| /linux/tools/testing/selftests/pidfd/ |
| H A D | pidfd_xattr_test.c | 50 char xattr_name[32]; in TEST_F() local 57 snprintf(xattr_name, sizeof(xattr_name), "trusted.testattr%d", i); in TEST_F() 59 ret = fsetxattr(self->child_pidfd, xattr_name, xattr_value, strlen(xattr_value), 0); in TEST_F() 64 snprintf(xattr_name, sizeof(xattr_name), "trusted.testattr%d", i); in TEST_F() 67 ret = fgetxattr(self->child_pidfd, xattr_name, buf, sizeof(buf)); in TEST_F() 75 snprintf(xattr_name, sizeof(xattr_name), "trusted.testattr%d", i); in TEST_F() 78 if (strcmp(it, xattr_name)) in TEST_F() 87 snprintf(xattr_name, sizeof(xattr_name), "trusted.testattr%d", i); in TEST_F() 88 ret = fremovexattr(self->child_pidfd, xattr_name); in TEST_F() 91 ret = fgetxattr(self->child_pidfd, xattr_name, buf, sizeof(buf)); in TEST_F()
|
| /linux/security/integrity/evm/ |
| H A D | evm_main.c | 195 const char *xattr_name, in evm_verify_hmac() 249 rc = evm_calc_hmac(dentry, xattr_name, xattr_value, in evm_verify_hmac() 276 rc = evm_calc_hash(dentry, xattr_name, xattr_value, in evm_verify_hmac() 294 evm_update_evmxattr(dentry, xattr_name, in evm_verify_hmac() 431 * @xattr_name: requested xattr 445 const char *xattr_name, in evm_verify_current_integrity() 448 if (!evm_key_loaded() || !evm_protected_xattr(xattr_name)) 451 return evm_verify_hmac(dentry, xattr_name, xattr_value, 476 * @xattr_name: requested xattr in evm_xattr_change() 485 struct dentry *dentry, const char *xattr_name, 179 evm_verify_hmac(struct dentry * dentry,const char * xattr_name,char * xattr_value,size_t xattr_value_len) evm_verify_hmac() argument 422 evm_verifyxattr(struct dentry * dentry,const char * xattr_name,void * xattr_value,size_t xattr_value_len) evm_verifyxattr() argument 462 evm_xattr_change(struct mnt_idmap * idmap,struct dentry * dentry,const char * xattr_name,const void * xattr_value,size_t xattr_value_len) evm_xattr_change() argument 498 evm_protect_xattr(struct mnt_idmap * idmap,struct dentry * dentry,const char * xattr_name,const void * xattr_value,size_t xattr_value_len) evm_protect_xattr() argument 588 evm_inode_setxattr(struct mnt_idmap * idmap,struct dentry * dentry,const char * xattr_name,const void * xattr_value,size_t xattr_value_len,int flags) evm_inode_setxattr() argument 620 evm_inode_removexattr(struct mnt_idmap * idmap,struct dentry * dentry,const char * xattr_name) evm_inode_removexattr() argument 774 evm_revalidate_status(const char * xattr_name) evm_revalidate_status() argument 805 evm_inode_post_setxattr(struct dentry * dentry,const char * xattr_name,const void * xattr_value,size_t xattr_value_len,int flags) evm_inode_post_setxattr() argument 853 evm_inode_post_removexattr(struct dentry * dentry,const char * xattr_name) evm_inode_post_removexattr() argument [all...] |
| H A D | evm_crypto.c | 373 int evm_update_evmxattr(struct dentry *dentry, const char *xattr_name, in evm_update_evmxattr() 392 rc = evm_calc_hmac(dentry, xattr_name, xattr_value, in evm_update_evmxattr() 366 evm_update_evmxattr(struct dentry * dentry,const char * xattr_name,const char * xattr_value,size_t xattr_value_len) evm_update_evmxattr() argument
|
| /linux/fs/hfsplus/ |
| H A D | xattr_security.c | 41 char *xattr_name; in hfsplus_initxattrs() local 44 xattr_name = kmalloc(NLS_MAX_CHARSET_SIZE * HFSPLUS_ATTR_MAX_STRLEN + 1, in hfsplus_initxattrs() 46 if (!xattr_name) in hfsplus_initxattrs() 53 strcpy(xattr_name, XATTR_SECURITY_PREFIX); in hfsplus_initxattrs() 54 strcpy(xattr_name + in hfsplus_initxattrs() 56 memset(xattr_name + in hfsplus_initxattrs() 59 err = __hfsplus_setxattr(inode, xattr_name, in hfsplus_initxattrs() 64 kfree(xattr_name); in hfsplus_initxattrs()
|
| /linux/fs/btrfs/ |
| H A D | props.c | 26 const char *xattr_name; member 61 if (!strcmp(h->xattr_name, name)) in find_prop_handler() 119 ret = btrfs_setxattr(trans, &inode->vfs_inode, handler->xattr_name, in btrfs_set_prop() 130 ret = btrfs_setxattr(trans, &inode->vfs_inode, handler->xattr_name, value, in btrfs_set_prop() 136 btrfs_setxattr(trans, &inode->vfs_inode, handler->xattr_name, NULL, in btrfs_set_prop() 270 handler->xattr_name, btrfs_ino(BTRFS_I(inode)), in inode_prop_iterator() 379 .xattr_name = XATTR_BTRFS_PREFIX "compression", 440 ret = btrfs_setxattr(trans, &inode->vfs_inode, h->xattr_name, value, in btrfs_inode_inherit_props() 445 btrfs_setxattr(trans, &inode->vfs_inode, h->xattr_name, in btrfs_inode_inherit_props() 469 u64 h = btrfs_name_hash(p->xattr_name, strlen(p->xattr_name)); in btrfs_props_init()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | cgroup_xattr.c | 22 static const char xattr_name[] = "user.bpf_test"; variable 32 if (!ASSERT_OK(set_cgroup_xattr(CGROUP_FS_PARENT, xattr_name, xattr_value_a), in test_read_cgroup_xattr() 39 if (!ASSERT_OK(set_cgroup_xattr(CGROUP_FS_CHILD, xattr_name, xattr_value_b), in test_read_cgroup_xattr()
|
| /linux/security/integrity/ima/ |
| H A D | ima_appraise.c | 651 static int ima_protect_xattr(struct dentry *dentry, const char *xattr_name, 654 if (strcmp(xattr_name, XATTR_NAME_IMA) == 0) { 750 const char *xattr_name, const void *xattr_value, in validate_hash_algo() 758 result = ima_protect_xattr(dentry, xattr_name, xattr_value, in validate_hash_algo() 769 } else if (!strcmp(xattr_name, XATTR_NAME_EVM) && xattr_value_len > 0) { in validate_hash_algo() 774 if (result == 1 || evm_revalidate_status(xattr_name)) { in validate_hash_algo() 792 const char *xattr_name) in ima_inode_setxattr() 796 result = ima_protect_xattr(dentry, xattr_name, NULL, 0); in ima_inode_setxattr() 797 if (result == 1 || evm_revalidate_status(xattr_name)) { in ima_inode_setxattr() 798 if (!strcmp(xattr_name, XATTR_NAME_IM in ima_inode_setxattr() 686 ima_protect_xattr(struct dentry * dentry,const char * xattr_name,const void * xattr_value,size_t xattr_value_len) ima_protect_xattr() argument 785 ima_inode_setxattr(struct mnt_idmap * idmap,struct dentry * dentry,const char * xattr_name,const void * xattr_value,size_t xattr_value_len,int flags) ima_inode_setxattr() argument 827 ima_inode_removexattr(struct mnt_idmap * idmap,struct dentry * dentry,const char * xattr_name) ima_inode_removexattr() argument [all...] |
| /linux/fs/xfs/scrub/ |
| H A D | parent_repair.c | 122 unsigned char *xattr_name; member 192 kvfree(rp->xattr_name); in xrep_parent_teardown() 193 rp->xattr_name = NULL; in xrep_parent_teardown() 1000 args.name = rp->xattr_name; in xrep_parent_insert_xattr() 1007 rp->xattr_name[XATTR_NAME_MAX] = 0; in xrep_parent_insert_xattr() 1009 error = xfblob_load(rp->xattr_blobs, key->name_cookie, rp->xattr_name, in xrep_parent_insert_xattr() 1027 rp->xattr_name[key->namelen] = 0; in xrep_parent_insert_xattr() 1030 rp->xattr_name, key->namelen, key->valuelen); in xrep_parent_insert_xattr() 1508 rp->xattr_name = kvmalloc(XATTR_NAME_MAX + 1, XCHK_GFP_FLAGS); in xrep_parent_setup_scan() 1509 if (!rp->xattr_name) in xrep_parent_setup_scan() [all …]
|
| /linux/fs/smb/server/ |
| H A D | vfs.c | 814 struct dentry *dentry, char *xattr_name) in ksmbd_vfs_xattr_len() argument 816 return vfs_getxattr(idmap, dentry, xattr_name, NULL, 0); in ksmbd_vfs_xattr_len() 830 char *xattr_name, char **xattr_buf) in ksmbd_vfs_getxattr() argument 836 xattr_len = ksmbd_vfs_xattr_len(idmap, dentry, xattr_name); in ksmbd_vfs_getxattr() 844 xattr_len = vfs_getxattr(idmap, dentry, xattr_name, in ksmbd_vfs_getxattr()
|
| /linux/fs/nfs/ |
| H A D | nfs42xdr.c | 503 encode_string(xdr, strlen(arg->xattr_name), arg->xattr_name); in encode_setxattr() 828 encode_getxattr(xdr, args->xattr_name, &hdr); in nfs4_xdr_enc_getxattr() 873 encode_removexattr(xdr, args->xattr_name, &hdr); in nfs4_xdr_enc_removexattr()
|
| H A D | nfs42proc.c | 1380 .xattr_name = name, in _nfs42_proc_removexattr() 1423 .xattr_name = name, in _nfs42_proc_setxattr() 1480 .xattr_name = name, in _nfs42_proc_getxattr()
|
| /linux/include/linux/ |
| H A D | nfs_xdr.h | 1567 const char *xattr_name; member 1583 const char *xattr_name; member 1615 const char *xattr_name; member
|
| /linux/security/ |
| H A D | security.c | 1272 const char **xattr_name, in security_dentry_init_security() argument 1276 xattr_name, lsmctx); in security_dentry_init_security()
|
| /linux/security/selinux/ |
| H A D | hooks.c | 2922 const char **xattr_name, in selinux_dentry_init_security() argument 2935 if (xattr_name) in selinux_dentry_init_security() 2936 *xattr_name = XATTR_NAME_SELINUX; in selinux_dentry_init_security()
|