sops              319 arch/arm/kernel/sys_oabi-compat.c 	struct sembuf *sops;
sops              328 arch/arm/kernel/sys_oabi-compat.c 	sops = kmalloc_array(nsops, sizeof(*sops), GFP_KERNEL);
sops              329 arch/arm/kernel/sys_oabi-compat.c 	if (!sops)
sops              335 arch/arm/kernel/sys_oabi-compat.c 		sops[i].sem_num = osb.sem_num;
sops              336 arch/arm/kernel/sys_oabi-compat.c 		sops[i].sem_op = osb.sem_op;
sops              337 arch/arm/kernel/sys_oabi-compat.c 		sops[i].sem_flg = osb.sem_flg;
sops              350 arch/arm/kernel/sys_oabi-compat.c 		err = sys_semtimedop_time32(semid, sops, nsops, timeout);
sops              353 arch/arm/kernel/sys_oabi-compat.c 	kfree(sops);
sops               20 fs/nfs/nfs.h   	const struct super_operations *sops;	/* NFS Super operations */
sops               15 fs/nfs/nfs2super.c 	.sops     = &nfs_sops,
sops               16 fs/nfs/nfs3super.c 	.sops     = &nfs_sops,
sops               72 fs/nfs/nfs4super.c 	.sops     = &nfs4_sops,
sops             2374 fs/nfs/super.c 	sb->s_op = server->nfs_client->cl_nfs_mod->sops;
sops              142 fs/pstore/inode.c 	const struct seq_operations *sops = NULL;
sops              145 fs/pstore/inode.c 		sops = &pstore_ftrace_seq_ops;
sops              147 fs/pstore/inode.c 	err = seq_open(file, sops);
sops             1683 include/linux/lsm_hooks.h 	int (*sem_semop)(struct kern_ipc_perm *perm, struct sembuf *sops,
sops              431 include/linux/security.h int security_sem_semop(struct kern_ipc_perm *sma, struct sembuf *sops,
sops             1207 include/linux/security.h 				     struct sembuf *sops, unsigned nsops,
sops              781 include/linux/syscalls.h asmlinkage long sys_semtimedop(int semid, struct sembuf __user *sops,
sops              784 include/linux/syscalls.h asmlinkage long sys_semtimedop_time32(int semid, struct sembuf __user *sops,
sops              787 include/linux/syscalls.h asmlinkage long sys_semop(int semid, struct sembuf __user *sops,
sops              136 ipc/sem.c      	struct sembuf		*sops;	 /* array of pending operations */
sops              272 ipc/sem.c      		curr = &sma->sems[q->sops[0].sem_num];
sops              367 ipc/sem.c      static inline int sem_lock(struct sem_array *sma, struct sembuf *sops,
sops              389 ipc/sem.c      	idx = array_index_nospec(sops->sem_num, sma->sem_nsems);
sops              406 ipc/sem.c      			return sops->sem_num;
sops              427 ipc/sem.c      		return sops->sem_num;
sops              631 ipc/sem.c      	struct sembuf *sops;
sops              634 ipc/sem.c      	sops = q->sops;
sops              638 ipc/sem.c      	for (sop = sops; sop < sops + nsops; sop++) {
sops              666 ipc/sem.c      	while (sop >= sops) {
sops              687 ipc/sem.c      	while (sop >= sops) {
sops              703 ipc/sem.c      	struct sembuf *sops;
sops              706 ipc/sem.c      	sops = q->sops;
sops              719 ipc/sem.c      	for (sop = sops; sop < sops + nsops; sop++) {
sops              745 ipc/sem.c      	for (sop = sops; sop < sops + nsops; sop++) {
sops              874 ipc/sem.c      static int do_smart_wakeup_zero(struct sem_array *sma, struct sembuf *sops,
sops              882 ipc/sem.c      	if (sops) {
sops              884 ipc/sem.c      			int num = sops[i].sem_num;
sops              967 ipc/sem.c      			do_smart_wakeup_zero(sma, q->sops, q->nsops, wake_q);
sops              986 ipc/sem.c      static void set_semotime(struct sem_array *sma, struct sembuf *sops)
sops              988 ipc/sem.c      	if (sops == NULL) {
sops              991 ipc/sem.c      		sma->sems[sops[0].sem_num].sem_otime =
sops             1010 ipc/sem.c      static void do_smart_update(struct sem_array *sma, struct sembuf *sops, int nsops,
sops             1015 ipc/sem.c      	otime |= do_smart_wakeup_zero(sma, sops, nsops, wake_q);
sops             1021 ipc/sem.c      		if (!sops) {
sops             1039 ipc/sem.c      				if (sops[i].sem_op > 0) {
sops             1041 ipc/sem.c      							      sops[i].sem_num, wake_q);
sops             1047 ipc/sem.c      		set_semotime(sma, sops);
sops             1972 ipc/sem.c      	struct sembuf *sops = fast_sops, *sop;
sops             1987 ipc/sem.c      		sops = kvmalloc_array(nsops, sizeof(*sops), GFP_KERNEL);
sops             1988 ipc/sem.c      		if (sops == NULL)
sops             1992 ipc/sem.c      	if (copy_from_user(sops, tsops, nsops * sizeof(*tsops))) {
sops             2007 ipc/sem.c      	for (sop = sops; sop < sops + nsops; sop++) {
sops             2060 ipc/sem.c      	error = security_sem_semop(&sma->sem_perm, sops, nsops, alter);
sops             2067 ipc/sem.c      	locknum = sem_lock(sma, sops, nsops);
sops             2088 ipc/sem.c      	queue.sops = sops;
sops             2104 ipc/sem.c      			do_smart_update(sma, sops, nsops, 1, &wake_q);
sops             2106 ipc/sem.c      			set_semotime(sma, sops);
sops             2123 ipc/sem.c      		int idx = array_index_nospec(sops->sem_num, sma->sem_nsems);
sops             2187 ipc/sem.c      		locknum = sem_lock(sma, sops, nsops);
sops             2214 ipc/sem.c      	if (sops != fast_sops)
sops             2215 ipc/sem.c      		kvfree(sops);
sops              438 net/core/sock_map.c BPF_CALL_4(bpf_sock_map_update, struct bpf_sock_ops_kern *, sops,
sops              443 net/core/sock_map.c 	if (likely(sock_map_sk_is_suitable(sops->sk) &&
sops              444 net/core/sock_map.c 		   sock_map_op_okay(sops)))
sops              445 net/core/sock_map.c 		return sock_map_update_common(map, *(u32 *)key, sops->sk,
sops              900 net/core/sock_map.c BPF_CALL_4(bpf_sock_hash_update, struct bpf_sock_ops_kern *, sops,
sops              905 net/core/sock_map.c 	if (likely(sock_map_sk_is_suitable(sops->sk) &&
sops              906 net/core/sock_map.c 		   sock_map_op_okay(sops)))
sops              907 net/core/sock_map.c 		return sock_hash_update_common(map, key, sops->sk, flags);
sops             1864 security/security.c int security_sem_semop(struct kern_ipc_perm *sma, struct sembuf *sops,
sops             1867 security/security.c 	return call_int_hook(sem_semop, 0, sma, sops, nsops, alter);
sops             6254 security/selinux/hooks.c 			     struct sembuf *sops, unsigned nsops, int alter)
sops             3101 security/smack/smack_lsm.c static int smack_sem_semop(struct kern_ipc_perm *isp, struct sembuf *sops,