/kernel/linux/linux-5.10/kernel/printk/ |
H A D | printk.c | 2696 static int try_enable_new_console(struct console *newcon, bool user_specified) in try_enable_new_console() argument 2706 if (!newcon->match || in try_enable_new_console() 2707 newcon->match(newcon, c->name, c->index, c->options) != 0) { in try_enable_new_console() 2709 BUILD_BUG_ON(sizeof(c->name) != sizeof(newcon->name)); in try_enable_new_console() 2710 if (strcmp(c->name, newcon->name) != 0) in try_enable_new_console() 2712 if (newcon->index >= 0 && in try_enable_new_console() 2713 newcon->index != c->index) in try_enable_new_console() 2715 if (newcon->index < 0) in try_enable_new_console() 2716 newcon in try_enable_new_console() 2763 register_console(struct console *newcon) register_console() argument [all...] |
/kernel/linux/linux-6.6/kernel/printk/ |
H A D | printk.c | 3287 static int console_call_setup(struct console *newcon, char *options) in console_call_setup() argument 3291 if (!newcon->setup) in console_call_setup() 3296 err = newcon->setup(newcon, options); in console_call_setup() 3311 static int try_enable_preferred_console(struct console *newcon, in try_enable_preferred_console() argument 3322 if (!newcon->match || in try_enable_preferred_console() 3323 newcon->match(newcon, c->name, c->index, c->options) != 0) { in try_enable_preferred_console() 3325 BUILD_BUG_ON(sizeof(c->name) != sizeof(newcon->name)); in try_enable_preferred_console() 3326 if (strcmp(c->name, newcon in try_enable_preferred_console() 3359 try_enable_default_console(struct console *newcon) try_enable_default_console() argument 3378 console_init_seq(struct console *newcon, bool bootcon_registered) console_init_seq() argument 3463 register_console(struct console *newcon) register_console() argument [all...] |
/kernel/linux/linux-5.10/security/selinux/ |
H A D | selinuxfs.c | 780 char *oldcon = NULL, *newcon = NULL, *taskcon = NULL; in sel_write_validatetrans() local 813 newcon = kzalloc(count + 1, GFP_KERNEL); in sel_write_validatetrans() 814 if (!newcon) in sel_write_validatetrans() 822 if (sscanf(req, "%s %s %hu %s", oldcon, newcon, &tclass, taskcon) != 4) in sel_write_validatetrans() 829 rc = security_context_str_to_sid(state, newcon, &nsid, GFP_KERNEL); in sel_write_validatetrans() 843 kfree(newcon); in sel_write_validatetrans() 965 char *newcon = NULL; in sel_write_create() local 1039 length = security_sid_to_context(state, newsid, &newcon, &len); in sel_write_create() 1050 memcpy(buf, newcon, len); in sel_write_create() 1053 kfree(newcon); in sel_write_create() 1068 char *newcon = NULL; sel_write_relabel() local 1128 char *newcon; sel_write_user() local 1194 char *newcon = NULL; sel_write_member() local [all...] |
/kernel/linux/linux-6.6/security/selinux/ |
H A D | selinuxfs.c | 741 char *oldcon = NULL, *newcon = NULL, *taskcon = NULL; in sel_write_validatetrans() local 773 newcon = kzalloc(count + 1, GFP_KERNEL); in sel_write_validatetrans() 774 if (!newcon) in sel_write_validatetrans() 782 if (sscanf(req, "%s %s %hu %s", oldcon, newcon, &tclass, taskcon) != 4) in sel_write_validatetrans() 789 rc = security_context_str_to_sid(newcon, &nsid, GFP_KERNEL); in sel_write_validatetrans() 803 kfree(newcon); in sel_write_validatetrans() 920 char *newcon = NULL; in sel_write_create() local 993 length = security_sid_to_context(newsid, &newcon, &len); in sel_write_create() 1004 memcpy(buf, newcon, len); in sel_write_create() 1007 kfree(newcon); in sel_write_create() 1020 char *newcon = NULL; sel_write_relabel() local 1077 char *newcon; sel_write_user() local 1140 char *newcon = NULL; sel_write_member() local [all...] |
/kernel/linux/linux-5.10/fs/dlm/ |
H A D | lowcomms.c | 773 struct connection *newcon; in accept_from_sock() local 822 newcon = nodeid2con(nodeid, GFP_NOFS); in accept_from_sock() 823 if (!newcon) { in accept_from_sock() 827 mutex_lock_nested(&newcon->sock_mutex, 1); in accept_from_sock() 828 if (newcon->sock) { in accept_from_sock() 829 struct connection *othercon = newcon->othercon; in accept_from_sock() 835 mutex_unlock(&newcon->sock_mutex); in accept_from_sock() 843 mutex_unlock(&newcon->sock_mutex); in accept_from_sock() 865 newcon->othercon = othercon; in accept_from_sock() 871 newcon in accept_from_sock() [all...] |
/kernel/linux/linux-6.6/fs/dlm/ |
H A D | lowcomms.c | 980 struct connection *newcon; in accept_from_sock() local 1035 newcon = nodeid2con(nodeid, 0); in accept_from_sock() 1036 if (WARN_ON_ONCE(!newcon)) { in accept_from_sock() 1044 down_write(&newcon->sock_lock); in accept_from_sock() 1045 if (newcon->sock) { in accept_from_sock() 1046 struct connection *othercon = newcon->othercon; in accept_from_sock() 1052 up_write(&newcon->sock_lock); in accept_from_sock() 1060 newcon->othercon = othercon; in accept_from_sock() 1080 add_sock(newsock, newcon); in accept_from_sock() 1083 lock_sock(newcon in accept_from_sock() [all...] |
/kernel/linux/linux-5.10/security/selinux/ss/ |
H A D | services.c | 3198 struct context newcon; in security_sid_mls_copy() local 3210 context_init(&newcon); in security_sid_mls_copy() 3238 newcon.user = context1->user; in security_sid_mls_copy() 3239 newcon.role = context1->role; in security_sid_mls_copy() 3240 newcon.type = context1->type; in security_sid_mls_copy() 3241 rc = mls_context_cpy(&newcon, context2); in security_sid_mls_copy() 3246 if (!policydb_context_isvalid(policydb, &newcon)) { in security_sid_mls_copy() 3248 &newcon); in security_sid_mls_copy() 3250 if (!context_struct_to_string(policydb, &newcon, &s, in security_sid_mls_copy() 3267 rc = sidtab_context_to_sid(sidtab, &newcon, new_si in security_sid_mls_copy() [all...] |
/kernel/linux/linux-6.6/security/selinux/ss/ |
H A D | services.c | 3152 struct context newcon; in security_sid_mls_copy() local 3164 context_init(&newcon); in security_sid_mls_copy() 3192 newcon.user = context1->user; in security_sid_mls_copy() 3193 newcon.role = context1->role; in security_sid_mls_copy() 3194 newcon.type = context1->type; in security_sid_mls_copy() 3195 rc = mls_context_cpy(&newcon, context2); in security_sid_mls_copy() 3200 if (!policydb_context_isvalid(policydb, &newcon)) { in security_sid_mls_copy() 3202 &newcon); in security_sid_mls_copy() 3204 if (!context_struct_to_string(policydb, &newcon, &s, in security_sid_mls_copy() 3221 rc = sidtab_context_to_sid(sidtab, &newcon, new_si in security_sid_mls_copy() [all...] |