Displaying 20 results from an estimated 27 matches for "qstr".
Did you mean:
istr
2003 Jan 16
0
[PATCH] Using qstr in ext3_get_parent()
Hi
In ext3_get_parent(), quick string (struct qstr) can do the job, in place
of declaring a dentry on stack. Following patch does this and saves few
bytes on kernel stack.
Thanks,
Maneesh
namei.c | 69 ++++++++++++++++++++++++++++++----------------------------------
1 files changed, 33 insertions(+), 36 deletions(-)
diff -urN linux-2.5.58-ba...
2022 Dec 01
1
[PATCH v7 3/6] security: Remove security_old_inode_init_security()
...ude/linux/security.h
index ca1b7109c0db..c682fc96ed61 100644
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -336,9 +336,6 @@ int security_inode_init_security(struct inode *inode, struct inode *dir,
int security_inode_init_security_anon(struct inode *inode,
const struct qstr *name,
const struct inode *context_inode);
-int security_old_inode_init_security(struct inode *inode, struct inode *dir,
- const struct qstr *qstr, const char **name,
- void **value, size_t *len);
int security_inode_create(struct inode *dir, struct dentry *dentry, umode_...
2023 Mar 14
1
[PATCH v8 3/6] security: Remove security_old_inode_init_security()
...clude/linux/security.h
index 5984d0d550b..cd23221ce9e 100644
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -336,9 +336,6 @@ int security_inode_init_security(struct inode *inode, struct inode *dir,
int security_inode_init_security_anon(struct inode *inode,
const struct qstr *name,
const struct inode *context_inode);
-int security_old_inode_init_security(struct inode *inode, struct inode *dir,
- const struct qstr *qstr, const char **name,
- void **value, size_t *len);
int security_inode_create(struct inode *dir, struct dentry *dentry, umode_...
2022 Dec 01
8
[PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
From: Roberto Sassu <roberto.sassu at huawei.com>
One of the major goals of LSM stacking is to run multiple LSMs side by side
without interfering with each other. The ultimate decision will depend on
individual LSM decision.
Several changes need to be made to the LSM infrastructure to be able to
support that. This patch set tackles one of them: gives to each LSM the
ability to specify one
2023 Mar 14
7
[PATCH v8 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes
From: Roberto Sassu <roberto.sassu at huawei.com>
One of the major goals of LSM stacking is to run multiple LSMs side by side
without interfering with each other. The ultimate decision will depend on
individual LSM decision.
Several changes need to be made to the LSM infrastructure to be able to
support that. This patch set tackles one of them: gives to each LSM the
ability to specify one
2023 Mar 24
1
[PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
...> security/smack/smack_lsm.c | 33 ++++++----
> > > 5 files changed, 137 insertions(+), 38 deletions(-)
...
> > > @@ -1604,33 +1654,66 @@ int security_inode_init_security(struct inode *inode, struct inode *dir,
> > > const struct qstr *qstr,
> > > const initxattrs initxattrs, void *fs_data)
> > > {
> > > - struct xattr new_xattrs[MAX_LSM_EVM_XATTR + 1];
> > > - struct xattr *lsm_xattr, *evm_xattr, *xattr;
> > > - int ret;
> > &...
2023 Jan 10
3
[PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
...t; + }
> +
> for (xattr = xattr_array; xattr->name != NULL; xattr++) {
> err = ocfs2_xattr_set(inode, OCFS2_XATTR_INDEX_SECURITY,
> xattr->name, xattr->value,
> @@ -7277,13 +7289,23 @@ int ocfs2_init_security_get(struct inode *inode,
> const struct qstr *qstr,
> struct ocfs2_security_xattr_info *si)
> {
> + int ret;
> +
> /* check whether ocfs2 support feature xattr */
> if (!ocfs2_supports_xattr(OCFS2_SB(dir->i_sb)))
> return -EOPNOTSUPP;
> - if (si)
> - return security_old_inode_init_security(inode,...
2023 Mar 24
1
[PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
...smack/smack_lsm.c | 33 ++++++----
> > > > 5 files changed, 137 insertions(+), 38 deletions(-)
...
> > > > @@ -1604,33 +1654,66 @@ int security_inode_init_security(struct inode *inode, struct inode *dir,
> > > > const struct qstr *qstr,
> > > > const initxattrs initxattrs, void *fs_data)
> > > > {
> > > > - struct xattr new_xattrs[MAX_LSM_EVM_XATTR + 1];
> > > > - struct xattr *lsm_xattr, *evm_xattr, *xattr;
> > > > -...
2023 Mar 27
1
[PATCH v8 4/6] security: Allow all LSMs to provide xattrs for inode_init_security hook
...+++----
> > > > > 5 files changed, 137 insertions(+), 38 deletions(-)
>
> ...
>
> > > > > @@ -1604,33 +1654,66 @@ int security_inode_init_security(struct inode *inode, struct inode *dir,
> > > > > const struct qstr *qstr,
> > > > > const initxattrs initxattrs, void *fs_data)
> > > > > {
> > > > > - struct xattr new_xattrs[MAX_LSM_EVM_XATTR + 1];
> > > > > - struct xattr *lsm_xattr, *evm_xattr, *xattr;
>...
2011 May 16
0
[PATCH v5 12/21] evm: add evm_inode_post_init call in btrfs
...e <linux/xattr.h>
#include <linux/security.h>
+#include <linux/evm.h>
#include "ctree.h"
#include "btrfs_inode.h"
#include "transaction.h"
@@ -367,31 +368,49 @@ int btrfs_xattr_security_init(struct btrfs_trans_handle *trans,
const struct qstr *qstr)
{
int err;
- size_t len;
- void *value;
- char *suffix;
+ struct xattr lsm_xattr;
+ struct xattr evm_xattr;
char *name;
- err = security_inode_init_security(inode, dir, qstr, &suffix, &value,
- &len);
+ err = security_inode_init_security(inode, dir, qstr, &lsm_x...
2011 Jun 02
0
[PATCH v6 11/20] evm: add evm_inode_post_init call in btrfs
...e <linux/xattr.h>
#include <linux/security.h>
+#include <linux/evm.h>
#include "ctree.h"
#include "btrfs_inode.h"
#include "transaction.h"
@@ -367,31 +368,49 @@ int btrfs_xattr_security_init(struct btrfs_trans_handle *trans,
const struct qstr *qstr)
{
int err;
- size_t len;
- void *value;
- char *suffix;
+ struct xattr lsm_xattr;
+ struct xattr evm_xattr;
char *name;
- err = security_inode_init_security(inode, dir, qstr, &suffix, &value,
- &len);
+ err = security_inode_init_security(inode, dir, qstr, &lsm_x...
2023 Feb 21
0
[PATCH v7 2/6] ocfs2: Switch to security_inode_init_security()
...array; xattr->name != NULL; xattr++) {
> > > err = ocfs2_xattr_set(inode, OCFS2_XATTR_INDEX_SECURITY,
> > > xattr->name, xattr->value,
> > > @@ -7277,13 +7289,23 @@ int ocfs2_init_security_get(struct inode *inode,
> > > const struct qstr *qstr,
> > > struct ocfs2_security_xattr_info *si)
> > > {
> > > + int ret;
> > > +
> > > /* check whether ocfs2 support feature xattr */
> > > if (!ocfs2_supports_xattr(OCFS2_SB(dir->i_sb)))
> > > return -EOPNOTSUPP;...
2023 Mar 14
2
[PATCH v8 2/6] ocfs2: Switch to security_inode_init_security()
...rray->value_len;
+ return 0;
+ }
+
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
err = ocfs2_xattr_set(inode, OCFS2_XATTR_INDEX_SECURITY,
xattr->name, xattr->value,
@@ -7277,13 +7289,23 @@ int ocfs2_init_security_get(struct inode *inode,
const struct qstr *qstr,
struct ocfs2_security_xattr_info *si)
{
+ int ret;
+
/* check whether ocfs2 support feature xattr */
if (!ocfs2_supports_xattr(OCFS2_SB(dir->i_sb)))
return -EOPNOTSUPP;
- if (si)
- return security_old_inode_init_security(inode, dir, qstr,
- &si->name, &si...
2006 Sep 24
1
[patch] buffer overflow in q_parser.y
...g (i.e. > 255) query strings that I
needed to support), but there are other solutions as well.
Index: c/include/search.h
===================================================================
--- c/include/search.h (revision 615)
+++ c/include/search.h (working copy)
@@ -819,6 +819,7 @@
char *qstr;
char *qstrp;
char buf[QP_CONC_WORDS][MAX_WORD_SIZE];
+ char *dynbuf;
int buf_index;
HashTable *field_cache;
HashSet *fields;
Index: c/src/q_parser.y
===================================================================
--- c/src/q_parser.y (revision 615)
+++ c/src/q_pars...
2023 Mar 14
1
[PATCH v8 1/6] reiserfs: Switch to security_inode_init_security()
...nsaction. If successful, reiserfs_security
* must be released using reiserfs_security_free when the caller is done. */
@@ -56,12 +72,9 @@ int reiserfs_security_init(struct inode *dir, struct inode *inode,
if (IS_PRIVATE(dir))
return 0;
- error = security_old_inode_init_security(inode, dir, qstr, &sec->name,
- &sec->value, &sec->length);
+ error = security_inode_init_security(inode, dir, qstr,
+ &reiserfs_initxattrs, sec);
if (error) {
- if (error == -EOPNOTSUPP)
- error = 0;
-
sec->name = NULL;
sec->value = NULL;
sec->length =...
2011 Sep 05
1
Error on creating snapshots (btrfs: could not do orphan cleanup -116)
This happens on a freshly created btrfs filesystem in a raid10 (4x1TB)
configuration with three
subvolumes and 1.5 TB data.
When I try to snapshot one of the subvolumes (with 100 GB of data), it
says that the snapshot
creation failed and I get the following error message:
btrfs: could not do orphan cleanup -116
After the failure:
- The snapshot exists in `btrfs subvolume list''
- The
2000 Jun 28
1
[Patch] Shorter patch for smbfs 2.2.16
...}
+}
+
/* reverse a string inline. This is used by the dircache walking routines */
static void reverse_string(char *buf, int len) {
char c;
@@ -149,8 +171,13 @@
static char *smb_encode_path(struct smb_sb_info *server, char *buf,
struct dentry *dir, struct qstr *name)
{
+ char *start = buf;
+
buf += smb_build_path(dir, name, buf);
+ if (server->opt.protocol <= SMB_PROTOCOL_COREPLUS)
+ str_upper(start, buf - start);
+
return buf;
}
@@ -625,11 +652,6 @@
!capable(CAP_SYS_ADMIN))...
2016 Jun 30
1
[PATCH v6v3 02/12] mm: migrate: support non-lru movable page migration
...e_inode" which will
> support
>
> struct file *movable_inode_getfile(const char *name,
> const struct file_operations *fop,
> const struct address_space_operations *a_ops)
> {
> struct path path;
> struct qstr this;
> struct inode *inode;
> struct super_block *sb;
>
> this.name = name;
> this.len = strlen(name);
> this.hash = 0;
> sb = movable_mnt.mnt_sb;
> patch.denty = d_alloc_pseudo(movable_inode_mnt->mnt_sb, &this...
2016 Jun 30
1
[PATCH v6v3 02/12] mm: migrate: support non-lru movable page migration
...e_inode" which will
> support
>
> struct file *movable_inode_getfile(const char *name,
> const struct file_operations *fop,
> const struct address_space_operations *a_ops)
> {
> struct path path;
> struct qstr this;
> struct inode *inode;
> struct super_block *sb;
>
> this.name = name;
> this.len = strlen(name);
> this.hash = 0;
> sb = movable_mnt.mnt_sb;
> patch.denty = d_alloc_pseudo(movable_inode_mnt->mnt_sb, &this...
2007 Mar 05
0
[PATCH 3/10] linux 2.6.18: constify instances of ''struct file_operations''
..._getfd(int *efd, struct inode **einode, struct file **efile,
- struct eventpoll *ep)
+int ep_getfd(int *efd, struct inode **einode, struct file **efile,
-+ struct eventpoll *ep, struct file_operations *fops)
++ struct eventpoll *ep, const struct file_operations *fops)
{
struct qstr this;
char name[32];
@@ -248,7 +248,7 @@ static int eventpollfs_delete_dentry(str
-static struct inode *ep_eventpoll_inode(void)
-+static struct inode *ep_eventpoll_inode(struct file_operations *fops)
++static struct inode *ep_eventpoll_inode(const struct file_operations *fops)
{
int...