XATTR_NAME_SELINUX 1234 fs/ceph/xattr.c name = XATTR_NAME_SELINUX; XATTR_NAME_SELINUX 38 security/integrity/evm/evm_main.c {.name = XATTR_NAME_SELINUX}, XATTR_NAME_SELINUX 557 security/selinux/hooks.c rc = __vfs_getxattr(root, root_inode, XATTR_NAME_SELINUX, NULL, 0); XATTR_NAME_SELINUX 1383 security/selinux/hooks.c rc = __vfs_getxattr(dentry, inode, XATTR_NAME_SELINUX, context, len); XATTR_NAME_SELINUX 1388 security/selinux/hooks.c rc = __vfs_getxattr(dentry, inode, XATTR_NAME_SELINUX, NULL, 0); XATTR_NAME_SELINUX 1398 security/selinux/hooks.c rc = __vfs_getxattr(dentry, inode, XATTR_NAME_SELINUX, XATTR_NAME_SELINUX 3149 security/selinux/hooks.c if (strcmp(name, XATTR_NAME_SELINUX)) { XATTR_NAME_SELINUX 3237 security/selinux/hooks.c if (strcmp(name, XATTR_NAME_SELINUX)) { XATTR_NAME_SELINUX 3277 security/selinux/hooks.c if (strcmp(name, XATTR_NAME_SELINUX)) { XATTR_NAME_SELINUX 3412 security/selinux/hooks.c const int len = sizeof(XATTR_NAME_SELINUX); XATTR_NAME_SELINUX 3414 security/selinux/hooks.c memcpy(buffer, XATTR_NAME_SELINUX, len); XATTR_NAME_SELINUX 3450 security/selinux/hooks.c if (strcmp(name, XATTR_NAME_SELINUX) == 0) XATTR_NAME_SELINUX 3469 security/selinux/hooks.c rc = kernfs_xattr_get(kn_dir, XATTR_NAME_SELINUX, NULL, 0); XATTR_NAME_SELINUX 3480 security/selinux/hooks.c rc = kernfs_xattr_get(kn_dir, XATTR_NAME_SELINUX, context, clen); XATTR_NAME_SELINUX 3513 security/selinux/hooks.c rc = kernfs_xattr_set(kn, XATTR_NAME_SELINUX, context, clen, XATTR_NAME_SELINUX 6534 security/selinux/hooks.c return __vfs_setxattr_noperm(dentry, XATTR_NAME_SELINUX, ctx, ctxlen, 0);