Home
last modified time | relevance | path

Searched refs:xattr (Results 1 – 8 of 8) sorted by relevance

/security/integrity/evm/
Devm_secfs.c134 struct xattr_list *xattr; in evm_read_xattrs() local
143 list_for_each_entry(xattr, &evm_config_xattrnames, list) in evm_read_xattrs()
144 size += strlen(xattr->name) + 1; in evm_read_xattrs()
152 list_for_each_entry(xattr, &evm_config_xattrnames, list) { in evm_read_xattrs()
153 sprintf(temp + offset, "%s\n", xattr->name); in evm_read_xattrs()
154 offset += strlen(xattr->name) + 1; in evm_read_xattrs()
178 struct xattr_list *xattr, *tmp; in evm_write_xattrs() local
197 xattr = kmalloc(sizeof(struct xattr_list), GFP_KERNEL); in evm_write_xattrs()
198 if (!xattr) { in evm_write_xattrs()
203 xattr->name = memdup_user_nul(buf, count); in evm_write_xattrs()
[all …]
Devm_posix_acl.c12 int posix_xattr_acl(const char *xattr) in posix_xattr_acl() argument
14 int xattr_len = strlen(xattr); in posix_xattr_acl()
17 && (strncmp(XATTR_NAME_POSIX_ACL_ACCESS, xattr, xattr_len) == 0)) in posix_xattr_acl()
20 && (strncmp(XATTR_NAME_POSIX_ACL_DEFAULT, xattr, xattr_len) == 0)) in posix_xattr_acl()
Devm_main.c95 struct xattr_list *xattr; in evm_find_protected_xattrs() local
102 list_for_each_entry_rcu(xattr, &evm_config_xattrnames, list) { in evm_find_protected_xattrs()
103 error = __vfs_getxattr(dentry, inode, xattr->name, NULL, 0, in evm_find_protected_xattrs()
231 struct xattr_list *xattr; in evm_protected_xattr() local
234 list_for_each_entry_rcu(xattr, &evm_config_xattrnames, list) { in evm_protected_xattr()
235 if ((strlen(xattr->name) == namelen) in evm_protected_xattr()
236 && (strncmp(req_xattr_name, xattr->name, namelen) == 0)) { in evm_protected_xattr()
241 xattr->name + XATTR_SECURITY_PREFIX_LEN, in evm_protected_xattr()
521 const struct xattr *lsm_xattr, in evm_inode_init_security()
522 struct xattr *evm_xattr) in evm_inode_init_security()
Devm_crypto.c193 struct xattr_list *xattr; in evm_calc_hmac_or_hash() local
212 list_for_each_entry_rcu(xattr, &evm_config_xattrnames, list) { in evm_calc_hmac_or_hash()
215 if (strcmp(xattr->name, XATTR_NAME_IMA) == 0) in evm_calc_hmac_or_hash()
219 && !strcmp(xattr->name, req_xattr_name)) { in evm_calc_hmac_or_hash()
227 size = vfs_getxattr_alloc(dentry, xattr->name, in evm_calc_hmac_or_hash()
323 data.hdr.xattr.sha1.type = EVM_XATTR_HMAC; in evm_update_evmxattr()
325 &data.hdr.xattr.data[1], in evm_update_evmxattr()
333 int evm_init_hmac(struct inode *inode, const struct xattr *lsm_xattr, in evm_init_hmac()
Devm.h63 int evm_init_hmac(struct inode *inode, const struct xattr *xattr,
/security/integrity/ima/
Dima_appraise.c68 iint->ima_hash->xattr.sha1.type = IMA_XATTR_DIGEST; in ima_fix_xattr()
71 iint->ima_hash->xattr.ng.type = IMA_XATTR_DIGEST_NG; in ima_fix_xattr()
72 iint->ima_hash->xattr.ng.algo = algo; in ima_fix_xattr()
75 &iint->ima_hash->xattr.data[offset], in ima_fix_xattr()
76 (sizeof(iint->ima_hash->xattr) - offset) + in ima_fix_xattr()
/security/integrity/
Dintegrity.h102 } xattr; member
/security/
Dsecurity.c973 struct xattr new_xattrs[MAX_LSM_EVM_XATTR + 1]; in security_inode_init_security()
974 struct xattr *lsm_xattr, *evm_xattr, *xattr; in security_inode_init_security() local
998 for (xattr = new_xattrs; xattr->value != NULL; xattr++) in security_inode_init_security()
999 kfree(xattr->value); in security_inode_init_security()