Home
last modified time | relevance | path

Searched refs:sig (Results 1 – 25 of 581) sorted by relevance

12345678910>>...24

/linux-6.12.1/include/linux/
Dsignal.h54 enum siginfo_layout siginfo_layout(unsigned sig, int si_code);
67 unsigned long sig = _sig - 1; in sigaddset() local
69 set->sig[0] |= 1UL << sig; in sigaddset()
71 set->sig[sig / _NSIG_BPW] |= 1UL << (sig % _NSIG_BPW); in sigaddset()
76 unsigned long sig = _sig - 1; in sigdelset() local
78 set->sig[0] &= ~(1UL << sig); in sigdelset()
80 set->sig[sig / _NSIG_BPW] &= ~(1UL << (sig % _NSIG_BPW)); in sigdelset()
85 unsigned long sig = _sig - 1; in sigismember() local
87 return 1 & (set->sig[0] >> sig); in sigismember()
89 return 1 & (set->sig[sig / _NSIG_BPW] >> (sig % _NSIG_BPW)); in sigismember()
[all …]
Dcompat.h130 compat_sigset_word sig[_COMPAT_NSIG_WORDS]; member
454 case 4: v.sig[7] = (set->sig[3] >> 32); v.sig[6] = set->sig[3]; in put_compat_sigset()
456 case 3: v.sig[5] = (set->sig[2] >> 32); v.sig[4] = set->sig[2]; in put_compat_sigset()
458 case 2: v.sig[3] = (set->sig[1] >> 32); v.sig[2] = set->sig[1]; in put_compat_sigset()
460 case 1: v.sig[1] = (set->sig[0] >> 32); v.sig[0] = set->sig[0]; in put_compat_sigset()
475 unsafe_put_user(__s->sig[3] >> 32, &__c->sig[7], label); \
476 unsafe_put_user(__s->sig[3], &__c->sig[6], label); \
479 unsafe_put_user(__s->sig[2] >> 32, &__c->sig[5], label); \
480 unsafe_put_user(__s->sig[2], &__c->sig[4], label); \
483 unsafe_put_user(__s->sig[1] >> 32, &__c->sig[3], label); \
[all …]
/linux-6.12.1/arch/x86/include/asm/
Dsignal.h24 unsigned long sig[_NSIG_WORDS]; member
44 #define sigaddset(set,sig) \ argument
45 (__builtin_constant_p(sig) \
46 ? __const_sigaddset((set), (sig)) \
47 : __gen_sigaddset((set), (sig)))
56 unsigned long sig = _sig - 1; in __const_sigaddset() local
57 set->sig[sig / _NSIG_BPW] |= 1 << (sig % _NSIG_BPW); in __const_sigaddset()
60 #define sigdelset(set, sig) \ argument
61 (__builtin_constant_p(sig) \
62 ? __const_sigdelset((set), (sig)) \
[all …]
/linux-6.12.1/drivers/pinctrl/aspeed/
Dpinmux-aspeed.h513 #define SIG_DESC_LIST_SYM(sig, group) sig_descs_ ## sig ## _ ## group argument
514 #define SIG_DESC_LIST_DECL(sig, group, ...) \ argument
515 static const struct aspeed_sig_desc SIG_DESC_LIST_SYM(sig, group)[] = \
518 #define SIG_EXPR_SYM(sig, group) sig_expr_ ## sig ## _ ## group argument
519 #define SIG_EXPR_DECL_(sig, group, func) \ argument
520 static const struct aspeed_sig_expr SIG_EXPR_SYM(sig, group) = \
522 .signal = #sig, \
524 .ndescs = ARRAY_SIZE(SIG_DESC_LIST_SYM(sig, group)), \
525 .descs = &(SIG_DESC_LIST_SYM(sig, group))[0], \
545 #define SIG_EXPR_DECL(sig, group, func, ...) \ argument
[all …]
/linux-6.12.1/drivers/gpu/ipu-v3/
Dipu-di.c203 struct ipu_di_signal_cfg *sig) in ipu_di_sync_config_interlaced() argument
205 u32 h_total = sig->mode.hactive + sig->mode.hsync_len + in ipu_di_sync_config_interlaced()
206 sig->mode.hback_porch + sig->mode.hfront_porch; in ipu_di_sync_config_interlaced()
207 u32 v_total = sig->mode.vactive + sig->mode.vsync_len + in ipu_di_sync_config_interlaced()
208 sig->mode.vback_porch + sig->mode.vfront_porch; in ipu_di_sync_config_interlaced()
220 .cnt_down = sig->mode.hsync_len * 2, in ipu_di_sync_config_interlaced()
227 .cnt_down = sig->mode.vsync_len * 2, in ipu_di_sync_config_interlaced()
240 .offset_count = (sig->mode.vsync_len + in ipu_di_sync_config_interlaced()
241 sig->mode.vback_porch) / 2, in ipu_di_sync_config_interlaced()
243 .repeat_count = sig->mode.vactive / 2, in ipu_di_sync_config_interlaced()
[all …]
/linux-6.12.1/crypto/asymmetric_keys/
Drestrict.c75 const struct public_key_signature *sig; in restrict_link_by_signature() local
87 sig = payload->data[asym_auth]; in restrict_link_by_signature()
88 if (!sig) in restrict_link_by_signature()
90 if (!sig->auth_ids[0] && !sig->auth_ids[1] && !sig->auth_ids[2]) in restrict_link_by_signature()
93 if (ca_keyid && !asymmetric_key_id_partial(sig->auth_ids[1], ca_keyid)) in restrict_link_by_signature()
98 sig->auth_ids[0], sig->auth_ids[1], in restrict_link_by_signature()
99 sig->auth_ids[2], false); in restrict_link_by_signature()
110 ret = verify_signature(key, sig); in restrict_link_by_signature()
211 const struct public_key_signature *sig; in key_or_keyring_common() local
228 sig = payload->data[asym_auth]; in key_or_keyring_common()
[all …]
Dpkcs7_verify.c25 struct public_key_signature *sig = sinfo->sig; in pkcs7_digest() local
31 kenter(",%u,%s", sinfo->index, sinfo->sig->hash_algo); in pkcs7_digest()
34 if (sig->digest) in pkcs7_digest()
37 if (!sinfo->sig->hash_algo) in pkcs7_digest()
43 tfm = crypto_alloc_shash(sinfo->sig->hash_algo, 0, 0); in pkcs7_digest()
48 sig->digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest()
51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest()
52 if (!sig->digest) in pkcs7_digest()
63 sig->digest); in pkcs7_digest()
66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest()
[all …]
Dx509_public_key.c26 struct public_key_signature *sig = cert->sig; in x509_get_sig_params() local
34 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params()
35 if (!sig->s) in x509_get_sig_params()
38 sig->s_size = cert->raw_sig_size; in x509_get_sig_params()
43 tfm = crypto_alloc_shash(sig->hash_algo, 0, 0); in x509_get_sig_params()
53 sig->digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params()
56 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params()
57 if (!sig->digest) in x509_get_sig_params()
67 sig->digest); in x509_get_sig_params()
72 ret = is_hash_blacklisted(sig->digest, sig->digest_size, in x509_get_sig_params()
[all …]
Dpublic_key.c69 char alg_name[CRYPTO_MAX_ALG_NAME], bool *sig, in software_key_determine_akcipher() argument
74 *sig = true; in software_key_determine_akcipher()
84 *sig = op == kernel_pkey_sign || in software_key_determine_akcipher()
105 *sig = false; in software_key_determine_akcipher()
159 struct crypto_sig *sig; in software_key_query() local
182 sig = crypto_alloc_sig(alg_name, 0, 0); in software_key_query()
183 if (IS_ERR(sig)) { in software_key_query()
184 ret = PTR_ERR(sig); in software_key_query()
189 ret = crypto_sig_set_privkey(sig, key, pkey->keylen); in software_key_query()
191 ret = crypto_sig_set_pubkey(sig, key, pkey->keylen); in software_key_query()
[all …]
Dpkcs7_trust.c26 struct public_key_signature *sig = sinfo->sig; in pkcs7_validate_trust_one() local
75 sig = last->sig; in pkcs7_validate_trust_one()
81 if (last && (last->sig->auth_ids[0] || last->sig->auth_ids[1])) { in pkcs7_validate_trust_one()
83 last->sig->auth_ids[0], in pkcs7_validate_trust_one()
84 last->sig->auth_ids[1], in pkcs7_validate_trust_one()
100 sinfo->sig->auth_ids[0], NULL, NULL, false); in pkcs7_validate_trust_one()
105 sig = sinfo->sig; in pkcs7_validate_trust_one()
115 ret = verify_signature(key, sig); in pkcs7_validate_trust_one()
Dx509_cert_parser.c48 public_key_signature_free(cert->sig); in x509_free_certificate()
74 cert->sig = kzalloc(sizeof(struct public_key_signature), GFP_KERNEL); in x509_cert_parse()
75 if (!cert->sig) in x509_cert_parse()
190 ctx->cert->sig->hash_algo = "sha1"; in x509_note_sig_algo()
194 ctx->cert->sig->hash_algo = "sha256"; in x509_note_sig_algo()
198 ctx->cert->sig->hash_algo = "sha384"; in x509_note_sig_algo()
202 ctx->cert->sig->hash_algo = "sha512"; in x509_note_sig_algo()
206 ctx->cert->sig->hash_algo = "sha224"; in x509_note_sig_algo()
210 ctx->cert->sig->hash_algo = "sha1"; in x509_note_sig_algo()
214 ctx->cert->sig->hash_algo = "sha3-256"; in x509_note_sig_algo()
[all …]
Dsignature.c23 void public_key_signature_free(struct public_key_signature *sig) in public_key_signature_free() argument
27 if (sig) { in public_key_signature_free()
28 for (i = 0; i < ARRAY_SIZE(sig->auth_ids); i++) in public_key_signature_free()
29 kfree(sig->auth_ids[i]); in public_key_signature_free()
30 kfree(sig->s); in public_key_signature_free()
31 kfree(sig->digest); in public_key_signature_free()
32 kfree(sig); in public_key_signature_free()
138 const struct public_key_signature *sig) in verify_signature() argument
154 ret = subtype->verify_signature(key, sig); in verify_signature()
Dpkcs7_parser.c48 public_key_signature_free(sinfo->sig); in pkcs7_free_signed_info()
130 ctx->sinfo->sig = kzalloc(sizeof(struct public_key_signature), in pkcs7_parse_message()
132 if (!ctx->sinfo->sig) in pkcs7_parse_message()
231 ctx->sinfo->sig->hash_algo = "sha1"; in pkcs7_sig_note_digest_algo()
234 ctx->sinfo->sig->hash_algo = "sha256"; in pkcs7_sig_note_digest_algo()
237 ctx->sinfo->sig->hash_algo = "sha384"; in pkcs7_sig_note_digest_algo()
240 ctx->sinfo->sig->hash_algo = "sha512"; in pkcs7_sig_note_digest_algo()
243 ctx->sinfo->sig->hash_algo = "sha224"; in pkcs7_sig_note_digest_algo()
246 ctx->sinfo->sig->hash_algo = "sm3"; in pkcs7_sig_note_digest_algo()
249 ctx->sinfo->sig->hash_algo = "streebog256"; in pkcs7_sig_note_digest_algo()
[all …]
/linux-6.12.1/kernel/
Dsignal.c70 static void __user *sig_handler(struct task_struct *t, int sig) in sig_handler() argument
72 return t->sighand->action[sig - 1].sa.sa_handler; in sig_handler()
75 static inline bool sig_handler_ignored(void __user *handler, int sig) in sig_handler_ignored() argument
79 (handler == SIG_DFL && sig_kernel_ignore(sig)); in sig_handler_ignored()
82 static bool sig_task_ignored(struct task_struct *t, int sig, bool force) in sig_task_ignored() argument
86 handler = sig_handler(t, sig); in sig_task_ignored()
89 if (unlikely(is_global_init(t) && sig_kernel_only(sig))) in sig_task_ignored()
93 handler == SIG_DFL && !(force && sig_kernel_only(sig))) in sig_task_ignored()
101 return sig_handler_ignored(handler, sig); in sig_task_ignored()
104 static bool sig_ignored(struct task_struct *t, int sig, bool force) in sig_ignored() argument
[all …]
Dcompat.c37 memcpy(blocked->sig, &set, sizeof(set)); in compat_sig_setmask()
47 old_set = current->blocked.sig[0]; in COMPAT_SYSCALL_DEFINE3()
257 case 4: set->sig[3] = v.sig[6] | (((long)v.sig[7]) << 32 ); in get_compat_sigset()
259 case 3: set->sig[2] = v.sig[4] | (((long)v.sig[5]) << 32 ); in get_compat_sigset()
261 case 2: set->sig[1] = v.sig[2] | (((long)v.sig[3]) << 32 ); in get_compat_sigset()
263 case 1: set->sig[0] = v.sig[0] | (((long)v.sig[1]) << 32 ); in get_compat_sigset()
/linux-6.12.1/arch/um/os-Linux/
Dsignal.c34 static void sig_handler_common(int sig, struct siginfo *si, mcontext_t *mc) in sig_handler_common() argument
40 if (sig == SIGSEGV) { in sig_handler_common()
47 if ((sig != SIGIO) && (sig != SIGWINCH)) in sig_handler_common()
50 (*sig_info[sig])(sig, si, &r); in sig_handler_common()
74 static void sig_handler(int sig, struct siginfo *si, mcontext_t *mc) in sig_handler() argument
81 (sig == SIGIO)) { in sig_handler()
89 if (!enabled && (sig == SIGIO)) { in sig_handler()
107 sig_handler_common(sig, si, mc); in sig_handler()
123 static void timer_alarm_handler(int sig, struct siginfo *unused_si, mcontext_t *mc) in timer_alarm_handler() argument
165 static void sigusr1_handler(int sig, struct siginfo *unused_si, mcontext_t *mc) in sigusr1_handler() argument
[all …]
/linux-6.12.1/tools/lib/subcmd/
Dsigchain.c15 static void check_signum(int sig) in check_signum() argument
17 if (sig < 1 || sig >= SIGCHAIN_MAX_SIGNALS) in check_signum()
18 die("BUG: signal out of range: %d", sig); in check_signum()
21 static int sigchain_push(int sig, sigchain_fun f) in sigchain_push() argument
23 struct sigchain_signal *s = signals + sig; in sigchain_push()
24 check_signum(sig); in sigchain_push()
27 s->old[s->n] = signal(sig, f); in sigchain_push()
34 int sigchain_pop(int sig) in sigchain_pop() argument
36 struct sigchain_signal *s = signals + sig; in sigchain_pop()
37 check_signum(sig); in sigchain_pop()
[all …]
/linux-6.12.1/arch/x86/lib/
Dcpu.c6 unsigned int x86_family(unsigned int sig) in x86_family() argument
10 x86 = (sig >> 8) & 0xf; in x86_family()
13 x86 += (sig >> 20) & 0xff; in x86_family()
19 unsigned int x86_model(unsigned int sig) in x86_model() argument
23 fam = x86_family(sig); in x86_model()
25 model = (sig >> 4) & 0xf; in x86_model()
28 model += ((sig >> 16) & 0xf) << 4; in x86_model()
34 unsigned int x86_stepping(unsigned int sig) in x86_stepping() argument
36 return sig & 0xf; in x86_stepping()
/linux-6.12.1/include/trace/events/
Dsignal.h52 TP_PROTO(int sig, struct kernel_siginfo *info, struct task_struct *task,
55 TP_ARGS(sig, info, task, group, result),
58 __field( int, sig )
68 __entry->sig = sig;
77 __entry->sig, __entry->errno, __entry->code,
98 TP_PROTO(int sig, struct kernel_siginfo *info, struct k_sigaction *ka),
100 TP_ARGS(sig, info, ka),
103 __field( int, sig )
111 __entry->sig = sig;
118 __entry->sig, __entry->errno, __entry->code,
/linux-6.12.1/arch/m68k/include/asm/
Dsignal.h17 unsigned long sig[_NSIG_WORDS]; member
45 unsigned long sig = _sig - 1; in __const_sigismember() local
46 return 1 & (set->sig[sig / _NSIG_BPW] >> (sig % _NSIG_BPW)); in __const_sigismember()
59 #define sigismember(set,sig) \ argument
60 (__builtin_constant_p(sig) ? \
61 __const_sigismember(set,sig) : \
62 __gen_sigismember(set,sig))
/linux-6.12.1/drivers/eisa/
Deisa-bus.c20 #define EISA_DEVINFO(i,s) { .id = { .sig = i }, .name = s }
62 if (!strcmp(edev->id.sig, eisa_table[i].id.sig)) { in eisa_name_device()
71 sprintf(edev->pretty_name, "EISA device %.7s", edev->id.sig); in eisa_name_device()
78 u8 sig[4]; in decode_eisa_sig() local
93 sig[i] = inb(addr + i); in decode_eisa_sig()
95 if (!i && (sig[0] & 0x80)) in decode_eisa_sig()
99 sig_str[0] = ((sig[0] >> 2) & 0x1f) + ('A' - 1); in decode_eisa_sig()
100 sig_str[1] = (((sig[0] & 3) << 3) | (sig[1] >> 5)) + ('A' - 1); in decode_eisa_sig()
101 sig_str[2] = (sig[1] & 0x1f) + ('A' - 1); in decode_eisa_sig()
102 rev = (sig[2] << 8) | sig[3]; in decode_eisa_sig()
[all …]
/linux-6.12.1/arch/mips/sgi-ip22/
Dip22-eisa.c54 u8 sig[4]; in decode_eisa_sig() local
59 sig[i] = inb(addr + i); in decode_eisa_sig()
61 if (!i && (sig[0] & 0x80)) in decode_eisa_sig()
65 sig_str[0] = ((sig[0] >> 2) & 0x1f) + ('A' - 1); in decode_eisa_sig()
66 sig_str[1] = (((sig[0] & 3) << 3) | (sig[1] >> 5)) + ('A' - 1); in decode_eisa_sig()
67 sig_str[2] = (sig[1] & 0x1f) + ('A' - 1); in decode_eisa_sig()
68 rev = (sig[2] << 8) | sig[3]; in decode_eisa_sig()
/linux-6.12.1/arch/mips/kernel/
Dsignal32.c39 SYSCALL_DEFINE3(32_sigaction, long, sig, const struct compat_sigaction __user *, act,
55 err |= __get_user(mask, &act->sa_mask.sig[0]);
62 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
70 err |= __put_user(old_ka.sa.sa_mask.sig[0], oact->sa_mask.sig);
71 err |= __put_user(0, &oact->sa_mask.sig[1]);
72 err |= __put_user(0, &oact->sa_mask.sig[2]);
73 err |= __put_user(0, &oact->sa_mask.sig[3]);
/linux-6.12.1/security/apparmor/
Dipc.c21 static inline int map_signal_num(int sig) in map_signal_num() argument
23 if (sig > SIGRTMAX) in map_signal_num()
25 else if (sig >= SIGRTMIN) in map_signal_num()
26 return sig - SIGRTMIN + SIGRT_BASE; in map_signal_num()
27 else if (sig < MAXMAPPED_SIG) in map_signal_num()
28 return sig_map[sig]; in map_signal_num()
105 int sig) in aa_may_signal() argument
110 ad.signal = map_signal_num(sig); in aa_may_signal()
111 ad.unmappedsig = sig; in aa_may_signal()
/linux-6.12.1/tools/crypto/ccp/
Ddbc_cli.py67 sig = None variable
75 sig = f.read() variable
76 if len(sig) != DBC_SIG_SIZE:
78 "Invalid signature length %d (expected %d)" % (len(sig), DBC_SIG_SIZE)
98 nonce = get_nonce(d, sig)
104 result = set_uid(d, uid, sig)
113 param, signature = process_param(d, messages[args.message], sig)
117 sig=_pretty_buffer(bytes(signature)),
126 param, signature = process_param(d, messages[args.message], sig, data)
130 sig=_pretty_buffer(bytes(signature)),

12345678910>>...24