Home
last modified time | relevance | path

Searched refs:newcon (Results 1 – 5 of 5) sorted by relevance

/linux-4.4.14/kernel/printk/
Dprintk.c2486 void register_console(struct console *newcon) in register_console() argument
2495 if (WARN(bcon == newcon, in register_console()
2504 if (console_drivers && newcon->flags & CON_BOOT) { in register_console()
2509 newcon->name, newcon->index); in register_console()
2527 if (newcon->index < 0) in register_console()
2528 newcon->index = 0; in register_console()
2529 if (newcon->setup == NULL || in register_console()
2530 newcon->setup(newcon, NULL) == 0) { in register_console()
2531 newcon->flags |= CON_ENABLED; in register_console()
2532 if (newcon->device) { in register_console()
[all …]
/linux-4.4.14/fs/dlm/
Dlowcomms.c680 struct connection *newcon; in tcp_accept_from_sock() local
736 newcon = nodeid2con(nodeid, GFP_NOFS); in tcp_accept_from_sock()
737 if (!newcon) { in tcp_accept_from_sock()
741 mutex_lock_nested(&newcon->sock_mutex, 1); in tcp_accept_from_sock()
742 if (newcon->sock) { in tcp_accept_from_sock()
743 struct connection *othercon = newcon->othercon; in tcp_accept_from_sock()
749 mutex_unlock(&newcon->sock_mutex); in tcp_accept_from_sock()
761 newcon->othercon = othercon; in tcp_accept_from_sock()
770 mutex_unlock(&newcon->sock_mutex); in tcp_accept_from_sock()
775 newsock->sk->sk_user_data = newcon; in tcp_accept_from_sock()
[all …]
/linux-4.4.14/net/tipc/
Dserver.c293 struct tipc_conn *newcon; in tipc_accept_from_sock() local
300 newcon = tipc_alloc_conn(con->server); in tipc_accept_from_sock()
301 if (IS_ERR(newcon)) { in tipc_accept_from_sock()
302 ret = PTR_ERR(newcon); in tipc_accept_from_sock()
307 newcon->rx_action = tipc_receive_from_sock; in tipc_accept_from_sock()
308 tipc_register_callbacks(newsock, newcon); in tipc_accept_from_sock()
311 newcon->usr_data = s->tipc_conn_new(newcon->conid); in tipc_accept_from_sock()
312 if (!newcon->usr_data) { in tipc_accept_from_sock()
/linux-4.4.14/security/selinux/
Dselinuxfs.c762 char *newcon = NULL; in sel_write_create() local
833 length = security_sid_to_context(newsid, &newcon, &len); in sel_write_create()
844 memcpy(buf, newcon, len); in sel_write_create()
847 kfree(newcon); in sel_write_create()
860 char *newcon = NULL; in sel_write_relabel() local
893 length = security_sid_to_context(newsid, &newcon, &len); in sel_write_relabel()
901 memcpy(buf, newcon, len); in sel_write_relabel()
904 kfree(newcon); in sel_write_relabel()
915 char *newcon; in sel_write_user() local
948 rc = security_sid_to_context(sids[i], &newcon, &len); in sel_write_user()
[all …]
/linux-4.4.14/security/selinux/ss/
Dservices.c2736 struct context newcon; in security_sid_mls_copy() local
2747 context_init(&newcon); in security_sid_mls_copy()
2767 newcon.user = context1->user; in security_sid_mls_copy()
2768 newcon.role = context1->role; in security_sid_mls_copy()
2769 newcon.type = context1->type; in security_sid_mls_copy()
2770 rc = mls_context_cpy(&newcon, context2); in security_sid_mls_copy()
2775 if (!policydb_context_isvalid(&policydb, &newcon)) { in security_sid_mls_copy()
2776 rc = convert_context_handle_invalid_context(&newcon); in security_sid_mls_copy()
2778 if (!context_struct_to_string(&newcon, &s, &len)) { in security_sid_mls_copy()
2789 rc = sidtab_context_to_sid(&sidtab, &newcon, new_sid); in security_sid_mls_copy()
[all …]