xattr_name         19 fs/btrfs/props.c 	const char *xattr_name;
xattr_name         52 fs/btrfs/props.c 		if (!strcmp(h->xattr_name, name))
xattr_name         87 fs/btrfs/props.c 		ret = btrfs_setxattr(trans, inode, handler->xattr_name,
xattr_name         98 fs/btrfs/props.c 	ret = btrfs_setxattr(trans, inode, handler->xattr_name, value,
xattr_name        104 fs/btrfs/props.c 		btrfs_setxattr(trans, inode, handler->xattr_name, NULL,
xattr_name        238 fs/btrfs/props.c 			   handler->xattr_name, btrfs_ino(BTRFS_I(inode)),
xattr_name        315 fs/btrfs/props.c 		.xattr_name = XATTR_BTRFS_PREFIX "compression",
xattr_name        372 fs/btrfs/props.c 		ret = btrfs_setxattr(trans, inode, h->xattr_name, value,
xattr_name        377 fs/btrfs/props.c 				btrfs_setxattr(trans, inode, h->xattr_name,
xattr_name        444 fs/btrfs/props.c 		u64 h = btrfs_name_hash(p->xattr_name, strlen(p->xattr_name));
xattr_name       2759 fs/cifs/cifspdu.h 	char  xattr_name[0];
xattr_name        394 fs/hfsplus/xattr.c static int name_len(const char *xattr_name, int xattr_name_len)
xattr_name        398 fs/hfsplus/xattr.c 	if (!is_known_namespace(xattr_name))
xattr_name        404 fs/hfsplus/xattr.c static int copy_name(char *buffer, const char *xattr_name, int name_len)
xattr_name        409 fs/hfsplus/xattr.c 	if (!is_known_namespace(xattr_name)) {
xattr_name        415 fs/hfsplus/xattr.c 	strncpy(buffer + offset, xattr_name, name_len);
xattr_name        426 fs/hfsplus/xattr.c 	char *xattr_name;
xattr_name        429 fs/hfsplus/xattr.c 	xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1,
xattr_name        431 fs/hfsplus/xattr.c 	if (!xattr_name)
xattr_name        433 fs/hfsplus/xattr.c 	strcpy(xattr_name, prefix);
xattr_name        434 fs/hfsplus/xattr.c 	strcpy(xattr_name + prefixlen, name);
xattr_name        435 fs/hfsplus/xattr.c 	res = __hfsplus_setxattr(inode, xattr_name, value, size, flags);
xattr_name        436 fs/hfsplus/xattr.c 	kfree(xattr_name);
xattr_name        581 fs/hfsplus/xattr.c 	char *xattr_name;
xattr_name        583 fs/hfsplus/xattr.c 	xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1,
xattr_name        585 fs/hfsplus/xattr.c 	if (!xattr_name)
xattr_name        588 fs/hfsplus/xattr.c 	strcpy(xattr_name, prefix);
xattr_name        589 fs/hfsplus/xattr.c 	strcpy(xattr_name + prefixlen, name);
xattr_name        591 fs/hfsplus/xattr.c 	res = __hfsplus_getxattr(inode, xattr_name, value, size);
xattr_name        592 fs/hfsplus/xattr.c 	kfree(xattr_name);
xattr_name        597 fs/hfsplus/xattr.c static inline int can_list(const char *xattr_name)
xattr_name        599 fs/hfsplus/xattr.c 	if (!xattr_name)
xattr_name        602 fs/hfsplus/xattr.c 	return strncmp(xattr_name, XATTR_TRUSTED_PREFIX,
xattr_name         40 fs/hfsplus/xattr_security.c 	char *xattr_name;
xattr_name         43 fs/hfsplus/xattr_security.c 	xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1,
xattr_name         45 fs/hfsplus/xattr_security.c 	if (!xattr_name)
xattr_name         52 fs/hfsplus/xattr_security.c 		strcpy(xattr_name, XATTR_SECURITY_PREFIX);
xattr_name         53 fs/hfsplus/xattr_security.c 		strcpy(xattr_name +
xattr_name         55 fs/hfsplus/xattr_security.c 		memset(xattr_name +
xattr_name         58 fs/hfsplus/xattr_security.c 		err = __hfsplus_setxattr(inode, xattr_name,
xattr_name         63 fs/hfsplus/xattr_security.c 	kfree(xattr_name);
xattr_name         20 include/linux/evm.h 					     const char *xattr_name,
xattr_name         29 include/linux/evm.h 				    const char *xattr_name,
xattr_name         32 include/linux/evm.h extern int evm_inode_removexattr(struct dentry *dentry, const char *xattr_name);
xattr_name         34 include/linux/evm.h 				       const char *xattr_name);
xattr_name         55 include/linux/evm.h 						    const char *xattr_name,
xattr_name         81 include/linux/evm.h 					   const char *xattr_name,
xattr_name         89 include/linux/evm.h 					const char *xattr_name)
xattr_name         95 include/linux/evm.h 					      const char *xattr_name)
xattr_name        106 include/linux/ima.h extern int ima_inode_setxattr(struct dentry *dentry, const char *xattr_name,
xattr_name        108 include/linux/ima.h extern int ima_inode_removexattr(struct dentry *dentry, const char *xattr_name);
xattr_name        121 include/linux/ima.h 				     const char *xattr_name,
xattr_name        129 include/linux/ima.h 					const char *xattr_name)
xattr_name        302 security/integrity/evm/evm_crypto.c int evm_update_evmxattr(struct dentry *dentry, const char *xattr_name,
xattr_name        320 security/integrity/evm/evm_crypto.c 	rc = evm_calc_hmac(dentry, xattr_name, xattr_value,
xattr_name        129 security/integrity/evm/evm_main.c 					     const char *xattr_name,
xattr_name        175 security/integrity/evm/evm_main.c 		rc = evm_calc_hmac(dentry, xattr_name, xattr_value,
xattr_name        188 security/integrity/evm/evm_main.c 		rc = evm_calc_hash(dentry, xattr_name, xattr_value,
xattr_name        205 security/integrity/evm/evm_main.c 				evm_update_evmxattr(dentry, xattr_name,
xattr_name        267 security/integrity/evm/evm_main.c 				      const char *xattr_name,
xattr_name        271 security/integrity/evm/evm_main.c 	if (!evm_key_loaded() || !evm_protected_xattr(xattr_name))
xattr_name        279 security/integrity/evm/evm_main.c 	return evm_verify_hmac(dentry, xattr_name, xattr_value,
xattr_name        312 security/integrity/evm/evm_main.c static int evm_protect_xattr(struct dentry *dentry, const char *xattr_name,
xattr_name        317 security/integrity/evm/evm_main.c 	if (strcmp(xattr_name, XATTR_NAME_EVM) == 0) {
xattr_name        320 security/integrity/evm/evm_main.c 	} else if (!evm_protected_xattr(xattr_name)) {
xattr_name        321 security/integrity/evm/evm_main.c 		if (!posix_xattr_acl(xattr_name))
xattr_name        371 security/integrity/evm/evm_main.c int evm_inode_setxattr(struct dentry *dentry, const char *xattr_name,
xattr_name        382 security/integrity/evm/evm_main.c 	if (strcmp(xattr_name, XATTR_NAME_EVM) == 0) {
xattr_name        389 security/integrity/evm/evm_main.c 	return evm_protect_xattr(dentry, xattr_name, xattr_value,
xattr_name        401 security/integrity/evm/evm_main.c int evm_inode_removexattr(struct dentry *dentry, const char *xattr_name)
xattr_name        409 security/integrity/evm/evm_main.c 	return evm_protect_xattr(dentry, xattr_name, NULL, 0);
xattr_name        434 security/integrity/evm/evm_main.c void evm_inode_post_setxattr(struct dentry *dentry, const char *xattr_name,
xattr_name        437 security/integrity/evm/evm_main.c 	if (!evm_key_loaded() || (!evm_protected_xattr(xattr_name)
xattr_name        438 security/integrity/evm/evm_main.c 				  && !posix_xattr_acl(xattr_name)))
xattr_name        443 security/integrity/evm/evm_main.c 	evm_update_evmxattr(dentry, xattr_name, xattr_value, xattr_value_len);
xattr_name        456 security/integrity/evm/evm_main.c void evm_inode_post_removexattr(struct dentry *dentry, const char *xattr_name)
xattr_name        458 security/integrity/evm/evm_main.c 	if (!evm_key_loaded() || !evm_protected_xattr(xattr_name))
xattr_name        463 security/integrity/evm/evm_main.c 	evm_update_evmxattr(dentry, xattr_name, NULL, 0);
xattr_name        482 security/integrity/ima/ima_appraise.c static int ima_protect_xattr(struct dentry *dentry, const char *xattr_name,
xattr_name        485 security/integrity/ima/ima_appraise.c 	if (strcmp(xattr_name, XATTR_NAME_IMA) == 0) {
xattr_name        511 security/integrity/ima/ima_appraise.c int ima_inode_setxattr(struct dentry *dentry, const char *xattr_name,
xattr_name        517 security/integrity/ima/ima_appraise.c 	result = ima_protect_xattr(dentry, xattr_name, xattr_value,
xattr_name        529 security/integrity/ima/ima_appraise.c int ima_inode_removexattr(struct dentry *dentry, const char *xattr_name)
xattr_name        533 security/integrity/ima/ima_appraise.c 	result = ima_protect_xattr(dentry, xattr_name, NULL, 0);