Searched refs:newcon (Results 1 – 4 of 4) sorted by relevance
/openbmc/linux/kernel/printk/ |
H A D | printk.c | 3292 static int console_call_setup(struct console *newcon, char *options) in console_call_setup() argument 3296 if (!newcon->setup) in console_call_setup() 3301 err = newcon->setup(newcon, options); in console_call_setup() 3316 static int try_enable_preferred_console(struct console *newcon, in try_enable_preferred_console() argument 3327 if (!newcon->match || in try_enable_preferred_console() 3328 newcon->match(newcon, c->name, c->index, c->options) != 0) { in try_enable_preferred_console() 3330 BUILD_BUG_ON(sizeof(c->name) != sizeof(newcon->name)); in try_enable_preferred_console() 3331 if (strcmp(c->name, newcon->name) != 0) in try_enable_preferred_console() 3333 if (newcon->index >= 0 && in try_enable_preferred_console() 3334 newcon->index != c->index) in try_enable_preferred_console() [all …]
|
/openbmc/linux/security/selinux/ |
H A D | selinuxfs.c | 743 char *oldcon = NULL, *newcon = NULL, *taskcon = NULL; in sel_write_validatetrans() local 775 newcon = kzalloc(count + 1, GFP_KERNEL); in sel_write_validatetrans() 776 if (!newcon) in sel_write_validatetrans() 784 if (sscanf(req, "%s %s %hu %s", oldcon, newcon, &tclass, taskcon) != 4) in sel_write_validatetrans() 791 rc = security_context_str_to_sid(newcon, &nsid, GFP_KERNEL); in sel_write_validatetrans() 805 kfree(newcon); in sel_write_validatetrans() 922 char *newcon = NULL; in sel_write_create() local 995 length = security_sid_to_context(newsid, &newcon, &len); in sel_write_create() 1006 memcpy(buf, newcon, len); in sel_write_create() 1009 kfree(newcon); in sel_write_create() [all …]
|
/openbmc/linux/fs/dlm/ |
H A D | lowcomms.c | 981 struct connection *newcon; in accept_from_sock() 1036 newcon = nodeid2con(nodeid, 0); in accept_from_sock() 1037 if (WARN_ON_ONCE(!newcon)) { in accept_from_sock() 1045 down_write(&newcon->sock_lock); in accept_from_sock() 1046 if (newcon->sock) { in accept_from_sock() 1047 struct connection *othercon = newcon->othercon; in accept_from_sock() 1053 up_write(&newcon->sock_lock); in accept_from_sock() 1061 newcon->othercon = othercon; in accept_from_sock() 1081 add_sock(newsock, newcon); in accept_from_sock() 1084 lock_sock(newcon in accept_from_sock() 980 struct connection *newcon; accept_from_sock() local [all...] |
/openbmc/linux/security/selinux/ss/ |
H A D | services.c | 3156 struct context newcon; in security_sid_mls_copy() local 3168 context_init(&newcon); in security_sid_mls_copy() 3196 newcon.user = context1->user; in security_sid_mls_copy() 3197 newcon.role = context1->role; in security_sid_mls_copy() 3198 newcon.type = context1->type; in security_sid_mls_copy() 3199 rc = mls_context_cpy(&newcon, context2); in security_sid_mls_copy() 3204 if (!policydb_context_isvalid(policydb, &newcon)) { in security_sid_mls_copy() 3206 &newcon); in security_sid_mls_copy() 3208 if (!context_struct_to_string(policydb, &newcon, &s, in security_sid_mls_copy() 3225 rc = sidtab_context_to_sid(sidtab, &newcon, new_sid); in security_sid_mls_copy() [all …]
|