| /Linux-v5.4/include/linux/ |
| D | xattr.h | 82 static inline void simple_xattrs_init(struct simple_xattrs *xattrs) in simple_xattrs_init() argument 84 INIT_LIST_HEAD(&xattrs->head); in simple_xattrs_init() 85 spin_lock_init(&xattrs->lock); in simple_xattrs_init() 91 static inline void simple_xattrs_free(struct simple_xattrs *xattrs) in simple_xattrs_free() argument 95 list_for_each_entry_safe(xattr, node, &xattrs->head, list) { in simple_xattrs_free() 102 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, 104 int simple_xattr_set(struct simple_xattrs *xattrs, const char *name, 106 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, char *buffer, 108 void simple_xattr_list_add(struct simple_xattrs *xattrs,
|
| D | shmem_fs.h | 23 struct simple_xattrs xattrs; /* list of xattrs */ member
|
| /Linux-v5.4/security/integrity/evm/ |
| D | Kconfig | 31 bool "Additional SMACK xattrs" 35 Include additional SMACK xattrs for HMAC calculation. 37 In addition to the original security xattrs (eg. security.selinux, 40 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and 52 Allow userland to provide additional xattrs for HMAC calculation. 54 When this option is enabled, root can add additional xattrs to the
|
| D | evm_main.c | 70 int i, xattrs; in evm_init_config() local 72 xattrs = ARRAY_SIZE(evm_config_default_xattrnames); in evm_init_config() 75 for (i = 0; i < xattrs; i++) { in evm_init_config()
|
| /Linux-v5.4/fs/ |
| D | xattr.c | 832 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, in simple_xattr_get() argument 838 spin_lock(&xattrs->lock); in simple_xattr_get() 839 list_for_each_entry(xattr, &xattrs->head, list) { in simple_xattr_get() 852 spin_unlock(&xattrs->lock); in simple_xattr_get() 870 int simple_xattr_set(struct simple_xattrs *xattrs, const char *name, in simple_xattr_set() argument 890 spin_lock(&xattrs->lock); in simple_xattr_set() 891 list_for_each_entry(xattr, &xattrs->head, list) { in simple_xattr_set() 908 list_add(&new_xattr->list, &xattrs->head); in simple_xattr_set() 912 spin_unlock(&xattrs->lock); in simple_xattr_set() 943 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, in simple_xattr_list() argument [all …]
|
| /Linux-v5.4/Documentation/filesystems/ |
| D | erofs.txt | 35 - Support extended attributes (xattrs) as an option; 39 - Support POSIX.1e ACLs by using xattrs; 97 | ... | inode | xattrs | extents | data inline | ... | inode ... 107 | xattr_ibody_header | shared xattrs | inline xattrs | 139 The size of the optional xattrs is indicated by i_xattr_count in inode 140 header. Large xattrs or xattrs shared by many different files can be 141 stored in shared xattrs metadata rather than inlined right after inode. 143 2. Shared xattrs metadata space 144 Shared xattrs space is similar to the above inode space, started with
|
| D | fsverity.rst | 238 metadata such as owner, mode, timestamps, and xattrs are still 426 support paging multi-gigabyte xattrs into memory, and to support 427 encrypting xattrs. Note that the verity metadata *must* be encrypted 708 filesystems assume that all xattrs fit into a single 4K 710 encrypt xattrs, yet the Merkle tree *must* be encrypted when the
|
| D | squashfs.txt | 214 The xattr table contains extended attributes for each inode. The xattrs
|
| D | overlayfs.txt | 284 appropriate REDIRECT and METACOPY xattrs, and gain access to file on lower 286 "trusted." xattrs will require CAP_SYS_ADMIN. But it should be possible
|
| /Linux-v5.4/fs/kernfs/ |
| D | inode.c | 55 simple_xattrs_init(&kn->iattr->xattrs); in __kernfs_iattrs() 148 return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size); in kernfs_iop_listxattr() 296 return simple_xattr_get(&attrs->xattrs, name, value, size); in kernfs_xattr_get() 306 return simple_xattr_set(&attrs->xattrs, name, value, size, flags); in kernfs_xattr_set()
|
| D | kernfs-internal.h | 28 struct simple_xattrs xattrs; member
|
| D | dir.c | 535 simple_xattrs_free(&kn->iattr->xattrs); in kernfs_put()
|
| /Linux-v5.4/fs/ceph/ |
| D | xattr.c | 659 struct ceph_inode_xattr **xattrs = NULL; in __build_xattrs() local 680 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), in __build_xattrs() 683 if (!xattrs) in __build_xattrs() 687 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), in __build_xattrs() 689 if (!xattrs[i]) in __build_xattrs() 697 kfree(xattrs[i]); in __build_xattrs() 698 kfree(xattrs); in __build_xattrs() 699 xattrs = NULL; in __build_xattrs() 713 0, 0, &xattrs[numattr]); in __build_xattrs() 718 kfree(xattrs); in __build_xattrs() [all …]
|
| /Linux-v5.4/security/apparmor/include/ |
| D | policy.h | 150 char **xattrs; member
|
| /Linux-v5.4/fs/erofs/ |
| D | Kconfig | 9 blocks, inline xattrs/data, etc.) for scenarios which need
|
| /Linux-v5.4/Documentation/ABI/testing/ |
| D | evm | 5 EVM protects a file's security extended attributes(xattrs)
|
| /Linux-v5.4/security/apparmor/ |
| D | policy_unpack.c | 552 profile->xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs() 553 if (!profile->xattrs) in unpack_xattrs() 556 if (!unpack_strdup(e, &profile->xattrs[i], NULL)) in unpack_xattrs()
|
| D | policy.c | 227 kzfree(profile->xattrs[i]); in aa_free_profile() 228 kzfree(profile->xattrs); in aa_free_profile()
|
| D | domain.c | 327 size = vfs_getxattr_alloc(d, profile->xattrs[i], &value, in aa_xattrs_match()
|
| /Linux-v5.4/fs/ubifs/ |
| D | Kconfig | 69 Saying Y here includes support for extended attributes (xattrs).
|
| /Linux-v5.4/mm/ |
| D | shmem.c | 1113 simple_xattrs_free(&info->xattrs); in shmem_evict_inode() 2258 simple_xattrs_init(&info->xattrs); in shmem_get_inode() 3216 simple_xattr_list_add(&info->xattrs, new_xattr); in shmem_initxattrs() 3229 return simple_xattr_get(&info->xattrs, name, buffer, size); in shmem_xattr_handler_get() 3240 return simple_xattr_set(&info->xattrs, name, value, size, flags); in shmem_xattr_handler_set() 3268 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size); in shmem_listxattr()
|
| /Linux-v5.4/Documentation/admin-guide/cifs/ |
| D | todo.rst | 46 h) implement support for security and trusted categories of xattrs
|
| D | usage.rst | 161 Note that server ea support is required for supporting xattrs from the Linux 538 Allow getting and setting user xattrs (those attributes whose 543 Do not allow getfattr/setfattr to get/set/list xattrs
|
| /Linux-v5.4/Documentation/filesystems/ext4/ |
| D | attributes.rst | 6 Extended attributes (xattrs) are typically stored in a separate data
|
| /Linux-v5.4/fs/squashfs/ |
| D | Kconfig | 105 Saying Y here includes support for extended attributes (xattrs).
|