Searched refs:new_role (Results 1 – 6 of 6) sorted by relevance
| /Linux-v5.4/security/selinux/ss/ |
| D | policydb.h | 87 u32 new_role; /* new role */ member 104 u32 new_role; /* new role */ member
|
| D | policydb.c | 2428 tr->new_role = le32_to_cpu(buf[2]); in policydb_read() 2441 !policydb_role_isvalid(p, tr->new_role)) in policydb_read() 2466 ra->new_role = le32_to_cpu(buf[1]); in policydb_read() 2468 !policydb_role_isvalid(p, ra->new_role)) in policydb_read() 2666 buf[2] = cpu_to_le32(tr->new_role); in role_trans_write() 2697 buf[1] = cpu_to_le32(ra->new_role); in role_allow_write()
|
| D | services.c | 702 tcontext->role == ra->new_role) in context_struct_compute_av() 1785 newcontext.role = roletr->new_role; in security_compute_sid()
|
| /Linux-v5.4/arch/x86/kvm/ |
| D | mmu.c | 4347 union kvm_mmu_page_role new_role) in cached_root_available() argument 4361 new_role.word == page_header(root.hpa)->role.word) in cached_root_available() 4372 union kvm_mmu_page_role new_role, in fast_cr3_switch() argument 4387 if (cached_root_available(vcpu, new_cr3, new_role)) { in fast_cr3_switch() 4421 union kvm_mmu_page_role new_role, in __kvm_mmu_new_cr3() argument 4424 if (!fast_cr3_switch(vcpu, new_cr3, new_role, skip_tlb_flush)) in __kvm_mmu_new_cr3() 5003 union kvm_mmu_role new_role = in init_kvm_tdp_mmu() local 5006 new_role.base.word &= mmu_base_role_mask.word; in init_kvm_tdp_mmu() 5007 if (new_role.as_u64 == context->mmu_role.as_u64) in init_kvm_tdp_mmu() 5010 context->mmu_role.as_u64 = new_role.as_u64; in init_kvm_tdp_mmu() [all …]
|
| /Linux-v5.4/drivers/block/drbd/ |
| D | drbd_nl.c | 616 drbd_set_role(struct drbd_device *const device, enum drbd_role new_role, int force) in drbd_set_role() argument 627 if (new_role == R_PRIMARY) { in drbd_set_role() 641 val.i = 0; val.role = new_role; in drbd_set_role() 719 if (new_role == R_SECONDARY) { in drbd_set_role() 753 set_disk_ro(device->vdisk, new_role == R_SECONDARY); in drbd_set_role()
|
| D | drbd_int.h | 1482 enum drbd_role new_role,
|