| /OK3568_Linux_fs/kernel/security/integrity/evm/ |
| H A D | evm_secfs.c | 133 struct xattr_list *xattr; in evm_read_xattrs() local 142 list_for_each_entry(xattr, &evm_config_xattrnames, list) in evm_read_xattrs() 143 size += strlen(xattr->name) + 1; in evm_read_xattrs() 151 list_for_each_entry(xattr, &evm_config_xattrnames, list) { in evm_read_xattrs() 152 sprintf(temp + offset, "%s\n", xattr->name); in evm_read_xattrs() 153 offset += strlen(xattr->name) + 1; in evm_read_xattrs() 177 struct xattr_list *xattr, *tmp; in evm_write_xattrs() local 196 xattr = kmalloc(sizeof(struct xattr_list), GFP_KERNEL); in evm_write_xattrs() 197 if (!xattr) { in evm_write_xattrs() 202 xattr->name = memdup_user_nul(buf, count); in evm_write_xattrs() [all …]
|
| H A D | evm_posix_acl.c | 12 int posix_xattr_acl(const char *xattr) in posix_xattr_acl() argument 14 int xattr_len = strlen(xattr); in posix_xattr_acl() 17 && (strncmp(XATTR_NAME_POSIX_ACL_ACCESS, xattr, xattr_len) == 0)) in posix_xattr_acl() 20 && (strncmp(XATTR_NAME_POSIX_ACL_DEFAULT, xattr, xattr_len) == 0)) in posix_xattr_acl()
|
| H A D | evm_main.c | 96 struct xattr_list *xattr; in evm_find_protected_xattrs() local 103 list_for_each_entry_lockless(xattr, &evm_config_xattrnames, list) { in evm_find_protected_xattrs() 104 error = __vfs_getxattr(dentry, inode, xattr->name, NULL, 0, in evm_find_protected_xattrs() 238 struct xattr_list *xattr; in evm_protected_xattr() local 241 list_for_each_entry_lockless(xattr, &evm_config_xattrnames, list) { in evm_protected_xattr() 242 if ((strlen(xattr->name) == namelen) in evm_protected_xattr() 243 && (strncmp(req_xattr_name, xattr->name, namelen) == 0)) { in evm_protected_xattr() 248 xattr->name + XATTR_SECURITY_PREFIX_LEN, in evm_protected_xattr() 528 const struct xattr *lsm_xattr, in evm_inode_init_security() 529 struct xattr *evm_xattr) in evm_inode_init_security()
|
| H A D | evm_crypto.c | 191 struct xattr_list *xattr; in evm_calc_hmac_or_hash() local 210 list_for_each_entry_lockless(xattr, &evm_config_xattrnames, list) { in evm_calc_hmac_or_hash() 213 if (strcmp(xattr->name, XATTR_NAME_IMA) == 0) in evm_calc_hmac_or_hash() 217 && !strcmp(xattr->name, req_xattr_name)) { in evm_calc_hmac_or_hash() 225 size = vfs_getxattr_alloc(dentry, xattr->name, in evm_calc_hmac_or_hash() 321 data.hdr.xattr.sha1.type = EVM_XATTR_HMAC; in evm_update_evmxattr() 323 &data.hdr.xattr.data[1], in evm_update_evmxattr() 331 int evm_init_hmac(struct inode *inode, const struct xattr *lsm_xattr, in evm_init_hmac()
|
| /OK3568_Linux_fs/kernel/fs/ceph/ |
| H A D | xattr.c | 19 struct ceph_inode_xattr *xattr); 450 struct ceph_inode_xattr *xattr = NULL; in __set_xattr() local 457 xattr = rb_entry(parent, struct ceph_inode_xattr, node); in __set_xattr() 458 c = strncmp(name, xattr->name, min(name_len, xattr->name_len)); in __set_xattr() 464 if (name_len == xattr->name_len) in __set_xattr() 466 else if (name_len < xattr->name_len) in __set_xattr() 471 xattr = NULL; in __set_xattr() 477 if (xattr && (flags & XATTR_CREATE)) in __set_xattr() 479 else if (!xattr && (flags & XATTR_REPLACE)) in __set_xattr() 488 if (xattr) in __set_xattr() [all …]
|
| /OK3568_Linux_fs/kernel/fs/hfsplus/ |
| H A D | xattr_security.c | 37 const struct xattr *xattr_array, in hfsplus_initxattrs() 40 const struct xattr *xattr; in hfsplus_initxattrs() local 48 for (xattr = xattr_array; xattr->name != NULL; xattr++) { in hfsplus_initxattrs() 50 if (!strcmp(xattr->name, "")) in hfsplus_initxattrs() 55 XATTR_SECURITY_PREFIX_LEN, xattr->name); in hfsplus_initxattrs() 57 XATTR_SECURITY_PREFIX_LEN + strlen(xattr->name), 0, 1); in hfsplus_initxattrs() 60 xattr->value, xattr->value_len, 0); in hfsplus_initxattrs()
|
| /OK3568_Linux_fs/kernel/fs/ext2/ |
| H A D | xattr_security.c | 30 static int ext2_initxattrs(struct inode *inode, const struct xattr *xattr_array, in ext2_initxattrs() 33 const struct xattr *xattr; in ext2_initxattrs() local 36 for (xattr = xattr_array; xattr->name != NULL; xattr++) { in ext2_initxattrs() 38 xattr->name, xattr->value, in ext2_initxattrs() 39 xattr->value_len, 0); in ext2_initxattrs()
|
| /OK3568_Linux_fs/kernel/fs/jffs2/ |
| H A D | security.c | 27 const struct xattr *xattr_array, void *fs_info) in jffs2_initxattrs() 29 const struct xattr *xattr; in jffs2_initxattrs() local 32 for (xattr = xattr_array; xattr->name != NULL; xattr++) { in jffs2_initxattrs() 34 xattr->name, xattr->value, in jffs2_initxattrs() 35 xattr->value_len, 0); in jffs2_initxattrs()
|
| /OK3568_Linux_fs/kernel/fs/ext4/ |
| H A D | xattr_security.c | 35 ext4_initxattrs(struct inode *inode, const struct xattr *xattr_array, in ext4_initxattrs() 38 const struct xattr *xattr; in ext4_initxattrs() local 42 for (xattr = xattr_array; xattr->name != NULL; xattr++) { in ext4_initxattrs() 45 xattr->name, xattr->value, in ext4_initxattrs() 46 xattr->value_len, XATTR_CREATE); in ext4_initxattrs()
|
| /OK3568_Linux_fs/kernel/fs/jfs/ |
| H A D | xattr.c | 64 struct jfs_ea_list *xattr; /* buffer containing ea list */ member 445 ea_buf->xattr = NULL; in ea_get() 452 ea_buf->xattr = (struct jfs_ea_list *) ji->i_inline_ea; in ea_get() 464 ea_buf->xattr = (struct jfs_ea_list *) ji->i_inline_ea; in ea_get() 487 ea_buf->xattr = kmalloc(ea_buf->max_size, GFP_KERNEL); in ea_get() 488 if (ea_buf->xattr == NULL) in ea_get() 496 if ((rc = ea_read(inode, ea_buf->xattr))) { in ea_get() 497 kfree(ea_buf->xattr); in ea_get() 498 ea_buf->xattr = NULL; in ea_get() 534 ea_buf->xattr = ea_buf->mp->data; in ea_get() [all …]
|
| /OK3568_Linux_fs/buildroot/support/testing/tests/core/ |
| H A D | device_table2.txt | 3 |xattr cap_sys_nice+eip 4 # leading spaces are ignored for xattr 5 |xattr cap_kill+eip 6 # leading tabs are ignored for xattr 7 |xattr cap_sys_time+eip
|
| /OK3568_Linux_fs/kernel/tools/lib/bpf/ |
| H A D | libbpf_probes.c | 71 struct bpf_load_program_attr xattr = {}; in probe_load() local 76 xattr.expected_attach_type = BPF_CGROUP_INET4_CONNECT; in probe_load() 79 xattr.expected_attach_type = BPF_CGROUP_GETSOCKOPT; in probe_load() 82 xattr.expected_attach_type = BPF_SK_LOOKUP; in probe_load() 85 xattr.kern_version = get_kernel_version(); in probe_load() 118 xattr.prog_type = prog_type; in probe_load() 119 xattr.insns = insns; in probe_load() 120 xattr.insns_cnt = insns_cnt; in probe_load() 121 xattr.license = "GPL"; in probe_load() 122 xattr.prog_ifindex = ifindex; in probe_load() [all …]
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/map_tests/ |
| H A D | sk_storage_map.c | 22 static struct bpf_create_map_attr xattr = { variable 153 xattr.btf_fd = btf_fd; in create_sk_storage_map() 155 map_fd = bpf_create_map_xattr(&xattr); in create_sk_storage_map() 156 xattr.btf_fd = -1; in create_sk_storage_map() 472 xattr.btf_fd = btf_fd; in test_sk_storage_map_basic() 478 map_fd = bpf_create_map_xattr(&xattr); in test_sk_storage_map_basic() 563 memcpy(&bad_xattr, &xattr, sizeof(xattr)); in test_sk_storage_map_basic() 569 memcpy(&bad_xattr, &xattr, sizeof(xattr)); in test_sk_storage_map_basic() 575 memcpy(&bad_xattr, &xattr, sizeof(xattr)); in test_sk_storage_map_basic() 581 memcpy(&bad_xattr, &xattr, sizeof(xattr)); in test_sk_storage_map_basic() [all …]
|
| /OK3568_Linux_fs/kernel/fs/ |
| H A D | xattr.c | 932 struct simple_xattr *xattr; in simple_xattr_get() local 936 list_for_each_entry(xattr, &xattrs->head, list) { in simple_xattr_get() 937 if (strcmp(name, xattr->name)) in simple_xattr_get() 940 ret = xattr->size; in simple_xattr_get() 942 if (size < xattr->size) in simple_xattr_get() 945 memcpy(buffer, xattr->value, xattr->size); in simple_xattr_get() 972 struct simple_xattr *xattr; in simple_xattr_set() local 993 list_for_each_entry(xattr, &xattrs->head, list) { in simple_xattr_set() 994 if (!strcmp(name, xattr->name)) { in simple_xattr_set() 996 xattr = new_xattr; in simple_xattr_set() [all …]
|
| /OK3568_Linux_fs/kernel/fs/squashfs/ |
| H A D | xattr.c | 32 u64 start = SQUASHFS_XATTR_BLK(squashfs_i(inode)->xattr) in squashfs_listxattr() 34 int offset = SQUASHFS_XATTR_OFFSET(squashfs_i(inode)->xattr); in squashfs_listxattr() 110 u64 start = SQUASHFS_XATTR_BLK(squashfs_i(inode)->xattr) in squashfs_xattr_get() 112 int offset = SQUASHFS_XATTR_OFFSET(squashfs_i(inode)->xattr); in squashfs_xattr_get() 150 u64 xattr; in squashfs_xattr_get() local 160 xattr = le64_to_cpu(xattr_val); in squashfs_xattr_get() 161 start = SQUASHFS_XATTR_BLK(xattr) + in squashfs_xattr_get() 163 offset = SQUASHFS_XATTR_OFFSET(xattr); in squashfs_xattr_get()
|
| H A D | inode.c | 197 xattr_id = le32_to_cpu(sqsh_ino->xattr); in squashfs_read_inode() 251 xattr_id = le32_to_cpu(sqsh_ino->xattr); in squashfs_read_inode() 289 __le32 xattr; in squashfs_read_inode() local 295 err = squashfs_read_metadata(sb, &xattr, &block, in squashfs_read_inode() 296 &offset, sizeof(xattr)); in squashfs_read_inode() 299 xattr_id = le32_to_cpu(xattr); in squashfs_read_inode() 343 xattr_id = le32_to_cpu(sqsh_ino->xattr); in squashfs_read_inode() 383 xattr_id = le32_to_cpu(sqsh_ino->xattr); in squashfs_read_inode() 398 &squashfs_i(inode)->xattr); in squashfs_read_inode()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/mtd/ |
| H A D | mtd-utils_git.bb | 23 # xattr support creates an additional compile-time dependency on acl because 24 # the sys/acl.h header is needed. libacl is not needed and thus enabling xattr 26 PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'xattr', d)} lzo jffs ubifs" 28 PACKAGECONFIG[xattr] = "--with-xattr,--without-xattr,acl" 36 …LIB}' 'AR=${AR}' 'CFLAGS=${CFLAGS} ${@bb.utils.contains('PACKAGECONFIG', 'xattr', '', '-DWITHOUT_X…
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | xattr.h | 44 struct xattr { struct 99 struct simple_xattr *xattr, *node; in simple_xattrs_free() local 101 list_for_each_entry_safe(xattr, node, &xattrs->head, list) { in simple_xattrs_free() 102 kfree(xattr->name); in simple_xattrs_free() 103 kvfree(xattr); in simple_xattrs_free()
|
| H A D | evm.h | 36 const struct xattr *xattr_array, 37 struct xattr *evm); 101 const struct xattr *xattr_array, in evm_inode_init_security() 102 struct xattr *evm) in evm_inode_init_security()
|
| /OK3568_Linux_fs/kernel/fs/btrfs/ |
| H A D | xattr.c | 468 const struct xattr *xattr_array, void *fs_private) in btrfs_initxattrs() 471 const struct xattr *xattr; in btrfs_initxattrs() local 481 for (xattr = xattr_array; xattr->name != NULL; xattr++) { in btrfs_initxattrs() 483 strlen(xattr->name) + 1, GFP_KERNEL); in btrfs_initxattrs() 489 strcpy(name + XATTR_SECURITY_PREFIX_LEN, xattr->name); in btrfs_initxattrs() 490 err = btrfs_setxattr(trans, inode, name, xattr->value, in btrfs_initxattrs() 491 xattr->value_len, 0); in btrfs_initxattrs()
|
| /OK3568_Linux_fs/buildroot/package/xorriso/ |
| H A D | xorriso.mk | 16 --disable-xattr-h-pref-attr \ 31 --disable-xattr-h-pref-attr 53 XORRISO_CONF_OPTS += --enable-xattr 55 XORRISO_CONF_OPTS += --disable-xattr
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/patch/ |
| H A D | patch_2.7.6.bb | 23 PACKAGECONFIG ?= "${@bb.utils.filter('DISTRO_FEATURES', 'xattr', d)}" 24 PACKAGECONFIG[xattr] = "--enable-xattr,--disable-xattr,attr,"
|
| /OK3568_Linux_fs/buildroot/docs/manual/ |
| H A D | makedev-syntax.txt | 76 This is done by adding a line starting with +|xattr+ after 81 | \|xattr | capability 84 - +|xattr+ is a "flag" that indicate an extended attribute 92 |xattr cap_sys_admin+eip 95 You can add several capabilities to a file by using several +|xattr+ lines. 101 |xattr cap_sys_admin+eip 102 |xattr cap_net_admin+eip
|
| /OK3568_Linux_fs/kernel/fs/ubifs/ |
| H A D | xattr.c | 126 ui->xattr = 1; in create_xattr() 258 if (ubifs_inode(inode)->xattr) in iget_xattr() 544 ubifs_assert(c, ubifs_inode(xino)->xattr); in ubifs_purge_xattrs() 648 static int init_xattrs(struct inode *inode, const struct xattr *xattr_array, in init_xattrs() 651 const struct xattr *xattr; in init_xattrs() local 655 for (xattr = xattr_array; xattr->name != NULL; xattr++) { in init_xattrs() 657 strlen(xattr->name) + 1, GFP_NOFS); in init_xattrs() 663 strcpy(name + XATTR_SECURITY_PREFIX_LEN, xattr->name); in init_xattrs() 668 err = ubifs_xattr_set(inode, name, xattr->value, in init_xattrs() 669 xattr->value_len, 0, false); in init_xattrs()
|
| /OK3568_Linux_fs/buildroot/package/makedevs/ |
| H A D | makedevs.c | 356 int bb_set_xattr(const char *fpath, const char *xattr) in bb_set_xattr() argument 362 cap = cap_from_text(xattr); in bb_set_xattr() 364 bb_perror_msg_and_die("cap_from_text failed for %s", xattr); in bb_set_xattr() 380 bb_xasprintf(&cap_new_text, "%s %s", cap_file_text, xattr); in bb_set_xattr() 386 bb_perror_msg_and_die("cap_set_file failed for %s (xattr = %s)", fpath, xattr); in bb_set_xattr() 504 char xattr[255]; in main() local 513 if (1 == sscanf(line, " |xattr %254s", xattr)) { in main() 518 if (bb_set_xattr(full_name, xattr) < 0) in main() 519 bb_error_msg_and_die("can't set cap %s on file %s\n", xattr, full_name); in main()
|