/linux-6.3-rc2/include/linux/ |
A D | signal.h | 68 set->sig[0] |= 1UL << sig; in sigaddset() 70 set->sig[sig / _NSIG_BPW] |= 1UL << (sig % _NSIG_BPW); in sigaddset() 77 set->sig[0] &= ~(1UL << sig); in sigdelset() 79 set->sig[sig / _NSIG_BPW] &= ~(1UL << (sig % _NSIG_BPW)); in sigdelset() 86 return 1 & (set->sig[0] >> sig); in sigismember() 88 return 1 & (set->sig[sig / _NSIG_BPW] >> (sig % _NSIG_BPW)); in sigismember() 98 set->sig[1] | set->sig[0]) == 0; in sigisemptyset() 114 (set1->sig[2] == set2->sig[2]) && in sigequalsets() 116 (set1->sig[0] == set2->sig[0]); in sigequalsets() 119 (set1->sig[0] == set2->sig[0]); in sigequalsets() [all …]
|
A D | compat.h | 454 case 4: v.sig[7] = (set->sig[3] >> 32); v.sig[6] = set->sig[3]; in put_compat_sigset() 456 case 3: v.sig[5] = (set->sig[2] >> 32); v.sig[4] = set->sig[2]; in put_compat_sigset() 458 case 2: v.sig[3] = (set->sig[1] >> 32); v.sig[2] = set->sig[1]; in put_compat_sigset() 460 case 1: v.sig[1] = (set->sig[0] >> 32); v.sig[0] = set->sig[0]; in put_compat_sigset() 475 unsafe_put_user(__s->sig[3] >> 32, &__c->sig[7], label); \ 476 unsafe_put_user(__s->sig[3], &__c->sig[6], label); \ 479 unsafe_put_user(__s->sig[2] >> 32, &__c->sig[5], label); \ 480 unsafe_put_user(__s->sig[2], &__c->sig[4], label); \ 483 unsafe_put_user(__s->sig[1] >> 32, &__c->sig[3], label); \ 484 unsafe_put_user(__s->sig[1], &__c->sig[2], label); \ [all …]
|
/linux-6.3-rc2/arch/x86/include/asm/ |
A D | signal.h | 24 unsigned long sig[_NSIG_WORDS]; member 44 #define sigaddset(set,sig) \ argument 45 (__builtin_constant_p(sig) \ 56 unsigned long sig = _sig - 1; in __const_sigaddset() local 57 set->sig[sig / _NSIG_BPW] |= 1 << (sig % _NSIG_BPW); in __const_sigaddset() 61 (__builtin_constant_p(sig) \ 73 unsigned long sig = _sig - 1; in __const_sigdelset() local 74 set->sig[sig / _NSIG_BPW] &= ~(1 << (sig % _NSIG_BPW)); in __const_sigdelset() 79 unsigned long sig = _sig - 1; in __const_sigismember() local 80 return 1 & (set->sig[sig / _NSIG_BPW] >> (sig % _NSIG_BPW)); in __const_sigismember() [all …]
|
/linux-6.3-rc2/drivers/pinctrl/aspeed/ |
A D | pinmux-aspeed.h | 513 #define SIG_DESC_LIST_SYM(sig, group) sig_descs_ ## sig ## _ ## group argument 518 #define SIG_EXPR_SYM(sig, group) sig_expr_ ## sig ## _ ## group argument 522 .signal = #sig, \ 555 #define SIG_EXPR_PTR(sig, group) (&SIG_EXPR_SYM(sig, group)) argument 557 #define SIG_EXPR_LIST_SYM(sig, group) sig_exprs_ ## sig ## _ ## group argument 596 SIG_EXPR_LIST_SYM(pin, sig)[ARRAY_SIZE(SIG_EXPR_LIST_SYM(sig, group))] \ 615 SIG_EXPR_LIST_DECL(sig, func, SIG_EXPR_PTR(sig, func)); \ 631 SIG_EXPR_LIST_DECL(sig, group, SIG_EXPR_PTR(sig, group)); \ 650 #define SIG_EXPR_LIST_PTR(sig, group) SIG_EXPR_LIST_SYM(sig, group) argument 693 SIG_EXPR_LIST_DECL_SESG(pin, sig, sig, __VA_ARGS__); \ [all …]
|
/linux-6.3-rc2/crypto/asymmetric_keys/ |
A D | restrict.c | 88 if (!sig) in restrict_link_by_signature() 90 if (!sig->auth_ids[0] && !sig->auth_ids[1] && !sig->auth_ids[2]) in restrict_link_by_signature() 98 sig->auth_ids[0], sig->auth_ids[1], in restrict_link_by_signature() 141 if (!sig) in key_or_keyring_common() 143 if (!sig->auth_ids[0] && !sig->auth_ids[1] && !sig->auth_ids[2]) in key_or_keyring_common() 150 sig->auth_ids[1], in key_or_keyring_common() 179 if (!sig->auth_ids[0] && !sig->auth_ids[1]) { in key_or_keyring_common() 181 sig->auth_ids[2])) in key_or_keyring_common() 184 } else if (!sig->auth_ids[0] || !sig->auth_ids[1]) { in key_or_keyring_common() 187 auth_id = sig->auth_ids[0] ?: sig->auth_ids[1]; in key_or_keyring_common() [all …]
|
A D | pkcs7_verify.c | 25 struct public_key_signature *sig = sinfo->sig; in pkcs7_digest() local 34 if (sig->digest) in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 52 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 186 sinfo->sig->auth_ids[0]->len, sinfo->sig->auth_ids[0]->data); in pkcs7_find_key() 224 sig = x509->sig; in pkcs7_verify_sig_chain() 225 if (sig->auth_ids[0]) in pkcs7_verify_sig_chain() 227 sig->auth_ids[0]->len, sig->auth_ids[0]->data); in pkcs7_verify_sig_chain() [all …]
|
A D | x509_public_key.c | 25 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() local 37 if (!sig->s) in x509_get_sig_params() 58 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 59 if (!sig->digest) in x509_get_sig_params() 72 ret = is_hash_blacklisted(sig->digest, sig->digest_size, in x509_get_sig_params() 76 sig->digest_size, sig->digest); in x509_get_sig_params() 104 if (cert->sig->auth_ids[0] || cert->sig->auth_ids[1]) { in x509_check_for_self_signed() 116 cert->sig->auth_ids[0] && cert->sig->auth_ids[1]) in x509_check_for_self_signed() 166 cert->sig = NULL; in x509_key_preparse() 169 cert->sig->pkey_algo, cert->sig->hash_algo); in x509_key_preparse() [all …]
|
A D | public_key.c | 325 BUG_ON(!sig->data); in cert_sig_digest_update() 328 if (!sig->hash_algo || strcmp(sig->hash_algo, "sm3") != 0) in cert_sig_digest_update() 357 ret = crypto_shash_finup(desc, sig->data, sig->data_size, sig->digest); in cert_sig_digest_update() 367 const struct public_key_signature *sig, in cert_sig_digest_update() argument 391 BUG_ON(!sig); in public_key_verify_signature() 392 BUG_ON(!sig->s); in public_key_verify_signature() 402 if (sig->pkey_algo) { in public_key_verify_signature() 410 sig->hash_algo, alg_name); in public_key_verify_signature() 448 sg_set_buf(&src_sg[0], sig->s, sig->s_size); in public_key_verify_signature() 449 sg_set_buf(&src_sg[1], sig->digest, sig->digest_size); in public_key_verify_signature() [all …]
|
A D | pkcs7_trust.c | 26 struct public_key_signature *sig = sinfo->sig; in pkcs7_validate_trust_one() local 75 sig = last->sig; in pkcs7_validate_trust_one() 81 if (last && (last->sig->auth_ids[0] || last->sig->auth_ids[1])) { in pkcs7_validate_trust_one() 83 last->sig->auth_ids[0], in pkcs7_validate_trust_one() 84 last->sig->auth_ids[1], in pkcs7_validate_trust_one() 100 sinfo->sig->auth_ids[0], NULL, NULL, false); in pkcs7_validate_trust_one() 105 sig = sinfo->sig; in pkcs7_validate_trust_one() 115 ret = verify_signature(key, sig); in pkcs7_validate_trust_one()
|
A D | x509_cert_parser.c | 48 public_key_signature_free(cert->sig); in x509_free_certificate() 76 if (!cert->sig) in x509_cert_parse() 204 ctx->cert->sig->hash_algo = "md4"; in x509_note_sig_algo() 256 ctx->cert->sig->hash_algo = "sm3"; in x509_note_sig_algo() 261 ctx->cert->sig->pkey_algo = "rsa"; in x509_note_sig_algo() 262 ctx->cert->sig->encoding = "pkcs1"; in x509_note_sig_algo() 267 ctx->cert->sig->encoding = "raw"; in x509_note_sig_algo() 271 ctx->cert->sig->pkey_algo = "sm2"; in x509_note_sig_algo() 272 ctx->cert->sig->encoding = "raw"; in x509_note_sig_algo() 277 ctx->cert->sig->encoding = "x962"; in x509_note_sig_algo() [all …]
|
A D | signature.c | 23 void public_key_signature_free(struct public_key_signature *sig) in public_key_signature_free() argument 27 if (sig) { in public_key_signature_free() 28 for (i = 0; i < ARRAY_SIZE(sig->auth_ids); i++) in public_key_signature_free() 29 kfree(sig->auth_ids[i]); in public_key_signature_free() 30 kfree(sig->s); in public_key_signature_free() 31 kfree(sig->digest); in public_key_signature_free() 32 kfree(sig); in public_key_signature_free() 138 const struct public_key_signature *sig) in verify_signature() argument 154 ret = subtype->verify_signature(key, sig); in verify_signature()
|
A D | pkcs7_parser.c | 48 public_key_signature_free(sinfo->sig); in pkcs7_free_signed_info() 132 if (!ctx->sinfo->sig) in pkcs7_parse_message() 231 ctx->sinfo->sig->hash_algo = "md4"; in pkcs7_sig_note_digest_algo() 234 ctx->sinfo->sig->hash_algo = "md5"; in pkcs7_sig_note_digest_algo() 252 ctx->sinfo->sig->hash_algo = "sm3"; in pkcs7_sig_note_digest_algo() 291 ctx->sinfo->sig->encoding = "raw"; in pkcs7_sig_note_pkey_algo() 296 ctx->sinfo->sig->encoding = "raw"; in pkcs7_sig_note_pkey_algo() 657 if (!ctx->sinfo->sig->s) in pkcs7_sig_note_signature() 660 ctx->sinfo->sig->s_size = vlen; in pkcs7_sig_note_signature() 696 sinfo->sig->auth_ids[0] = kid; in pkcs7_note_signed_info() [all …]
|
/linux-6.3-rc2/drivers/gpu/ipu-v3/ |
A D | ipu-di.c | 205 u32 h_total = sig->mode.hactive + sig->mode.hsync_len + in ipu_di_sync_config_interlaced() 206 sig->mode.hback_porch + sig->mode.hfront_porch; in ipu_di_sync_config_interlaced() 207 u32 v_total = sig->mode.vactive + sig->mode.vsync_len + in ipu_di_sync_config_interlaced() 208 sig->mode.vback_porch + sig->mode.vfront_porch; in ipu_di_sync_config_interlaced() 268 u32 h_total = sig->mode.hactive + sig->mode.hsync_len + in ipu_di_sync_config_noninterlaced() 269 sig->mode.hback_porch + sig->mode.hfront_porch; in ipu_di_sync_config_noninterlaced() 270 u32 v_total = sig->mode.vactive + sig->mode.vsync_len + in ipu_di_sync_config_noninterlaced() 271 sig->mode.vback_porch + sig->mode.vfront_porch; in ipu_di_sync_config_noninterlaced() 383 if (sig->hsync_pin == 2 && sig->vsync_pin == 3) in ipu_di_sync_config_noninterlaced() 568 di->id, sig->mode.hactive, sig->mode.vactive); in ipu_di_init_sync_panel() [all …]
|
/linux-6.3-rc2/kernel/ |
A D | signal.c | 134 ready |= signal->sig[i] &~ blocked->sig[i]; in has_pending_signals() 137 case 4: ready = signal->sig[3] &~ blocked->sig[3]; in has_pending_signals() 138 ready |= signal->sig[2] &~ blocked->sig[2]; in has_pending_signals() 139 ready |= signal->sig[1] &~ blocked->sig[1]; in has_pending_signals() 140 ready |= signal->sig[0] &~ blocked->sig[0]; in has_pending_signals() 143 case 2: ready = signal->sig[1] &~ blocked->sig[1]; in has_pending_signals() 144 ready |= signal->sig[0] &~ blocked->sig[0]; in has_pending_signals() 147 case 1: ready = signal->sig[0] &~ blocked->sig[0]; in has_pending_signals() 618 if (sig) in __dequeue_signal() 2115 if (valid_signal(sig) && sig) in do_notify_parent() [all …]
|
/linux-6.3-rc2/arch/um/os-Linux/ |
A D | signal.c | 39 if (sig == SIGSEGV) { in sig_handler_common() 46 if ((sig != SIGIO) && (sig != SIGWINCH)) in sig_handler_common() 49 (*sig_info[sig])(sig, si, &r); in sig_handler_common() 95 sig_handler_common(sig, si, mc); in sig_handler() 181 unsigned long pending = 1UL << sig; in hard_handler() 204 sig--; in hard_handler() 205 pending &= ~(1 << sig); in hard_handler() 206 (*handlers[sig])(sig, (struct siginfo *)si, mc); in hard_handler() 220 void set_handler(int sig) in set_handler() argument 234 if (sig == SIGSEGV) in set_handler() [all …]
|
/linux-6.3-rc2/tools/lib/subcmd/ |
A D | sigchain.c | 15 static void check_signum(int sig) in check_signum() argument 17 if (sig < 1 || sig >= SIGCHAIN_MAX_SIGNALS) in check_signum() 18 die("BUG: signal out of range: %d", sig); in check_signum() 21 static int sigchain_push(int sig, sigchain_fun f) in sigchain_push() argument 23 struct sigchain_signal *s = signals + sig; in sigchain_push() 24 check_signum(sig); in sigchain_push() 27 s->old[s->n] = signal(sig, f); in sigchain_push() 34 int sigchain_pop(int sig) in sigchain_pop() argument 36 struct sigchain_signal *s = signals + sig; in sigchain_pop() 37 check_signum(sig); in sigchain_pop() [all …]
|
/linux-6.3-rc2/arch/x86/lib/ |
A D | cpu.c | 6 unsigned int x86_family(unsigned int sig) in x86_family() argument 10 x86 = (sig >> 8) & 0xf; in x86_family() 13 x86 += (sig >> 20) & 0xff; in x86_family() 19 unsigned int x86_model(unsigned int sig) in x86_model() argument 23 fam = x86_family(sig); in x86_model() 25 model = (sig >> 4) & 0xf; in x86_model() 28 model += ((sig >> 16) & 0xf) << 4; in x86_model() 34 unsigned int x86_stepping(unsigned int sig) in x86_stepping() argument 36 return sig & 0xf; in x86_stepping()
|
/linux-6.3-rc2/arch/m68k/include/asm/ |
A D | signal.h | 17 unsigned long sig[_NSIG_WORDS]; member 45 unsigned long sig = _sig - 1; in __const_sigismember() local 46 return 1 & (set->sig[sig / _NSIG_BPW] >> (sig % _NSIG_BPW)); in __const_sigismember() 59 #define sigismember(set,sig) \ argument 60 (__builtin_constant_p(sig) ? \ 61 __const_sigismember(set,sig) : \ 62 __gen_sigismember(set,sig))
|
/linux-6.3-rc2/include/trace/events/ |
A D | signal.h | 52 TP_PROTO(int sig, struct kernel_siginfo *info, struct task_struct *task, 55 TP_ARGS(sig, info, task, group, result), 58 __field( int, sig ) 68 __entry->sig = sig; 77 __entry->sig, __entry->errno, __entry->code, 98 TP_PROTO(int sig, struct kernel_siginfo *info, struct k_sigaction *ka), 100 TP_ARGS(sig, info, ka), 103 __field( int, sig ) 111 __entry->sig = sig; 118 __entry->sig, __entry->errno, __entry->code,
|
/linux-6.3-rc2/drivers/eisa/ |
A D | eisa-bus.c | 62 if (!strcmp(edev->id.sig, eisa_table[i].id.sig)) { in eisa_name_device() 78 u8 sig[4]; in decode_eisa_sig() local 93 sig[i] = inb(addr + i); in decode_eisa_sig() 100 sig_str[1] = (((sig[0] & 3) << 3) | (sig[1] >> 5)) + ('A' - 1); in decode_eisa_sig() 102 rev = (sig[2] << 8) | sig[3]; in decode_eisa_sig() 118 if (!strcmp(eids->sig, edev->id.sig) && in eisa_bus_match() 186 char *sig; in eisa_init_device() local 193 if (!sig) in eisa_init_device() 196 memcpy(edev->id.sig, sig, EISA_SIG_LEN); in eisa_init_device() 345 edev->id.sig); in eisa_probe() [all …]
|
/linux-6.3-rc2/arch/mips/sgi-ip22/ |
A D | ip22-eisa.c | 54 u8 sig[4]; in decode_eisa_sig() local 59 sig[i] = inb(addr + i); in decode_eisa_sig() 61 if (!i && (sig[0] & 0x80)) in decode_eisa_sig() 65 sig_str[0] = ((sig[0] >> 2) & 0x1f) + ('A' - 1); in decode_eisa_sig() 66 sig_str[1] = (((sig[0] & 3) << 3) | (sig[1] >> 5)) + ('A' - 1); in decode_eisa_sig() 67 sig_str[2] = (sig[1] & 0x1f) + ('A' - 1); in decode_eisa_sig() 68 rev = (sig[2] << 8) | sig[3]; in decode_eisa_sig()
|
/linux-6.3-rc2/drivers/net/wireless/ |
A D | wl3501_cs.c | 397 wl3501_set_to_wla(this, ptr, &sig, sizeof(sig)); in wl3501_request_mib() 441 wl3501_set_to_wla(this, ptr, &sig, sizeof(sig)); in wl3501_pwr_mgmt() 545 wl3501_set_to_wla(this, sig_bf, &sig, sizeof(sig)); in wl3501_send_pkt() 558 return wl3501_esbq_exec(this, &sig, sizeof(sig)); in wl3501_mgmt_resync() 585 return wl3501_esbq_exec(this, &sig, sizeof(sig)); in wl3501_mgmt_scan() 603 return wl3501_esbq_exec(this, &sig, sizeof(sig)); in wl3501_mgmt_join() 656 return wl3501_esbq_exec(this, &sig, sizeof(sig)); in wl3501_mgmt_start() 666 wl3501_get_from_wla(this, addr, &sig, sizeof(sig)); in wl3501_mgmt_scan_confirm() 697 &sig.req, sizeof(sig.req)); in wl3501_mgmt_scan_confirm() 863 return wl3501_esbq_exec(this, &sig, sizeof(sig)); in wl3501_mgmt_auth() [all …]
|
/linux-6.3-rc2/arch/ia64/kernel/ |
A D | traps.c | 103 int sig, code; in ia64_bad_break() local 112 sig = SIGILL; code = ILL_ILLOPC; in ia64_bad_break() 116 sig = SIGFPE; code = FPE_INTDIV; in ia64_bad_break() 120 sig = SIGFPE; code = FPE_INTOVF; in ia64_bad_break() 124 sig = SIGFPE; code = FPE_FLTSUB; in ia64_bad_break() 128 sig = SIGSEGV; code = SEGV_MAPERR; in ia64_bad_break() 132 sig = SIGSEGV; code = BUS_ADRALN; in ia64_bad_break() 177 force_sig_fault(sig, code, in ia64_bad_break() 422 int result, sig, si_code; in ia64_fault() local 475 sig = SIGSEGV; in ia64_fault() [all …]
|
/linux-6.3-rc2/arch/mips/kernel/ |
A D | signal32.c | 38 SYSCALL_DEFINE3(32_sigaction, long, sig, const struct compat_sigaction __user *, act, 54 err |= __get_user(mask, &act->sa_mask.sig[0]); 61 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); 69 err |= __put_user(old_ka.sa.sa_mask.sig[0], oact->sa_mask.sig); 70 err |= __put_user(0, &oact->sa_mask.sig[1]); 71 err |= __put_user(0, &oact->sa_mask.sig[2]); 72 err |= __put_user(0, &oact->sa_mask.sig[3]);
|
/linux-6.3-rc2/security/apparmor/ |
A D | ipc.c | 21 static inline int map_signal_num(int sig) in map_signal_num() argument 23 if (sig > SIGRTMAX) in map_signal_num() 25 else if (sig >= SIGRTMIN) in map_signal_num() 26 return sig - SIGRTMIN + SIGRT_BASE; in map_signal_num() 27 else if (sig < MAXMAPPED_SIG) in map_signal_num() 28 return sig_map[sig]; in map_signal_num() 100 int aa_may_signal(struct aa_label *sender, struct aa_label *target, int sig) in aa_may_signal() argument 105 aad(&sa)->signal = map_signal_num(sig); in aa_may_signal() 106 aad(&sa)->unmappedsig = sig; in aa_may_signal()
|