sops 319 arch/arm/kernel/sys_oabi-compat.c struct sembuf *sops; sops 328 arch/arm/kernel/sys_oabi-compat.c sops = kmalloc_array(nsops, sizeof(*sops), GFP_KERNEL); sops 329 arch/arm/kernel/sys_oabi-compat.c if (!sops) sops 335 arch/arm/kernel/sys_oabi-compat.c sops[i].sem_num = osb.sem_num; sops 336 arch/arm/kernel/sys_oabi-compat.c sops[i].sem_op = osb.sem_op; sops 337 arch/arm/kernel/sys_oabi-compat.c sops[i].sem_flg = osb.sem_flg; sops 350 arch/arm/kernel/sys_oabi-compat.c err = sys_semtimedop_time32(semid, sops, nsops, timeout); sops 353 arch/arm/kernel/sys_oabi-compat.c kfree(sops); sops 20 fs/nfs/nfs.h const struct super_operations *sops; /* NFS Super operations */ sops 15 fs/nfs/nfs2super.c .sops = &nfs_sops, sops 16 fs/nfs/nfs3super.c .sops = &nfs_sops, sops 72 fs/nfs/nfs4super.c .sops = &nfs4_sops, sops 2374 fs/nfs/super.c sb->s_op = server->nfs_client->cl_nfs_mod->sops; sops 142 fs/pstore/inode.c const struct seq_operations *sops = NULL; sops 145 fs/pstore/inode.c sops = &pstore_ftrace_seq_ops; sops 147 fs/pstore/inode.c err = seq_open(file, sops); sops 1683 include/linux/lsm_hooks.h int (*sem_semop)(struct kern_ipc_perm *perm, struct sembuf *sops, sops 431 include/linux/security.h int security_sem_semop(struct kern_ipc_perm *sma, struct sembuf *sops, sops 1207 include/linux/security.h struct sembuf *sops, unsigned nsops, sops 781 include/linux/syscalls.h asmlinkage long sys_semtimedop(int semid, struct sembuf __user *sops, sops 784 include/linux/syscalls.h asmlinkage long sys_semtimedop_time32(int semid, struct sembuf __user *sops, sops 787 include/linux/syscalls.h asmlinkage long sys_semop(int semid, struct sembuf __user *sops, sops 136 ipc/sem.c struct sembuf *sops; /* array of pending operations */ sops 272 ipc/sem.c curr = &sma->sems[q->sops[0].sem_num]; sops 367 ipc/sem.c static inline int sem_lock(struct sem_array *sma, struct sembuf *sops, sops 389 ipc/sem.c idx = array_index_nospec(sops->sem_num, sma->sem_nsems); sops 406 ipc/sem.c return sops->sem_num; sops 427 ipc/sem.c return sops->sem_num; sops 631 ipc/sem.c struct sembuf *sops; sops 634 ipc/sem.c sops = q->sops; sops 638 ipc/sem.c for (sop = sops; sop < sops + nsops; sop++) { sops 666 ipc/sem.c while (sop >= sops) { sops 687 ipc/sem.c while (sop >= sops) { sops 703 ipc/sem.c struct sembuf *sops; sops 706 ipc/sem.c sops = q->sops; sops 719 ipc/sem.c for (sop = sops; sop < sops + nsops; sop++) { sops 745 ipc/sem.c for (sop = sops; sop < sops + nsops; sop++) { sops 874 ipc/sem.c static int do_smart_wakeup_zero(struct sem_array *sma, struct sembuf *sops, sops 882 ipc/sem.c if (sops) { sops 884 ipc/sem.c int num = sops[i].sem_num; sops 967 ipc/sem.c do_smart_wakeup_zero(sma, q->sops, q->nsops, wake_q); sops 986 ipc/sem.c static void set_semotime(struct sem_array *sma, struct sembuf *sops) sops 988 ipc/sem.c if (sops == NULL) { sops 991 ipc/sem.c sma->sems[sops[0].sem_num].sem_otime = sops 1010 ipc/sem.c static void do_smart_update(struct sem_array *sma, struct sembuf *sops, int nsops, sops 1015 ipc/sem.c otime |= do_smart_wakeup_zero(sma, sops, nsops, wake_q); sops 1021 ipc/sem.c if (!sops) { sops 1039 ipc/sem.c if (sops[i].sem_op > 0) { sops 1041 ipc/sem.c sops[i].sem_num, wake_q); sops 1047 ipc/sem.c set_semotime(sma, sops); sops 1972 ipc/sem.c struct sembuf *sops = fast_sops, *sop; sops 1987 ipc/sem.c sops = kvmalloc_array(nsops, sizeof(*sops), GFP_KERNEL); sops 1988 ipc/sem.c if (sops == NULL) sops 1992 ipc/sem.c if (copy_from_user(sops, tsops, nsops * sizeof(*tsops))) { sops 2007 ipc/sem.c for (sop = sops; sop < sops + nsops; sop++) { sops 2060 ipc/sem.c error = security_sem_semop(&sma->sem_perm, sops, nsops, alter); sops 2067 ipc/sem.c locknum = sem_lock(sma, sops, nsops); sops 2088 ipc/sem.c queue.sops = sops; sops 2104 ipc/sem.c do_smart_update(sma, sops, nsops, 1, &wake_q); sops 2106 ipc/sem.c set_semotime(sma, sops); sops 2123 ipc/sem.c int idx = array_index_nospec(sops->sem_num, sma->sem_nsems); sops 2187 ipc/sem.c locknum = sem_lock(sma, sops, nsops); sops 2214 ipc/sem.c if (sops != fast_sops) sops 2215 ipc/sem.c kvfree(sops); sops 438 net/core/sock_map.c BPF_CALL_4(bpf_sock_map_update, struct bpf_sock_ops_kern *, sops, sops 443 net/core/sock_map.c if (likely(sock_map_sk_is_suitable(sops->sk) && sops 444 net/core/sock_map.c sock_map_op_okay(sops))) sops 445 net/core/sock_map.c return sock_map_update_common(map, *(u32 *)key, sops->sk, sops 900 net/core/sock_map.c BPF_CALL_4(bpf_sock_hash_update, struct bpf_sock_ops_kern *, sops, sops 905 net/core/sock_map.c if (likely(sock_map_sk_is_suitable(sops->sk) && sops 906 net/core/sock_map.c sock_map_op_okay(sops))) sops 907 net/core/sock_map.c return sock_hash_update_common(map, key, sops->sk, flags); sops 1864 security/security.c int security_sem_semop(struct kern_ipc_perm *sma, struct sembuf *sops, sops 1867 security/security.c return call_int_hook(sem_semop, 0, sma, sops, nsops, alter); sops 6254 security/selinux/hooks.c struct sembuf *sops, unsigned nsops, int alter) sops 3101 security/smack/smack_lsm.c static int smack_sem_semop(struct kern_ipc_perm *isp, struct sembuf *sops,