Home
last modified time | relevance | path

Searched refs:classes (Results 1 – 5 of 5) sorted by relevance

/security/
DKconfig.hardening16 This chooses the level of coverage over classes of potentially
25 classes of uninitialized stack variable exploits
32 pattern. This is intended to eliminate all classes
DKconfig173 or are part of the kernel text. This kills entire classes
/security/selinux/ss/
Dservices.c3001 char *name = k, **classes = args; in get_classes_callback() local
3004 classes[value] = kstrdup(name, GFP_ATOMIC); in get_classes_callback()
3005 if (!classes[value]) in get_classes_callback()
3011 int security_get_classes(char ***classes, int *nclasses) in security_get_classes() argument
3019 *classes = kcalloc(*nclasses, sizeof(**classes), GFP_ATOMIC); in security_get_classes()
3020 if (!*classes) in security_get_classes()
3024 *classes); in security_get_classes()
3028 kfree((*classes)[i]); in security_get_classes()
3029 kfree(*classes); in security_get_classes()
/security/selinux/
Dselinuxfs.c1699 char **classes; in sel_make_classes() local
1704 rc = security_get_classes(&classes, &nclasses); in sel_make_classes()
1714 class_name_dir = sel_make_dir(class_dir, classes[i], in sel_make_classes()
1722 rc = sel_make_class_dir_entries(classes[i], i + 1, in sel_make_classes()
1730 kfree(classes[i]); in sel_make_classes()
1731 kfree(classes); in sel_make_classes()
/security/selinux/include/
Dsecurity.h211 int security_get_classes(char ***classes, int *nclasses);