/linux-master/arch/powerpc/platforms/4xx/ |
H A D | pci.c | 301 u32 sa; local 304 sa = (0xffffffffu << ilog2(size)) | 1; 305 sa |= 0x1; 309 writel(sa, reg + PCIL0_PTM1MS); 418 u32 lah, lal, pciah, pcial, sa; local 432 sa = (0xffffffffu << ilog2(size)) | 0x1; 440 writel(sa, reg + PCIX0_POM0SA); 446 writel(sa, reg + PCIX0_POM1SA); 502 u32 sa; local 509 sa 1715 u32 lah, lal, pciah, pcial, sa; local 1842 u64 sa; local [all...] |
/linux-master/drivers/net/ethernet/aquantia/atlantic/ |
H A D | aq_macsec.c | 591 set_bit(ctx->sa.assoc_num, &aq_txsc->tx_sa_idx_busy); 593 memcpy(aq_txsc->tx_sa_key[ctx->sa.assoc_num], ctx->sa.key, 598 ctx->sa.tx_sa, ctx->sa.key, 599 ctx->sa.assoc_num); 620 ctx->sa.tx_sa, NULL, ctx->sa.assoc_num); 664 ret = aq_clear_txsa(nic, &cfg->aq_txsc[txsc_idx], ctx->sa.assoc_num, 910 const struct macsec_rx_sc *rx_sc = ctx->sa [all...] |
/linux-master/security/apparmor/ |
H A D | capability.c | 46 struct common_audit_data *sa = va; local 49 audit_log_untrustedstring(ab, capability_names[sa->u.cap]);
|
H A D | ipc.c | 54 struct common_audit_data *sa = va; local 55 struct apparmor_audit_data *ad = aad(sa);
|
/linux-master/arch/s390/kernel/ |
H A D | compat_signal.c | 243 if (ka->sa.sa_flags & SA_ONSTACK) { 300 if (ksig->ka.sa.sa_flags & SA_RESTORER) { 302 ksig->ka.sa.sa_restorer | PSW32_ADDR_AMODE; 314 regs->psw.addr = (__force __u64) ksig->ka.sa.sa_handler; 364 if (ksig->ka.sa.sa_flags & SA_RESTORER) { 366 ksig->ka.sa.sa_restorer | PSW32_ADDR_AMODE; 394 regs->psw.addr = (__u64 __force) ksig->ka.sa.sa_handler; 413 if (ksig->ka.sa.sa_flags & SA_SIGINFO)
|
/linux-master/tools/testing/vsock/ |
H A D | util.c | 145 struct sockaddr sa; member in union:__anon3489 167 ret = connect(fd, &addr.sa, sizeof(addr.svm)); 196 struct sockaddr sa; member in union:__anon3490 213 if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { 233 struct sockaddr sa; member in union:__anon3491 245 client_fd = accept(fd, &clientaddr.sa, &clientaddr_len); 262 if (clientaddr.sa.sa_family != AF_VSOCK) { 264 clientaddr.sa.sa_family);
|
/linux-master/fs/xfs/scrub/ |
H A D | newbt.c | 60 free = sc->sa.pag->pagf_freeblks; 61 sz = xfs_ag_block_count(sc->mp, sc->sa.pag->pag_agno); 208 if (agno == sc->sa.pag->pag_agno && 212 xnr->alloc_hint = XFS_AGB_TO_FSB(sc->mp, sc->sa.pag->pag_agno, 226 ASSERT(sc->sa.pag != NULL); 258 if (agno != sc->sa.pag->pag_agno) { 259 ASSERT(agno == sc->sa.pag->pag_agno); 263 error = xrep_newbt_add_blocks(xnr, sc->sa.pag, &args);
|
/linux-master/lib/ |
H A D | test_printf.c | 427 struct sockaddr_in sa; local 429 sa.sin_family = AF_INET; 430 sa.sin_port = cpu_to_be16(12345); 431 sa.sin_addr.s_addr = cpu_to_be32(0x7f000001); 433 test("127.000.000.001|127.0.0.1", "%pi4|%pI4", &sa.sin_addr, &sa.sin_addr); 434 test("127.000.000.001|127.0.0.1", "%piS|%pIS", &sa, &sa); 435 sa.sin_addr.s_addr = cpu_to_be32(0x01020304); 436 test("001.002.003.004:12345|1.2.3.4:12345", "%piSp|%pISp", &sa, [all...] |
/linux-master/drivers/gpu/drm/ |
H A D | drm_blend.c | 433 const struct drm_plane_state *sa = *(struct drm_plane_state **)a; local 436 if (sa->zpos != sb->zpos) 437 return sa->zpos - sb->zpos; 439 return sa->plane->base.id - sb->plane->base.id;
|
/linux-master/fs/smb/client/ |
H A D | fscache.c | 40 const struct sockaddr *sa = (struct sockaddr *)&server->dstaddr; local 57 switch (sa->sa_family) { 63 cifs_dbg(VFS, "Unknown network family '%d'\n", sa->sa_family); 81 key = kasprintf(GFP_KERNEL, "cifs,%pISpc,%s", sa, sharename);
|
/linux-master/tools/testing/selftests/x86/ |
H A D | test_vsyscall.c | 45 struct sigaction sa; local 46 memset(&sa, 0, sizeof(sa)); 47 sa.sa_sigaction = handler; 48 sa.sa_flags = SA_SIGINFO | flags; 49 sigemptyset(&sa.sa_mask); 50 if (sigaction(sig, &sa, 0))
|
/linux-master/arch/xtensa/kernel/ |
H A D | signal.c | 348 unsigned long handler = (unsigned long)ksig->ka.sa.sa_handler; 364 if ((ksig->ka.sa.sa_flags & SA_ONSTACK) != 0 && sas_ss_flags(sp) == 0) { 377 if (ksig->ka.sa.sa_flags & SA_SIGINFO) { 389 if (ksig->ka.sa.sa_flags & SA_RESTORER) { 392 (unsigned long __user *)ksig->ka.sa.sa_restorer; 396 ra = (unsigned long)ksig->ka.sa.sa_restorer; 475 if (!(ksig.ka.sa.sa_flags & SA_RESTART)) {
|
/linux-master/tools/testing/selftests/net/ |
H A D | ip_local_port_range.c | 50 struct sockaddr sa; member in union:__anon3483 74 return bind(fd, &addr.sa, addr_len); 80 struct sockaddr sa; member in union:__anon3484 89 err = getsockname(fd, &addr.sa, &addr_len); 93 switch (addr.sa.sa_family) { 358 struct sockaddr sa; member in union:__anon3485 404 connect(fd, &addr.sa, addr_len);
|
/linux-master/tools/testing/selftests/arm64/abi/ |
H A D | hwcap.c | 900 struct sigaction sa; local 902 memset(&sa, 0, sizeof(sa)); 903 sa.sa_sigaction = handler; 904 sa.sa_flags = SA_RESTART | SA_SIGINFO; 905 sigemptyset(&sa.sa_mask); 906 ret = sigaction(signum, &sa, NULL);
|
/linux-master/arch/x86/um/ |
H A D | signal.c | 375 if (ksig->ka.sa.sa_flags & SA_RESTORER) 376 restorer = ksig->ka.sa.sa_restorer; 400 PT_REGS_IP(regs) = (unsigned long) ksig->ka.sa.sa_handler; 420 if (ksig->ka.sa.sa_flags & SA_RESTORER) 421 restorer = ksig->ka.sa.sa_restorer; 446 PT_REGS_IP(regs) = (unsigned long) ksig->ka.sa.sa_handler; 504 if (ksig->ka.sa.sa_flags & SA_SIGINFO) { 533 if (ksig->ka.sa.sa_flags & SA_RESTORER) 534 err |= __put_user((void *)ksig->ka.sa.sa_restorer, 554 PT_REGS_IP(regs) = (unsigned long) ksig->ka.sa [all...] |
/linux-master/arch/x86/kernel/ |
H A D | signal_64.c | 172 if (!(ksig->ka.sa.sa_flags & SA_RESTORER)) 188 unsafe_put_user(ksig->ka.sa.sa_restorer, &frame->pretcode, Efault); 193 if (ksig->ka.sa.sa_flags & SA_SIGINFO) { 210 regs->ip = (unsigned long) ksig->ka.sa.sa_handler; 311 if (!(ksig->ka.sa.sa_flags & SA_RESTORER)) 326 restorer = ksig->ka.sa.sa_restorer; 332 if (ksig->ka.sa.sa_flags & SA_SIGINFO) { 339 regs->ip = (unsigned long) ksig->ka.sa.sa_handler; 398 act->sa.sa_flags |= SA_IA32_ABI; 400 act->sa [all...] |
/linux-master/net/bluetooth/ |
H A D | iso.c | 890 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; local 894 BT_DBG("sk %p bc_sid %u bc_num_bis %u", sk, sa->iso_bc->bc_sid, 895 sa->iso_bc->bc_num_bis); 897 if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc)) 900 bacpy(&iso_pi(sk)->dst, &sa->iso_bc->bc_bdaddr); 903 if (!bdaddr_type_is_le(sa->iso_bc->bc_bdaddr_type)) 906 iso_pi(sk)->dst_type = sa->iso_bc->bc_bdaddr_type; 909 if (sa->iso_bc->bc_sid > 0x0f) 912 iso_pi(sk)->bc_sid = sa 930 iso_sock_bind_pa_sk(struct sock *sk, struct sockaddr_iso *sa, int addr_len) argument 969 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; local 1026 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; local 1246 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; local [all...] |
/linux-master/kernel/ |
H A D | signal.c | 72 return t->sighand->action[sig - 1].sa.sa_handler; 522 t->sighand->action[i].sa.sa_handler = SIG_IGN; 537 if (force_default || ka->sa.sa_handler != SIG_IGN) 538 ka->sa.sa_handler = SIG_DFL; 539 ka->sa.sa_flags = 0; 541 ka->sa.sa_restorer = NULL; 543 sigemptyset(&ka->sa.sa_mask); 550 void __user *handler = tsk->sighand->action[sig-1].sa.sa_handler; 1336 ignored = action->sa.sa_handler == SIG_IGN; 1339 action->sa [all...] |
/linux-master/tools/testing/selftests/arm64/mte/ |
H A D | mte_common_util.c | 84 struct sigaction sa; local 86 sa.sa_sigaction = handler; 87 sa.sa_flags = SA_SIGINFO; 88 sigemptyset(&sa.sa_mask); 89 sigaction(signal, &sa, NULL);
|
/linux-master/net/mac80211/ |
H A D | fils_aead.c | 245 addr[0] = mgmt->sa; 290 mgmt->sa); 299 addr[0] = mgmt->sa; 320 mgmt->sa); 328 mgmt->sa);
|
/linux-master/tools/testing/selftests/net/af_unix/ |
H A D | test_unix_oob.c | 28 struct sigaction sa; local 30 sa.sa_sigaction = sig_hand; 31 sigemptyset(&sa.sa_mask); 32 sa.sa_flags = SA_SIGINFO | SA_RESTART; 34 return sigaction(signal, &sa, NULL);
|
/linux-master/tools/perf/trace/beauty/ |
H A D | beauty.h | 30 size_t strarray__scnprintf(struct strarray *sa, char *bf, size_t size, const char *intfmt, bool show_prefix, int val); 31 size_t strarray__scnprintf_suffix(struct strarray *sa, char *bf, size_t size, const char *intfmt, bool show_suffix, int val); 32 size_t strarray__scnprintf_flags(struct strarray *sa, char *bf, size_t size, bool show_prefix, unsigned long flags); 34 bool strarray__strtoul(struct strarray *sa, char *bf, size_t size, u64 *ret); 35 bool strarray__strtoul_flags(struct strarray *sa, char *bf, size_t size, u64 *ret);
|
/linux-master/net/can/j1939/ |
H A D | main.c | 78 skcb->addr.sa = cf->can_id; 83 if (!j1939_address_is_valid(skcb->addr.sa)) { 84 netdev_err_once(priv->ndev, "%s: sa is broadcast address, ignoring!\n", 101 if (j1939_address_is_unicast(skcb->addr.sa) && 102 priv->ents[skcb->addr.sa].nusers) 350 skcb->addr.sa;
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | select_reuseport.c | 140 static void sa46_init_loopback(union sa46 *sa, sa_family_t family) argument 142 memset(sa, 0, sizeof(*sa)); 143 sa->family = family; 144 if (sa->family == AF_INET6) 145 sa->v6.sin6_addr = in6addr_loopback; 147 sa->v4.sin_addr.s_addr = htonl(INADDR_LOOPBACK); 150 static void sa46_init_inany(union sa46 *sa, sa_family_t family) argument 152 memset(sa, 0, sizeof(*sa)); [all...] |
/linux-master/drivers/scsi/ |
H A D | scsi_logging.c | 111 int sa, cdb0; local 125 sa = (cdbp[8] << 8) + cdbp[9]; 127 sa = cdbp[1] & 0x1f; 129 if (!scsi_opcode_sa_name(cdb0, sa, &cdb_name, &sa_name)) { 147 off = scnprintf(buffer, buf_len, "%s, sa=0x%x", 148 cdb_name, sa); 151 "opcode=0x%x, sa=0x%x", cdb0, sa);
|