Searched refs:classes (Results 1 – 5 of 5) sorted by relevance
/security/ |
D | Kconfig.hardening | 16 This chooses the level of coverage over classes of potentially 25 classes of uninitialized stack variable exploits 32 pattern. This is intended to eliminate all classes
|
D | Kconfig | 173 or are part of the kernel text. This kills entire classes
|
/security/selinux/ss/ |
D | services.c | 3001 char *name = k, **classes = args; in get_classes_callback() local 3004 classes[value] = kstrdup(name, GFP_ATOMIC); in get_classes_callback() 3005 if (!classes[value]) in get_classes_callback() 3011 int security_get_classes(char ***classes, int *nclasses) in security_get_classes() argument 3019 *classes = kcalloc(*nclasses, sizeof(**classes), GFP_ATOMIC); in security_get_classes() 3020 if (!*classes) in security_get_classes() 3024 *classes); in security_get_classes() 3028 kfree((*classes)[i]); in security_get_classes() 3029 kfree(*classes); in security_get_classes()
|
/security/selinux/ |
D | selinuxfs.c | 1699 char **classes; in sel_make_classes() local 1704 rc = security_get_classes(&classes, &nclasses); in sel_make_classes() 1714 class_name_dir = sel_make_dir(class_dir, classes[i], in sel_make_classes() 1722 rc = sel_make_class_dir_entries(classes[i], i + 1, in sel_make_classes() 1730 kfree(classes[i]); in sel_make_classes() 1731 kfree(classes); in sel_make_classes()
|
/security/selinux/include/ |
D | security.h | 211 int security_get_classes(char ***classes, int *nclasses);
|