/kernel/linux/linux-5.10/security/selinux/ss/ |
H A D | context.h | 7 * that can be interpreted by a user or application 24 * A security context consists of an authenticated user 28 u32 user; member 154 dst->user = src->user; in context_cpy() 176 c->user = c->role = c->type = 0; in context_destroy() 189 return ((c1->user == c2->user) && in context_cmp()
|
/kernel/linux/linux-5.10/kernel/ |
H A D | uid16.c | 23 SYSCALL_DEFINE3(chown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() 25 return ksys_chown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3() 28 SYSCALL_DEFINE3(lchown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() 30 return ksys_lchown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3() 33 SYSCALL_DEFINE3(fchown16, unsigned int, fd, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() 35 return ksys_fchown(fd, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3()
|
/kernel/linux/linux-6.6/fs/proc/ |
H A D | stat.c | 85 u64 user, nice, system, idle, iowait, irq, softirq, steal; in show_stat() local 92 user = nice = system = idle = iowait = in show_stat() 105 user += cpustat[CPUTIME_USER]; in show_stat() 127 seq_put_decimal_ull(p, "cpu ", nsec_to_clock_t(user)); in show_stat() 146 user = cpustat[CPUTIME_USER]; in show_stat() 157 seq_put_decimal_ull(p, " ", nsec_to_clock_t(user)); in show_stat()
|
/kernel/linux/linux-6.6/arch/x86/um/ |
H A D | ptrace_32.c | 52 /* determines which flags the user has access to. */ 132 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in poke_user() 133 (addr <= offsetof(struct user, u_debugreg[7]))) { in poke_user() 134 addr -= offsetof(struct user, u_debugreg[0]); in poke_user() 188 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in peek_user() 189 (addr <= offsetof(struct user, u_debugreg[7]))) { in peek_user() 190 addr -= offsetof(struct user, u_debugreg[0]); in peek_user()
|
H A D | ptrace_64.c | 18 * determines which flags the user has access to. 118 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in poke_user() 119 (addr <= offsetof(struct user, u_debugreg[7]))) { in poke_user() 120 addr -= offsetof(struct user, u_debugreg[0]); in poke_user() 182 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in peek_user() 183 (addr <= offsetof(struct user, u_debugreg[7]))) { in peek_user() 184 addr -= offsetof(struct user, u_debugreg[0]); in peek_user()
|
/kernel/linux/linux-6.6/security/selinux/ss/ |
H A D | context.h | 7 * that can be interpreted by a user or application 24 * A security context consists of an authenticated user 28 u32 user; member 155 dst->user = src->user; in context_cpy() 179 c->user = c->role = c->type = 0; in context_destroy() 192 return ((c1->user == c2->user) && in context_cmp()
|
/kernel/linux/linux-6.6/kernel/ |
H A D | uid16.c | 23 SYSCALL_DEFINE3(chown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() 25 return ksys_chown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3() 28 SYSCALL_DEFINE3(lchown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() 30 return ksys_lchown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3() 33 SYSCALL_DEFINE3(fchown16, unsigned int, fd, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() 35 return ksys_fchown(fd, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3()
|
/third_party/ffmpeg/libavformat/ |
H A D | icecast.c | 35 char *user; member 93 char *headers, *user = NULL; in icecast_open() local 147 if (!(user = av_strdup(auth))) { in icecast_open() 156 user ? user : DEFAULT_ICE_USER, in icecast_open() 175 av_freep(&user); in icecast_open()
|
/third_party/node/lib/ |
H A D | os.js | 133 * user: number, 151 user: data[i++], 362 const user = getUserInfo(options, ctx); 364 if (user === undefined) 368 user.uid |= 0; 369 user.gid |= 0; 372 return user;
|
/third_party/typescript/tests/baselines/reference/tsc/declarationEmit/ |
H A D | when-pkg-references-sibling-package-through-indirect-symlink-moduleCaseChange.js | 2 //// [/user/username/projects/myProject/pkg1/dist/index.d.ts]
5 //// [/user/username/projects/myProject/pkg1/dist/types.d.ts]
20 //// [/user/username/projects/myProject/pkg1/package.json]
23 //// [/user/username/projects/myproject/pkg2/dist/index.d.ts]
26 //// [/user/username/projects/myproject/pkg2/dist/types.d.ts]
29 //// [/user/username/projects/myproject/pkg2/package.json]
32 //// [/user/username/projects/myproject/pkg3/src/index.ts]
35 //// [/user/username/projects/myproject/pkg3/src/keys.ts]
39 //// [/user/username/projects/myproject/pkg3/tsconfig.json]
42 //// [/user/usernam [all...] |
H A D | when-pkg-references-sibling-package-through-indirect-symlink.js | 2 //// [/user/username/projects/myproject/pkg1/dist/index.d.ts]
5 //// [/user/username/projects/myproject/pkg1/dist/types.d.ts]
20 //// [/user/username/projects/myproject/pkg1/package.json]
23 //// [/user/username/projects/myproject/pkg2/dist/index.d.ts]
26 //// [/user/username/projects/myproject/pkg2/dist/types.d.ts]
29 //// [/user/username/projects/myproject/pkg2/package.json]
32 //// [/user/username/projects/myproject/pkg3/src/index.ts]
35 //// [/user/username/projects/myproject/pkg3/src/keys.ts]
39 //// [/user/username/projects/myproject/pkg3/tsconfig.json]
42 //// [/user/usernam [all...] |
/third_party/mesa3d/src/compiler/nir/ |
H A D | nir_opt_copy_propagate.c | 87 nir_alu_instr *user = nir_instr_as_alu(src->src.parent_instr); in copy_propagate_alu() local 88 unsigned src_idx = src - user->src; in copy_propagate_alu() 89 assert(src_idx < nir_op_infos[user->op].num_inputs); in copy_propagate_alu() 90 unsigned num_comp = nir_ssa_alu_instr_src_components(user, src_idx); in copy_propagate_alu() 102 return rewrite_to_vec(impl, user, copy); in copy_propagate_alu()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_gtc.c | 109 /* "RESPONSE=<user>\0<password>" */ in eap_gtc_process() 129 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Response user", in eap_gtc_process() 153 "Identity not found in the user " in eap_gtc_process() 168 if (sm->user == NULL || sm->user->password == NULL || in eap_gtc_process() 169 sm->user->password_hash) { in eap_gtc_process() 176 if (rlen != sm->user->password_len || in eap_gtc_process() 177 os_memcmp_const(pos, sm->user->password, rlen) != 0) { in eap_gtc_process()
|
H A D | eap_server_md5.c | 106 if (sm->user == NULL || sm->user->password == NULL || in eap_md5_process() 107 sm->user->password_hash) { in eap_md5_process() 122 if (chap_md5(id, sm->user->password, sm->user->password_len, in eap_md5_process()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_gtc.c | 109 /* "RESPONSE=<user>\0<password>" */ in eap_gtc_process() 129 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Response user", in eap_gtc_process() 153 "Identity not found in the user " in eap_gtc_process() 168 if (sm->user == NULL || sm->user->password == NULL || in eap_gtc_process() 169 sm->user->password_hash) { in eap_gtc_process() 176 if (rlen != sm->user->password_len || in eap_gtc_process() 177 os_memcmp_const(pos, sm->user->password, rlen) != 0) { in eap_gtc_process()
|
/third_party/libwebsockets/lib/misc/ |
H A D | lws-struct-lejp.c | 33 lws_struct_args_t *a = (lws_struct_args_t *)ctx->user; in lws_struct_schema_only_lejp_cb() 144 lws_struct_args_t *args = (lws_struct_args_t *)ctx->user; in lws_struct_default_lejp_cb() 174 ctx->pst[ctx->pst_sp].user = NULL; in lws_struct_default_lejp_cb() 183 ctx->pst[ctx->pst_sp].user = NULL; in lws_struct_default_lejp_cb() 236 if (!ctx->pst[ctx->pst_sp].user) { in lws_struct_default_lejp_cb() 257 (((char *)ctx->pst[ctx->pst_sp - 1].user) + pmap->ofs); in lws_struct_default_lejp_cb() 263 ctx->pst[ctx->pst_sp].user = lwsac_use_zero(&args->ac, in lws_struct_default_lejp_cb() 265 if (!ctx->pst[ctx->pst_sp].user) { in lws_struct_default_lejp_cb() 276 ((char *)ctx->pst[ctx->pst_sp].user + in lws_struct_default_lejp_cb() 282 *((void **)owner) = ctx->pst[ctx->pst_sp].user; in lws_struct_default_lejp_cb() 479 lws_struct_json_init_parse(struct lejp_ctx *ctx, lejp_callback cb, void *user) lws_struct_json_init_parse() argument [all...] |
/kernel/linux/linux-5.10/net/ipv4/ |
H A D | ip_fragment.c | 5 * interface as the means of communication with the user level. 121 static bool frag_expire_skip_icmp(u32 user) in frag_expire_skip_icmp() argument 123 return user == IP_DEFRAG_AF_PACKET || in frag_expire_skip_icmp() 124 ip_defrag_user_in_between(user, IP_DEFRAG_CONNTRACK_IN, in frag_expire_skip_icmp() 126 ip_defrag_user_in_between(user, IP_DEFRAG_CONNTRACK_BRIDGE_IN, in frag_expire_skip_icmp() 185 if (frag_expire_skip_icmp(qp->q.key.v4.user) && in ip_expire() 205 u32 user, int vif) in ip_find() 210 .user = user, in ip_find() 399 return qp->q.key.v4.user in ip_frag_coalesce_ok() 204 ip_find(struct net *net, struct iphdr *iph, u32 user, int vif) ip_find() argument 475 ip_defrag(struct net *net, struct sk_buff *skb, u32 user) ip_defrag() argument 504 ip_check_defrag(struct net *net, struct sk_buff *skb, u32 user) ip_check_defrag() argument [all...] |
/kernel/linux/linux-6.6/net/ipv4/ |
H A D | ip_fragment.c | 5 * interface as the means of communication with the user level. 121 static bool frag_expire_skip_icmp(u32 user) in frag_expire_skip_icmp() argument 123 return user == IP_DEFRAG_AF_PACKET || in frag_expire_skip_icmp() 124 ip_defrag_user_in_between(user, IP_DEFRAG_CONNTRACK_IN, in frag_expire_skip_icmp() 126 ip_defrag_user_in_between(user, IP_DEFRAG_CONNTRACK_BRIDGE_IN, in frag_expire_skip_icmp() 186 if (frag_expire_skip_icmp(qp->q.key.v4.user) && in ip_expire() 206 u32 user, int vif) in ip_find() 211 .user = user, in ip_find() 407 return qp->q.key.v4.user in ip_frag_coalesce_ok() 205 ip_find(struct net *net, struct iphdr *iph, u32 user, int vif) ip_find() argument 483 ip_defrag(struct net *net, struct sk_buff *skb, u32 user) ip_defrag() argument 512 ip_check_defrag(struct net *net, struct sk_buff *skb, u32 user) ip_check_defrag() argument [all...] |
/kernel/linux/linux-5.10/drivers/gpu/drm/i915/gem/ |
H A D | i915_gem_context.c | 15 * In software, there is a distinction between contexts created by the user, 492 * Map the user's engine back to the actual engines; one virtual in kill_engines() 494 * the same engine may be have multiple instances in the user's map. in kill_engines() 638 * If the user has disabled hangchecking, we can not be sure that in context_close() 1426 const struct drm_i915_gem_context_param_sseu *user, in i915_gem_user_to_context_sseu() 1433 if (!user->slice_mask || !user->subslice_mask || in i915_gem_user_to_context_sseu() 1434 !user->min_eus_per_subslice || !user->max_eus_per_subslice) in i915_gem_user_to_context_sseu() 1438 if (user in i915_gem_user_to_context_sseu() 1425 i915_gem_user_to_context_sseu(struct intel_gt *gt, const struct drm_i915_gem_context_param_sseu *user, struct intel_sseu *context) i915_gem_user_to_context_sseu() argument 1777 struct i915_context_param_engines __user *user = set_engines() local 1907 struct i915_context_param_engines __user *user; get_engines() local [all...] |
/third_party/curl/lib/vauth/ |
H A D | digest_sspi.c | 84 * userp [in] - The user name in the format User or Domain\User. 85 * passwdp [in] - The user's password. 159 /* Use the current Windows user */ in Curl_auth_create_digest_md5_message() 382 * userp [in] - The user name in the format User or Domain\User. 383 * passwdp [in] - The user's password. 432 /* If the user/passwd that was used to make the identity for http_context in Curl_auth_create_digest_http_message() 434 if((userp && !digest->user) || (!userp && digest->user) || in Curl_auth_create_digest_http_message() 436 (userp && digest->user && Curl_timestrcmp(userp, digest->user)) || in Curl_auth_create_digest_http_message() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ccree/ |
H A D | cc_cipher.c | 52 struct cc_user_key_info user; member 199 ctx_p->user.key = kzalloc(max_key_buf_size, GFP_KERNEL); in cc_cipher_init() 200 if (!ctx_p->user.key) in cc_cipher_init() 204 ctx_p->user.key); in cc_cipher_init() 207 ctx_p->user.key_dma_addr = dma_map_single(dev, ctx_p->user.key, in cc_cipher_init() 210 if (dma_mapping_error(dev, ctx_p->user.key_dma_addr)) { in cc_cipher_init() 212 max_key_buf_size, ctx_p->user.key); in cc_cipher_init() 216 max_key_buf_size, ctx_p->user.key, &ctx_p->user in cc_cipher_init() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccree/ |
H A D | cc_cipher.c | 52 struct cc_user_key_info user; member 202 ctx_p->user.key = kzalloc(max_key_buf_size, GFP_KERNEL); in cc_cipher_init() 203 if (!ctx_p->user.key) in cc_cipher_init() 207 ctx_p->user.key); in cc_cipher_init() 210 ctx_p->user.key_dma_addr = dma_map_single(dev, ctx_p->user.key, in cc_cipher_init() 213 if (dma_mapping_error(dev, ctx_p->user.key_dma_addr)) { in cc_cipher_init() 215 max_key_buf_size, ctx_p->user.key); in cc_cipher_init() 219 max_key_buf_size, ctx_p->user.key, &ctx_p->user in cc_cipher_init() [all...] |
/third_party/ltp/testcases/kernel/syscalls/ptrace/ |
H A D | ptrace09.c | 21 #include <sys/user.h> 59 (void *)offsetof(struct user, u_debugreg[0]), &watchpoint); in run() 61 (void *)offsetof(struct user, u_debugreg[7]), (void *)0x30001); in run()
|
/kernel/linux/linux-6.6/arch/s390/kernel/ |
H A D | ptrace.c | 3 * Ptrace user space interface. 18 #include <linux/user.h> 81 /* Copy user specified PER registers */ in update_cr_regs() 86 /* merge TIF_SINGLE_STEP into user specified PER registers. */ in update_cr_regs() 166 /* Start address of the user specified per set. */ in __peek_user_per() 169 /* End address of the user specified per set. */ in __peek_user_per() 186 * Read the word at offset addr from the user area of a process. The 191 * struct user contain pad bytes that should be read as zeroes. 198 if (addr < offsetof(struct user, regs.acrs)) { in __peek_user() 203 if (addr == offsetof(struct user, reg in __peek_user() [all...] |
/kernel/linux/linux-5.10/security/keys/ |
H A D | gc.c | 158 /* deal with the user's key tracking and quota */ in key_gc_unused_keys() 160 spin_lock(&key->user->lock); in key_gc_unused_keys() 161 key->user->qnkeys--; in key_gc_unused_keys() 162 key->user->qnbytes -= key->quotalen; in key_gc_unused_keys() 163 spin_unlock(&key->user->lock); in key_gc_unused_keys() 166 atomic_dec(&key->user->nkeys); in key_gc_unused_keys() 168 atomic_dec(&key->user->nikeys); in key_gc_unused_keys() 170 key_user_put(key->user); in key_gc_unused_keys()
|