| /third_party/ltp/testcases/kernel/mem/hugetlb/lib/ |
| H A D | hugetlb.c | 84 * getuserid() - return the integer value for the "user" id 86 int getuserid(char *user) in getuserid() argument 90 ent = getpwnam(user); in getuserid()
|
| /third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-form-get/ |
| H A D | minimal-http-server-form-get.c | 26 callback_http(struct lws *wsi, enum lws_callback_reasons reason, void *user, in callback_http() argument 72 return lws_callback_http_dummy(wsi, reason, user, in, len); in callback_http()
|
| /third_party/libwebsockets/plugin-standalone/ |
| H A D | protocol_example_standalone.c | 62 void *user, void *in, size_t len) in callback_dumb_increment() 65 (struct per_session_data__dumb_increment *)user; in callback_dumb_increment() 61 callback_dumb_increment(struct lws *wsi, enum lws_callback_reasons reason, void *user, void *in, size_t len) callback_dumb_increment() argument
|
| /third_party/rust/crates/libc/ci/ |
| H A D | run-docker.sh | 41 --user "$(id -u)":"$(id -g)" \ 73 --user "$(id -u)":"$(id -g)" \
|
| /third_party/skia/third_party/externals/spirv-tools/source/opt/ |
| H A D | dataflow.cpp | 77 inst, [this](Instruction* user) { Enqueue(user); }); in EnqueueUsers()
|
| H A D | eliminate_dead_constant_pass.cpp | 41 const_id, [&count](Instruction* user, uint32_t index) { in Process() 43 SpvOp op = user->opcode(); in Process()
|
| /third_party/skia/third_party/externals/spirv-tools/source/reduce/ |
| H A D | remove_block_reduction_opportunity_finder.cpp | 79 &instruction, [&instructions_in_block](opt::Instruction* user) -> bool { in BlockInstructionsHaveNoOutsideReferences() 82 return instructions_in_block.find(user->unique_id()) != in BlockInstructionsHaveNoOutsideReferences()
|
| /third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/opt/ |
| H A D | dataflow.cpp | 77 inst, [this](Instruction* user) { Enqueue(user); }); in EnqueueUsers()
|
| H A D | eliminate_dead_constant_pass.cpp | 41 const_id, [&count](Instruction* user, uint32_t index) { in Process() 43 SpvOp op = user->opcode(); in Process()
|
| /third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/reduce/ |
| H A D | remove_block_reduction_opportunity_finder.cpp | 79 &instruction, [&instructions_in_block](opt::Instruction* user) -> bool { in BlockInstructionsHaveNoOutsideReferences() 82 return instructions_in_block.find(user->unique_id()) != in BlockInstructionsHaveNoOutsideReferences()
|
| /third_party/skia/third_party/externals/tint/src/transform/ |
| H A D | unshadow.cc | 78 if (auto* user = sem.Get<sem::VariableUser>(ident)) { in Run() 79 auto it = renamed_to.find(user->Variable()); in Run()
|
| /third_party/spirv-tools/source/opt/ |
| H A D | dataflow.cpp | 76 inst, [this](Instruction* user) { Enqueue(user); }); in EnqueueUsers()
|
| H A D | eliminate_dead_constant_pass.cpp | 40 const_id, [&count](Instruction* user, uint32_t index) { in Process() 42 spv::Op op = user->opcode(); in Process()
|
| /third_party/spirv-tools/source/reduce/ |
| H A D | remove_block_reduction_opportunity_finder.cpp | 79 &instruction, [&instructions_in_block](opt::Instruction* user) -> bool { in BlockInstructionsHaveNoOutsideReferences() 82 return instructions_in_block.find(user->unique_id()) != in BlockInstructionsHaveNoOutsideReferences()
|
| /kernel/linux/linux-5.10/net/netrom/ |
| H A D | af_netrom.c | 252 * This is called from user mode and the timers. Thus it protects itself 570 ax25_uid_assoc *user; in nr_bind() local 596 * Only the super user can set an arbitrary user callsign. in nr_bind() 609 user = ax25_findbyuid(current_euid()); in nr_bind() 610 if (user) { in nr_bind() 611 nr->user_addr = user->call; in nr_bind() 612 ax25_uid_put(user); in nr_bind() 642 ax25_uid_assoc *user; in nr_connect() local 688 user in nr_connect() 876 ax25_address *src, *dest, *user; nr_rx_frame() local [all...] |
| /kernel/linux/linux-5.10/fs/ |
| H A D | pipe.c | 35 * New pipe buffers will be restricted to this size while the user is exceeding 50 * The max size that a non-root user is allowed to grow the pipe. Can 55 /* Maximum allocatable pages per user. Hard limit is unset by default, soft 754 unsigned long account_pipe_buffers(struct user_struct *user, in account_pipe_buffers() argument 757 return atomic_long_add_return(new - old, &user->pipe_bufs); in account_pipe_buffers() 783 struct user_struct *user = get_current_user(); in alloc_pipe_info() local 794 user_bufs = account_pipe_buffers(user, 0, pipe_bufs); in alloc_pipe_info() 797 user_bufs = account_pipe_buffers(user, pipe_bufs, PIPE_MIN_DEF_BUFFERS); in alloc_pipe_info() 814 pipe->user = user; in alloc_pipe_info() [all...] |
| /kernel/linux/linux-6.6/fs/ |
| H A D | pipe.c | 36 * New pipe buffers will be restricted to this size while the user is exceeding 51 * The max size that a non-root user is allowed to grow the pipe. Can 56 /* Maximum allocatable pages per user. Hard limit is unset by default, soft 756 unsigned long account_pipe_buffers(struct user_struct *user, in account_pipe_buffers() argument 759 return atomic_long_add_return(new - old, &user->pipe_bufs); in account_pipe_buffers() 785 struct user_struct *user = get_current_user(); in alloc_pipe_info() local 796 user_bufs = account_pipe_buffers(user, 0, pipe_bufs); in alloc_pipe_info() 799 user_bufs = account_pipe_buffers(user, pipe_bufs, PIPE_MIN_DEF_BUFFERS); in alloc_pipe_info() 816 pipe->user = user; in alloc_pipe_info() [all...] |
| /kernel/linux/linux-6.6/net/netrom/ |
| H A D | af_netrom.c | 252 * This is called from user mode and the timers. Thus it protects itself 570 ax25_uid_assoc *user; in nr_bind() local 596 * Only the super user can set an arbitrary user callsign. in nr_bind() 609 user = ax25_findbyuid(current_euid()); in nr_bind() 610 if (user) { in nr_bind() 611 nr->user_addr = user->call; in nr_bind() 612 ax25_uid_put(user); in nr_bind() 642 ax25_uid_assoc *user; in nr_connect() local 688 user in nr_connect() 876 ax25_address *src, *dest, *user; nr_rx_frame() local [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
| H A D | eap_server_peap.c | 176 if (sm->user && sm->user->force_version >= 0) { in eap_peap_init() 177 data->force_version = sm->user->force_version; in eap_peap_init() 900 next_type = sm->user->methods[0].method; in eap_peap_process_phase2_soh() 903 sm->user->methods[0].vendor, next_type); in eap_peap_process_phase2_soh() 904 eap_peap_phase2_init(sm, data, sm->user->methods[0].vendor, next_type); in eap_peap_process_phase2_soh() 945 if (sm->user && sm->user_eap_method_index < EAP_MAX_METHODS && in eap_peap_process_phase2_response() 946 (sm->user->methods[sm->user_eap_method_index].vendor != in eap_peap_process_phase2_response() 948 sm->user->methods[sm->user_eap_method_index].method != in eap_peap_process_phase2_response() 950 next_vendor = sm->user in eap_peap_process_phase2_response() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
| H A D | ap_config.c | 234 conf->fragm_threshold = -2; /* user driver default: 2346 */ in hostapd_config_defaults() 643 void hostapd_config_free_eap_user(struct hostapd_eap_user *user) in hostapd_config_free_eap_user() argument 645 hostapd_config_free_radius_attr(user->accept_attr); in hostapd_config_free_eap_user() 646 os_free(user->identity); in hostapd_config_free_eap_user() 647 bin_clear_free(user->password, user->password_len); in hostapd_config_free_eap_user() 648 bin_clear_free(user->salt, user->salt_len); in hostapd_config_free_eap_user() 649 os_free(user); in hostapd_config_free_eap_user() 653 void hostapd_config_free_eap_users(struct hostapd_eap_user *user) in hostapd_config_free_eap_users() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
| H A D | eap_server_peap.c | 176 if (sm->user && sm->user->force_version >= 0) { in eap_peap_init() 177 data->force_version = sm->user->force_version; in eap_peap_init() 931 next_type = sm->user->methods[0].method; in eap_peap_process_phase2_soh() 934 sm->user->methods[0].vendor, next_type); in eap_peap_process_phase2_soh() 935 eap_peap_phase2_init(sm, data, sm->user->methods[0].vendor, next_type); in eap_peap_process_phase2_soh() 976 if (sm->user && sm->user_eap_method_index < EAP_MAX_METHODS && in eap_peap_process_phase2_response() 977 (sm->user->methods[sm->user_eap_method_index].vendor != in eap_peap_process_phase2_response() 979 sm->user->methods[sm->user_eap_method_index].method != in eap_peap_process_phase2_response() 981 next_vendor = sm->user in eap_peap_process_phase2_response() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
| H A D | ap_config.c | 212 conf->fragm_threshold = -2; /* user driver default: 2346 */ in hostapd_config_defaults() 562 void hostapd_config_free_eap_user(struct hostapd_eap_user *user) in hostapd_config_free_eap_user() argument 564 hostapd_config_free_radius_attr(user->accept_attr); in hostapd_config_free_eap_user() 565 os_free(user->identity); in hostapd_config_free_eap_user() 566 bin_clear_free(user->password, user->password_len); in hostapd_config_free_eap_user() 567 bin_clear_free(user->salt, user->salt_len); in hostapd_config_free_eap_user() 568 os_free(user); in hostapd_config_free_eap_user() 572 void hostapd_config_free_eap_users(struct hostapd_eap_user *user) in hostapd_config_free_eap_users() argument [all...] |
| /device/soc/rockchip/common/sdk_linux/kernel/bpf/ |
| H A D | syscall.c | 66 * are 0 - i.e. new user-space does not rely on any kernel feature extensions 337 static int bpf_charge_memlock(struct user_struct *user, u32 pages) in bpf_charge_memlock() argument 340 if (atomic_long_add_return(pages, &user->locked_vm) > memlock_limit) { in bpf_charge_memlock() 341 atomic_long_sub(pages, &user->locked_vm); in bpf_charge_memlock() 347 static void bpf_uncharge_memlock(struct user_struct *user, u32 pages) in bpf_uncharge_memlock() argument 349 if (user) { in bpf_uncharge_memlock() 350 atomic_long_sub(pages, &user->locked_vm); in bpf_uncharge_memlock() 357 struct user_struct *user; in bpf_map_charge_init() local 364 user = get_current_user(); in bpf_map_charge_init() 365 ret = bpf_charge_memlock(user, page in bpf_map_charge_init() 1676 __bpf_prog_charge(struct user_struct *user, u32 pages) __bpf_prog_charge() argument 1692 __bpf_prog_uncharge(struct user_struct *user, u32 pages) __bpf_prog_uncharge() argument 1701 struct user_struct *user = get_current_user(); bpf_prog_charge_memlock() local 1716 struct user_struct *user = prog->aux->user; bpf_prog_uncharge_memlock() local [all...] |
| /kernel/linux/linux-5.10/security/selinux/ss/ |
| H A D | services.c | 303 val1 = scontext->user; in constraint_expr_eval() 304 val2 = tcontext->user; in constraint_expr_eval() 411 val1 = c->user; in constraint_expr_eval() 758 u16 orig_tclass, bool user) in security_compute_validatetrans() 781 if (!user) in security_compute_validatetrans() 821 if (user) in security_compute_validatetrans() 1251 *scontext_len += strlen(sym_name(p, SYM_USERS, context->user - 1)) + 1; in context_struct_to_string() 1266 * Copy the user name, role name and type name into the context. in context_struct_to_string() 1269 sym_name(p, SYM_USERS, context->user - 1), in context_struct_to_string() 1453 /* Extract the user in string_to_context_struct() 756 security_compute_validatetrans(struct selinux_state *state, u32 oldsid, u32 newsid, u32 tasksid, u16 orig_tclass, bool user) security_compute_validatetrans() argument 2745 struct user_datum *user; security_get_user_sids() local [all...] |
| /kernel/linux/linux-5.10/kernel/bpf/ |
| H A D | syscall.c | 69 * are 0 - i.e. new user-space does not rely on any kernel feature extensions 360 static int bpf_charge_memlock(struct user_struct *user, u32 pages) in bpf_charge_memlock() argument 364 if (atomic_long_add_return(pages, &user->locked_vm) > memlock_limit) { in bpf_charge_memlock() 365 atomic_long_sub(pages, &user->locked_vm); in bpf_charge_memlock() 371 static void bpf_uncharge_memlock(struct user_struct *user, u32 pages) in bpf_uncharge_memlock() argument 373 if (user) in bpf_uncharge_memlock() 374 atomic_long_sub(pages, &user->locked_vm); in bpf_uncharge_memlock() 380 struct user_struct *user; in bpf_map_charge_init() local 386 user = get_current_user(); in bpf_map_charge_init() 387 ret = bpf_charge_memlock(user, page in bpf_map_charge_init() 1658 __bpf_prog_charge(struct user_struct *user, u32 pages) __bpf_prog_charge() argument 1674 __bpf_prog_uncharge(struct user_struct *user, u32 pages) __bpf_prog_uncharge() argument 1682 struct user_struct *user = get_current_user(); bpf_prog_charge_memlock() local 1697 struct user_struct *user = prog->aux->user; bpf_prog_uncharge_memlock() local [all...] |