Searched refs:newcon (Results 1 – 5 of 5) sorted by relevance
/linux-4.4.14/kernel/printk/ |
D | printk.c | 2486 void register_console(struct console *newcon) in register_console() argument 2495 if (WARN(bcon == newcon, in register_console() 2504 if (console_drivers && newcon->flags & CON_BOOT) { in register_console() 2509 newcon->name, newcon->index); in register_console() 2527 if (newcon->index < 0) in register_console() 2528 newcon->index = 0; in register_console() 2529 if (newcon->setup == NULL || in register_console() 2530 newcon->setup(newcon, NULL) == 0) { in register_console() 2531 newcon->flags |= CON_ENABLED; in register_console() 2532 if (newcon->device) { in register_console() [all …]
|
/linux-4.4.14/fs/dlm/ |
D | lowcomms.c | 680 struct connection *newcon; in tcp_accept_from_sock() local 736 newcon = nodeid2con(nodeid, GFP_NOFS); in tcp_accept_from_sock() 737 if (!newcon) { in tcp_accept_from_sock() 741 mutex_lock_nested(&newcon->sock_mutex, 1); in tcp_accept_from_sock() 742 if (newcon->sock) { in tcp_accept_from_sock() 743 struct connection *othercon = newcon->othercon; in tcp_accept_from_sock() 749 mutex_unlock(&newcon->sock_mutex); in tcp_accept_from_sock() 761 newcon->othercon = othercon; in tcp_accept_from_sock() 770 mutex_unlock(&newcon->sock_mutex); in tcp_accept_from_sock() 775 newsock->sk->sk_user_data = newcon; in tcp_accept_from_sock() [all …]
|
/linux-4.4.14/net/tipc/ |
D | server.c | 293 struct tipc_conn *newcon; in tipc_accept_from_sock() local 300 newcon = tipc_alloc_conn(con->server); in tipc_accept_from_sock() 301 if (IS_ERR(newcon)) { in tipc_accept_from_sock() 302 ret = PTR_ERR(newcon); in tipc_accept_from_sock() 307 newcon->rx_action = tipc_receive_from_sock; in tipc_accept_from_sock() 308 tipc_register_callbacks(newsock, newcon); in tipc_accept_from_sock() 311 newcon->usr_data = s->tipc_conn_new(newcon->conid); in tipc_accept_from_sock() 312 if (!newcon->usr_data) { in tipc_accept_from_sock()
|
/linux-4.4.14/security/selinux/ |
D | selinuxfs.c | 762 char *newcon = NULL; in sel_write_create() local 833 length = security_sid_to_context(newsid, &newcon, &len); in sel_write_create() 844 memcpy(buf, newcon, len); in sel_write_create() 847 kfree(newcon); in sel_write_create() 860 char *newcon = NULL; in sel_write_relabel() local 893 length = security_sid_to_context(newsid, &newcon, &len); in sel_write_relabel() 901 memcpy(buf, newcon, len); in sel_write_relabel() 904 kfree(newcon); in sel_write_relabel() 915 char *newcon; in sel_write_user() local 948 rc = security_sid_to_context(sids[i], &newcon, &len); in sel_write_user() [all …]
|
/linux-4.4.14/security/selinux/ss/ |
D | services.c | 2736 struct context newcon; in security_sid_mls_copy() local 2747 context_init(&newcon); in security_sid_mls_copy() 2767 newcon.user = context1->user; in security_sid_mls_copy() 2768 newcon.role = context1->role; in security_sid_mls_copy() 2769 newcon.type = context1->type; in security_sid_mls_copy() 2770 rc = mls_context_cpy(&newcon, context2); in security_sid_mls_copy() 2775 if (!policydb_context_isvalid(&policydb, &newcon)) { in security_sid_mls_copy() 2776 rc = convert_context_handle_invalid_context(&newcon); in security_sid_mls_copy() 2778 if (!context_struct_to_string(&newcon, &s, &len)) { in security_sid_mls_copy() 2789 rc = sidtab_context_to_sid(&sidtab, &newcon, new_sid); in security_sid_mls_copy() [all …]
|