Searched refs:newcon (Results 1 – 5 of 5) sorted by relevance
/linux-4.1.27/kernel/printk/ |
D | printk.c | 2416 void register_console(struct console *newcon) in register_console() argument 2425 if (WARN(bcon == newcon, in register_console() 2434 if (console_drivers && newcon->flags & CON_BOOT) { in register_console() 2439 newcon->name, newcon->index); in register_console() 2457 if (newcon->index < 0) in register_console() 2458 newcon->index = 0; in register_console() 2459 if (newcon->setup == NULL || in register_console() 2460 newcon->setup(newcon, NULL) == 0) { in register_console() 2461 newcon->flags |= CON_ENABLED; in register_console() 2462 if (newcon->device) { in register_console() [all …]
|
/linux-4.1.27/net/tipc/ |
D | server.c | 293 struct tipc_conn *newcon; in tipc_accept_from_sock() local 300 newcon = tipc_alloc_conn(con->server); in tipc_accept_from_sock() 301 if (IS_ERR(newcon)) { in tipc_accept_from_sock() 302 ret = PTR_ERR(newcon); in tipc_accept_from_sock() 307 newcon->rx_action = tipc_receive_from_sock; in tipc_accept_from_sock() 308 tipc_register_callbacks(newsock, newcon); in tipc_accept_from_sock() 311 newcon->usr_data = s->tipc_conn_new(newcon->conid); in tipc_accept_from_sock()
|
/linux-4.1.27/security/selinux/ |
D | selinuxfs.c | 764 char *newcon = NULL; in sel_write_create() local 837 length = security_sid_to_context(newsid, &newcon, &len); in sel_write_create() 848 memcpy(buf, newcon, len); in sel_write_create() 851 kfree(newcon); in sel_write_create() 864 char *newcon = NULL; in sel_write_relabel() local 899 length = security_sid_to_context(newsid, &newcon, &len); in sel_write_relabel() 907 memcpy(buf, newcon, len); in sel_write_relabel() 910 kfree(newcon); in sel_write_relabel() 921 char *newcon; in sel_write_user() local 954 rc = security_sid_to_context(sids[i], &newcon, &len); in sel_write_user() [all …]
|
/linux-4.1.27/fs/dlm/ |
D | lowcomms.c | 913 struct connection *newcon; in tcp_accept_from_sock() local 969 newcon = nodeid2con(nodeid, GFP_NOFS); in tcp_accept_from_sock() 970 if (!newcon) { in tcp_accept_from_sock() 974 mutex_lock_nested(&newcon->sock_mutex, 1); in tcp_accept_from_sock() 975 if (newcon->sock) { in tcp_accept_from_sock() 976 struct connection *othercon = newcon->othercon; in tcp_accept_from_sock() 982 mutex_unlock(&newcon->sock_mutex); in tcp_accept_from_sock() 994 newcon->othercon = othercon; in tcp_accept_from_sock() 1003 mutex_unlock(&newcon->sock_mutex); in tcp_accept_from_sock() 1008 newsock->sk->sk_user_data = newcon; in tcp_accept_from_sock() [all …]
|
/linux-4.1.27/security/selinux/ss/ |
D | services.c | 2567 struct context newcon; in security_sid_mls_copy() local 2578 context_init(&newcon); in security_sid_mls_copy() 2598 newcon.user = context1->user; in security_sid_mls_copy() 2599 newcon.role = context1->role; in security_sid_mls_copy() 2600 newcon.type = context1->type; in security_sid_mls_copy() 2601 rc = mls_context_cpy(&newcon, context2); in security_sid_mls_copy() 2606 if (!policydb_context_isvalid(&policydb, &newcon)) { in security_sid_mls_copy() 2607 rc = convert_context_handle_invalid_context(&newcon); in security_sid_mls_copy() 2609 if (!context_struct_to_string(&newcon, &s, &len)) { in security_sid_mls_copy() 2620 rc = sidtab_context_to_sid(&sidtab, &newcon, new_sid); in security_sid_mls_copy() [all …]
|