/linux/include/linux/ |
A D | xattr.h | 97 static inline void simple_xattrs_init(struct simple_xattrs *xattrs) in simple_xattrs_init() argument 99 INIT_LIST_HEAD(&xattrs->head); in simple_xattrs_init() 100 spin_lock_init(&xattrs->lock); in simple_xattrs_init() 106 static inline void simple_xattrs_free(struct simple_xattrs *xattrs) in simple_xattrs_free() argument 110 list_for_each_entry_safe(xattr, node, &xattrs->head, list) { in simple_xattrs_free() 117 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, 119 int simple_xattr_set(struct simple_xattrs *xattrs, const char *name, 122 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, char *buffer, 124 void simple_xattr_list_add(struct simple_xattrs *xattrs,
|
A D | shmem_fs.h | 25 struct simple_xattrs xattrs; /* list of xattrs */ member
|
/linux/security/integrity/evm/ |
A D | Kconfig | 31 bool "Additional SMACK xattrs" 35 Include additional SMACK xattrs for HMAC calculation. 37 In addition to the original security xattrs (eg. security.selinux, 40 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and 52 Allow userland to provide additional xattrs for HMAC calculation. 54 When this option is enabled, root can add additional xattrs to the
|
A D | evm_main.c | 95 int i, xattrs; in evm_init_config() local 97 xattrs = ARRAY_SIZE(evm_config_default_xattrnames); in evm_init_config() 100 for (i = 0; i < xattrs; i++) { in evm_init_config()
|
/linux/fs/kernfs/ |
A D | inode.c | 49 simple_xattrs_init(&kn->iattr->xattrs); in __kernfs_iattrs() 145 return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size); in kernfs_iop_listxattr() 301 return simple_xattr_get(&attrs->xattrs, name, value, size); in kernfs_xattr_get() 311 return simple_xattr_set(&attrs->xattrs, name, value, size, flags, NULL); in kernfs_xattr_set() 338 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_add() argument 356 ret = simple_xattr_set(xattrs, full_name, value, size, flags, in kernfs_vfs_user_xattr_add() 372 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_rm() argument 380 ret = simple_xattr_set(xattrs, full_name, value, size, flags, in kernfs_vfs_user_xattr_rm() 409 return kernfs_vfs_user_xattr_add(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set() 412 return kernfs_vfs_user_xattr_rm(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set()
|
A D | kernfs-internal.h | 29 struct simple_xattrs xattrs; member
|
A D | dir.c | 533 simple_xattrs_free(&kn->iattr->xattrs); in kernfs_put()
|
/linux/fs/ |
A D | xattr.c | 969 spin_lock(&xattrs->lock); in simple_xattr_get() 970 list_for_each_entry(xattr, &xattrs->head, list) { in simple_xattr_get() 983 spin_unlock(&xattrs->lock); in simple_xattr_get() 1026 spin_lock(&xattrs->lock); in simple_xattr_set() 1048 list_add(&new_xattr->list, &xattrs->head); in simple_xattr_set() 1052 spin_unlock(&xattrs->lock); in simple_xattr_set() 1108 spin_lock(&xattrs->lock); in simple_xattr_list() 1118 spin_unlock(&xattrs->lock); in simple_xattr_list() 1129 spin_lock(&xattrs->lock); in simple_xattr_list_add() 1130 list_add(&new_xattr->list, &xattrs->head); in simple_xattr_list_add() [all …]
|
/linux/Documentation/filesystems/ |
A D | erofs.rst | 48 - Support extended attributes (xattrs) as an option; 52 - Support POSIX.1e ACLs by using xattrs; 127 | ... | inode | xattrs | extents | data inline | ... | inode ... 137 | xattr_ibody_header | shared xattrs | inline xattrs | 173 The size of the optional xattrs is indicated by i_xattr_count in inode 174 header. Large xattrs or xattrs shared by many different files can be 175 stored in shared xattrs metadata rather than inlined right after inode. 177 2. Shared xattrs metadata space 179 Shared xattrs space is similar to the above inode space, started with
|
A D | fsverity.rst | 323 metadata such as owner, mode, timestamps, and xattrs are still 506 support paging multi-gigabyte xattrs into memory, and to support 507 encrypting xattrs. Note that the verity metadata *must* be encrypted 788 filesystems assume that all xattrs fit into a single 4K 790 encrypt xattrs, yet the Merkle tree *must* be encrypted when the
|
A D | squashfs.rst | 220 The xattr table contains extended attributes for each inode. The xattrs
|
A D | overlayfs.rst | 363 appropriate REDIRECT and METACOPY xattrs, and gain access to file on lower 365 "trusted." xattrs will require CAP_SYS_ADMIN. But it should be possible
|
/linux/fs/ceph/ |
A D | xattr.c | 756 struct ceph_inode_xattr **xattrs = NULL; in __build_xattrs() local 780 if (!xattrs) in __build_xattrs() 786 if (!xattrs[i]) in __build_xattrs() 794 kfree(xattrs[i]); in __build_xattrs() 795 kfree(xattrs); in __build_xattrs() 796 xattrs = NULL; in __build_xattrs() 810 0, 0, &xattrs[numattr]); in __build_xattrs() 815 kfree(xattrs); in __build_xattrs() 824 if (xattrs) { in __build_xattrs() 826 kfree(xattrs[i]); in __build_xattrs() [all …]
|
/linux/Documentation/admin-guide/cifs/ |
A D | todo.rst | 35 (stat, statfs, create, unlink, mkdir, xattrs) already have been improved by 48 h) implement support for security and trusted categories of xattrs
|
A D | usage.rst | 160 Note that server ea support is required for supporting xattrs from the Linux 537 Allow getting and setting user xattrs (those attributes whose 542 Do not allow getfattr/setfattr to get/set/list xattrs
|
/linux/security/apparmor/include/ |
A D | policy.h | 150 char **xattrs; member
|
/linux/fs/erofs/ |
A D | Kconfig | 11 xattrs/data, chunk-based deduplication, multiple devices, etc.) for
|
/linux/fs/ubifs/ |
A D | Kconfig | 70 Saying Y here includes support for extended attributes (xattrs).
|
/linux/security/apparmor/ |
A D | policy_unpack.c | 555 profile->xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs() 556 if (!profile->xattrs) in unpack_xattrs() 559 if (!unpack_strdup(e, &profile->xattrs[i], NULL)) in unpack_xattrs()
|
A D | policy.c | 227 kfree_sensitive(profile->xattrs[i]); in aa_free_profile() 228 kfree_sensitive(profile->xattrs); in aa_free_profile()
|
A D | domain.c | 329 size = vfs_getxattr_alloc(&init_user_ns, d, profile->xattrs[i], in aa_xattrs_match()
|
/linux/Documentation/ABI/testing/ |
A D | evm | 6 EVM protects a file's security extended attributes(xattrs)
|
/linux/mm/ |
A D | shmem.c | 1159 simple_xattrs_free(&info->xattrs); in shmem_evict_inode() 2304 simple_xattrs_init(&info->xattrs); in shmem_get_inode() 3148 simple_xattr_list_add(&info->xattrs, new_xattr); in shmem_initxattrs() 3161 return simple_xattr_get(&info->xattrs, name, buffer, size); in shmem_xattr_handler_get() 3173 return simple_xattr_set(&info->xattrs, name, value, size, flags, NULL); in shmem_xattr_handler_set() 3201 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size); in shmem_listxattr()
|
/linux/Documentation/filesystems/ext4/ |
A D | attributes.rst | 6 Extended attributes (xattrs) are typically stored in a separate data
|
/linux/fs/squashfs/ |
A D | Kconfig | 105 Saying Y here includes support for extended attributes (xattrs).
|