Home
last modified time | relevance | path

Searched refs:xattrs (Results 1 – 25 of 39) sorted by relevance

12

/linux/fs/
H A Dpidfs.c49 struct simple_xattrs *xattrs; member
153 struct simple_xattrs *xattrs __free(kfree) = NULL; in pidfs_free_pid()
172 xattrs = no_free_ptr(attr->xattrs); in pidfs_free_pid()
173 if (xattrs) in pidfs_free_pid()
174 simple_xattrs_free(xattrs, NULL); in pidfs_free_pid()
718 struct simple_xattrs *xattrs; in pidfs_listxattr() local
720 xattrs = READ_ONCE(attr->xattrs); in pidfs_listxattr()
721 if (!xattrs) in pidfs_listxattr()
724 return simple_xattr_list(inode, xattrs, buf, size); in pidfs_listxattr()
979 struct simple_xattrs *xattrs; in pidfs_xattr_get() local
[all …]
/linux/security/integrity/evm/
H A DKconfig32 bool "Additional SMACK xattrs"
36 Include additional SMACK xattrs for HMAC calculation.
38 In addition to the original security xattrs (eg. security.selinux,
41 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and
53 Allow userland to provide additional xattrs for HMAC calculation.
55 When this option is enabled, root can add additional xattrs to the
H A Devm_main.c89 int i, xattrs; in evm_init_config() local
91 xattrs = ARRAY_SIZE(evm_config_default_xattrnames); in evm_init_config()
94 for (i = 0; i < xattrs; i++) { in evm_init_config()
1014 const struct qstr *qstr, struct xattr *xattrs, in evm_inode_init_security() argument
1022 if (!(evm_initialized & EVM_INIT_HMAC) || !xattrs) in evm_inode_init_security()
1030 for (xattr = xattrs; xattr->name; xattr++) { in evm_inode_init_security()
1039 evm_xattr = lsm_get_xattr_slot(xattrs, xattr_count); in evm_inode_init_security()
1053 rc = evm_init_hmac(inode, xattrs, xattr_data->digest); in evm_inode_init_security()
H A Devm.h84 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs,
H A Devm_crypto.c399 int evm_init_hmac(struct inode *inode, const struct xattr *xattrs, in evm_init_hmac() argument
411 for (xattr = xattrs; xattr->name; xattr++) { in evm_init_hmac()
/linux/fs/kernfs/
H A Dinode.c48 simple_xattrs_init(&ret->xattrs); in __kernfs_iattrs()
149 return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size); in kernfs_iop_listxattr()
304 return simple_xattr_get(&attrs->xattrs, name, value, size); in kernfs_xattr_get()
317 old_xattr = simple_xattr_set(&attrs->xattrs, name, value, size, flags); in kernfs_xattr_set()
349 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_add() argument
368 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); in kernfs_vfs_user_xattr_add()
389 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_rm() argument
397 old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); in kernfs_vfs_user_xattr_rm()
428 return kernfs_vfs_user_xattr_add(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set()
431 return kernfs_vfs_user_xattr_rm(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set()
H A Dkernfs-internal.h29 struct simple_xattrs xattrs; member
/linux/include/linux/
H A Dlsm_hooks.h210 static inline struct xattr *lsm_get_xattr_slot(struct xattr *xattrs, in lsm_get_xattr_slot() argument
213 if (unlikely(!xattrs)) in lsm_get_xattr_slot()
215 return &xattrs[(*xattr_count)++]; in lsm_get_xattr_slot()
H A Devm.h22 const struct qstr *qstr, struct xattr *xattrs,
58 struct xattr *xattrs, in evm_inode_init_security() argument
H A Dshmem_fs.h51 struct simple_xattrs xattrs; /* list of xattrs */ member
/linux/Documentation/translations/zh_CN/security/
H A Dipe.rst25 控制机制,因此扩展属性(xattrs)也必须受到保护。这就引出了
49 那么攻击者就可以清除所有的扩展属性(xattrs)——包括
52 使用DM-Verity,由于xattrs被保存为Merkel树的一部分,
/linux/fs/smb/client/
H A Dreparse.c608 struct wsl_xattr xattrs[] = { in wsl_set_xattrs() local
623 num_xattrs = ARRAY_SIZE(xattrs) - 1; in wsl_set_xattrs()
625 num_xattrs = ARRAY_SIZE(xattrs); in wsl_set_xattrs()
628 xattrs[i].next = ALIGN(sizeof(*ea) + name_size + in wsl_set_xattrs()
629 xattrs[i].size, 4); in wsl_set_xattrs()
630 dlen += xattrs[i].next; in wsl_set_xattrs()
640 next = xattrs[i].next; in wsl_set_xattrs()
644 ea->ea_value_length = cpu_to_le16(xattrs[i].size); in wsl_set_xattrs()
645 memcpy(ea->ea_data, xattrs[i].name, name_size); in wsl_set_xattrs()
647 &xattrs[i].value, xattrs[i].size); in wsl_set_xattrs()
/linux/fs/ceph/
H A Dxattr.c801 struct ceph_inode_xattr **xattrs = NULL; in __build_xattrs() local
822 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), in __build_xattrs()
825 if (!xattrs) in __build_xattrs()
829 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), in __build_xattrs()
831 if (!xattrs[i]) in __build_xattrs()
839 kfree(xattrs[i]); in __build_xattrs()
840 kfree(xattrs); in __build_xattrs()
841 xattrs = NULL; in __build_xattrs()
855 0, 0, &xattrs[numattr]); in __build_xattrs()
860 kfree(xattrs); in __build_xattrs()
[all …]
/linux/fs/overlayfs/
H A DMakefile9 copy_up.o export.o params.o xattrs.o
/linux/Documentation/admin-guide/cifs/
H A Dtodo.rst36 (stat, statfs, create, unlink, mkdir, xattrs) already have been improved by
49 h) implement support for security and trusted categories of xattrs
/linux/security/apparmor/include/
H A Dpolicy.h195 char **xattrs; member
/linux/fs/ubifs/
H A DKconfig70 Saying Y here includes support for extended attributes (xattrs).
/linux/Documentation/ABI/testing/
H A Devm6 EVM protects a file's security extended attributes(xattrs)
/linux/security/apparmor/
H A Dpolicy_unpack.c546 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs()
547 if (!profile->attach.xattrs) in unpack_xattrs()
550 if (!aa_unpack_strdup(e, &profile->attach.xattrs[i], NULL)) in unpack_xattrs()
H A Dpolicy.c237 kfree_sensitive(attach->xattrs[i]); in free_attachment()
238 kfree_sensitive(attach->xattrs); in free_attachment()
/linux/Documentation/filesystems/
H A Doverlayfs.rst401 appropriate REDIRECT and METACOPY xattrs, and gain access to file on lower
403 "trusted." xattrs will require CAP_SYS_ADMIN. But it should be possible
490 When a layer containing verity xattrs is used, it means that any such
573 that have overlayfs attributes, such as whiteouts or "overlay.*" xattrs, will
577 Overlayfs specific xattrs are escaped by using a special prefix of
777 filesystem that supports xattrs.
/linux/Documentation/security/
H A Dipe.rst21 as a result, xattrs would have to be protected. This lead to a selection
46 modify filesystem offline, the attacker could wipe all the xattrs -
50 With DM-Verity, as the xattrs are saved as part of the Merkel tree, if
/linux/Documentation/filesystems/ext4/
H A Dattributes.rst6 Extended attributes (xattrs) are typically stored in a separate data
/linux/fs/erofs/
H A DKconfig21 xattrs/data, chunk-based deduplication, multiple devices, etc.) for
/linux/mm/
H A Dshmem.c1400 simple_xattrs_free(&info->xattrs, sbinfo->max_inodes ? &freed : NULL); in shmem_evict_inode()
3092 simple_xattrs_init(&info->xattrs); in __shmem_get_inode()
4230 * support from the LSM "for free". As soon as we have any other xattrs in shmem_fileattr_set()
4236 * Callback for security_inode_init_security() for acquiring xattrs.
4283 simple_xattr_add(&info->xattrs, new_xattr); in shmem_initxattrs()
4292 simple_xattrs_free(&info->xattrs, NULL); in shmem_initxattrs()
4306 return simple_xattr_get(&info->xattrs, name, buffer, size); in shmem_xattr_handler_get()
4333 old_xattr = simple_xattr_set(&info->xattrs, name, value, size, flags); in shmem_xattr_handler_set()
4380 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size);

12