/kernel/linux/linux-5.10/include/linux/ |
D | xattr.h | 87 static inline void simple_xattrs_init(struct simple_xattrs *xattrs) in simple_xattrs_init() argument 89 INIT_LIST_HEAD(&xattrs->head); in simple_xattrs_init() 90 spin_lock_init(&xattrs->lock); in simple_xattrs_init() 96 static inline void simple_xattrs_free(struct simple_xattrs *xattrs) in simple_xattrs_free() argument 100 list_for_each_entry_safe(xattr, node, &xattrs->head, list) { in simple_xattrs_free() 107 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, 109 int simple_xattr_set(struct simple_xattrs *xattrs, const char *name, 112 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, char *buffer, 114 void simple_xattr_list_add(struct simple_xattrs *xattrs,
|
D | shmem_fs.h | 24 struct simple_xattrs xattrs; /* list of xattrs */ member
|
/kernel/linux/linux-5.10/security/integrity/evm/ |
D | Kconfig | 31 bool "Additional SMACK xattrs" 35 Include additional SMACK xattrs for HMAC calculation. 37 In addition to the original security xattrs (eg. security.selinux, 40 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and 52 Allow userland to provide additional xattrs for HMAC calculation. 54 When this option is enabled, root can add additional xattrs to the
|
D | evm_main.c | 71 int i, xattrs; in evm_init_config() local 73 xattrs = ARRAY_SIZE(evm_config_default_xattrnames); in evm_init_config() 76 for (i = 0; i < xattrs; i++) { in evm_init_config()
|
/kernel/linux/linux-5.10/fs/kernfs/ |
D | inode.c | 55 simple_xattrs_init(&kn->iattr->xattrs); in __kernfs_iattrs() 150 return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size); in kernfs_iop_listxattr() 298 return simple_xattr_get(&attrs->xattrs, name, value, size); in kernfs_xattr_get() 308 return simple_xattr_set(&attrs->xattrs, name, value, size, flags, NULL); in kernfs_xattr_set() 334 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_add() argument 352 ret = simple_xattr_set(xattrs, full_name, value, size, flags, in kernfs_vfs_user_xattr_add() 368 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_rm() argument 376 ret = simple_xattr_set(xattrs, full_name, value, size, flags, in kernfs_vfs_user_xattr_rm() 404 return kernfs_vfs_user_xattr_add(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set() 407 return kernfs_vfs_user_xattr_rm(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set()
|
D | kernfs-internal.h | 28 struct simple_xattrs xattrs; member
|
D | dir.c | 539 simple_xattrs_free(&kn->iattr->xattrs); in kernfs_put()
|
/kernel/linux/linux-5.10/fs/ |
D | xattr.c | 929 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, in simple_xattr_get() argument 935 spin_lock(&xattrs->lock); in simple_xattr_get() 936 list_for_each_entry(xattr, &xattrs->head, list) { in simple_xattr_get() 949 spin_unlock(&xattrs->lock); in simple_xattr_get() 968 int simple_xattr_set(struct simple_xattrs *xattrs, const char *name, in simple_xattr_set() argument 992 spin_lock(&xattrs->lock); in simple_xattr_set() 993 list_for_each_entry(xattr, &xattrs->head, list) { in simple_xattr_set() 1014 list_add(&new_xattr->list, &xattrs->head); in simple_xattr_set() 1018 spin_unlock(&xattrs->lock); in simple_xattr_set() 1049 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, in simple_xattr_list() argument [all …]
|
/kernel/linux/linux-5.10/Documentation/filesystems/ |
D | erofs.rst | 47 - Support extended attributes (xattrs) as an option; 51 - Support POSIX.1e ACLs by using xattrs; 120 | ... | inode | xattrs | extents | data inline | ... | inode ... 130 | xattr_ibody_header | shared xattrs | inline xattrs | 165 The size of the optional xattrs is indicated by i_xattr_count in inode 166 header. Large xattrs or xattrs shared by many different files can be 167 stored in shared xattrs metadata rather than inlined right after inode. 169 2. Shared xattrs metadata space 171 Shared xattrs space is similar to the above inode space, started with
|
D | fsverity.rst | 246 metadata such as owner, mode, timestamps, and xattrs are still 434 support paging multi-gigabyte xattrs into memory, and to support 435 encrypting xattrs. Note that the verity metadata *must* be encrypted 716 filesystems assume that all xattrs fit into a single 4K 718 encrypt xattrs, yet the Merkle tree *must* be encrypted when the
|
D | squashfs.rst | 220 The xattr table contains extended attributes for each inode. The xattrs
|
D | overlayfs.rst | 363 appropriate REDIRECT and METACOPY xattrs, and gain access to file on lower 365 "trusted." xattrs will require CAP_SYS_ADMIN. But it should be possible
|
/kernel/linux/linux-5.10/fs/ceph/ |
D | xattr.c | 668 struct ceph_inode_xattr **xattrs = NULL; in __build_xattrs() local 689 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), in __build_xattrs() 692 if (!xattrs) in __build_xattrs() 696 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), in __build_xattrs() 698 if (!xattrs[i]) in __build_xattrs() 706 kfree(xattrs[i]); in __build_xattrs() 707 kfree(xattrs); in __build_xattrs() 708 xattrs = NULL; in __build_xattrs() 722 0, 0, &xattrs[numattr]); in __build_xattrs() 727 kfree(xattrs); in __build_xattrs() [all …]
|
/kernel/linux/linux-5.10/security/apparmor/include/ |
D | policy.h | 150 char **xattrs; member
|
/kernel/linux/linux-5.10/fs/erofs/ |
D | Kconfig | 10 blocks, inline xattrs/data, etc.) for scenarios which need
|
/kernel/linux/linux-5.10/Documentation/ABI/testing/ |
D | evm | 5 EVM protects a file's security extended attributes(xattrs)
|
/kernel/linux/linux-5.10/fs/ubifs/ |
D | Kconfig | 70 Saying Y here includes support for extended attributes (xattrs).
|
/kernel/linux/linux-5.10/security/apparmor/ |
D | policy_unpack.c | 555 profile->xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs() 556 if (!profile->xattrs) in unpack_xattrs() 559 if (!unpack_strdup(e, &profile->xattrs[i], NULL)) in unpack_xattrs()
|
D | policy.c | 227 kfree_sensitive(profile->xattrs[i]); in aa_free_profile() 228 kfree_sensitive(profile->xattrs); in aa_free_profile()
|
D | domain.c | 327 size = vfs_getxattr_alloc(d, profile->xattrs[i], &value, in aa_xattrs_match()
|
/kernel/linux/linux-5.10/mm/ |
D | shmem.c | 1184 simple_xattrs_free(&info->xattrs); in shmem_evict_inode() 2309 simple_xattrs_init(&info->xattrs); in shmem_get_inode() 3265 simple_xattr_list_add(&info->xattrs, new_xattr); in shmem_initxattrs() 3278 return simple_xattr_get(&info->xattrs, name, buffer, size); in shmem_xattr_handler_get() 3289 return simple_xattr_set(&info->xattrs, name, value, size, flags, NULL); in shmem_xattr_handler_set() 3317 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size); in shmem_listxattr()
|
/kernel/linux/linux-5.10/Documentation/admin-guide/cifs/ |
D | todo.rst | 46 h) implement support for security and trusted categories of xattrs
|
D | usage.rst | 160 Note that server ea support is required for supporting xattrs from the Linux 537 Allow getting and setting user xattrs (those attributes whose 542 Do not allow getfattr/setfattr to get/set/list xattrs
|
/kernel/linux/linux-5.10/Documentation/filesystems/ext4/ |
D | attributes.rst | 6 Extended attributes (xattrs) are typically stored in a separate data
|
/kernel/linux/linux-5.10/fs/squashfs/ |
D | Kconfig | 105 Saying Y here includes support for extended attributes (xattrs).
|