Searched refs:classes (Results 1 – 5 of 5) sorted by relevance
/security/ |
D | Kconfig.hardening | 51 This chooses the level of coverage over classes of potentially 60 classes of uninitialized stack variable exploits 69 a __user attribute. This can prevent some classes of 82 explicitly initialized. This can prevent most classes 100 initialized. This is intended to eliminate all classes 115 all classes of uninitialized stack variable exploits and 133 classes of uninitialized stack variable exploits and
|
D | Kconfig | 163 or are part of the kernel text. This kills entire classes
|
/security/selinux/ss/ |
D | services.c | 3214 char *name = k, **classes = args; in get_classes_callback() local 3217 classes[value] = kstrdup(name, GFP_ATOMIC); in get_classes_callback() 3218 if (!classes[value]) in get_classes_callback() 3225 char ***classes, int *nclasses) in security_get_classes() argument 3232 *classes = NULL; in security_get_classes() 3240 *classes = kcalloc(*nclasses, sizeof(**classes), GFP_ATOMIC); in security_get_classes() 3241 if (!*classes) in security_get_classes() 3245 *classes); in security_get_classes() 3249 kfree((*classes)[i]); in security_get_classes() 3250 kfree(*classes); in security_get_classes()
|
/security/selinux/ |
D | selinuxfs.c | 1856 char **classes; in sel_make_classes() local 1861 rc = security_get_classes(fsi->state, &classes, &nclasses); in sel_make_classes() 1871 class_name_dir = sel_make_dir(fsi->class_dir, classes[i], in sel_make_classes() 1879 rc = sel_make_class_dir_entries(classes[i], i + 1, in sel_make_classes() 1887 kfree(classes[i]); in sel_make_classes() 1888 kfree(classes); in sel_make_classes()
|
/security/selinux/include/ |
D | security.h | 334 char ***classes, int *nclasses);
|