| /third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/opt/ |
| H A D | ir_context.cpp | 233 i, [&work_list, to_kill, &seen](Instruction* user) { in CollectNonSemanticTree() 234 if (user->IsNonSemanticInstruction() && seen.insert(user).second) { in CollectNonSemanticTree() 235 work_list.push_back(user); in CollectNonSemanticTree() 236 to_kill->insert(user); in CollectNonSemanticTree() 272 before, [&predicate, &uses_to_update](Instruction* user, uint32_t index) { in ReplaceAllUsesWithPredicate() 273 if (predicate(user)) { in ReplaceAllUsesWithPredicate() 274 uses_to_update.emplace_back(user, index); in ReplaceAllUsesWithPredicate() 280 Instruction* user = p.first; in ReplaceAllUsesWithPredicate() local 282 if (prev == nullptr || prev != user) { in ReplaceAllUsesWithPredicate() [all...] |
| /kernel/linux/linux-5.10/arch/um/drivers/ |
| H A D | slip_kern.c | 23 spri = (struct slip_data *) private->user; in slip_init() 50 (struct slip_data *) &lp->user); in slip_read() 56 (struct slip_data *) &lp->user); in slip_write() 81 .user = &slip_user_info,
|
| /kernel/linux/linux-6.6/arch/um/drivers/ |
| H A D | slip_kern.c | 23 spri = (struct slip_data *) private->user; in slip_init() 50 (struct slip_data *) &lp->user); in slip_read() 56 (struct slip_data *) &lp->user); in slip_write() 81 .user = &slip_user_info,
|
| /third_party/curl/lib/ |
| H A D | llist.c | 96 void *user) in Curl_llist_remove() 130 list->dtor(user, ptr); in Curl_llist_remove() 134 Curl_llist_destroy(struct Curl_llist *list, void *user) in Curl_llist_destroy() argument 138 Curl_llist_remove(list, list->tail, user); in Curl_llist_destroy() 95 Curl_llist_remove(struct Curl_llist *list, struct Curl_llist_element *e, void *user) Curl_llist_remove() argument
|
| /third_party/ltp/testcases/kernel/syscalls/setsockopt/ |
| H A D | setsockopt08.c | 23 * the user specified ->u.user.target_size, which will be considered 26 * ->targetsize: if OTOH the user specified ->u.user.target_size is 65 * This code is based on the premise that the user sets the given 66 * ->u.user.match_size or ->u.user.target_size consistent to the 71 * independent of the actual values of ->u.user.match_size or 72 * ->u.user.target_size and the result ends up getting layed out with proper 121 xt_entry_match->u.user in run() [all...] |
| /third_party/selinux/libselinux/utils/ |
| H A D | getconlist.c | 14 fprintf(stderr, "usage: %s [-l level] user [context]\n", name); in usage() 23 char *user = NULL, *level = NULL; in main() local 53 user = argv[optind]; in main() 74 get_ordered_context_list_with_level(user, level, in main() 77 ret = get_ordered_context_list(user, cur_context, &list); in main()
|
| /kernel/linux/common_modules/tzdriver/tlogger/ |
| H A D | log_cfg_api.h | 27 void get_log_chown(uid_t *user, gid_t *group); 61 static inline void get_log_chown(const uid_t *user, const gid_t *group) in get_log_chown() argument 63 (void)user; in get_log_chown()
|
| /kernel/linux/linux-6.6/drivers/crypto/ccp/ |
| H A D | dbc.h | 33 struct dbc_user_nonce user; member 38 struct dbc_user_setuid user; member 43 struct dbc_user_param user; member
|
| /third_party/musl/Benchmark/musl/ |
| H A D | libc_grp.cpp | 30 const char *user = "root"; in Bm_function_Getgrouplist() local 31 struct passwd *pw = getpwnam(user); in Bm_function_Getgrouplist() 43 benchmark::DoNotOptimize(getgrouplist(user, pw->pw_gid, groups, &ngroups)); in Bm_function_Getgrouplist()
|
| /third_party/skia/third_party/externals/spirv-tools/source/val/ |
| H A D | validate_small_type_uses.cpp | 37 const auto* user = use.first; in ValidateSmallTypeUses() local 38 switch (user->opcode()) { in ValidateSmallTypeUses() 48 return _.diag(SPV_ERROR_INVALID_ID, user) in ValidateSmallTypeUses()
|
| /third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/val/ |
| H A D | validate_small_type_uses.cpp | 37 const auto* user = use.first; in ValidateSmallTypeUses() local 38 switch (user->opcode()) { in ValidateSmallTypeUses() 48 return _.diag(SPV_ERROR_INVALID_ID, user) in ValidateSmallTypeUses()
|
| /third_party/spirv-tools/source/val/ |
| H A D | validate_small_type_uses.cpp | 37 const auto* user = use.first; in ValidateSmallTypeUses() local 38 switch (user->opcode()) { in ValidateSmallTypeUses() 48 return _.diag(SPV_ERROR_INVALID_ID, user) in ValidateSmallTypeUses()
|
| /third_party/libwebsockets/lib/misc/ |
| H A D | dir.c | 115 lws_dir(const char *dirpath, void *user, lws_dir_callback_function cb) in lws_dir() argument 172 if (cb(dirpath, user, &lde)) { in lws_dir() 217 lws_dir_glob_cb(const char *dirpath, void *user, struct lws_dir_entry *lde) in lws_dir_glob_cb() argument 219 lws_dir_glob_t *filter = (lws_dir_glob_t*)user; in lws_dir_glob_cb() 231 filter->cb(filter->user, path); in lws_dir_glob_cb() 238 lws_dir_rm_rf_cb(const char *dirpath, void *user, struct lws_dir_entry *lde) in lws_dir_rm_rf_cb() argument 298 lws_plugins_dir_cb(const char *dirpath, void *user, struct lws_dir_entry *lde) in lws_plugins_dir_cb() argument 300 struct lws_plugins_args *pa = (struct lws_plugins_args *)user; in lws_plugins_dir_cb()
|
| /third_party/mbedtls/library/ |
| H A D | psa_crypto_pake.c | 151 /* The only two JPAKE user/peer identifiers supported in built-in implementation. */ 160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local 190 user = mbedtls_calloc(1, user_len); in mbedtls_psa_pake_setup() 191 if (user == NULL) { in mbedtls_psa_pake_setup() 208 status = psa_crypto_driver_pake_get_user(inputs, user, in mbedtls_psa_pake_setup() 240 if (memcmp(user, jpake_client_id, actual_user_len) == 0 && in mbedtls_psa_pake_setup() 244 if (memcmp(user, jpake_server_id, actual_user_len) == 0 && in mbedtls_psa_pake_setup() 260 /* Role has been set, release user/peer buffers. */ in mbedtls_psa_pake_setup() 261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup() 272 mbedtls_free(user); mbedtls_fre in mbedtls_psa_pake_setup() [all...] |
| /third_party/python/Lib/ |
| H A D | poplib.py | 58 USER name user(name) 82 NB: the POP protocol locks the mailbox from user 203 def user(self, user): member in POP3 204 """Send user name, return response 208 return self._shortcmd('USER %s' % user) 311 def rpop(self, user): 313 return self._shortcmd('RPOP %s' % user) 318 def apop(self, user, password): 324 user [all...] |
| /third_party/spirv-tools/source/opt/ |
| H A D | eliminate_dead_output_stores_pass.cpp | 66 def_use_mgr->ForEachUser(ref, [this](Instruction* user) { in KillAllStoresOfRef() 67 if (user->opcode() == spv::Op::OpStore) kill_list_.push_back(user); in KillAllStoresOfRef() 219 var_id, [this, &var, is_builtin](Instruction* user) { in DoDeadOutputStoreElimination() 220 auto op = user->opcode(); in DoDeadOutputStoreElimination() 222 op == spv::Op::OpDecorate || user->IsNonSemanticInstruction()) in DoDeadOutputStoreElimination() 225 KillAllDeadStoresOfBuiltinRef(user, &var); in DoDeadOutputStoreElimination() 227 KillAllDeadStoresOfLocRef(user, &var); in DoDeadOutputStoreElimination()
|
| /kernel/linux/linux-5.10/tools/perf/Documentation/ |
| H A D | Makefile | 189 pdf: $(OUTPUT)user-manual.pdf 231 $(INSTALL) -m 644 $(OUTPUT)user-manual.pdf $(DESTDIR)$(pdfdir) 307 $(OUTPUT)user-manual.html: $(OUTPUT)user-manual.xml 310 $(OUTPUT)perf.info: $(OUTPUT)user-manual.texi 311 $(QUIET_MAKEINFO)$(MAKEINFO) --no-split -o $@ $(OUTPUT)user-manual.texi 313 $(OUTPUT)user-manual.texi: $(OUTPUT)user-manual.xml 315 $(DOCBOOK2X_TEXI) $(OUTPUT)user-manual.xml --encoding=UTF-8 --to-stdout >$@++ && \ 320 $(OUTPUT)user [all...] |
| /third_party/skia/third_party/externals/spirv-tools/source/fuzz/ |
| H A D | transformation_propagate_instruction_down.cpp | 171 opt::Instruction* user, uint32_t operand_index) { in Apply() 172 assert(ir_context->get_instr_block(user) && in Apply() 176 fuzzerutil::InOperandIndexFromOperandIndex(*user, operand_index); in Apply() 178 if (fuzzerutil::IdIsAvailableAtUse(ir_context, user, in_operand_index, in Apply() 180 user->SetInOperand(in_operand_index, {id}); in Apply() 185 // Every user of |inst_to_propagate| must be updated since we will in Apply() 187 assert(false && "Every user of |inst_to_propagate| must be updated"); in Apply() 366 &*it, [ir_context, block](opt::Instruction* user) { in GetInstructionToPropagate() 367 return ir_context->get_instr_block(user) != block; in GetInstructionToPropagate() 437 opt::Instruction* user, uint32_ in IsApplicableToBlock() [all...] |
| /third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/fuzz/ |
| H A D | transformation_propagate_instruction_down.cpp | 171 opt::Instruction* user, uint32_t operand_index) { in Apply() 172 assert(ir_context->get_instr_block(user) && in Apply() 176 fuzzerutil::InOperandIndexFromOperandIndex(*user, operand_index); in Apply() 178 if (fuzzerutil::IdIsAvailableAtUse(ir_context, user, in_operand_index, in Apply() 180 user->SetInOperand(in_operand_index, {id}); in Apply() 185 // Every user of |inst_to_propagate| must be updated since we will in Apply() 187 assert(false && "Every user of |inst_to_propagate| must be updated"); in Apply() 366 &*it, [ir_context, block](opt::Instruction* user) { in GetInstructionToPropagate() 367 return ir_context->get_instr_block(user) != block; in GetInstructionToPropagate() 437 opt::Instruction* user, uint32_ in IsApplicableToBlock() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
| H A D | eap_server_psk.c | 258 (sm->user->methods[i].vendor != EAP_VENDOR_IETF || in eap_psk_process_2() 259 sm->user->methods[i].method != EAP_TYPE_NONE); in eap_psk_process_2() 261 if (sm->user->methods[i].vendor == EAP_VENDOR_IETF && in eap_psk_process_2() 262 sm->user->methods[i].method == EAP_TYPE_PSK) in eap_psk_process_2() 267 sm->user->methods[i].vendor != EAP_VENDOR_IETF || in eap_psk_process_2() 268 sm->user->methods[i].method != EAP_TYPE_PSK) { in eap_psk_process_2() 276 if (sm->user->password == NULL || in eap_psk_process_2() 277 sm->user->password_len != EAP_PSK_PSK_LEN) { in eap_psk_process_2() 279 "user database for ID_P", in eap_psk_process_2() 284 if (eap_psk_key_setup(sm->user in eap_psk_process_2() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
| H A D | eap_server_psk.c | 258 (sm->user->methods[i].vendor != EAP_VENDOR_IETF || in eap_psk_process_2() 259 sm->user->methods[i].method != EAP_TYPE_NONE); in eap_psk_process_2() 261 if (sm->user->methods[i].vendor == EAP_VENDOR_IETF && in eap_psk_process_2() 262 sm->user->methods[i].method == EAP_TYPE_PSK) in eap_psk_process_2() 267 sm->user->methods[i].vendor != EAP_VENDOR_IETF || in eap_psk_process_2() 268 sm->user->methods[i].method != EAP_TYPE_PSK) { in eap_psk_process_2() 276 if (sm->user->password == NULL || in eap_psk_process_2() 277 sm->user->password_len != EAP_PSK_PSK_LEN) { in eap_psk_process_2() 279 "user database for ID_P", in eap_psk_process_2() 284 if (eap_psk_key_setup(sm->user in eap_psk_process_2() [all...] |
| /kernel/linux/linux-5.10/arch/x86/um/ |
| H A D | ptrace_32.c | 51 /* determines which flags the user has access to. */ 131 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in poke_user() 132 (addr <= offsetof(struct user, u_debugreg[7]))) { in poke_user() 133 addr -= offsetof(struct user, u_debugreg[0]); in poke_user() 187 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in peek_user() 188 (addr <= offsetof(struct user, u_debugreg[7]))) { in peek_user() 189 addr -= offsetof(struct user, u_debugreg[0]); in peek_user()
|
| H A D | ptrace_64.c | 17 * determines which flags the user has access to. 117 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in poke_user() 118 (addr <= offsetof(struct user, u_debugreg[7]))) { in poke_user() 119 addr -= offsetof(struct user, u_debugreg[0]); in poke_user() 181 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in peek_user() 182 (addr <= offsetof(struct user, u_debugreg[7]))) { in peek_user() 183 addr -= offsetof(struct user, u_debugreg[0]); in peek_user()
|
| /kernel/linux/linux-5.10/security/selinux/ss/ |
| H A D | context.h | 7 * that can be interpreted by a user or application 24 * A security context consists of an authenticated user 28 u32 user; member 154 dst->user = src->user; in context_cpy() 176 c->user = c->role = c->type = 0; in context_destroy() 189 return ((c1->user == c2->user) && in context_cmp()
|
| /kernel/linux/linux-5.10/kernel/ |
| H A D | uid16.c | 23 SYSCALL_DEFINE3(chown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() 25 return ksys_chown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3() 28 SYSCALL_DEFINE3(lchown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() 30 return ksys_lchown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3() 33 SYSCALL_DEFINE3(fchown16, unsigned int, fd, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() 35 return ksys_fchown(fd, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3()
|