/Linux-v6.6/ipc/ |
D | sem.c | 136 struct sembuf *sops; /* array of pending operations */ member 297 curr = &sma->sems[q->sops[0].sem_num]; in unmerge_queues() 389 static inline int sem_lock(struct sem_array *sma, struct sembuf *sops, in sem_lock() argument 411 idx = array_index_nospec(sops->sem_num, sma->sem_nsems); in sem_lock() 428 return sops->sem_num; in sem_lock() 449 return sops->sem_num; in sem_lock() 652 struct sembuf *sops; in perform_atomic_semop_slow() local 655 sops = q->sops; in perform_atomic_semop_slow() 659 for (sop = sops; sop < sops + nsops; sop++) { in perform_atomic_semop_slow() 687 while (sop >= sops) { in perform_atomic_semop_slow() [all …]
|
/Linux-v6.6/arch/arm/kernel/ |
D | sys_oabi-compat.c | 345 struct sembuf *sops; in sys_oabi_semtimedop() local 354 sops = kvmalloc_array(nsops, sizeof(*sops), GFP_KERNEL); in sys_oabi_semtimedop() 355 if (!sops) in sys_oabi_semtimedop() 361 sops[i].sem_num = osb.sem_num; in sys_oabi_semtimedop() 362 sops[i].sem_op = osb.sem_op; in sys_oabi_semtimedop() 363 sops[i].sem_flg = osb.sem_flg; in sys_oabi_semtimedop() 376 err = __do_semtimedop(semid, sops, nsops, &ts, ns); in sys_oabi_semtimedop() 379 err = __do_semtimedop(semid, sops, nsops, NULL, ns); in sys_oabi_semtimedop() 381 kvfree(sops); in sys_oabi_semtimedop()
|
/Linux-v6.6/fs/nfs/ |
D | nfs2super.c | 15 .sops = &nfs_sops,
|
D | nfs3super.c | 16 .sops = &nfs_sops,
|
D | nfs.h | 20 const struct super_operations *sops; /* NFS Super operations */ member
|
D | nfs4super.c | 43 .sops = &nfs4_sops,
|
D | super.c | 1052 sb->s_op = server->nfs_client->cl_nfs_mod->sops; in nfs_fill_super()
|
/Linux-v6.6/fs/pstore/ |
D | inode.c | 146 const struct seq_operations *sops = NULL; in pstore_file_open() local 149 sops = &pstore_ftrace_seq_ops; in pstore_file_open() 151 err = seq_open(file, sops); in pstore_file_open()
|
/Linux-v6.6/net/core/ |
D | sock_map.c | 611 BPF_CALL_4(bpf_sock_map_update, struct bpf_sock_ops_kern *, sops, in BPF_CALL_4() argument 616 if (likely(sock_map_sk_is_suitable(sops->sk) && in BPF_CALL_4() 617 sock_map_op_okay(sops))) in BPF_CALL_4() 618 return sock_map_update_common(map, *(u32 *)key, sops->sk, in BPF_CALL_4() 1213 BPF_CALL_4(bpf_sock_hash_update, struct bpf_sock_ops_kern *, sops, in BPF_CALL_4() argument 1218 if (likely(sock_map_sk_is_suitable(sops->sk) && in BPF_CALL_4() 1219 sock_map_op_okay(sops))) in BPF_CALL_4() 1220 return sock_hash_update_common(map, key, sops->sk, flags); in BPF_CALL_4()
|
/Linux-v6.6/include/linux/ |
D | syscalls.h | 717 asmlinkage long sys_semtimedop(int semid, struct sembuf __user *sops, 720 asmlinkage long sys_semtimedop_time32(int semid, struct sembuf __user *sops, 723 asmlinkage long sys_semop(int semid, struct sembuf __user *sops,
|
D | security.h | 470 int security_sem_semop(struct kern_ipc_perm *sma, struct sembuf *sops, 1330 struct sembuf *sops, unsigned nsops, in security_sem_semop() argument
|
D | lsm_hook_defs.h | 260 LSM_HOOK(int, 0, sem_semop, struct kern_ipc_perm *perm, struct sembuf *sops,
|
/Linux-v6.6/security/ |
D | security.c | 3782 int security_sem_semop(struct kern_ipc_perm *sma, struct sembuf *sops, in security_sem_semop() argument 3785 return call_int_hook(sem_semop, 0, sma, sops, nsops, alter); in security_sem_semop()
|
/Linux-v6.6/security/smack/ |
D | smack_lsm.c | 3268 static int smack_sem_semop(struct kern_ipc_perm *isp, struct sembuf *sops, in smack_sem_semop() argument
|
/Linux-v6.6/security/selinux/ |
D | hooks.c | 6247 struct sembuf *sops, unsigned nsops, int alter) in selinux_sem_semop() argument
|