| /OK3568_Linux_fs/kernel/fs/ceph/ |
| H A D | snap.c | 66 struct ceph_snap_realm *realm) in ceph_get_snap_realm() argument 76 if (atomic_inc_not_zero(&realm->nref)) in ceph_get_snap_realm() 80 if (atomic_inc_return(&realm->nref) == 1) in ceph_get_snap_realm() 81 list_del_init(&realm->empty_item); in ceph_get_snap_realm() 116 struct ceph_snap_realm *realm; in ceph_create_snap_realm() local 120 realm = kzalloc(sizeof(*realm), GFP_NOFS); in ceph_create_snap_realm() 121 if (!realm) in ceph_create_snap_realm() 124 atomic_set(&realm->nref, 1); /* for caller */ in ceph_create_snap_realm() 125 realm->ino = ino; in ceph_create_snap_realm() 126 INIT_LIST_HEAD(&realm->children); in ceph_create_snap_realm() [all …]
|
| H A D | quota.c | 128 struct ceph_snap_realm *realm) in lookup_quotarealm_inode() argument 133 qri = find_quotarealm_inode(mdsc, realm->ino); in lookup_quotarealm_inode() 158 in = ceph_lookup_inode(sb, realm->ino); in lookup_quotarealm_inode() 163 realm->ino, PTR_ERR(in)); in lookup_quotarealm_inode() 213 struct ceph_snap_realm *realm, *next; in get_quota_realm() local 221 realm = ceph_inode(inode)->i_snap_realm; in get_quota_realm() 222 if (realm) in get_quota_realm() 223 ceph_get_snap_realm(mdsc, realm); in get_quota_realm() 227 while (realm) { in get_quota_realm() 230 spin_lock(&realm->inodes_with_caps_lock); in get_quota_realm() [all …]
|
| H A D | caps.c | 706 struct ceph_snap_realm *realm = ceph_lookup_snap_realm(mdsc, in ceph_add_cap() local 708 if (realm) { in ceph_add_cap() 716 spin_lock(&realm->inodes_with_caps_lock); in ceph_add_cap() 718 &realm->inodes_with_caps); in ceph_add_cap() 719 ci->i_snap_realm = realm; in ceph_add_cap() 720 if (realm->ino == ci->i_vino.ino) in ceph_add_cap() 721 realm->inode = inode; in ceph_add_cap() 722 spin_unlock(&realm->inodes_with_caps_lock); in ceph_add_cap() 729 WARN_ON(!realm); in ceph_add_cap() 1121 struct ceph_snap_realm *realm = ci->i_snap_realm; in drop_inode_snap_realm() local [all …]
|
| H A D | inode.c | 570 struct ceph_snap_realm *realm = ci->i_snap_realm; in ceph_evict_inode() local 572 realm); in ceph_evict_inode() 573 spin_lock(&realm->inodes_with_caps_lock); in ceph_evict_inode() 576 if (realm->ino == ci->i_vino.ino) in ceph_evict_inode() 577 realm->inode = NULL; in ceph_evict_inode() 578 spin_unlock(&realm->inodes_with_caps_lock); in ceph_evict_inode() 579 ceph_put_snap_realm(mdsc, realm); in ceph_evict_inode() 988 le64_to_cpu(info->cap.realm), in ceph_fill_inode()
|
| H A D | mds_client.c | 3129 struct ceph_snap_realm *realm; in handle_reply() local 3248 realm = NULL; in handle_reply() 3254 &realm); in handle_reply() 3273 if (realm) in handle_reply() 3274 ceph_put_snap_realm(mdsc, realm); in handle_reply() 3917 struct ceph_snap_realm *realm = in encode_snap_realms() local 3942 realm->ino, realm->seq, realm->parent_ino); in encode_snap_realms() 3943 sr_rec.ino = cpu_to_le64(realm->ino); in encode_snap_realms() 3944 sr_rec.seq = cpu_to_le64(realm->seq); in encode_snap_realms() 3945 sr_rec.parent = cpu_to_le64(realm->parent_ino); in encode_snap_realms()
|
| H A D | super.h | 921 struct ceph_snap_realm *realm); 923 struct ceph_snap_realm *realm);
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/krb5/krb5/ |
| H A D | CVE-2021-36222.patch | 49 - realmstr = k5memdup0(realm.data, realm.length, &retval); 51 + realmstr = k5memdup0(realm.data, realm.length, &retval); 76 +realm = K5Realm() 82 +a = (hostname, realm.portbase) 100 + # [2] realm = KRBTEST.COM 116 +realm.kinit(realm.user_princ, password('user'))
|
| H A D | CVE-2021-37750.patch | 49 errcode = get_local_tgt(kdc_context, &sprinc->realm, header_server,
|
| H A D | CVE-2022-42898.patch | 21 privileges of a cross-realm KDC may be able to extract secrets from a
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/cyrus-sasl/cyrus-sasl/ |
| H A D | CVE-2022-24407.patch | 24 if (realm) sparams->utils->free(realm);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | kssl.h | 168 krb5_data *realm, krb5_data *entity, 179 const char *realm, int slen,
|
| H A D | krb5_asn.h | 112 ASN1_GENERALSTRING *realm; member
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/ppp/ppp/ |
| H A D | provider | 6 # MUST CHANGE: replace myusername@realm with the PPP login name given to 10 user "myusername@realm"
|
| /OK3568_Linux_fs/kernel/net/rxrpc/ |
| H A D | key.c | 177 kfree(princ->realm); in rxrpc_free_krb5_principal() 271 princ->realm = kmalloc(tmp + 1, GFP_KERNEL); in rxrpc_krb5_decode_principal() 272 if (!princ->realm) in rxrpc_krb5_decode_principal() 274 memcpy(princ->realm, xdr, tmp); in rxrpc_krb5_decode_principal() 275 princ->realm[tmp] = 0; in rxrpc_krb5_decode_principal() 279 _debug("%s/...@%s", princ->name_parts[0], princ->realm); in rxrpc_krb5_decode_principal() 1085 toksize += 4 + RND(strlen(princ->realm)); in rxrpc_read() 1091 toksize += 4 + RND(strlen(princ->realm)); in rxrpc_read() 1189 ENCODE_STR(princ->realm); in rxrpc_read() 1195 ENCODE_STR(princ->realm); in rxrpc_read()
|
| /OK3568_Linux_fs/buildroot/dl/sox/git/src/ |
| H A D | effects_i_dsp.c | 323 double realm = log(tr_bw/.0005)/log(2.); in lsx_kaiser_beta() local 324 double const * c0 = coefs[range_limit( (int)realm, 0, (int)array_length(coefs)-1)]; in lsx_kaiser_beta() 325 double const * c1 = coefs[range_limit(1+(int)realm, 0, (int)array_length(coefs)-1)]; in lsx_kaiser_beta() 328 return b0 + (b1 - b0) * (realm - (int)realm); in lsx_kaiser_beta()
|
| /OK3568_Linux_fs/external/rknpu2/examples/3rdparty/zlmediakit/include/ |
| H A D | mk_events.h | 126 const char *realm,
|
| H A D | mk_events_objects.h | 245 const char *realm);
|
| /OK3568_Linux_fs/kernel/include/keys/ |
| H A D | rxrpc-type.h | 41 char *realm; /* parts of the realm part of the principal */ member
|
| /OK3568_Linux_fs/buildroot/package/libkrb5/ |
| H A D | 0001-Fix-KDC-null-deref-on-TGS-inner-body-null-server.patch | 46 errcode = get_local_tgt(kdc_context, &sprinc->realm, header_server,
|
| /OK3568_Linux_fs/app/forlinx/flapp/src/plugins/imxwayland/simplebrowser/ |
| H A D | webpage.cpp | 103 .arg(auth->realm()).arg(requestUrl.toString().toHtmlEscaped())); in handleAuthenticationRequired()
|
| /OK3568_Linux_fs/app/forlinx/flapp/src/plugins/simplebrowser/ |
| H A D | webpage.cpp | 105 .arg(auth->realm()).arg(requestUrl.toString().toHtmlEscaped())); in handleAuthenticationRequired()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/krb5/ |
| H A D | krb5_1.17.2.bb | 10 authentication credentials for a Kerberos realm, holds the master keys \ 11 for the realm, and responds to authentication requests. This package \
|
| /OK3568_Linux_fs/kernel/include/linux/ceph/ |
| H A D | ceph_fs.h | 501 __le64 realm; /* snap realm */ member 708 __le64 ino, realm; member
|
| /OK3568_Linux_fs/app/forlinx/forlinx_up4_qt/simplebrowser/ |
| H A D | webpage.cpp | 110 .arg(auth->realm()).arg(requestUrl.toString().toHtmlEscaped())); in handleAuthenticationRequired()
|
| /OK3568_Linux_fs/app/forlinx/forlinx_qt/simplebrowser/ |
| H A D | webpage.cpp | 110 .arg(auth->realm()).arg(requestUrl.toString().toHtmlEscaped())); in handleAuthenticationRequired()
|