/Linux-v6.1/include/linux/ |
D | xattr.h | 97 static inline void simple_xattrs_init(struct simple_xattrs *xattrs) in simple_xattrs_init() argument 99 INIT_LIST_HEAD(&xattrs->head); in simple_xattrs_init() 100 spin_lock_init(&xattrs->lock); in simple_xattrs_init() 106 static inline void simple_xattrs_free(struct simple_xattrs *xattrs) in simple_xattrs_free() argument 110 list_for_each_entry_safe(xattr, node, &xattrs->head, list) { in simple_xattrs_free() 117 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, 119 int simple_xattr_set(struct simple_xattrs *xattrs, const char *name, 122 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, char *buffer, 124 void simple_xattr_list_add(struct simple_xattrs *xattrs,
|
D | shmem_fs.h | 25 struct simple_xattrs xattrs; /* list of xattrs */ member
|
/Linux-v6.1/security/integrity/evm/ |
D | Kconfig | 31 bool "Additional SMACK xattrs" 35 Include additional SMACK xattrs for HMAC calculation. 37 In addition to the original security xattrs (eg. security.selinux, 40 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and 52 Allow userland to provide additional xattrs for HMAC calculation. 54 When this option is enabled, root can add additional xattrs to the
|
D | evm_main.c | 89 int i, xattrs; in evm_init_config() local 91 xattrs = ARRAY_SIZE(evm_config_default_xattrnames); in evm_init_config() 94 for (i = 0; i < xattrs; i++) { in evm_init_config()
|
/Linux-v6.1/fs/kernfs/ |
D | inode.c | 49 simple_xattrs_init(&kn->iattr->xattrs); in __kernfs_iattrs() 148 return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size); in kernfs_iop_listxattr() 307 return simple_xattr_get(&attrs->xattrs, name, value, size); in kernfs_xattr_get() 317 return simple_xattr_set(&attrs->xattrs, name, value, size, flags, NULL); in kernfs_xattr_set() 344 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_add() argument 362 ret = simple_xattr_set(xattrs, full_name, value, size, flags, in kernfs_vfs_user_xattr_add() 378 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_rm() argument 386 ret = simple_xattr_set(xattrs, full_name, value, size, flags, in kernfs_vfs_user_xattr_rm() 415 return kernfs_vfs_user_xattr_add(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set() 418 return kernfs_vfs_user_xattr_rm(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set()
|
D | kernfs-internal.h | 29 struct simple_xattrs xattrs; member
|
D | dir.c | 556 simple_xattrs_free(&kn->iattr->xattrs); in kernfs_put()
|
/Linux-v6.1/fs/ |
D | xattr.c | 1020 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, in simple_xattr_get() argument 1026 spin_lock(&xattrs->lock); in simple_xattr_get() 1027 list_for_each_entry(xattr, &xattrs->head, list) { in simple_xattr_get() 1040 spin_unlock(&xattrs->lock); in simple_xattr_get() 1059 int simple_xattr_set(struct simple_xattrs *xattrs, const char *name, in simple_xattr_set() argument 1083 spin_lock(&xattrs->lock); in simple_xattr_set() 1084 list_for_each_entry(xattr, &xattrs->head, list) { in simple_xattr_set() 1105 list_add(&new_xattr->list, &xattrs->head); in simple_xattr_set() 1109 spin_unlock(&xattrs->lock); in simple_xattr_set() 1140 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, in simple_xattr_list() argument [all …]
|
/Linux-v6.1/Documentation/filesystems/ |
D | erofs.rst | 55 - Support extended attributes (xattrs) as an option; 60 - Support POSIX.1e ACLs by using xattrs; 155 | ... | inode | xattrs | extents | data inline | ... | inode ... 165 | xattr_ibody_header | shared xattrs | inline xattrs | 201 The size of the optional xattrs is indicated by i_xattr_count in inode 202 header. Large xattrs or xattrs shared by many different files can be 203 stored in shared xattrs metadata rather than inlined right after inode. 205 2. Shared xattrs metadata space 207 Shared xattrs space is similar to the above inode space, started with
|
D | fsverity.rst | 88 stored as security.ima xattrs, based on policy. 334 metadata such as owner, mode, timestamps, and xattrs are still 517 support paging multi-gigabyte xattrs into memory, and to support 518 encrypting xattrs. Note that the verity metadata *must* be encrypted 806 filesystems assume that all xattrs fit into a single 4K 808 encrypt xattrs, yet the Merkle tree *must* be encrypted when the
|
D | squashfs.rst | 220 The xattr table contains extended attributes for each inode. The xattrs
|
D | overlayfs.rst | 363 appropriate REDIRECT and METACOPY xattrs, and gain access to file on lower 365 "trusted." xattrs will require CAP_SYS_ADMIN. But it should be possible
|
/Linux-v6.1/fs/ceph/ |
D | xattr.c | 764 struct ceph_inode_xattr **xattrs = NULL; in __build_xattrs() local 785 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), in __build_xattrs() 788 if (!xattrs) in __build_xattrs() 792 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), in __build_xattrs() 794 if (!xattrs[i]) in __build_xattrs() 802 kfree(xattrs[i]); in __build_xattrs() 803 kfree(xattrs); in __build_xattrs() 804 xattrs = NULL; in __build_xattrs() 818 0, 0, &xattrs[numattr]); in __build_xattrs() 823 kfree(xattrs); in __build_xattrs() [all …]
|
/Linux-v6.1/Documentation/admin-guide/cifs/ |
D | todo.rst | 35 (stat, statfs, create, unlink, mkdir, xattrs) already have been improved by 48 h) implement support for security and trusted categories of xattrs
|
D | usage.rst | 160 Note that server ea support is required for supporting xattrs from the Linux 537 Allow getting and setting user xattrs (those attributes whose 542 Do not allow getfattr/setfattr to get/set/list xattrs
|
/Linux-v6.1/security/apparmor/include/ |
D | policy.h | 154 char **xattrs; member
|
/Linux-v6.1/fs/ubifs/ |
D | Kconfig | 70 Saying Y here includes support for extended attributes (xattrs).
|
/Linux-v6.1/security/apparmor/ |
D | policy_unpack.c | 558 profile->xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs() 559 if (!profile->xattrs) in unpack_xattrs() 562 if (!unpack_strdup(e, &profile->xattrs[i], NULL)) in unpack_xattrs()
|
D | policy.c | 227 kfree_sensitive(profile->xattrs[i]); in aa_free_profile() 228 kfree_sensitive(profile->xattrs); in aa_free_profile()
|
D | domain.c | 328 size = vfs_getxattr_alloc(&init_user_ns, d, profile->xattrs[i], in aa_xattrs_match()
|
/Linux-v6.1/fs/erofs/ |
D | Kconfig | 11 xattrs/data, chunk-based deduplication, multiple devices, etc.) for
|
/Linux-v6.1/Documentation/ABI/testing/ |
D | evm | 6 EVM protects a file's security extended attributes(xattrs)
|
/Linux-v6.1/Documentation/filesystems/ext4/ |
D | attributes.rst | 6 Extended attributes (xattrs) are typically stored in a separate data
|
/Linux-v6.1/mm/ |
D | shmem.c | 1175 simple_xattrs_free(&info->xattrs); in shmem_evict_inode() 2360 simple_xattrs_init(&info->xattrs); in shmem_get_inode() 3286 simple_xattr_list_add(&info->xattrs, new_xattr); in shmem_initxattrs() 3299 return simple_xattr_get(&info->xattrs, name, buffer, size); in shmem_xattr_handler_get() 3312 err = simple_xattr_set(&info->xattrs, name, value, size, flags, NULL); in shmem_xattr_handler_set() 3345 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size); in shmem_listxattr()
|
/Linux-v6.1/fs/squashfs/ |
D | Kconfig | 105 Saying Y here includes support for extended attributes (xattrs).
|