Symbol: xattr_name
fs/btrfs/props.c
119
ret = btrfs_setxattr(trans, &inode->vfs_inode, handler->xattr_name,
fs/btrfs/props.c
130
ret = btrfs_setxattr(trans, &inode->vfs_inode, handler->xattr_name, value,
fs/btrfs/props.c
136
btrfs_setxattr(trans, &inode->vfs_inode, handler->xattr_name, NULL,
fs/btrfs/props.c
26
const char *xattr_name;
fs/btrfs/props.c
270
handler->xattr_name, btrfs_ino(BTRFS_I(inode)),
fs/btrfs/props.c
379
.xattr_name = XATTR_BTRFS_PREFIX "compression",
fs/btrfs/props.c
440
ret = btrfs_setxattr(trans, &inode->vfs_inode, h->xattr_name, value,
fs/btrfs/props.c
445
btrfs_setxattr(trans, &inode->vfs_inode, h->xattr_name,
fs/btrfs/props.c
469
u64 h = btrfs_name_hash(p->xattr_name, strlen(p->xattr_name));
fs/btrfs/props.c
61
if (!strcmp(h->xattr_name, name))
fs/hfsplus/xattr.c
408
static size_t name_len(const char *xattr_name, size_t xattr_name_len)
fs/hfsplus/xattr.c
412
if (!is_known_namespace(xattr_name))
fs/hfsplus/xattr.c
418
static ssize_t copy_name(char *buffer, const char *xattr_name, size_t name_len)
fs/hfsplus/xattr.c
424
if (!is_known_namespace(xattr_name)) {
fs/hfsplus/xattr.c
426
"%s%s", XATTR_MAC_OSX_PREFIX, xattr_name);
fs/hfsplus/xattr.c
428
len = strscpy(buffer, xattr_name, name_len + 1);
fs/hfsplus/xattr.c
445
char *xattr_name;
fs/hfsplus/xattr.c
456
xattr_name = kmalloc(xattr_name_len, GFP_KERNEL);
fs/hfsplus/xattr.c
457
if (!xattr_name)
fs/hfsplus/xattr.c
459
strcpy(xattr_name, prefix);
fs/hfsplus/xattr.c
460
strcpy(xattr_name + prefixlen, name);
fs/hfsplus/xattr.c
461
res = __hfsplus_setxattr(inode, xattr_name, value, size, flags);
fs/hfsplus/xattr.c
462
kfree(xattr_name);
fs/hfsplus/xattr.c
608
char *xattr_name;
fs/hfsplus/xattr.c
614
xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1,
fs/hfsplus/xattr.c
616
if (!xattr_name)
fs/hfsplus/xattr.c
619
strcpy(xattr_name, prefix);
fs/hfsplus/xattr.c
620
strcpy(xattr_name + prefixlen, name);
fs/hfsplus/xattr.c
622
res = __hfsplus_getxattr(inode, xattr_name, value, size);
fs/hfsplus/xattr.c
623
kfree(xattr_name);
fs/hfsplus/xattr.c
631
static inline int can_list(const char *xattr_name)
fs/hfsplus/xattr.c
633
if (!xattr_name)
fs/hfsplus/xattr.c
636
return strncmp(xattr_name, XATTR_TRUSTED_PREFIX,
fs/hfsplus/xattr_security.c
41
char *xattr_name;
fs/hfsplus/xattr_security.c
44
xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1,
fs/hfsplus/xattr_security.c
46
if (!xattr_name)
fs/hfsplus/xattr_security.c
53
strcpy(xattr_name, XATTR_SECURITY_PREFIX);
fs/hfsplus/xattr_security.c
54
strcpy(xattr_name +
fs/hfsplus/xattr_security.c
56
memset(xattr_name +
fs/hfsplus/xattr_security.c
59
err = __hfsplus_setxattr(inode, xattr_name,
fs/hfsplus/xattr_security.c
64
kfree(xattr_name);
fs/internal.h
289
struct xattr_name *kname;
fs/internal.h
300
int import_xattr_name(struct xattr_name *kname, const char __user *name);
fs/nfs/nfs42proc.c
1377
.xattr_name = name,
fs/nfs/nfs42proc.c
1408
.xattr_name = name,
fs/nfs/nfs42proc.c
1465
.xattr_name = name,
fs/nfs/nfs42xattr.c
236
entry->xattr_name = namep;
fs/nfs/nfs42xattr.c
518
if (!strcmp(entry->xattr_name, name))
fs/nfs/nfs42xattr.c
533
bucket = nfs4_xattr_hash_bucket(cache, entry->xattr_name);
fs/nfs/nfs42xattr.c
543
oldentry = nfs4_xattr_get_entry(bucket, entry->xattr_name);
fs/nfs/nfs42xattr.c
624
entry->xattr_name, (unsigned long)entry->xattr_size);
fs/nfs/nfs42xattr.c
84
char *xattr_name;
fs/nfs/nfs42xattr.c
890
if (entry->xattr_name != NULL) {
fs/nfs/nfs42xdr.c
501
encode_string(xdr, strlen(arg->xattr_name), arg->xattr_name);
fs/nfs/nfs42xdr.c
826
encode_getxattr(xdr, args->xattr_name, &hdr);
fs/nfs/nfs42xdr.c
871
encode_removexattr(xdr, args->xattr_name, &hdr);
fs/smb/client/smb1pdu.h
2342
char xattr_name[];
fs/smb/server/vfs.c
814
struct dentry *dentry, char *xattr_name)
fs/smb/server/vfs.c
816
return vfs_getxattr(idmap, dentry, xattr_name, NULL, 0);
fs/smb/server/vfs.c
830
char *xattr_name, char **xattr_buf)
fs/smb/server/vfs.c
836
xattr_len = ksmbd_vfs_xattr_len(idmap, dentry, xattr_name);
fs/smb/server/vfs.c
844
xattr_len = vfs_getxattr(idmap, dentry, xattr_name,
fs/smb/server/vfs.h
106
char *xattr_name,
fs/xattr.c
1013
static int file_removexattr(struct file *f, struct xattr_name *kname)
fs/xattr.c
1027
unsigned int lookup_flags, struct xattr_name *kname)
fs/xattr.c
1052
struct xattr_name kname;
fs/xattr.c
1242
const char *xattr_name = key;
fs/xattr.c
1246
return strcmp(xattr->name, xattr_name);
fs/xattr.c
589
int import_xattr_name(struct xattr_name *kname, const char __user *name)
fs/xattr.c
679
struct xattr_name kname;
fs/xattr.c
824
struct xattr_name kname;
fs/xfs/scrub/parent_repair.c
1000
args.name = rp->xattr_name;
fs/xfs/scrub/parent_repair.c
1007
rp->xattr_name[XATTR_NAME_MAX] = 0;
fs/xfs/scrub/parent_repair.c
1009
error = xfblob_load(rp->xattr_blobs, key->name_cookie, rp->xattr_name,
fs/xfs/scrub/parent_repair.c
1027
rp->xattr_name[key->namelen] = 0;
fs/xfs/scrub/parent_repair.c
1030
rp->xattr_name, key->namelen, key->valuelen);
fs/xfs/scrub/parent_repair.c
122
unsigned char *xattr_name;
fs/xfs/scrub/parent_repair.c
1508
rp->xattr_name = kvmalloc(XATTR_NAME_MAX + 1, XCHK_GFP_FLAGS);
fs/xfs/scrub/parent_repair.c
1509
if (!rp->xattr_name)
fs/xfs/scrub/parent_repair.c
1569
kvfree(rp->xattr_name);
fs/xfs/scrub/parent_repair.c
1570
rp->xattr_name = NULL;
fs/xfs/scrub/parent_repair.c
192
kvfree(rp->xattr_name);
fs/xfs/scrub/parent_repair.c
193
rp->xattr_name = NULL;
include/linux/evm.h
18
const char *xattr_name,
include/linux/evm.h
24
extern bool evm_revalidate_status(const char *xattr_name);
include/linux/evm.h
48
const char *xattr_name,
include/linux/evm.h
64
static inline bool evm_revalidate_status(const char *xattr_name)
include/linux/lsm_hook_defs.h
85
int mode, const struct qstr *name, const char **xattr_name,
include/linux/nfs_xdr.h
1567
const char *xattr_name;
include/linux/nfs_xdr.h
1583
const char *xattr_name;
include/linux/nfs_xdr.h
1614
const char *xattr_name;
include/linux/security.h
391
const char **xattr_name,
include/linux/security.h
868
const char **xattr_name,
security/integrity/evm/evm_crypto.c
367
int evm_update_evmxattr(struct dentry *dentry, const char *xattr_name,
security/integrity/evm/evm_crypto.c
386
rc = evm_calc_hmac(dentry, xattr_name, xattr_value,
security/integrity/evm/evm_main.c
179
const char *xattr_name,
security/integrity/evm/evm_main.c
233
rc = evm_calc_hmac(dentry, xattr_name, xattr_value,
security/integrity/evm/evm_main.c
254
rc = evm_calc_hash(dentry, xattr_name, xattr_value,
security/integrity/evm/evm_main.c
271
evm_update_evmxattr(dentry, xattr_name,
security/integrity/evm/evm_main.c
422
const char *xattr_name,
security/integrity/evm/evm_main.c
425
if (!evm_key_loaded() || !evm_protected_xattr(xattr_name))
security/integrity/evm/evm_main.c
428
return evm_verify_hmac(dentry, xattr_name, xattr_value,
security/integrity/evm/evm_main.c
462
struct dentry *dentry, const char *xattr_name,
security/integrity/evm/evm_main.c
468
rc = vfs_getxattr_alloc(&nop_mnt_idmap, dentry, xattr_name, &xattr_data,
security/integrity/evm/evm_main.c
498
struct dentry *dentry, const char *xattr_name,
security/integrity/evm/evm_main.c
503
if (strcmp(xattr_name, XATTR_NAME_EVM) == 0) {
security/integrity/evm/evm_main.c
508
} else if (!evm_protected_xattr(xattr_name)) {
security/integrity/evm/evm_main.c
509
if (!posix_xattr_acl(xattr_name))
security/integrity/evm/evm_main.c
559
!evm_xattr_change(idmap, dentry, xattr_name, xattr_value,
security/integrity/evm/evm_main.c
588
const char *xattr_name, const void *xattr_value,
security/integrity/evm/evm_main.c
599
if (strcmp(xattr_name, XATTR_NAME_EVM) == 0) {
security/integrity/evm/evm_main.c
606
return evm_protect_xattr(idmap, dentry, xattr_name, xattr_value,
security/integrity/evm/evm_main.c
620
const char *xattr_name)
security/integrity/evm/evm_main.c
628
return evm_protect_xattr(idmap, dentry, xattr_name, NULL, 0);
security/integrity/evm/evm_main.c
774
bool evm_revalidate_status(const char *xattr_name)
security/integrity/evm/evm_main.c
780
if (!xattr_name)
security/integrity/evm/evm_main.c
783
if (!evm_protected_xattr(xattr_name) && !posix_xattr_acl(xattr_name) &&
security/integrity/evm/evm_main.c
784
strcmp(xattr_name, XATTR_NAME_EVM))
security/integrity/evm/evm_main.c
805
const char *xattr_name,
security/integrity/evm/evm_main.c
810
if (!evm_revalidate_status(xattr_name))
security/integrity/evm/evm_main.c
815
if (!strcmp(xattr_name, XATTR_NAME_EVM))
security/integrity/evm/evm_main.c
824
evm_update_evmxattr(dentry, xattr_name, xattr_value, xattr_value_len);
security/integrity/evm/evm_main.c
853
const char *xattr_name)
security/integrity/evm/evm_main.c
855
if (!evm_revalidate_status(xattr_name))
security/integrity/evm/evm_main.c
860
if (!strcmp(xattr_name, XATTR_NAME_EVM))
security/integrity/evm/evm_main.c
866
evm_update_evmxattr(dentry, xattr_name, NULL, 0);
security/integrity/ima/ima_appraise.c
676
static int ima_protect_xattr(struct dentry *dentry, const char *xattr_name,
security/integrity/ima/ima_appraise.c
679
if (strcmp(xattr_name, XATTR_NAME_IMA) == 0) {
security/integrity/ima/ima_appraise.c
775
const char *xattr_name, const void *xattr_value,
security/integrity/ima/ima_appraise.c
783
result = ima_protect_xattr(dentry, xattr_name, xattr_value,
security/integrity/ima/ima_appraise.c
794
} else if (!strcmp(xattr_name, XATTR_NAME_EVM) && xattr_value_len > 0) {
security/integrity/ima/ima_appraise.c
799
if (result == 1 || evm_revalidate_status(xattr_name)) {
security/integrity/ima/ima_appraise.c
817
const char *xattr_name)
security/integrity/ima/ima_appraise.c
821
result = ima_protect_xattr(dentry, xattr_name, NULL, 0);
security/integrity/ima/ima_appraise.c
822
if (result == 1 || evm_revalidate_status(xattr_name)) {
security/integrity/ima/ima_appraise.c
823
if (!strcmp(xattr_name, XATTR_NAME_IMA))
security/security.c
1247
const char **xattr_name,
security/security.c
1251
xattr_name, lsmctx);
security/selinux/hooks.c
2898
const char **xattr_name,
security/selinux/hooks.c
2911
if (xattr_name)
security/selinux/hooks.c
2912
*xattr_name = XATTR_NAME_SELINUX;
tools/testing/selftests/bpf/prog_tests/cgroup_xattr.c
22
static const char xattr_name[] = "user.bpf_test";
tools/testing/selftests/bpf/prog_tests/cgroup_xattr.c
32
if (!ASSERT_OK(set_cgroup_xattr(CGROUP_FS_PARENT, xattr_name, xattr_value_a),
tools/testing/selftests/bpf/prog_tests/cgroup_xattr.c
39
if (!ASSERT_OK(set_cgroup_xattr(CGROUP_FS_CHILD, xattr_name, xattr_value_b),
tools/testing/selftests/pidfd/pidfd_xattr_test.c
50
char xattr_name[32];
tools/testing/selftests/pidfd/pidfd_xattr_test.c
57
snprintf(xattr_name, sizeof(xattr_name), "trusted.testattr%d", i);
tools/testing/selftests/pidfd/pidfd_xattr_test.c
59
ret = fsetxattr(self->child_pidfd, xattr_name, xattr_value, strlen(xattr_value), 0);
tools/testing/selftests/pidfd/pidfd_xattr_test.c
64
snprintf(xattr_name, sizeof(xattr_name), "trusted.testattr%d", i);
tools/testing/selftests/pidfd/pidfd_xattr_test.c
67
ret = fgetxattr(self->child_pidfd, xattr_name, buf, sizeof(buf));
tools/testing/selftests/pidfd/pidfd_xattr_test.c
75
snprintf(xattr_name, sizeof(xattr_name), "trusted.testattr%d", i);
tools/testing/selftests/pidfd/pidfd_xattr_test.c
78
if (strcmp(it, xattr_name))
tools/testing/selftests/pidfd/pidfd_xattr_test.c
87
snprintf(xattr_name, sizeof(xattr_name), "trusted.testattr%d", i);
tools/testing/selftests/pidfd/pidfd_xattr_test.c
88
ret = fremovexattr(self->child_pidfd, xattr_name);
tools/testing/selftests/pidfd/pidfd_xattr_test.c
91
ret = fgetxattr(self->child_pidfd, xattr_name, buf, sizeof(buf));