Searched refs:newcon (Results 1 – 4 of 4) sorted by relevance
/Linux-v4.19/kernel/printk/ |
D | printk.c | 2574 void register_console(struct console *newcon) in register_console() argument 2584 if (WARN(bcon == newcon, in register_console() 2593 if (console_drivers && newcon->flags & CON_BOOT) { in register_console() 2598 newcon->name, newcon->index); in register_console() 2616 if (newcon->index < 0) in register_console() 2617 newcon->index = 0; in register_console() 2618 if (newcon->setup == NULL || in register_console() 2619 newcon->setup(newcon, NULL) == 0) { in register_console() 2620 newcon->flags |= CON_ENABLED; in register_console() 2621 if (newcon->device) { in register_console() [all …]
|
/Linux-v4.19/fs/dlm/ |
D | lowcomms.c | 736 struct connection *newcon; in tcp_accept_from_sock() local 784 newcon = nodeid2con(nodeid, GFP_NOFS); in tcp_accept_from_sock() 785 if (!newcon) { in tcp_accept_from_sock() 789 mutex_lock_nested(&newcon->sock_mutex, 1); in tcp_accept_from_sock() 790 if (newcon->sock) { in tcp_accept_from_sock() 791 struct connection *othercon = newcon->othercon; in tcp_accept_from_sock() 797 mutex_unlock(&newcon->sock_mutex); in tcp_accept_from_sock() 812 newcon->othercon = othercon; in tcp_accept_from_sock() 821 mutex_unlock(&newcon->sock_mutex); in tcp_accept_from_sock() 826 newcon->rx_action = receive_from_sock; in tcp_accept_from_sock() [all …]
|
/Linux-v4.19/security/selinux/ |
D | selinuxfs.c | 688 char *oldcon = NULL, *newcon = NULL, *taskcon = NULL; in sel_write_validatetrans() local 721 newcon = kzalloc(count + 1, GFP_KERNEL); in sel_write_validatetrans() 722 if (!newcon) in sel_write_validatetrans() 730 if (sscanf(req, "%s %s %hu %s", oldcon, newcon, &tclass, taskcon) != 4) in sel_write_validatetrans() 737 rc = security_context_str_to_sid(state, newcon, &nsid, GFP_KERNEL); in sel_write_validatetrans() 751 kfree(newcon); in sel_write_validatetrans() 873 char *newcon = NULL; in sel_write_create() local 947 length = security_sid_to_context(state, newsid, &newcon, &len); in sel_write_create() 958 memcpy(buf, newcon, len); in sel_write_create() 961 kfree(newcon); in sel_write_create() [all …]
|
/Linux-v4.19/security/selinux/ss/ |
D | services.c | 2983 struct context newcon; in security_sid_mls_copy() local 2994 context_init(&newcon); in security_sid_mls_copy() 3014 newcon.user = context1->user; in security_sid_mls_copy() 3015 newcon.role = context1->role; in security_sid_mls_copy() 3016 newcon.type = context1->type; in security_sid_mls_copy() 3017 rc = mls_context_cpy(&newcon, context2); in security_sid_mls_copy() 3022 if (!policydb_context_isvalid(policydb, &newcon)) { in security_sid_mls_copy() 3023 rc = convert_context_handle_invalid_context(state, &newcon); in security_sid_mls_copy() 3025 if (!context_struct_to_string(policydb, &newcon, &s, in security_sid_mls_copy() 3037 rc = sidtab_context_to_sid(sidtab, &newcon, new_sid); in security_sid_mls_copy() [all …]
|