/linux-master/fs/hfsplus/ |
H A D | xattr_security.c | 41 char *xattr_name; local 44 xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1, 46 if (!xattr_name) 53 strcpy(xattr_name, XATTR_SECURITY_PREFIX); 54 strcpy(xattr_name + 56 memset(xattr_name + 59 err = __hfsplus_setxattr(inode, xattr_name, 64 kfree(xattr_name);
|
H A D | xattr.c | 393 static int name_len(const char *xattr_name, int xattr_name_len) argument 397 if (!is_known_namespace(xattr_name)) 403 static int copy_name(char *buffer, const char *xattr_name, int name_len) argument 408 if (!is_known_namespace(xattr_name)) { 414 strncpy(buffer + offset, xattr_name, name_len); 425 char *xattr_name; local 428 xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1, 430 if (!xattr_name) 432 strcpy(xattr_name, prefix); 433 strcpy(xattr_name 580 char *xattr_name; local 596 can_list(const char *xattr_name) argument [all...] |
/linux-master/include/linux/ |
H A D | evm.h | 18 const char *xattr_name, 24 extern bool evm_revalidate_status(const char *xattr_name); 46 const char *xattr_name, 62 static inline bool evm_revalidate_status(const char *xattr_name) argument 45 evm_verifyxattr(struct dentry *dentry, const char *xattr_name, void *xattr_value, size_t xattr_value_len) argument
|
H A D | nfs_xdr.h | 1532 const char *xattr_name; member in struct:nfs42_setxattrargs 1548 const char *xattr_name; member in struct:nfs42_getxattrargs 1579 const char *xattr_name; member in struct:nfs42_removexattrargs
|
H A D | security.h | 331 const char **xattr_name, void **ctx, 783 const char **xattr_name, 780 security_dentry_init_security(struct dentry *dentry, int mode, const struct qstr *name, const char **xattr_name, void **ctx, u32 *ctxlen) argument
|
H A D | lsm_hook_defs.h | 85 int mode, const struct qstr *name, const char **xattr_name,
|
/linux-master/security/integrity/evm/ |
H A D | evm_main.c | 179 const char *xattr_name, 228 rc = evm_calc_hmac(dentry, xattr_name, xattr_value, 249 rc = evm_calc_hash(dentry, xattr_name, xattr_value, 264 evm_update_evmxattr(dentry, xattr_name, 401 * @xattr_name: requested xattr 415 const char *xattr_name, 418 if (!evm_key_loaded() || !evm_protected_xattr(xattr_name)) 424 return evm_verify_hmac(dentry, xattr_name, xattr_value, 449 * @xattr_name: requested xattr 458 struct dentry *dentry, const char *xattr_name, 178 evm_verify_hmac(struct dentry *dentry, const char *xattr_name, char *xattr_value, size_t xattr_value_len) argument 414 evm_verifyxattr(struct dentry *dentry, const char *xattr_name, void *xattr_value, size_t xattr_value_len) argument 457 evm_xattr_change(struct mnt_idmap *idmap, struct dentry *dentry, const char *xattr_name, const void *xattr_value, size_t xattr_value_len) argument 493 evm_protect_xattr(struct mnt_idmap *idmap, struct dentry *dentry, const char *xattr_name, const void *xattr_value, size_t xattr_value_len) argument 583 evm_inode_setxattr(struct mnt_idmap *idmap, struct dentry *dentry, const char *xattr_name, const void *xattr_value, size_t xattr_value_len, int flags) argument 615 evm_inode_removexattr(struct mnt_idmap *idmap, struct dentry *dentry, const char *xattr_name) argument 745 evm_revalidate_status(const char *xattr_name) argument 775 evm_inode_post_setxattr(struct dentry *dentry, const char *xattr_name, const void *xattr_value, size_t xattr_value_len, int flags) argument 823 evm_inode_post_removexattr(struct dentry *dentry, const char *xattr_name) argument [all...] |
H A D | evm_crypto.c | 356 int evm_update_evmxattr(struct dentry *dentry, const char *xattr_name, argument 374 rc = evm_calc_hmac(dentry, xattr_name, xattr_value,
|
/linux-master/fs/reiserfs/ |
H A D | xattr_security.c | 99 char xattr_name[XATTR_NAME_MAX + 1] = XATTR_SECURITY_PREFIX; local 105 strlcat(xattr_name, sec->name, sizeof(xattr_name)); 107 error = reiserfs_xattr_set_handle(th, inode, xattr_name, sec->value,
|
/linux-master/fs/btrfs/ |
H A D | props.c | 26 const char *xattr_name; member in struct:prop_handler 61 if (!strcmp(h->xattr_name, name)) 119 ret = btrfs_setxattr(trans, inode, handler->xattr_name, 130 ret = btrfs_setxattr(trans, inode, handler->xattr_name, value, 136 btrfs_setxattr(trans, inode, handler->xattr_name, NULL, 270 handler->xattr_name, btrfs_ino(BTRFS_I(inode)), 378 .xattr_name = XATTR_BTRFS_PREFIX "compression", 439 ret = btrfs_setxattr(trans, inode, h->xattr_name, value, 444 btrfs_setxattr(trans, inode, h->xattr_name, 469 u64 h = btrfs_name_hash(p->xattr_name, strle [all...] |
/linux-master/security/integrity/ima/ |
H A D | ima_appraise.c | 661 static int ima_protect_xattr(struct dentry *dentry, const char *xattr_name, argument 664 if (strcmp(xattr_name, XATTR_NAME_IMA) == 0) { 751 const char *xattr_name, const void *xattr_value, 759 result = ima_protect_xattr(dentry, xattr_name, xattr_value, 770 } else if (!strcmp(xattr_name, XATTR_NAME_EVM) && xattr_value_len > 0) { 773 if (result == 1 || evm_revalidate_status(xattr_name)) { 791 const char *xattr_name) 795 result = ima_protect_xattr(dentry, xattr_name, NULL, 0); 796 if (result == 1 || evm_revalidate_status(xattr_name)) { 750 ima_inode_setxattr(struct mnt_idmap *idmap, struct dentry *dentry, const char *xattr_name, const void *xattr_value, size_t xattr_value_len, int flags) argument 790 ima_inode_removexattr(struct mnt_idmap *idmap, struct dentry *dentry, const char *xattr_name) argument
|
/linux-master/fs/ |
H A D | internal.h | 259 struct xattr_name { struct 272 struct xattr_name *kname;
|
H A D | xattr.c | 638 struct xattr_name kname; 756 struct xattr_name kname; 1116 const char *xattr_name = key; local 1120 return strcmp(xattr->name, xattr_name);
|
/linux-master/fs/nfs/ |
H A D | nfs42xattr.c | 84 char *xattr_name; member in struct:nfs4_xattr_entry 236 entry->xattr_name = namep; 518 if (!strcmp(entry->xattr_name, name)) 533 bucket = nfs4_xattr_hash_bucket(cache, entry->xattr_name); 543 oldentry = nfs4_xattr_get_entry(bucket, entry->xattr_name); 624 entry->xattr_name, (unsigned long)entry->xattr_size); 890 if (entry->xattr_name != NULL) {
|
H A D | nfs42xdr.c | 466 encode_string(xdr, strlen(arg->xattr_name), arg->xattr_name); 751 encode_getxattr(xdr, args->xattr_name, &hdr); 796 encode_removexattr(xdr, args->xattr_name, &hdr);
|
H A D | nfs42proc.c | 1171 .xattr_name = name, 1202 .xattr_name = name, 1259 .xattr_name = name,
|
/linux-master/fs/smb/server/ |
H A D | vfs.h | 105 char *xattr_name,
|
H A D | vfs.c | 884 struct dentry *dentry, char *xattr_name) 886 return vfs_getxattr(idmap, dentry, xattr_name, NULL, 0); 893 * @xattr_name: name of xattr name to query 900 char *xattr_name, char **xattr_buf) 906 xattr_len = ksmbd_vfs_xattr_len(idmap, dentry, xattr_name); 914 xattr_len = vfs_getxattr(idmap, dentry, xattr_name, 883 ksmbd_vfs_xattr_len(struct mnt_idmap *idmap, struct dentry *dentry, char *xattr_name) argument 898 ksmbd_vfs_getxattr(struct mnt_idmap *idmap, struct dentry *dentry, char *xattr_name, char **xattr_buf) argument
|
/linux-master/security/ |
H A D | security.c | 1633 * @xattr_name: name of the security/LSM xattr 1639 * @xattr_name does not need to be free'd by the caller, it is a static string. 1645 const char **xattr_name, void **ctx, 1649 xattr_name, ctx, ctxlen); 1643 security_dentry_init_security(struct dentry *dentry, int mode, const struct qstr *name, const char **xattr_name, void **ctx, u32 *ctxlen) argument
|
/linux-master/security/selinux/ |
H A D | hooks.c | 2874 const char **xattr_name, void **ctx, 2887 if (xattr_name) 2888 *xattr_name = XATTR_NAME_SELINUX; 2872 selinux_dentry_init_security(struct dentry *dentry, int mode, const struct qstr *name, const char **xattr_name, void **ctx, u32 *ctxlen) argument
|
/linux-master/fs/smb/client/ |
H A D | cifspdu.h | 2711 char xattr_name[]; member in struct:file_xattr_info
|