XATTR_NAME_SELINUX 1234 fs/ceph/xattr.c 	name = XATTR_NAME_SELINUX;
XATTR_NAME_SELINUX   38 security/integrity/evm/evm_main.c 	{.name = XATTR_NAME_SELINUX},
XATTR_NAME_SELINUX  557 security/selinux/hooks.c 		rc = __vfs_getxattr(root, root_inode, XATTR_NAME_SELINUX, NULL, 0);
XATTR_NAME_SELINUX 1383 security/selinux/hooks.c 	rc = __vfs_getxattr(dentry, inode, XATTR_NAME_SELINUX, context, len);
XATTR_NAME_SELINUX 1388 security/selinux/hooks.c 		rc = __vfs_getxattr(dentry, inode, XATTR_NAME_SELINUX, NULL, 0);
XATTR_NAME_SELINUX 1398 security/selinux/hooks.c 		rc = __vfs_getxattr(dentry, inode, XATTR_NAME_SELINUX,
XATTR_NAME_SELINUX 3149 security/selinux/hooks.c 	if (strcmp(name, XATTR_NAME_SELINUX)) {
XATTR_NAME_SELINUX 3237 security/selinux/hooks.c 	if (strcmp(name, XATTR_NAME_SELINUX)) {
XATTR_NAME_SELINUX 3277 security/selinux/hooks.c 	if (strcmp(name, XATTR_NAME_SELINUX)) {
XATTR_NAME_SELINUX 3412 security/selinux/hooks.c 	const int len = sizeof(XATTR_NAME_SELINUX);
XATTR_NAME_SELINUX 3414 security/selinux/hooks.c 		memcpy(buffer, XATTR_NAME_SELINUX, len);
XATTR_NAME_SELINUX 3450 security/selinux/hooks.c 	if (strcmp(name, XATTR_NAME_SELINUX) == 0)
XATTR_NAME_SELINUX 3469 security/selinux/hooks.c 	rc = kernfs_xattr_get(kn_dir, XATTR_NAME_SELINUX, NULL, 0);
XATTR_NAME_SELINUX 3480 security/selinux/hooks.c 	rc = kernfs_xattr_get(kn_dir, XATTR_NAME_SELINUX, context, clen);
XATTR_NAME_SELINUX 3513 security/selinux/hooks.c 	rc = kernfs_xattr_set(kn, XATTR_NAME_SELINUX, context, clen,
XATTR_NAME_SELINUX 6534 security/selinux/hooks.c 	return __vfs_setxattr_noperm(dentry, XATTR_NAME_SELINUX, ctx, ctxlen, 0);