Symbol: xattr
fs/btrfs/xattr.c
484
const struct xattr *xattr_array, void *fs_private)
fs/btrfs/xattr.c
487
const struct xattr *xattr;
fs/btrfs/xattr.c
497
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
fs/btrfs/xattr.c
499
strlen(xattr->name) + 1;
fs/btrfs/xattr.c
506
scnprintf(name, name_len, "%s%s", XATTR_SECURITY_PREFIX, xattr->name);
fs/btrfs/xattr.c
511
ret = btrfs_setxattr(trans, inode, name, xattr->value,
fs/btrfs/xattr.c
512
xattr->value_len, 0);
fs/ceph/xattr.c
1040
xattr = __get_xattr(ci, name);
fs/ceph/xattr.c
1041
if (!xattr)
fs/ceph/xattr.c
1045
if (size && size < xattr->val_len)
fs/ceph/xattr.c
1048
err = xattr->val_len;
fs/ceph/xattr.c
1052
memcpy(value, xattr->val, xattr->val_len);
fs/ceph/xattr.c
1191
struct ceph_inode_xattr *xattr = NULL;
fs/ceph/xattr.c
1223
xattr = kmalloc_obj(struct ceph_inode_xattr, GFP_NOFS);
fs/ceph/xattr.c
1224
if (!xattr)
fs/ceph/xattr.c
1277
flags, value ? 1 : -1, &xattr);
fs/ceph/xattr.c
1323
kfree(xattr);
fs/ceph/xattr.c
19
struct ceph_inode_xattr *xattr);
fs/ceph/xattr.c
576
struct ceph_inode_xattr *xattr = NULL;
fs/ceph/xattr.c
583
xattr = rb_entry(parent, struct ceph_inode_xattr, node);
fs/ceph/xattr.c
584
c = strncmp(name, xattr->name, min(name_len, xattr->name_len));
fs/ceph/xattr.c
590
if (name_len == xattr->name_len)
fs/ceph/xattr.c
592
else if (name_len < xattr->name_len)
fs/ceph/xattr.c
597
xattr = NULL;
fs/ceph/xattr.c
603
if (xattr && (flags & XATTR_CREATE))
fs/ceph/xattr.c
605
else if (!xattr && (flags & XATTR_REPLACE))
fs/ceph/xattr.c
614
if (xattr)
fs/ceph/xattr.c
615
__remove_xattr(ci, xattr);
fs/ceph/xattr.c
622
if (!xattr) {
fs/ceph/xattr.c
624
xattr = *newxattr;
fs/ceph/xattr.c
625
xattr->name = name;
fs/ceph/xattr.c
626
xattr->name_len = name_len;
fs/ceph/xattr.c
627
xattr->should_free_name = update_xattr;
fs/ceph/xattr.c
634
if (xattr->should_free_val)
fs/ceph/xattr.c
635
kfree(xattr->val);
fs/ceph/xattr.c
639
name = xattr->name;
fs/ceph/xattr.c
641
ci->i_xattrs.names_size -= xattr->name_len;
fs/ceph/xattr.c
642
ci->i_xattrs.vals_size -= xattr->val_len;
fs/ceph/xattr.c
647
xattr->val = val;
fs/ceph/xattr.c
649
xattr->val = "";
fs/ceph/xattr.c
651
xattr->val_len = val_len;
fs/ceph/xattr.c
652
xattr->dirty = update_xattr;
fs/ceph/xattr.c
653
xattr->should_free_val = (val && update_xattr);
fs/ceph/xattr.c
656
rb_link_node(&xattr->node, parent, p);
fs/ceph/xattr.c
657
rb_insert_color(&xattr->node, &ci->i_xattrs.index);
fs/ceph/xattr.c
662
ceph_vinop(inode), xattr, name_len, name, min(val_len,
fs/ceph/xattr.c
675
struct ceph_inode_xattr *xattr = NULL;
fs/ceph/xattr.c
682
xattr = rb_entry(parent, struct ceph_inode_xattr, node);
fs/ceph/xattr.c
683
c = strncmp(name, xattr->name, xattr->name_len);
fs/ceph/xattr.c
684
if (c == 0 && name_len > xattr->name_len)
fs/ceph/xattr.c
691
int len = min(xattr->val_len, MAX_XATTR_VAL_PRINT_LEN);
fs/ceph/xattr.c
693
doutc(cl, "%s found %.*s%s\n", name, len, xattr->val,
fs/ceph/xattr.c
694
xattr->val_len > len ? "..." : "");
fs/ceph/xattr.c
695
return xattr;
fs/ceph/xattr.c
704
static void __free_xattr(struct ceph_inode_xattr *xattr)
fs/ceph/xattr.c
706
BUG_ON(!xattr);
fs/ceph/xattr.c
708
if (xattr->should_free_name)
fs/ceph/xattr.c
709
kfree(xattr->name);
fs/ceph/xattr.c
710
if (xattr->should_free_val)
fs/ceph/xattr.c
711
kfree(xattr->val);
fs/ceph/xattr.c
713
kfree(xattr);
fs/ceph/xattr.c
717
struct ceph_inode_xattr *xattr)
fs/ceph/xattr.c
719
if (!xattr)
fs/ceph/xattr.c
722
rb_erase(&xattr->node, &ci->i_xattrs.index);
fs/ceph/xattr.c
724
if (xattr->should_free_name)
fs/ceph/xattr.c
725
kfree(xattr->name);
fs/ceph/xattr.c
726
if (xattr->should_free_val)
fs/ceph/xattr.c
727
kfree(xattr->val);
fs/ceph/xattr.c
729
ci->i_xattrs.names_size -= xattr->name_len;
fs/ceph/xattr.c
730
ci->i_xattrs.vals_size -= xattr->val_len;
fs/ceph/xattr.c
732
kfree(xattr);
fs/ceph/xattr.c
742
struct ceph_inode_xattr *xattr = NULL;
fs/ceph/xattr.c
748
xattr = rb_entry(p, struct ceph_inode_xattr, node);
fs/ceph/xattr.c
749
memcpy(dest, xattr->name, xattr->name_len);
fs/ceph/xattr.c
750
dest[xattr->name_len] = '\0';
fs/ceph/xattr.c
752
doutc(cl, "dest=%s %p (%s) (%d/%d)\n", dest, xattr, xattr->name,
fs/ceph/xattr.c
753
xattr->name_len, ci->i_xattrs.names_size);
fs/ceph/xattr.c
755
dest += xattr->name_len + 1;
fs/ceph/xattr.c
766
struct ceph_inode_xattr *xattr = NULL;
fs/ceph/xattr.c
773
xattr = rb_entry(p, struct ceph_inode_xattr, node);
fs/ceph/xattr.c
776
doutc(cl, "next p=%p (%.*s)\n", p, xattr->name_len, xattr->name);
fs/ceph/xattr.c
779
__free_xattr(xattr);
fs/ceph/xattr.c
910
struct ceph_inode_xattr *xattr = NULL;
fs/ceph/xattr.c
925
xattr = rb_entry(p, struct ceph_inode_xattr, node);
fs/ceph/xattr.c
927
ceph_encode_32(&dest, xattr->name_len);
fs/ceph/xattr.c
928
memcpy(dest, xattr->name, xattr->name_len);
fs/ceph/xattr.c
929
dest += xattr->name_len;
fs/ceph/xattr.c
930
ceph_encode_32(&dest, xattr->val_len);
fs/ceph/xattr.c
931
memcpy(dest, xattr->val, xattr->val_len);
fs/ceph/xattr.c
932
dest += xattr->val_len;
fs/ceph/xattr.c
974
struct ceph_inode_xattr *xattr;
fs/ext2/xattr_security.c
31
static int ext2_initxattrs(struct inode *inode, const struct xattr *xattr_array,
fs/ext2/xattr_security.c
34
const struct xattr *xattr;
fs/ext2/xattr_security.c
37
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
fs/ext2/xattr_security.c
39
xattr->name, xattr->value,
fs/ext2/xattr_security.c
40
xattr->value_len, 0);
fs/ext4/ext4.h
2189
EXT4_FEATURE_COMPAT_FUNCS(xattr, EXT_ATTR)
fs/ext4/xattr_security.c
36
ext4_initxattrs(struct inode *inode, const struct xattr *xattr_array,
fs/ext4/xattr_security.c
39
const struct xattr *xattr;
fs/ext4/xattr_security.c
43
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
fs/ext4/xattr_security.c
46
xattr->name, xattr->value,
fs/ext4/xattr_security.c
47
xattr->value_len, XATTR_CREATE);
fs/f2fs/xattr.c
139
static int f2fs_initxattrs(struct inode *inode, const struct xattr *xattr_array,
fs/f2fs/xattr.c
142
const struct xattr *xattr;
fs/f2fs/xattr.c
145
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
fs/f2fs/xattr.c
147
xattr->name, xattr->value,
fs/f2fs/xattr.c
148
xattr->value_len, folio, 0);
fs/gfs2/inode.c
664
static int gfs2_initxattrs(struct inode *inode, const struct xattr *xattr_array,
fs/gfs2/inode.c
667
const struct xattr *xattr;
fs/gfs2/inode.c
670
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
fs/gfs2/inode.c
671
err = __gfs2_xattr_set(inode, xattr->name, xattr->value,
fs/gfs2/inode.c
672
xattr->value_len, 0,
fs/hfsplus/xattr_security.c
37
const struct xattr *xattr_array,
fs/hfsplus/xattr_security.c
40
const struct xattr *xattr;
fs/hfsplus/xattr_security.c
48
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
fs/hfsplus/xattr_security.c
50
if (!strcmp(xattr->name, ""))
fs/hfsplus/xattr_security.c
55
XATTR_SECURITY_PREFIX_LEN, xattr->name);
fs/hfsplus/xattr_security.c
57
XATTR_SECURITY_PREFIX_LEN + strlen(xattr->name), 0, 1);
fs/hfsplus/xattr_security.c
60
xattr->value, xattr->value_len, 0);
fs/jffs2/gc.c
132
int xattr = 0;
fs/jffs2/gc.c
148
if (!xattr)
fs/jffs2/gc.c
149
xattr = jffs2_verify_xattr(c);
fs/jffs2/security.c
27
const struct xattr *xattr_array, void *fs_info)
fs/jffs2/security.c
29
const struct xattr *xattr;
fs/jffs2/security.c
32
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
fs/jffs2/security.c
34
xattr->name, xattr->value,
fs/jffs2/security.c
35
xattr->value_len, 0);
fs/jfs/xattr.c
1022
static int jfs_initxattrs(struct inode *inode, const struct xattr *xattr_array,
fs/jfs/xattr.c
1025
const struct xattr *xattr;
fs/jfs/xattr.c
1030
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
fs/jfs/xattr.c
1032
strlen(xattr->name) + 1, GFP_NOFS);
fs/jfs/xattr.c
1038
strcpy(name + XATTR_SECURITY_PREFIX_LEN, xattr->name);
fs/jfs/xattr.c
1041
xattr->value, xattr->value_len, 0);
fs/jfs/xattr.c
447
ea_buf->xattr = NULL;
fs/jfs/xattr.c
454
ea_buf->xattr = (struct jfs_ea_list *) ji->i_inline_ea;
fs/jfs/xattr.c
466
ea_buf->xattr = (struct jfs_ea_list *) ji->i_inline_ea;
fs/jfs/xattr.c
489
ea_buf->xattr = kmalloc(ea_buf->max_size, GFP_KERNEL);
fs/jfs/xattr.c
490
if (ea_buf->xattr == NULL)
fs/jfs/xattr.c
498
if ((rc = ea_read(inode, ea_buf->xattr))) {
fs/jfs/xattr.c
499
kfree(ea_buf->xattr);
fs/jfs/xattr.c
500
ea_buf->xattr = NULL;
fs/jfs/xattr.c
536
ea_buf->xattr = ea_buf->mp->data;
fs/jfs/xattr.c
541
if ((rc = ea_read(inode, ea_buf->xattr))) {
fs/jfs/xattr.c
556
ea_buf->xattr = ea_buf->mp->data;
fs/jfs/xattr.c
561
if (EALIST_SIZE(ea_buf->xattr) != ea_size) {
fs/jfs/xattr.c
562
if (unlikely(EALIST_SIZE(ea_buf->xattr) > INT_MAX)) {
fs/jfs/xattr.c
564
EALIST_SIZE(ea_buf->xattr));
fs/jfs/xattr.c
566
int size = clamp_t(int, ea_size, 0, EALIST_SIZE(ea_buf->xattr));
fs/jfs/xattr.c
570
ea_buf->xattr, size, 1);
fs/jfs/xattr.c
590
kfree(ea_buf->xattr);
fs/jfs/xattr.c
619
rc = ea_write(inode, ea_buf->xattr, new_size, &ea_buf->new_ea);
fs/jfs/xattr.c
620
kfree(ea_buf->xattr);
fs/jfs/xattr.c
626
rc = ea_write(inode, ea_buf->xattr, new_size, &ea_buf->new_ea);
fs/jfs/xattr.c
64
struct jfs_ea_list *xattr; /* buffer containing ea list */
fs/jfs/xattr.c
687
ealist = (struct jfs_ea_list *) ea_buf.xattr;
fs/jfs/xattr.c
826
ealist = (struct jfs_ea_list *) ea_buf.xattr;
fs/jfs/xattr.c
893
ealist = (struct jfs_ea_list *) ea_buf.xattr;
fs/libfs.c
688
s->s_xattr = ctx->xattr;
fs/nfs/nfs.h
21
const struct xattr_handler * const *xattr; /* NFS xattr handlers */
fs/nfs/nfs4super.c
44
.xattr = nfs4_xattr_handlers,
fs/nfs/super.c
1074
sb->s_xattr = server->nfs_client->cl_nfs_mod->xattr;
fs/ocfs2/xattr.c
7280
static int ocfs2_initxattrs(struct inode *inode, const struct xattr *xattr_array,
fs/ocfs2/xattr.c
7284
const struct xattr *xattr;
fs/ocfs2/xattr.c
7298
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
fs/ocfs2/xattr.c
7300
xattr->name, xattr->value,
fs/ocfs2/xattr.c
7301
xattr->value_len, XATTR_CREATE);
fs/orangefs/protocol.h
185
* by <linux/xattr.h>
fs/pidfs.c
1076
ctx->xattr = pidfs_xattr_handlers;
fs/squashfs/inode.c
226
xattr_id = le32_to_cpu(sqsh_ino->xattr);
fs/squashfs/inode.c
280
xattr_id = le32_to_cpu(sqsh_ino->xattr);
fs/squashfs/inode.c
324
__le32 xattr;
fs/squashfs/inode.c
330
err = squashfs_read_metadata(sb, &xattr, &block,
fs/squashfs/inode.c
331
&offset, sizeof(xattr));
fs/squashfs/inode.c
334
xattr_id = le32_to_cpu(xattr);
fs/squashfs/inode.c
379
xattr_id = le32_to_cpu(sqsh_ino->xattr);
fs/squashfs/inode.c
421
xattr_id = le32_to_cpu(sqsh_ino->xattr);
fs/squashfs/inode.c
437
&squashfs_i(inode)->xattr);
fs/squashfs/squashfs_fs.h
297
__le32 xattr;
fs/squashfs/squashfs_fs.h
320
__le32 xattr;
fs/squashfs/squashfs_fs.h
362
__le32 xattr;
fs/squashfs/squashfs_fs.h
393
__le32 xattr;
fs/squashfs/squashfs_fs.h
442
__le64 xattr;
fs/squashfs/squashfs_fs_i.h
16
u64 xattr;
fs/squashfs/xattr.c
110
u64 start = SQUASHFS_XATTR_BLK(squashfs_i(inode)->xattr)
fs/squashfs/xattr.c
112
int offset = SQUASHFS_XATTR_OFFSET(squashfs_i(inode)->xattr);
fs/squashfs/xattr.c
150
u64 xattr;
fs/squashfs/xattr.c
160
xattr = le64_to_cpu(xattr_val);
fs/squashfs/xattr.c
161
start = SQUASHFS_XATTR_BLK(xattr) +
fs/squashfs/xattr.c
163
offset = SQUASHFS_XATTR_OFFSET(xattr);
fs/squashfs/xattr.c
32
u64 start = SQUASHFS_XATTR_BLK(squashfs_i(inode)->xattr)
fs/squashfs/xattr.c
34
int offset = SQUASHFS_XATTR_OFFSET(squashfs_i(inode)->xattr);
fs/squashfs/xattr.h
35
unsigned long long *xattr)
fs/squashfs/xattr_id.c
29
int *count, unsigned int *size, unsigned long long *xattr)
fs/squashfs/xattr_id.c
48
*xattr = le64_to_cpu(id.xattr);
fs/ubifs/debug.c
253
pr_err("\txattr %u\n", ui->xattr);
fs/ubifs/journal.c
1050
ubifs_assert(c, ubifs_inode(xino)->xattr);
fs/ubifs/super.c
159
ui->xattr = (ui->flags & UBIFS_XATTR_FL) ? 1 : 0;
fs/ubifs/super.c
170
if (ui->xattr) {
fs/ubifs/super.c
298
ubifs_assert(c, !ui->xattr);
fs/ubifs/super.c
352
if (ui->xattr)
fs/ubifs/super.c
91
if (ui->xattr && !S_ISREG(inode->i_mode))
fs/ubifs/ubifs.h
407
unsigned int xattr:1;
fs/ubifs/xattr.c
113
ui->xattr = 1;
fs/ubifs/xattr.c
243
if (ubifs_inode(inode)->xattr)
fs/ubifs/xattr.c
525
ubifs_assert(c, ubifs_inode(xino)->xattr);
fs/ubifs/xattr.c
605
static int init_xattrs(struct inode *inode, const struct xattr *xattr_array,
fs/ubifs/xattr.c
608
const struct xattr *xattr;
fs/ubifs/xattr.c
612
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
fs/ubifs/xattr.c
614
strlen(xattr->name) + 1, GFP_NOFS);
fs/ubifs/xattr.c
620
strcpy(name + XATTR_SECURITY_PREFIX_LEN, xattr->name);
fs/ubifs/xattr.c
625
err = ubifs_xattr_set(inode, name, xattr->value,
fs/ubifs/xattr.c
626
xattr->value_len, 0, false);
fs/xattr.c
1193
void simple_xattr_free(struct simple_xattr *xattr)
fs/xattr.c
1195
if (xattr)
fs/xattr.c
1196
kfree(xattr->name);
fs/xattr.c
1197
kvfree(xattr);
fs/xattr.c
1243
const struct simple_xattr *xattr;
fs/xattr.c
1245
xattr = rb_entry(node, struct simple_xattr, rb_node);
fs/xattr.c
1246
return strcmp(xattr->name, xattr_name);
fs/xattr.c
1262
struct simple_xattr *xattr;
fs/xattr.c
1263
xattr = rb_entry(new_node, struct simple_xattr, rb_node);
fs/xattr.c
1264
return rbtree_simple_xattr_cmp(xattr->name, node);
fs/xattr.c
1285
struct simple_xattr *xattr = NULL;
fs/xattr.c
1292
xattr = rb_entry(rbp, struct simple_xattr, rb_node);
fs/xattr.c
1293
ret = xattr->size;
fs/xattr.c
1295
if (size < xattr->size)
fs/xattr.c
1298
memcpy(buffer, xattr->value, xattr->size);
fs/xattr.c
1446
struct simple_xattr *xattr;
fs/xattr.c
1469
xattr = rb_entry(rbp, struct simple_xattr, rb_node);
fs/xattr.c
1472
if (!trusted && xattr_is_trusted(xattr->name))
fs/xattr.c
1476
if (xattr_is_maclabel(xattr->name))
fs/xattr.c
1479
err = xattr_list_one(&buffer, &remaining_size, xattr->name);
fs/xattr.c
1549
struct simple_xattr *xattr;
fs/xattr.c
1553
xattr = rb_entry(rbp, struct simple_xattr, rb_node);
fs/xattr.c
1554
rb_erase(&xattr->rb_node, &xattrs->rb_root);
fs/xattr.c
1556
*freed_space += simple_xattr_space(xattr->name,
fs/xattr.c
1557
xattr->size);
fs/xattr.c
1558
simple_xattr_free(xattr);
fs/xfs/xfs_iops.c
56
const struct xattr *xattr_array,
fs/xfs/xfs_iops.c
59
const struct xattr *xattr;
fs/xfs/xfs_iops.c
63
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
fs/xfs/xfs_iops.c
67
.name = xattr->name,
fs/xfs/xfs_iops.c
68
.namelen = strlen(xattr->name),
fs/xfs/xfs_iops.c
69
.value = xattr->value,
fs/xfs/xfs_iops.c
70
.valuelen = xattr->value_len,
include/linux/ceph/osd_client.h
163
} xattr;
include/linux/ceph/rados.h
504
} __attribute__ ((packed)) xattr;
include/linux/evm.h
22
const struct qstr *qstr, struct xattr *xattrs,
include/linux/evm.h
58
struct xattr *xattrs,
include/linux/lsm_hook_defs.h
119
struct inode *dir, const struct qstr *qstr, struct xattr *xattrs,
include/linux/lsm_hooks.h
210
static inline struct xattr *lsm_get_xattr_slot(struct xattr *xattrs,
include/linux/pseudo_fs.h
9
const struct xattr_handler * const *xattr;
include/linux/security.h
273
const struct xattr *xattr_array, void *fs_data);
include/linux/security.h
60
struct xattr;
include/linux/xattr.h
124
void simple_xattr_free(struct simple_xattr *xattr);
mm/shmem.c
2980
static int shmem_initxattrs(struct inode *, const struct xattr *, void *);
mm/shmem.c
4253
const struct xattr *xattr_array, void *fs_info)
mm/shmem.c
4257
const struct xattr *xattr;
mm/shmem.c
4263
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
mm/shmem.c
4264
ispace += simple_xattr_space(xattr->name,
mm/shmem.c
4265
xattr->value_len + XATTR_SECURITY_PREFIX_LEN);
mm/shmem.c
4279
for (xattr = xattr_array; xattr->name != NULL; xattr++) {
mm/shmem.c
4280
new_xattr = simple_xattr_alloc(xattr->value, xattr->value_len);
mm/shmem.c
4284
len = strlen(xattr->name) + 1;
mm/shmem.c
4295
xattr->name, len);
mm/shmem.c
4300
if (xattr->name != NULL) {
net/ceph/osd_client.c
1012
dst->xattr.name_len = cpu_to_le32(src->xattr.name_len);
net/ceph/osd_client.c
1013
dst->xattr.value_len = cpu_to_le32(src->xattr.value_len);
net/ceph/osd_client.c
1014
dst->xattr.cmp_op = src->xattr.cmp_op;
net/ceph/osd_client.c
1015
dst->xattr.cmp_mode = src->xattr.cmp_mode;
net/ceph/osd_client.c
2062
WARN_ON(op->indata_len != op->xattr.name_len +
net/ceph/osd_client.c
2063
op->xattr.value_len);
net/ceph/osd_client.c
2065
&op->xattr.osd_data);
net/ceph/osd_client.c
394
ceph_osd_data_release(&op->xattr.osd_data);
net/ceph/osd_client.c
861
op->xattr.name_len = payload_len;
net/ceph/osd_client.c
866
op->xattr.value_len = size;
net/ceph/osd_client.c
872
op->xattr.cmp_op = cmp_op;
net/ceph/osd_client.c
873
op->xattr.cmp_mode = cmp_mode;
net/ceph/osd_client.c
875
ceph_osd_data_pagelist_init(&op->xattr.osd_data, pagelist);
net/socket.c
433
ctx->xattr = sockfs_xattr_handlers;
security/integrity/evm/evm.h
84
int evm_init_hmac(struct inode *inode, const struct xattr *xattrs,
security/integrity/evm/evm_crypto.c
229
struct xattr_list *xattr;
security/integrity/evm/evm_crypto.c
249
list_for_each_entry_lockless(xattr, &evm_config_xattrnames, list) {
security/integrity/evm/evm_crypto.c
252
if (strcmp(xattr->name, XATTR_NAME_IMA) == 0)
security/integrity/evm/evm_crypto.c
259
if (type != EVM_XATTR_PORTABLE_DIGSIG && !xattr->enabled)
security/integrity/evm/evm_crypto.c
263
&& !strcmp(xattr->name, req_xattr_name)) {
security/integrity/evm/evm_crypto.c
275
size = vfs_getxattr_alloc(&nop_mnt_idmap, dentry, xattr->name,
security/integrity/evm/evm_crypto.c
285
xattr->name, NULL, 0);
security/integrity/evm/evm_crypto.c
288
dentry->d_name.name, xattr->name, size,
security/integrity/evm/evm_crypto.c
296
dump_security_xattr(xattr->name, xattr_value, xattr_size);
security/integrity/evm/evm_crypto.c
389
data.hdr.xattr.sha1.type = EVM_XATTR_HMAC;
security/integrity/evm/evm_crypto.c
392
&data.hdr.xattr.data[1],
security/integrity/evm/evm_crypto.c
400
int evm_init_hmac(struct inode *inode, const struct xattr *xattrs,
security/integrity/evm/evm_crypto.c
404
const struct xattr *xattr;
security/integrity/evm/evm_crypto.c
415
for (xattr = xattrs; xattr->name; xattr++) {
security/integrity/evm/evm_crypto.c
417
XATTR_SECURITY_PREFIX_LEN, xattr->name) != 0)
security/integrity/evm/evm_crypto.c
420
crypto_shash_update(desc, xattr->value,
security/integrity/evm/evm_crypto.c
421
xattr->value_len);
security/integrity/evm/evm_main.c
1014
const struct qstr *qstr, struct xattr *xattrs,
security/integrity/evm/evm_main.c
1018
struct xattr *xattr, *evm_xattr;
security/integrity/evm/evm_main.c
1030
for (xattr = xattrs; xattr->name; xattr++) {
security/integrity/evm/evm_main.c
1031
if (evm_protected_xattr(xattr->name))
security/integrity/evm/evm_main.c
1044
WARN_ONCE(evm_xattr != xattr,
security/integrity/evm/evm_main.c
134
struct xattr_list *xattr;
security/integrity/evm/evm_main.c
141
list_for_each_entry_lockless(xattr, &evm_config_xattrnames, list) {
security/integrity/evm/evm_main.c
142
error = __vfs_getxattr(dentry, inode, xattr->name, NULL, 0);
security/integrity/evm/evm_main.c
304
struct xattr_list *xattr;
security/integrity/evm/evm_main.c
307
list_for_each_entry_lockless(xattr, &evm_config_xattrnames, list) {
security/integrity/evm/evm_main.c
308
if (!all_xattrs && !xattr->enabled)
security/integrity/evm/evm_main.c
311
if ((strlen(xattr->name) == namelen)
security/integrity/evm/evm_main.c
312
&& (strncmp(req_xattr_name, xattr->name, namelen) == 0)) {
security/integrity/evm/evm_main.c
317
xattr->name + XATTR_SECURITY_PREFIX_LEN,
security/integrity/evm/evm_main.c
354
struct xattr_list *xattr;
security/integrity/evm/evm_main.c
357
list_for_each_entry_lockless(xattr, &evm_config_xattrnames, list) {
security/integrity/evm/evm_main.c
359
xattr->name, NULL, 0);
security/integrity/evm/evm_main.c
367
size = strlen(xattr->name) + 1;
security/integrity/evm/evm_main.c
372
memcpy(buffer + total_size, xattr->name, size);
security/integrity/evm/evm_main.c
388
d_backing_inode(dentry), xattr->name,
security/integrity/evm/evm_posix_acl.c
12
int posix_xattr_acl(const char *xattr)
security/integrity/evm/evm_posix_acl.c
14
int xattr_len = strlen(xattr);
security/integrity/evm/evm_posix_acl.c
17
&& (strncmp(XATTR_NAME_POSIX_ACL_ACCESS, xattr, xattr_len) == 0))
security/integrity/evm/evm_posix_acl.c
20
&& (strncmp(XATTR_NAME_POSIX_ACL_DEFAULT, xattr, xattr_len) == 0))
security/integrity/evm/evm_secfs.c
132
struct xattr_list *xattr;
security/integrity/evm/evm_secfs.c
141
list_for_each_entry(xattr, &evm_config_xattrnames, list) {
security/integrity/evm/evm_secfs.c
142
if (!xattr->enabled)
security/integrity/evm/evm_secfs.c
145
size += strlen(xattr->name) + 1;
security/integrity/evm/evm_secfs.c
154
list_for_each_entry(xattr, &evm_config_xattrnames, list) {
security/integrity/evm/evm_secfs.c
155
if (!xattr->enabled)
security/integrity/evm/evm_secfs.c
158
sprintf(temp + offset, "%s\n", xattr->name);
security/integrity/evm/evm_secfs.c
159
offset += strlen(xattr->name) + 1;
security/integrity/evm/evm_secfs.c
183
struct xattr_list *xattr, *tmp;
security/integrity/evm/evm_secfs.c
202
xattr = kmalloc_obj(struct xattr_list);
security/integrity/evm/evm_secfs.c
203
if (!xattr) {
security/integrity/evm/evm_secfs.c
208
xattr->enabled = true;
security/integrity/evm/evm_secfs.c
209
xattr->name = memdup_user_nul(buf, count);
security/integrity/evm/evm_secfs.c
210
if (IS_ERR(xattr->name)) {
security/integrity/evm/evm_secfs.c
211
err = PTR_ERR(xattr->name);
security/integrity/evm/evm_secfs.c
212
xattr->name = NULL;
security/integrity/evm/evm_secfs.c
217
len = strlen(xattr->name);
security/integrity/evm/evm_secfs.c
218
if (len && xattr->name[len-1] == '\n')
security/integrity/evm/evm_secfs.c
219
xattr->name[len-1] = '\0';
security/integrity/evm/evm_secfs.c
222
audit_log_untrustedstring(ab, xattr->name);
security/integrity/evm/evm_secfs.c
224
if (strcmp(xattr->name, ".") == 0) {
security/integrity/evm/evm_secfs.c
237
if (strncmp(xattr->name, XATTR_SECURITY_PREFIX,
security/integrity/evm/evm_secfs.c
253
if (strcmp(xattr->name, tmp->name) == 0) {
security/integrity/evm/evm_secfs.c
263
list_add_tail_rcu(&xattr->list, &evm_config_xattrnames);
security/integrity/evm/evm_secfs.c
272
if (xattr) {
security/integrity/evm/evm_secfs.c
273
kfree(xattr->name);
security/integrity/evm/evm_secfs.c
274
kfree(xattr);
security/integrity/ima/ima_appraise.c
102
&iint->ima_hash->xattr.data[offset],
security/integrity/ima/ima_appraise.c
103
(sizeof(iint->ima_hash->xattr) - offset) +
security/integrity/ima/ima_appraise.c
95
iint->ima_hash->xattr.sha1.type = IMA_XATTR_DIGEST;
security/integrity/ima/ima_appraise.c
98
iint->ima_hash->xattr.ng.type = IMA_XATTR_DIGEST_NG;
security/integrity/ima/ima_appraise.c
99
iint->ima_hash->xattr.ng.algo = algo;
security/integrity/integrity.h
66
} xattr;
security/security.c
1311
struct xattr *new_xattrs = NULL;
security/selinux/hooks.c
2941
struct xattr *xattrs, int *xattr_count)
security/selinux/hooks.c
2945
struct xattr *xattr = lsm_get_xattr_slot(xattrs, xattr_count);
security/selinux/hooks.c
2971
if (xattr) {
security/selinux/hooks.c
2976
xattr->value = context;
security/selinux/hooks.c
2977
xattr->value_len = clen;
security/selinux/hooks.c
2978
xattr->name = XATTR_SELINUX_SUFFIX;
security/smack/smack_lsm.c
1013
struct xattr *xattrs, int *xattr_count)
security/smack/smack_lsm.c
984
xattr_dupval(struct xattr *xattrs, int *xattr_count,
security/smack/smack_lsm.c
987
struct xattr * const xattr = lsm_get_xattr_slot(xattrs, xattr_count);
security/smack/smack_lsm.c
989
if (!xattr)
security/smack/smack_lsm.c
992
xattr->value = kmemdup(value, vallen, GFP_NOFS);
security/smack/smack_lsm.c
993
if (!xattr->value)
security/smack/smack_lsm.c
996
xattr->value_len = vallen;
security/smack/smack_lsm.c
997
xattr->name = name;