Lines Matching defs:NULL

290  * NULL if there was no label to fetch, or an error code.
297 struct smack_known *skp = NULL;
303 if (buffer == NULL)
310 skp = NULL;
367 if (nrp == NULL) {
393 if (nklep == NULL) {
434 struct smk_audit_info ad, *saip = NULL;
532 if (smack_syslog_label != NULL && smack_syslog_label != skp)
737 param->string = NULL;
749 char *arg = NULL;
764 *mnt_opts = NULL;
927 if (isp->smk_task == NULL || isp->smk_task == bsp->smk_task)
941 if (likely(tracer != NULL))
1335 skp = size ? smk_import_entry(value, size) : NULL;
1338 else if (skp == NULL || (check_star &&
1464 isp->smk_task = NULL;
1466 isp->smk_mmap = NULL;
1562 char *label = NULL;
1581 if (sock == NULL || sock->sk == NULL)
1601 if (*buffer == NULL)
1620 if (buffer != NULL && len <= buffer_size)
1780 * @file: contains the file structure for file to map (may be NULL).
1785 * The @file may be NULL, e.g. if mapping anonymous memory.
1805 if (file == NULL)
1812 if (isp->smk_mmap == NULL)
1933 rc = smk_access(skp, tkp, MAY_DELIVER, NULL);
2042 init_task_smack(smack_cred(cred), NULL, NULL);
2338 if (cred == NULL) {
2344 * If the cred isn't NULL we're dealing with some USB IO
2390 if (ssp == NULL)
2403 ssp->smk_packet = NULL;
2460 * Returns the label of the far end or NULL if it's not special.
2468 return NULL;
2480 return NULL;
2510 * Returns the label of the far end or NULL if it's not special.
2523 return NULL;
2527 * If the label is NULL the entry has
2530 if (snp->smk_label == NULL)
2548 return NULL;
2630 if (hkp != NULL) {
2702 if (address == NULL) {
2718 * A NULL address is only used for updating existing
2758 if (spp == NULL)
2787 struct smack_known *skp = NULL;
2802 if (skp != NULL && object != NULL)
2804 if (skp == NULL)
2806 if (object == NULL)
2858 if (value == NULL || size > SMK_LONGLABEL || size == 0)
2886 if (sock == NULL || sock->sk == NULL)
2907 smk_ipv6_port_label(sock, NULL);
2930 if (sock->sk == NULL)
2985 if (sock->sk != NULL && sock->sk->sk_family == PF_INET6) {
3010 if (sock->sk == NULL)
3019 struct smack_known *rsp = NULL;
3025 if (rsp != NULL) {
3451 if (inode == NULL)
3619 skp = NULL;
3625 skp = NULL;
3632 if (final == NULL)
3691 if (cp == NULL)
3721 if (value == NULL || size == 0 || size >= SMK_LONGLABEL)
3750 if (new == NULL)
3913 * Perfectly reasonable for this to be NULL
3915 if (sip == NULL)
3932 if (rsp != NULL)
4015 if (ssp != NULL && ssp->smk_in == &smack_known_star)
4044 if (ip6 == NULL)
4058 if (th != NULL)
4064 if (uh != NULL)
4069 if (dh != NULL)
4081 * Returns smack_known of the secmark or NULL if that won't work.
4086 if (skb == NULL || skb->secmark == 0)
4087 return NULL;
4094 return NULL;
4107 * Returns smack_known of the IP options or NULL if that won't work.
4113 struct socket_smack *ssp = NULL;
4114 struct smack_known *skp = NULL;
4142 struct smack_known *skp = NULL;
4165 if (skp == NULL) {
4167 if (skp == NULL)
4175 ipv4_skb_to_auditdata(skb, &ad.a, NULL);
4197 if (skp == NULL) {
4201 if (skp == NULL)
4208 ipv6_skb_to_auditdata(skb, &ad.a, NULL);
4246 if (ssp->smk_packet != NULL) {
4276 struct socket_smack *ssp = NULL;
4278 struct sock *sk = NULL;
4282 if (skb != NULL) {
4290 if (family == PF_UNSPEC && sock != NULL)
4307 if (sock != NULL)
4310 if (skp != NULL)
4340 if (sk == NULL ||
4394 if (skp == NULL) {
4396 if (skp == NULL)
4404 ipv4_skb_to_auditdata(skb, &ad.a, NULL);
4432 if (hskp == NULL)
4457 ssp->smk_packet = NULL;
4496 key->security = NULL;
4543 if (keyp == NULL)
4549 if (keyp->security == NULL)
4554 if (tkp == NULL)
4577 * May also return 0 (and a NULL buffer pointer) if there is no label.
4585 if (key->security == NULL) {
4586 *_buffer = NULL;
4591 if (copy == NULL)
4614 if (key == NULL)
4620 if (key->security == NULL)
4625 if (tkp == NULL)
4647 * @cred: The credentials of the event source (may be NULL).
4703 *rule = NULL;
4870 if (new_creds == NULL) {
4872 if (new_creds == NULL)