Home
last modified time | relevance | path

Searched refs:classes (Results 1 – 5 of 5) sorted by relevance

/security/
DKconfig.hardening51 This chooses the level of coverage over classes of potentially
60 classes of uninitialized stack variable exploits
69 a __user attribute. This can prevent some classes of
82 explicitly initialized. This can prevent most classes
100 initialized. This is intended to eliminate all classes
115 all classes of uninitialized stack variable exploits and
133 classes of uninitialized stack variable exploits and
DKconfig163 or are part of the kernel text. This kills entire classes
/security/selinux/ss/
Dservices.c3214 char *name = k, **classes = args; in get_classes_callback() local
3217 classes[value] = kstrdup(name, GFP_ATOMIC); in get_classes_callback()
3218 if (!classes[value]) in get_classes_callback()
3225 char ***classes, int *nclasses) in security_get_classes() argument
3232 *classes = NULL; in security_get_classes()
3240 *classes = kcalloc(*nclasses, sizeof(**classes), GFP_ATOMIC); in security_get_classes()
3241 if (!*classes) in security_get_classes()
3245 *classes); in security_get_classes()
3249 kfree((*classes)[i]); in security_get_classes()
3250 kfree(*classes); in security_get_classes()
/security/selinux/
Dselinuxfs.c1856 char **classes; in sel_make_classes() local
1861 rc = security_get_classes(fsi->state, &classes, &nclasses); in sel_make_classes()
1871 class_name_dir = sel_make_dir(fsi->class_dir, classes[i], in sel_make_classes()
1879 rc = sel_make_class_dir_entries(classes[i], i + 1, in sel_make_classes()
1887 kfree(classes[i]); in sel_make_classes()
1888 kfree(classes); in sel_make_classes()
/security/selinux/include/
Dsecurity.h334 char ***classes, int *nclasses);