| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | xattr.h | 88 static inline void simple_xattrs_init(struct simple_xattrs *xattrs) in simple_xattrs_init() argument 90 INIT_LIST_HEAD(&xattrs->head); in simple_xattrs_init() 91 spin_lock_init(&xattrs->lock); in simple_xattrs_init() 97 static inline void simple_xattrs_free(struct simple_xattrs *xattrs) in simple_xattrs_free() argument 101 list_for_each_entry_safe(xattr, node, &xattrs->head, list) { in simple_xattrs_free() 108 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, 110 int simple_xattr_set(struct simple_xattrs *xattrs, const char *name, 113 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, char *buffer, 115 void simple_xattr_list_add(struct simple_xattrs *xattrs,
|
| H A D | shmem_fs.h | 24 struct simple_xattrs xattrs; /* list of xattrs */ member
|
| /OK3568_Linux_fs/kernel/fs/kernfs/ |
| H A D | inode.c | 55 simple_xattrs_init(&kn->iattr->xattrs); in __kernfs_iattrs() 150 return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size); in kernfs_iop_listxattr() 298 return simple_xattr_get(&attrs->xattrs, name, value, size); in kernfs_xattr_get() 308 return simple_xattr_set(&attrs->xattrs, name, value, size, flags, NULL); in kernfs_xattr_set() 335 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_add() argument 353 ret = simple_xattr_set(xattrs, full_name, value, size, flags, in kernfs_vfs_user_xattr_add() 369 struct simple_xattrs *xattrs, in kernfs_vfs_user_xattr_rm() argument 377 ret = simple_xattr_set(xattrs, full_name, value, size, flags, in kernfs_vfs_user_xattr_rm() 405 return kernfs_vfs_user_xattr_add(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set() 408 return kernfs_vfs_user_xattr_rm(kn, full_name, &attrs->xattrs, in kernfs_vfs_user_xattr_set()
|
| H A D | kernfs-internal.h | 28 struct simple_xattrs xattrs; member
|
| /OK3568_Linux_fs/kernel/security/integrity/evm/ |
| H A D | Kconfig | 31 bool "Additional SMACK xattrs" 35 Include additional SMACK xattrs for HMAC calculation. 37 In addition to the original security xattrs (eg. security.selinux, 40 Smack xattrs: security.SMACK64EXEC, security.SMACK64TRANSMUTE and 52 Allow userland to provide additional xattrs for HMAC calculation. 54 When this option is enabled, root can add additional xattrs to the
|
| H A D | evm_main.c | 71 int i, xattrs; in evm_init_config() local 73 xattrs = ARRAY_SIZE(evm_config_default_xattrnames); in evm_init_config() 76 for (i = 0; i < xattrs; i++) { in evm_init_config()
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | erofs.rst | 47 - Support extended attributes (xattrs) as an option; 51 - Support POSIX.1e ACLs by using xattrs; 123 | ... | inode | xattrs | extents | data inline | ... | inode ... 133 | xattr_ibody_header | shared xattrs | inline xattrs | 168 The size of the optional xattrs is indicated by i_xattr_count in inode 169 header. Large xattrs or xattrs shared by many different files can be 170 stored in shared xattrs metadata rather than inlined right after inode. 172 2. Shared xattrs metadata space 174 Shared xattrs space is similar to the above inode space, started with
|
| H A D | fsverity.rst | 323 metadata such as owner, mode, timestamps, and xattrs are still 506 support paging multi-gigabyte xattrs into memory, and to support 507 encrypting xattrs. Note that the verity metadata *must* be encrypted 788 filesystems assume that all xattrs fit into a single 4K 790 encrypt xattrs, yet the Merkle tree *must* be encrypted when the
|
| /OK3568_Linux_fs/kernel/fs/ |
| H A D | xattr.c | 929 int simple_xattr_get(struct simple_xattrs *xattrs, const char *name, in simple_xattr_get() argument 935 spin_lock(&xattrs->lock); in simple_xattr_get() 936 list_for_each_entry(xattr, &xattrs->head, list) { in simple_xattr_get() 949 spin_unlock(&xattrs->lock); in simple_xattr_get() 968 int simple_xattr_set(struct simple_xattrs *xattrs, const char *name, in simple_xattr_set() argument 992 spin_lock(&xattrs->lock); in simple_xattr_set() 993 list_for_each_entry(xattr, &xattrs->head, list) { in simple_xattr_set() 1014 list_add(&new_xattr->list, &xattrs->head); in simple_xattr_set() 1018 spin_unlock(&xattrs->lock); in simple_xattr_set() 1049 ssize_t simple_xattr_list(struct inode *inode, struct simple_xattrs *xattrs, in simple_xattr_list() argument [all …]
|
| /OK3568_Linux_fs/buildroot/package/tar/ |
| H A D | tar.mk | 28 TAR_CONF_OPTS += --with-xattrs 30 TAR_CONF_OPTS += --without-xattrs
|
| /OK3568_Linux_fs/kernel/fs/ceph/ |
| H A D | xattr.c | 668 struct ceph_inode_xattr **xattrs = NULL; in __build_xattrs() local 689 xattrs = kcalloc(numattr, sizeof(struct ceph_inode_xattr *), in __build_xattrs() 692 if (!xattrs) in __build_xattrs() 696 xattrs[i] = kmalloc(sizeof(struct ceph_inode_xattr), in __build_xattrs() 698 if (!xattrs[i]) in __build_xattrs() 706 kfree(xattrs[i]); in __build_xattrs() 707 kfree(xattrs); in __build_xattrs() 708 xattrs = NULL; in __build_xattrs() 722 0, 0, &xattrs[numattr]); in __build_xattrs() 727 kfree(xattrs); in __build_xattrs() [all …]
|
| /OK3568_Linux_fs/buildroot/fs/tar/ |
| H A D | tar.mk | 16 tar $(TAR_OPTS) -cf $@ --null --xattrs-include='*' --no-recursion -T - --numeric-owner)
|
| /OK3568_Linux_fs/yocto/poky/meta/lib/oe/ |
| H A D | copy_buildsystem.py | 24 | tar --xattrs --xattrs-include='*' -xf - -C %s" % (src, dest)
|
| /OK3568_Linux_fs/buildroot/package/xen/ |
| H A D | 0001-9pfs-include-linux-limits.h-for-XATTR_SIZE_MAX.patch | 7 to reject attempts of creating xattrs with an invalid size, which is
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/systemd/ |
| H A D | CVE-2022-4415-1.patch | 85 static const char * const xattrs[_META_MAX] = {
|
| /OK3568_Linux_fs/kernel/security/apparmor/include/ |
| H A D | policy.h | 150 char **xattrs; member
|
| /OK3568_Linux_fs/kernel/fs/erofs/ |
| H A D | Kconfig | 11 blocks, inline xattrs/data, etc.) for scenarios which need
|
| /OK3568_Linux_fs/kernel/fs/ubifs/ |
| H A D | Kconfig | 70 Saying Y here includes support for extended attributes (xattrs).
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/testing/ |
| H A D | evm | 5 EVM protects a file's security extended attributes(xattrs)
|
| /OK3568_Linux_fs/kernel/security/apparmor/ |
| H A D | policy_unpack.c | 555 profile->xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs() 556 if (!profile->xattrs) in unpack_xattrs() 559 if (!unpack_strdup(e, &profile->xattrs[i], NULL)) in unpack_xattrs()
|
| H A D | policy.c | 227 kfree_sensitive(profile->xattrs[i]); in aa_free_profile() 228 kfree_sensitive(profile->xattrs); in aa_free_profile()
|
| /OK3568_Linux_fs/kernel/mm/ |
| H A D | shmem.c | 1191 simple_xattrs_free(&info->xattrs); in shmem_evict_inode() 2331 simple_xattrs_init(&info->xattrs); in shmem_get_inode() 3233 simple_xattr_list_add(&info->xattrs, new_xattr); in shmem_initxattrs() 3247 return simple_xattr_get(&info->xattrs, name, buffer, size); in shmem_xattr_handler_get() 3258 return simple_xattr_set(&info->xattrs, name, value, size, flags, NULL); in shmem_xattr_handler_set() 3286 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size); in shmem_listxattr()
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/cifs/ |
| H A D | todo.rst | 46 h) implement support for security and trusted categories of xattrs
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ext4/ |
| H A D | attributes.rst | 6 Extended attributes (xattrs) are typically stored in a separate data
|
| /OK3568_Linux_fs/kernel/fs/squashfs/ |
| H A D | Kconfig | 105 Saying Y here includes support for extended attributes (xattrs).
|