Searched refs:__vfs_setxattr_noperm (Results 1 - 8 of 8) sorted by relevance
/linux-4.4.14/include/linux/ |
H A D | xattr.h | 46 int __vfs_setxattr_noperm(struct dentry *, const char *, const void *, size_t, int);
|
H A D | lsm_hooks.h | 1281 * fs code as needed (via __vfs_setxattr_noperm) to update any backing
|
/linux-4.4.14/security/integrity/evm/ |
H A D | evm_crypto.c | 210 rc = __vfs_setxattr_noperm(dentry, XATTR_NAME_EVM, evm_update_evmxattr()
|
H A D | evm_main.c | 372 * __vfs_setxattr_noperm(). The caller of which has taken the inode's
|
/linux-4.4.14/security/integrity/ima/ |
H A D | ima_appraise.c | 62 rc = __vfs_setxattr_noperm(dentry, XATTR_NAME_IMA, ima_fix_xattr()
|
/linux-4.4.14/fs/ |
H A D | xattr.c | 77 * __vfs_setxattr_noperm - perform setxattr operation without performing 92 int __vfs_setxattr_noperm(struct dentry *dentry, const char *name, __vfs_setxattr_noperm() function 137 error = __vfs_setxattr_noperm(dentry, name, value, size, flags); vfs_setxattr()
|
/linux-4.4.14/security/smack/ |
H A D | smack_lsm.c | 4564 return __vfs_setxattr_noperm(dentry, XATTR_NAME_SMACK, ctx, ctxlen, 0); smack_inode_setsecctx()
|
/linux-4.4.14/security/selinux/ |
H A D | hooks.c | 5778 return __vfs_setxattr_noperm(dentry, XATTR_NAME_SELINUX, ctx, ctxlen, 0); selinux_inode_setsecctx()
|
Completed in 308 milliseconds