/third_party/node/lib/internal/process/ |
H A D | per_thread.js | 125 if (!previousValueIsValid(prevValue.user)) { 128 validateNumber(prevValue.user, 'prevValue.user'); 129 throw new ERR_INVALID_ARG_VALUE.RangeError('prevValue.user', 130 prevValue.user); 146 user: cpuValues[0] - prevValue.user, 153 user: cpuValues[0], 194 // in the user land. Either document it, or deprecate it in favor of a 203 // Without this, user cod [all...] |
/third_party/ltp/tools/sparse/sparse-src/ |
H A D | linearize.h | 252 static inline void add_pseudo_user_ptr(struct pseudo_user *user, struct pseudo_user_list **list) in add_pseudo_user_ptr() argument 254 add_ptr_list(list, user); in add_pseudo_user_ptr() 294 struct pseudo_user *user = __alloc_pseudo_user(0); in alloc_pseudo_user() local 295 user->userp = pp; in alloc_pseudo_user() 296 user->insn = insn; in alloc_pseudo_user() 297 return user; in alloc_pseudo_user()
|
/third_party/musl/src/misc/ |
H A D | initgroups.c | 5 int initgroups(const char *user, gid_t gid) in initgroups() argument 9 if (getgrouplist(user, gid, groups, &count) < 0) return -1; in initgroups()
|
/third_party/pulseaudio/src/modules/raop/ |
H A D | raop-util.h | 37 int pa_raop_basic_response(const char *user, const char *pwd, char **str); 38 int pa_raop_digest_response(const char *user, const char *realm, const char *password,
|
/kernel/linux/linux-5.10/drivers/gpu/drm/nouveau/nvkm/engine/fifo/ |
H A D | gk104.c | 104 const struct gk104_fifo_chan_user *user = oclass->engn; in gk104_fifo_class_new() local 105 return user->ctor(fifo, oclass, argv, argc, pobject); in gk104_fifo_class_new() 107 if (oclass->engn == &fifo->func->user) { in gk104_fifo_class_new() 108 const struct gk104_fifo_user_user *user = oclass->engn; in gk104_fifo_class_new() local 109 return user->ctor(oclass, argv, argc, pobject); in gk104_fifo_class_new() 122 if (fifo->func->user.ctor && c++ == index) { in gk104_fifo_class_get() 123 oclass->base = fifo->func->user.user; in gk104_fifo_class_get() 124 oclass->engn = &fifo->func->user; in gk104_fifo_class_get() 129 oclass->base = fifo->func->chan.user; in gk104_fifo_class_get() [all...] |
/kernel/linux/linux-5.10/drivers/scsi/isci/ |
H A D | init.c | 228 * This method returns an error code indicating success or failure. The user 417 * Validate the user parameters. If they are not legal, then in sci_user_parameters_set() 450 struct sci_user_parameters *user = &ihost->user_parameters; in sci_oem_defaults() local 473 user->phys[i].max_speed_generation = SCIC_SDS_PARM_GEN2_SPEED; in sci_oem_defaults() 476 user->phys[i].align_insertion_frequency = 0x7f; in sci_oem_defaults() 477 user->phys[i].in_connection_align_insertion_frequency = 0xff; in sci_oem_defaults() 478 user->phys[i].notify_enable_spin_up_insertion_frequency = 0x33; in sci_oem_defaults() 489 user->stp_inactivity_timeout = 5; in sci_oem_defaults() 490 user->ssp_inactivity_timeout = 5; in sci_oem_defaults() 491 user in sci_oem_defaults() [all...] |
/kernel/linux/linux-6.6/drivers/scsi/isci/ |
H A D | init.c | 229 * This method returns an error code indicating success or failure. The user 415 * Validate the user parameters. If they are not legal, then in sci_user_parameters_set() 448 struct sci_user_parameters *user = &ihost->user_parameters; in sci_oem_defaults() local 471 user->phys[i].max_speed_generation = SCIC_SDS_PARM_GEN2_SPEED; in sci_oem_defaults() 474 user->phys[i].align_insertion_frequency = 0x7f; in sci_oem_defaults() 475 user->phys[i].in_connection_align_insertion_frequency = 0xff; in sci_oem_defaults() 476 user->phys[i].notify_enable_spin_up_insertion_frequency = 0x33; in sci_oem_defaults() 487 user->stp_inactivity_timeout = 5; in sci_oem_defaults() 488 user->ssp_inactivity_timeout = 5; in sci_oem_defaults() 489 user in sci_oem_defaults() [all...] |
/kernel/linux/linux-5.10/include/linux/ |
H A D | dcookies.h | 23 * dcookie_register - register a user of dcookies 25 * Register as a dcookie user. Returns %NULL on failure. 30 * dcookie_unregister - unregister a user of dcookies 32 * Unregister as a dcookie user. This may invalidate 35 void dcookie_unregister(struct dcookie_user * user); 44 * dcookie user. 57 static inline void dcookie_unregister(struct dcookie_user * user) in dcookie_unregister() argument
|
/kernel/linux/linux-6.6/drivers/gpu/drm/nouveau/include/nvkm/subdev/ |
H A D | vfn.h | 12 u32 user; member 17 struct nvkm_device_oclass user; member
|
/third_party/ltp/include/lapi/ |
H A D | ip_tables.h | 18 } user; member 36 } user; member
|
/kernel/linux/linux-6.6/kernel/ |
H A D | cred.c | 60 .user = INIT_USER, 86 free_uid(cred->user); in put_cred_rcu() 220 get_uid(new->user); in prepare_creds() 355 /* If the two credentials are in the same user namespace see if in cred_cap_issubset() 361 /* The credentials are in a different user namespaces in cred_cap_issubset() 431 * RLIMIT_NPROC limits on user->processes have already been checked in commit_creds() 434 if (new->user != old->user || new->user_ns != old->user_ns) in commit_creds() 438 if (new->user != old->user || ne in commit_creds() [all...] |
/kernel/linux/linux-6.6/drivers/gpu/drm/nouveau/nvkm/engine/fifo/ |
H A D | base.c | 78 if (oclass->engn == &fifo->func->cgrp.user) in nvkm_fifo_class_new() 81 if (oclass->engn == &fifo->func->chan.user) in nvkm_fifo_class_new() 102 if (cgrp->user.oclass) { in nvkm_fifo_class_get() 104 oclass->base = cgrp->user; in nvkm_fifo_class_get() 105 oclass->engn = &fifo->func->cgrp.user; in nvkm_fifo_class_get() 112 if (chan->user.oclass) { in nvkm_fifo_class_get() 114 oclass->base = chan->user; in nvkm_fifo_class_get() 115 oclass->engn = &fifo->func->chan.user; in nvkm_fifo_class_get()
|
/third_party/curl/lib/ |
H A D | socks_gssapi.c | 126 char *user = NULL; in Curl_SOCKS5_gssapi_negotiate() local 301 /* Everything is good so far, user was authenticated! */ in Curl_SOCKS5_gssapi_negotiate() 309 failf(data, "Failed to determine user name."); in Curl_SOCKS5_gssapi_negotiate() 319 failf(data, "Failed to determine user name."); in Curl_SOCKS5_gssapi_negotiate() 322 user = malloc(gss_send_token.length + 1); in Curl_SOCKS5_gssapi_negotiate() 323 if(!user) { in Curl_SOCKS5_gssapi_negotiate() 330 memcpy(user, gss_send_token.value, gss_send_token.length); in Curl_SOCKS5_gssapi_negotiate() 331 user[gss_send_token.length] = '\0'; in Curl_SOCKS5_gssapi_negotiate() 334 infof(data, "SOCKS5 server authenticated user %s with GSS-API.",user); in Curl_SOCKS5_gssapi_negotiate() [all...] |
/third_party/skia/third_party/externals/freetype/src/tools/ftrandom/ |
H A D | ftrandom.c | 106 void *user ) in FT_MoveTo() 109 FT_UNUSED( user ); in FT_MoveTo() 117 void *user ) in FT_LineTo() 120 FT_UNUSED( user ); in FT_LineTo() 129 void *user ) in FT_ConicTo() 133 FT_UNUSED( user ); in FT_ConicTo() 143 void *user ) in FT_CubicTo() 148 FT_UNUSED( user ); in FT_CubicTo()
|
/kernel/linux/linux-5.10/arch/x86/kernel/ |
H A D | ptrace.c | 17 #include <linux/user.h> 137 * Determines which flags the user has access to [1 = access, 0 = no access]. 197 * we will never get back to user mode with invalid %cs or %ss in set_segment_reg() 199 * on user_mode() to distinguish a user trap frame (which can in set_segment_reg() 341 * If the user value contains TF, mark that in set_flags() 627 * writing for the user. And anyway this is the previous in ptrace_set_breakpoint_addr() 720 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user)) in arch_ptrace() 726 else if (addr >= offsetof(struct user, u_debugreg[0]) && in arch_ptrace() 727 addr <= offsetof(struct user, u_debugreg[7])) { in arch_ptrace() 728 addr -= offsetof(struct user, u_debugre in arch_ptrace() [all...] |
/kernel/linux/linux-5.10/fs/ |
H A D | open.c | 361 /* Clear the capabilities if we switch to a non-root user */ in access_override_creds() 383 * non_rcu field, because now that other user may be in access_override_creds() 642 int chown_common(const struct path *path, uid_t user, gid_t group) in chown_common() argument 651 uid = make_kuid(current_user_ns(), user); in chown_common() 656 if (user != (uid_t) -1) { in chown_common() 684 int do_fchownat(int dfd, const char __user *filename, uid_t user, gid_t group, in do_fchownat() argument 704 error = chown_common(&path, user, group); in do_fchownat() 716 SYSCALL_DEFINE5(fchownat, int, dfd, const char __user *, filename, uid_t, user, in SYSCALL_DEFINE5() 719 return do_fchownat(dfd, filename, user, group, flag); in SYSCALL_DEFINE5() 722 SYSCALL_DEFINE3(chown, const char __user *, filename, uid_t, user, gid_ 733 vfs_fchown(struct file *file, uid_t user, gid_t group) vfs_fchown() argument 746 ksys_fchown(unsigned int fd, uid_t user, gid_t group) ksys_fchown() argument [all...] |
/kernel/linux/linux-6.6/fs/ |
H A D | open.c | 421 /* Clear the capabilities if we switch to a non-root user */ in access_override_creds() 443 * non_rcu field, because now that other user may be in access_override_creds() 748 int chown_common(const struct path *path, uid_t user, gid_t group) in chown_common() argument 759 uid = make_kuid(current_user_ns(), user); in chown_common() 769 if ((user != (uid_t)-1) && !setattr_vfsuid(&newattrs, uid)) in chown_common() 794 int do_fchownat(int dfd, const char __user *filename, uid_t user, gid_t group, in do_fchownat() argument 814 error = chown_common(&path, user, group); in do_fchownat() 826 SYSCALL_DEFINE5(fchownat, int, dfd, const char __user *, filename, uid_t, user, in SYSCALL_DEFINE5() 829 return do_fchownat(dfd, filename, user, group, flag); in SYSCALL_DEFINE5() 832 SYSCALL_DEFINE3(chown, const char __user *, filename, uid_t, user, gid_ 843 vfs_fchown(struct file *file, uid_t user, gid_t group) vfs_fchown() argument 856 ksys_fchown(unsigned int fd, uid_t user, gid_t group) ksys_fchown() argument [all...] |
/kernel/linux/linux-6.6/arch/x86/kernel/ |
H A D | ptrace.c | 16 #include <linux/user.h> 156 * Determines which flags the user has access to [1 = access, 0 = no access]. 216 * we will never get back to user mode with invalid %cs or %ss in set_segment_reg() 218 * on user_mode() to distinguish a user trap frame (which can in set_segment_reg() 360 * If the user value contains TF, mark that in set_flags() 646 * writing for the user. And anyway this is the previous in ptrace_set_breakpoint_addr() 750 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user)) in arch_ptrace() 756 else if (addr >= offsetof(struct user, u_debugreg[0]) && in arch_ptrace() 757 addr <= offsetof(struct user, u_debugreg[7])) { in arch_ptrace() 758 addr -= offsetof(struct user, u_debugre in arch_ptrace() [all...] |
/kernel/linux/linux-5.10/drivers/gpu/drm/nouveau/dispnv50/ |
H A D | oimm507b.c | 37 &args, sizeof(args), &wndw->wimm.base.user); in oimm507b_init_() 43 nvif_object_map(&wndw->wimm.base.user, NULL, 0); in oimm507b_init_()
|
/kernel/linux/linux-5.10/drivers/staging/media/ipu3/ |
H A D | ipu3-css-params.h | 16 struct ipu3_uapi_params *user); 21 struct ipu3_uapi_params *user);
|
/kernel/linux/linux-6.6/drivers/staging/media/ipu3/ |
H A D | ipu3-css-params.h | 16 struct ipu3_uapi_params *user); 21 struct ipu3_uapi_params *user);
|
/kernel/linux/linux-6.6/drivers/gpu/drm/nouveau/dispnv50/ |
H A D | oimm507b.c | 37 &args, sizeof(args), &wndw->wimm.base.user); in oimm507b_init_() 43 nvif_object_map(&wndw->wimm.base.user, NULL, 0); in oimm507b_init_()
|
/third_party/typescript/tests/baselines/reference/ |
H A D | genericUnboundedTypeParamAssignability.js | 14 function user<T>(t: T) { 33 function user(t) {
function
|
/kernel/linux/linux-5.10/arch/m68k/fpsp040/ |
H A D | fpsp.h | 63 | because it needs to report an exception back to the user. This 83 .set USER_D0,LV+0 | saved user D0 84 .set USER_D1,LV+4 | saved user D1 85 .set USER_A0,LV+8 | saved user A0 86 .set USER_A1,LV+12 | saved user A1 87 .set USER_FP0,LV+16 | saved user FP0 88 .set USER_FP1,LV+28 | saved user FP1 89 .set USER_FP2,LV+40 | saved user FP2 90 .set USER_FP3,LV+52 | saved user FP3 91 .set USER_FPCR,LV+64 | saved user FPC [all...] |
/kernel/linux/linux-6.6/arch/m68k/fpsp040/ |
H A D | fpsp.h | 63 | because it needs to report an exception back to the user. This 83 .set USER_D0,LV+0 | saved user D0 84 .set USER_D1,LV+4 | saved user D1 85 .set USER_A0,LV+8 | saved user A0 86 .set USER_A1,LV+12 | saved user A1 87 .set USER_FP0,LV+16 | saved user FP0 88 .set USER_FP1,LV+28 | saved user FP1 89 .set USER_FP2,LV+40 | saved user FP2 90 .set USER_FP3,LV+52 | saved user FP3 91 .set USER_FPCR,LV+64 | saved user FPC [all...] |