*ea) + name_size + in wsl_set_xattrs() 629 xattrs[i].size, 4); in wsl_set_xattrs() 630 dlen += xattrs[i].next; in wsl_set_xattrs() 640 next = xattrs[i].next; in wsl_set_xattrs() 644 ea->ea_value_length = cpu_to_le16(xattrs[i].size); in wsl_set_xattrs() 645 memcpy(ea->ea_data, xattrs[i].name, name_size); in wsl_set_xattrs() 647 &xattrs[i].value, xattrs[i].size); in wsl_set_xattrs()
|
| /linux/fs/ceph/ |
| H A D | xattr.c | 801 struct ceph_inode_xattr **xattrs = NULL; in __build_xattrs() local 822 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), in __build_xattrs() 825 if (!xattrs) in __build_xattrs() 829 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), in __build_xattrs() 831 if (!xattrs[i]) in __build_xattrs() 839 kfree(xattrs[i]); in __build_xattrs() 840 kfree(xattrs); in __build_xattrs() 841 xattrs = NULL; in __build_xattrs() 855 0, 0, &xattrs[numattr]); in __build_xattrs() 860 kfree(xattrs); in __build_xattrs() [all …]
|
| /linux/fs/overlayfs/ |
| H A D | Makefile | 9 copy_up.o export.o params.o xattrs.o
|
| /linux/Documentation/admin-guide/cifs/ |
| H A D | todo.rst | 36 (stat, statfs, create, unlink, mkdir, xattrs) already have been improved by 49 h) implement support for security and trusted categories of xattrs
|
| /linux/security/apparmor/include/ |
| H A D | policy.h | 195 char **xattrs; member
|
| /linux/fs/ubifs/ |
| H A D | Kconfig | 70 Saying Y here includes support for extended attributes (xattrs).
|
| /linux/Documentation/ABI/testing/ |
| H A D | evm | 6 EVM protects a file's security extended attributes(xattrs)
|
| /linux/security/apparmor/ |
| H A D | policy_unpack.c | 546 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs() 547 if (!profile->attach.xattrs) in unpack_xattrs() 550 if (!aa_unpack_strdup(e, &profile->attach.xattrs[i], NULL)) in unpack_xattrs()
|
| H A D | policy.c | 237 kfree_sensitive(attach->xattrs[i]); in free_attachment() 238 kfree_sensitive(attach->xattrs); in free_attachment()
|
| /linux/Documentation/filesystems/ |
| H A D | overlayfs.rst | 401 appropriate REDIRECT and METACOPY xattrs, and gain access to file on lower 403 "trusted." xattrs will require CAP_SYS_ADMIN. But it should be possible 490 When a layer containing verity xattrs is used, it means that any such 573 that have overlayfs attributes, such as whiteouts or "overlay.*" xattrs, will 577 Overlayfs specific xattrs are escaped by using a special prefix of 777 filesystem that supports xattrs.
|
| /linux/Documentation/security/ |
| H A D | ipe.rst | 21 as a result, xattrs would have to be protected. This lead to a selection 46 modify filesystem offline, the attacker could wipe all the xattrs - 50 With DM-Verity, as the xattrs are saved as part of the Merkel tree, if
|
| /linux/Documentation/filesystems/ext4/ |
| H A D | attributes.rst | 6 Extended attributes (xattrs) are typically stored in a separate data
|
| /linux/fs/erofs/ |
| H A D | Kconfig | 21 xattrs/data, chunk-based deduplication, multiple devices, etc.) for
|
| /linux/mm/ |
| H A D | shmem.c | 1400 simple_xattrs_free(&info->xattrs, sbinfo->max_inodes ? &freed : NULL); in shmem_evict_inode() 3092 simple_xattrs_init(&info->xattrs); in __shmem_get_inode() 4230 * support from the LSM "for free". As soon as we have any other xattrs in shmem_fileattr_set() 4236 * Callback for security_inode_init_security() for acquiring xattrs. 4283 simple_xattr_add(&info->xattrs, new_xattr); in shmem_initxattrs() 4292 simple_xattrs_free(&info->xattrs, NULL); in shmem_initxattrs() 4306 return simple_xattr_get(&info->xattrs, name, buffer, size); in shmem_xattr_handler_get() 4333 old_xattr = simple_xattr_set(&info->xattrs, name, value, size, flags); in shmem_xattr_handler_set() 4380 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size);
|