/linux-6.12.1/net/xfrm/ |
D | xfrm_nat_keepalive.c | 27 static void nat_keepalive_init(struct nat_keepalive *ka, struct xfrm_state *x) in nat_keepalive_init() argument 29 ka->net = xs_net(x); in nat_keepalive_init() 30 ka->family = x->props.family; in nat_keepalive_init() 31 ka->saddr = x->props.saddr; in nat_keepalive_init() 32 ka->daddr = x->id.daddr; in nat_keepalive_init() 33 ka->encap_sport = x->encap->encap_sport; in nat_keepalive_init() 34 ka->encap_dport = x->encap->encap_dport; in nat_keepalive_init() 35 ka->smark = xfrm_smark_get(0, x); in nat_keepalive_init() 39 struct nat_keepalive *ka) in nat_keepalive_send_ipv4() argument 41 struct net *net = ka->net; in nat_keepalive_send_ipv4() [all …]
|
/linux-6.12.1/arch/x86/kernel/ |
D | signal.c | 49 ksig->ka.sa.sa_flags & SA_IA32_ABI; in is_ia32_compat_frame() 60 ksig->ka.sa.sa_flags & SA_X32_ABI; in is_x32_frame() 97 struct k_sigaction *ka = &ksig->ka; in get_sigframe() local 112 if (ka->sa.sa_flags & SA_ONSTACK) { in get_sigframe() 125 !(ka->sa.sa_flags & SA_RESTORER) && in get_sigframe() 126 ka->sa.sa_restorer) { in get_sigframe() 128 sp = (unsigned long) ka->sa.sa_restorer; in get_sigframe() 243 if (ksig->ka.sa.sa_flags & SA_SIGINFO) in setup_rt_frame() 273 if (!(ksig->ka.sa.sa_flags & SA_RESTART)) { in handle_signal()
|
D | signal_64.c | 172 if (!(ksig->ka.sa.sa_flags & SA_RESTORER)) in x64_setup_rt_frame() 188 unsafe_put_user(ksig->ka.sa.sa_restorer, &frame->pretcode, Efault); in x64_setup_rt_frame() 193 if (ksig->ka.sa.sa_flags & SA_SIGINFO) { in x64_setup_rt_frame() 210 regs->ip = (unsigned long) ksig->ka.sa.sa_handler; in x64_setup_rt_frame() 311 if (!(ksig->ka.sa.sa_flags & SA_RESTORER)) in x32_setup_rt_frame() 329 restorer = ksig->ka.sa.sa_restorer; in x32_setup_rt_frame() 335 if (ksig->ka.sa.sa_flags & SA_SIGINFO) { in x32_setup_rt_frame() 342 regs->ip = (unsigned long) ksig->ka.sa.sa_handler; in x32_setup_rt_frame()
|
D | signal_32.c | 251 if (ksig->ka.sa.sa_flags & SA_RESTORER) { in ia32_setup_frame() 252 restorer = ksig->ka.sa.sa_restorer; in ia32_setup_frame() 278 regs->ip = (unsigned long) ksig->ka.sa.sa_handler; in ia32_setup_frame() 339 if (ksig->ka.sa.sa_flags & SA_RESTORER) in ia32_setup_rt_frame() 340 restorer = ksig->ka.sa.sa_restorer; in ia32_setup_rt_frame() 360 regs->ip = (unsigned long) ksig->ka.sa.sa_handler; in ia32_setup_rt_frame()
|
/linux-6.12.1/arch/mips/include/asm/ |
D | signal.h | 17 #define sig_uses_siginfo(ka, abi) \ argument 19 ((ka)->sa.sa_flags & SA_SIGINFO)) 21 #define sig_uses_siginfo(ka, abi) \ argument 24 ((ka)->sa.sa_flags & SA_SIGINFO) : 1) )
|
/linux-6.12.1/arch/s390/kernel/ |
D | signal.c | 265 get_sigframe(struct k_sigaction *ka, struct pt_regs * regs, size_t frame_size) in get_sigframe() argument 277 if (ka->sa.sa_flags & SA_ONSTACK) { in get_sigframe() 285 static int setup_frame(int sig, struct k_sigaction *ka, in setup_frame() argument 302 frame = get_sigframe(ka, regs, frame_size); in setup_frame() 333 if (ka->sa.sa_flags & SA_RESTORER) in setup_frame() 334 restorer = (unsigned long) ka->sa.sa_restorer; in setup_frame() 345 regs->psw.addr = (unsigned long) ka->sa.sa_handler; in setup_frame() 381 frame = get_sigframe(&ksig->ka, regs, frame_size); in setup_rt_frame() 391 if (ksig->ka.sa.sa_flags & SA_RESTORER) in setup_rt_frame() 392 restorer = (unsigned long) ksig->ka.sa.sa_restorer; in setup_rt_frame() [all …]
|
D | compat_signal.c | 231 get_sigframe(struct k_sigaction *ka, struct pt_regs * regs, size_t frame_size) in get_sigframe() argument 243 if (ka->sa.sa_flags & SA_ONSTACK) { in get_sigframe() 268 frame = get_sigframe(&ksig->ka, regs, frame_size); in setup_frame32() 300 if (ksig->ka.sa.sa_flags & SA_RESTORER) { in setup_frame32() 302 ksig->ka.sa.sa_restorer | PSW32_ADDR_AMODE; in setup_frame32() 314 regs->psw.addr = (__force __u64) ksig->ka.sa.sa_handler; in setup_frame32() 354 frame = get_sigframe(&ksig->ka, regs, frame_size); in setup_rt_frame32() 364 if (ksig->ka.sa.sa_flags & SA_RESTORER) { in setup_rt_frame32() 366 ksig->ka.sa.sa_restorer | PSW32_ADDR_AMODE; in setup_rt_frame32() 394 regs->psw.addr = (__u64 __force) ksig->ka.sa.sa_handler; in setup_rt_frame32() [all …]
|
/linux-6.12.1/arch/sh/kernel/ |
D | signal_32.c | 254 get_sigframe(struct k_sigaction *ka, unsigned long sp, size_t frame_size) in get_sigframe() argument 256 if (ka->sa.sa_flags & SA_ONSTACK) { in get_sigframe() 275 frame = get_sigframe(&ksig->ka, regs->regs[15], sizeof(*frame)); in setup_frame() 288 if (ksig->ka.sa.sa_flags & SA_RESTORER) { in setup_frame() 289 regs->pr = (unsigned long) ksig->ka.sa.sa_restorer; in setup_frame() 319 (struct fdpic_func_descriptor __user *)ksig->ka.sa.sa_handler; in setup_frame() 324 regs->pc = (unsigned long)ksig->ka.sa.sa_handler; in setup_frame() 341 frame = get_sigframe(&ksig->ka, regs->regs[15], sizeof(*frame)); in setup_rt_frame() 358 if (ksig->ka.sa.sa_flags & SA_RESTORER) { in setup_rt_frame() 359 regs->pr = (unsigned long) ksig->ka.sa.sa_restorer; in setup_rt_frame() [all …]
|
/linux-6.12.1/include/trace/events/ |
D | signal.h | 98 TP_PROTO(int sig, struct kernel_siginfo *info, struct k_sigaction *ka), 100 TP_ARGS(sig, info, ka), 113 __entry->sa_handler = (unsigned long)ka->sa.sa_handler; 114 __entry->sa_flags = ka->sa.sa_flags;
|
/linux-6.12.1/arch/um/kernel/ |
D | signal.c | 69 if (!(ksig->ka.sa.sa_flags & SA_RESTART)) { in handle_signal() 82 if ((ksig->ka.sa.sa_flags & SA_ONSTACK) && (sas_ss_flags(sp) == 0)) in handle_signal() 86 if (!(ksig->ka.sa.sa_flags & SA_SIGINFO)) in handle_signal()
|
/linux-6.12.1/arch/parisc/kernel/ |
D | signal.c | 161 get_sigframe(struct k_sigaction *ka, unsigned long sp, size_t frame_size) in get_sigframe() argument 167 __func__, (unsigned long)ka, sp, frame_size); in get_sigframe() 171 if ((ka->sa.sa_flags & SA_ONSTACK) != 0 && ! sas_ss_flags(sp)) in get_sigframe() 234 frame = get_sigframe(&ksig->ka, usp, sigframe_size); in setup_rt_frame() 284 haddr = A(ksig->ka.sa.sa_handler); in setup_rt_frame() 389 __func__, ksig->sig, &ksig->ka, &ksig->info, oldset, regs); in handle_signal() 451 syscall_restart(struct pt_regs *regs, struct k_sigaction *ka) in syscall_restart() argument 468 if (!(ka->sa.sa_flags & SA_RESTART)) { in syscall_restart() 563 syscall_restart(regs, &ksig.ka); in do_signal()
|
/linux-6.12.1/arch/x86/um/ |
D | signal.c | 375 if (ksig->ka.sa.sa_flags & SA_RESTORER) in setup_signal_stack_sc() 376 restorer = ksig->ka.sa.sa_restorer; in setup_signal_stack_sc() 400 PT_REGS_IP(regs) = (unsigned long) ksig->ka.sa.sa_handler; in setup_signal_stack_sc() 420 if (ksig->ka.sa.sa_flags & SA_RESTORER) in setup_signal_stack_si() 421 restorer = ksig->ka.sa.sa_restorer; in setup_signal_stack_si() 446 PT_REGS_IP(regs) = (unsigned long) ksig->ka.sa.sa_handler; in setup_signal_stack_si() 504 if (ksig->ka.sa.sa_flags & SA_SIGINFO) { in setup_signal_stack_si() 533 if (ksig->ka.sa.sa_flags & SA_RESTORER) in setup_signal_stack_si() 534 err |= __put_user((void *)ksig->ka.sa.sa_restorer, in setup_signal_stack_si() 554 PT_REGS_IP(regs) = (unsigned long) ksig->ka.sa.sa_handler; in setup_signal_stack_si()
|
/linux-6.12.1/arch/xtensa/kernel/ |
D | signal.c | 348 unsigned long handler = (unsigned long)ksig->ka.sa.sa_handler; in setup_frame() 364 if ((ksig->ka.sa.sa_flags & SA_ONSTACK) != 0 && sas_ss_flags(sp) == 0) { in setup_frame() 377 if (ksig->ka.sa.sa_flags & SA_SIGINFO) { in setup_frame() 389 if (ksig->ka.sa.sa_flags & SA_RESTORER) { in setup_frame() 392 (unsigned long __user *)ksig->ka.sa.sa_restorer; in setup_frame() 396 ra = (unsigned long)ksig->ka.sa.sa_restorer; in setup_frame() 475 if (!(ksig.ka.sa.sa_flags & SA_RESTART)) { in do_signal()
|
/linux-6.12.1/arch/arc/kernel/ |
D | signal.c | 296 if (unlikely(ksig->ka.sa.sa_flags & SA_SIGINFO)) { in setup_rt_frame() 321 regs->ret = (unsigned long)ksig->ka.sa.sa_handler; in setup_rt_frame() 327 if(!(ksig->ka.sa.sa_flags & SA_RESTORER)) in setup_rt_frame() 330 regs->blink = (unsigned long)ksig->ka.sa.sa_restorer; in setup_rt_frame() 345 static void arc_restart_syscall(struct k_sigaction *ka, struct pt_regs *regs) in arc_restart_syscall() argument 365 if (!(ka->sa.sa_flags & SA_RESTART)) { in arc_restart_syscall() 412 arc_restart_syscall(&ksig.ka, regs); in do_signal()
|
/linux-6.12.1/arch/sparc/kernel/ |
D | signal_32.c | 297 regs->pc = (unsigned long) ksig->ka.sa.sa_handler; in setup_frame() 301 if (ksig->ka.ka_restorer) in setup_frame() 302 regs->u_regs[UREG_I7] = (unsigned long)ksig->ka.ka_restorer; in setup_frame() 395 regs->pc = (unsigned long) ksig->ka.sa.sa_handler; in setup_rt_frame() 398 if (ksig->ka.ka_restorer) in setup_rt_frame() 399 regs->u_regs[UREG_I7] = (unsigned long)ksig->ka.ka_restorer; in setup_rt_frame() 423 if (ksig->ka.sa.sa_flags & SA_SIGINFO) in handle_signal() 496 syscall_restart(orig_i0, regs, &ksig.ka.sa); in do_signal()
|
D | signal32.c | 463 regs->tpc = (unsigned long) ksig->ka.sa.sa_handler; in setup_frame32() 471 if (ksig->ka.ka_restorer) { in setup_frame32() 472 regs->u_regs[UREG_I7] = (unsigned long)ksig->ka.ka_restorer; in setup_frame32() 595 regs->tpc = (unsigned long) ksig->ka.sa.sa_handler; in setup_rt_frame32() 603 if (ksig->ka.ka_restorer) in setup_rt_frame32() 604 regs->u_regs[UREG_I7] = (unsigned long)ksig->ka.ka_restorer; in setup_rt_frame32() 629 if (ksig->ka.sa.sa_flags & SA_SIGINFO) in handle_signal32() 677 syscall_restart32(orig_i0, regs, &ksig.ka.sa); in do_signal32()
|
/linux-6.12.1/arch/microblaze/kernel/ |
D | signal.c | 168 if (ksig->ka.sa.sa_flags & SA_SIGINFO) in setup_rt_frame() 220 regs->pc = (unsigned long)ksig->ka.sa.sa_handler; in setup_rt_frame() 232 handle_restart(struct pt_regs *regs, struct k_sigaction *ka, int has_handler) in handle_restart() argument 242 if (has_handler && !(ka->sa.sa_flags & SA_RESTART)) { in handle_restart() 293 handle_restart(regs, &ksig.ka, 1); in do_signal()
|
/linux-6.12.1/arch/arm/kernel/ |
D | signal.c | 324 unsigned long handler = (unsigned long)ksig->ka.sa.sa_handler; in setup_return() 345 if (ksig->ka.sa.sa_flags & SA_THIRTYTWO) in setup_return() 376 if (ksig->ka.sa.sa_flags & SA_RESTORER) { in setup_return() 377 retcode = (unsigned long)ksig->ka.sa.sa_restorer; in setup_return() 387 if (ksig->ka.sa.sa_flags & SA_SIGINFO) in setup_return() 398 if (ksig->ka.sa.sa_flags & SA_SIGINFO) in setup_return() 515 if (ksig->ka.sa.sa_flags & SA_SIGINFO) in handle_signal() 584 && !(ksig.ka.sa.sa_flags & SA_RESTART))) { in do_signal()
|
/linux-6.12.1/arch/alpha/kernel/ |
D | signal.c | 345 r26 = (unsigned long) ksig->ka.ka_restorer; in setup_frame() 360 regs->r27 = regs->pc = (unsigned long) ksig->ka.sa.sa_handler; in setup_frame() 399 r26 = (unsigned long) ksig->ka.ka_restorer; in setup_rt_frame() 414 regs->r27 = regs->pc = (unsigned long) ksig->ka.sa.sa_handler; in setup_rt_frame() 438 if (ksig->ka.sa.sa_flags & SA_SIGINFO) in handle_signal() 448 struct pt_regs *regs, struct k_sigaction *ka) in syscall_restart() argument 452 if (!(ka->sa.sa_flags & SA_RESTART)) { in syscall_restart() 495 syscall_restart(r0, r19, regs, &ksig.ka); in do_signal()
|
/linux-6.12.1/arch/arm64/kernel/ |
D | signal32.c | 314 static void compat_setup_return(struct pt_regs *regs, struct k_sigaction *ka, in compat_setup_return() argument 318 compat_ulong_t handler = ptr_to_compat(ka->sa.sa_handler); in compat_setup_return() 337 if (ka->sa.sa_flags & SA_RESTORER) { in compat_setup_return() 338 retcode = ptr_to_compat(ka->sa.sa_restorer); in compat_setup_return() 343 if (ka->sa.sa_flags & SA_SIGINFO) in compat_setup_return() 424 compat_setup_return(regs, &ksig->ka, frame->sig.retcode, frame, usig); in compat_setup_rt_frame() 447 compat_setup_return(regs, &ksig->ka, frame->retcode, frame, usig); in compat_setup_frame()
|
/linux-6.12.1/arch/powerpc/kernel/ |
D | signal.c | 178 static void check_syscall_restart(struct pt_regs *regs, struct k_sigaction *ka, in check_syscall_restart() argument 214 restart = !has_handler || (ka->sa.sa_flags & SA_RESTART) != 0; in check_syscall_restart() 254 check_syscall_restart(tsk->thread.regs, &ksig.ka, ksig.sig > 0); in do_signal() 283 if (ksig.ka.sa.sa_flags & SA_SIGINFO) in do_signal()
|
/linux-6.12.1/scripts/coccinelle/api/ |
D | kfree_mismatch.cocci | 213 ka << alloc.kok; 218 msg = "WARNING kmalloc (line %s) && vmalloc (line %s) are used to allocate this memory" % (ka[0].li… 222 ka << alloc.kok; 227 msg = "WARNING kmalloc (line %s) && vmalloc (line %s) are used to allocate this memory" % (ka[0].li…
|
/linux-6.12.1/arch/openrisc/kernel/ |
D | signal.c | 201 if (ksig->ka.sa.sa_flags & SA_SIGINFO) in setup_rt_frame() 230 regs->pc = (unsigned long)ksig->ka.sa.sa_handler; /* what we enter NOW */ in setup_rt_frame() 306 && !(ksig.ka.sa.sa_flags & SA_RESTART))) { in do_signal()
|
/linux-6.12.1/drivers/rtc/ |
D | rtc-mpc5121.c | 342 u32 ka; in mpc5121_rtc_probe() local 343 ka = in_be32(&rtc->regs->keep_alive); in mpc5121_rtc_probe() 344 if (ka & 0x02) { in mpc5121_rtc_probe() 347 out_be32(&rtc->regs->keep_alive, ka); in mpc5121_rtc_probe()
|
/linux-6.12.1/net/sched/ |
D | act_pedit.c | 47 const struct nlattr *ka; in tcf_pedit_keys_ex_parse() local 60 nla_for_each_nested(ka, nla, rem) { in tcf_pedit_keys_ex_parse() 70 if (nla_type(ka) != TCA_PEDIT_KEY_EX) { in tcf_pedit_keys_ex_parse() 71 NL_SET_ERR_MSG_ATTR(extack, ka, "Unknown attribute, expected extended key"); in tcf_pedit_keys_ex_parse() 77 ka, pedit_key_ex_policy, in tcf_pedit_keys_ex_parse()
|