xattr_name 19 fs/btrfs/props.c const char *xattr_name; xattr_name 52 fs/btrfs/props.c if (!strcmp(h->xattr_name, name)) xattr_name 87 fs/btrfs/props.c ret = btrfs_setxattr(trans, inode, handler->xattr_name, xattr_name 98 fs/btrfs/props.c ret = btrfs_setxattr(trans, inode, handler->xattr_name, value, xattr_name 104 fs/btrfs/props.c btrfs_setxattr(trans, inode, handler->xattr_name, NULL, xattr_name 238 fs/btrfs/props.c handler->xattr_name, btrfs_ino(BTRFS_I(inode)), xattr_name 315 fs/btrfs/props.c .xattr_name = XATTR_BTRFS_PREFIX "compression", xattr_name 372 fs/btrfs/props.c ret = btrfs_setxattr(trans, inode, h->xattr_name, value, xattr_name 377 fs/btrfs/props.c btrfs_setxattr(trans, inode, h->xattr_name, xattr_name 444 fs/btrfs/props.c u64 h = btrfs_name_hash(p->xattr_name, strlen(p->xattr_name)); xattr_name 2759 fs/cifs/cifspdu.h char xattr_name[0]; xattr_name 394 fs/hfsplus/xattr.c static int name_len(const char *xattr_name, int xattr_name_len) xattr_name 398 fs/hfsplus/xattr.c if (!is_known_namespace(xattr_name)) xattr_name 404 fs/hfsplus/xattr.c static int copy_name(char *buffer, const char *xattr_name, int name_len) xattr_name 409 fs/hfsplus/xattr.c if (!is_known_namespace(xattr_name)) { xattr_name 415 fs/hfsplus/xattr.c strncpy(buffer + offset, xattr_name, name_len); xattr_name 426 fs/hfsplus/xattr.c char *xattr_name; xattr_name 429 fs/hfsplus/xattr.c xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1, xattr_name 431 fs/hfsplus/xattr.c if (!xattr_name) xattr_name 433 fs/hfsplus/xattr.c strcpy(xattr_name, prefix); xattr_name 434 fs/hfsplus/xattr.c strcpy(xattr_name + prefixlen, name); xattr_name 435 fs/hfsplus/xattr.c res = __hfsplus_setxattr(inode, xattr_name, value, size, flags); xattr_name 436 fs/hfsplus/xattr.c kfree(xattr_name); xattr_name 581 fs/hfsplus/xattr.c char *xattr_name; xattr_name 583 fs/hfsplus/xattr.c xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1, xattr_name 585 fs/hfsplus/xattr.c if (!xattr_name) xattr_name 588 fs/hfsplus/xattr.c strcpy(xattr_name, prefix); xattr_name 589 fs/hfsplus/xattr.c strcpy(xattr_name + prefixlen, name); xattr_name 591 fs/hfsplus/xattr.c res = __hfsplus_getxattr(inode, xattr_name, value, size); xattr_name 592 fs/hfsplus/xattr.c kfree(xattr_name); xattr_name 597 fs/hfsplus/xattr.c static inline int can_list(const char *xattr_name) xattr_name 599 fs/hfsplus/xattr.c if (!xattr_name) xattr_name 602 fs/hfsplus/xattr.c return strncmp(xattr_name, XATTR_TRUSTED_PREFIX, xattr_name 40 fs/hfsplus/xattr_security.c char *xattr_name; xattr_name 43 fs/hfsplus/xattr_security.c xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1, xattr_name 45 fs/hfsplus/xattr_security.c if (!xattr_name) xattr_name 52 fs/hfsplus/xattr_security.c strcpy(xattr_name, XATTR_SECURITY_PREFIX); xattr_name 53 fs/hfsplus/xattr_security.c strcpy(xattr_name + xattr_name 55 fs/hfsplus/xattr_security.c memset(xattr_name + xattr_name 58 fs/hfsplus/xattr_security.c err = __hfsplus_setxattr(inode, xattr_name, xattr_name 63 fs/hfsplus/xattr_security.c kfree(xattr_name); xattr_name 20 include/linux/evm.h const char *xattr_name, xattr_name 29 include/linux/evm.h const char *xattr_name, xattr_name 32 include/linux/evm.h extern int evm_inode_removexattr(struct dentry *dentry, const char *xattr_name); xattr_name 34 include/linux/evm.h const char *xattr_name); xattr_name 55 include/linux/evm.h const char *xattr_name, xattr_name 81 include/linux/evm.h const char *xattr_name, xattr_name 89 include/linux/evm.h const char *xattr_name) xattr_name 95 include/linux/evm.h const char *xattr_name) xattr_name 106 include/linux/ima.h extern int ima_inode_setxattr(struct dentry *dentry, const char *xattr_name, xattr_name 108 include/linux/ima.h extern int ima_inode_removexattr(struct dentry *dentry, const char *xattr_name); xattr_name 121 include/linux/ima.h const char *xattr_name, xattr_name 129 include/linux/ima.h const char *xattr_name) xattr_name 302 security/integrity/evm/evm_crypto.c int evm_update_evmxattr(struct dentry *dentry, const char *xattr_name, xattr_name 320 security/integrity/evm/evm_crypto.c rc = evm_calc_hmac(dentry, xattr_name, xattr_value, xattr_name 129 security/integrity/evm/evm_main.c const char *xattr_name, xattr_name 175 security/integrity/evm/evm_main.c rc = evm_calc_hmac(dentry, xattr_name, xattr_value, xattr_name 188 security/integrity/evm/evm_main.c rc = evm_calc_hash(dentry, xattr_name, xattr_value, xattr_name 205 security/integrity/evm/evm_main.c evm_update_evmxattr(dentry, xattr_name, xattr_name 267 security/integrity/evm/evm_main.c const char *xattr_name, xattr_name 271 security/integrity/evm/evm_main.c if (!evm_key_loaded() || !evm_protected_xattr(xattr_name)) xattr_name 279 security/integrity/evm/evm_main.c return evm_verify_hmac(dentry, xattr_name, xattr_value, xattr_name 312 security/integrity/evm/evm_main.c static int evm_protect_xattr(struct dentry *dentry, const char *xattr_name, xattr_name 317 security/integrity/evm/evm_main.c if (strcmp(xattr_name, XATTR_NAME_EVM) == 0) { xattr_name 320 security/integrity/evm/evm_main.c } else if (!evm_protected_xattr(xattr_name)) { xattr_name 321 security/integrity/evm/evm_main.c if (!posix_xattr_acl(xattr_name)) xattr_name 371 security/integrity/evm/evm_main.c int evm_inode_setxattr(struct dentry *dentry, const char *xattr_name, xattr_name 382 security/integrity/evm/evm_main.c if (strcmp(xattr_name, XATTR_NAME_EVM) == 0) { xattr_name 389 security/integrity/evm/evm_main.c return evm_protect_xattr(dentry, xattr_name, xattr_value, xattr_name 401 security/integrity/evm/evm_main.c int evm_inode_removexattr(struct dentry *dentry, const char *xattr_name) xattr_name 409 security/integrity/evm/evm_main.c return evm_protect_xattr(dentry, xattr_name, NULL, 0); xattr_name 434 security/integrity/evm/evm_main.c void evm_inode_post_setxattr(struct dentry *dentry, const char *xattr_name, xattr_name 437 security/integrity/evm/evm_main.c if (!evm_key_loaded() || (!evm_protected_xattr(xattr_name) xattr_name 438 security/integrity/evm/evm_main.c && !posix_xattr_acl(xattr_name))) xattr_name 443 security/integrity/evm/evm_main.c evm_update_evmxattr(dentry, xattr_name, xattr_value, xattr_value_len); xattr_name 456 security/integrity/evm/evm_main.c void evm_inode_post_removexattr(struct dentry *dentry, const char *xattr_name) xattr_name 458 security/integrity/evm/evm_main.c if (!evm_key_loaded() || !evm_protected_xattr(xattr_name)) xattr_name 463 security/integrity/evm/evm_main.c evm_update_evmxattr(dentry, xattr_name, NULL, 0); xattr_name 482 security/integrity/ima/ima_appraise.c static int ima_protect_xattr(struct dentry *dentry, const char *xattr_name, xattr_name 485 security/integrity/ima/ima_appraise.c if (strcmp(xattr_name, XATTR_NAME_IMA) == 0) { xattr_name 511 security/integrity/ima/ima_appraise.c int ima_inode_setxattr(struct dentry *dentry, const char *xattr_name, xattr_name 517 security/integrity/ima/ima_appraise.c result = ima_protect_xattr(dentry, xattr_name, xattr_value, xattr_name 529 security/integrity/ima/ima_appraise.c int ima_inode_removexattr(struct dentry *dentry, const char *xattr_name) xattr_name 533 security/integrity/ima/ima_appraise.c result = ima_protect_xattr(dentry, xattr_name, NULL, 0);