Home
last modified time | relevance | path

Searched full:signed (Results 1 – 25 of 966) sorted by relevance

12345678910>>...39

/Linux-v6.1/tools/include/nolibc/
Dstd.h23 typedef signed char int8_t;
25 typedef signed short int16_t;
27 typedef signed int int32_t;
29 typedef signed long long int64_t;
31 typedef signed long ssize_t;
33 typedef signed long intptr_t;
34 typedef signed long ptrdiff_t;
40 typedef signed int pid_t;
44 typedef signed long off_t;
45 typedef signed long blksize_t;
[all …]
/Linux-v6.1/arch/parisc/include/uapi/asm/
Dstat.h15 signed int st_size;
16 signed int st_atime;
18 signed int st_mtime;
20 signed int st_ctime;
55 signed long long st_size;
56 signed int st_blksize;
58 signed long long st_blocks;
59 signed int st_atime;
61 signed int st_mtime;
63 signed int st_ctime;
/Linux-v6.1/arch/ia64/include/asm/
Dasm-prototypes.h18 signed int __divsi3(signed int, unsigned int);
19 signed int __modsi3(signed int, unsigned int);
21 signed long long __divdi3(signed long long, unsigned long long);
22 signed long long __moddi3(signed long long, unsigned long long);
/Linux-v6.1/security/integrity/ima/
DKconfig184 to be signed. Unsigned files might prevent the system from
192 This option defines a policy requiring all firmware to be signed,
203 be signed and verified by a public key on the trusted IMA
215 Enabling this rule will require all kernel modules to be signed
227 Enabling this rule will require the IMA policy to be signed and
247 appended signature is the same used for signed kernel modules.
252 bool "Require all keys on the .ima keyring be signed (deprecated)"
259 keyring be signed by a key on the system trusted keyring.
264 bool "Permit keys validly signed by a built-in or secondary CA cert (EXPERIMENTAL)"
272 key is validly signed by a CA cert in the system built-in or
[all …]
/Linux-v6.1/arch/mips/include/asm/octeon/
Dcvmx-fau.h147 * @value: Signed value to add.
166 * @value: Signed value to add.
181 * @value: Signed value to add.
197 * @value: Signed value to add.
211 * @value: Signed value to add.
226 * @value: Signed value to add.
250 * @value: Signed value to add.
275 * @value: Signed value to add.
298 * @value: Signed value to add.
319 * @value: Signed value to add.
[all …]
/Linux-v6.1/include/linux/
Dmath64.h33 * div_s64_rem - signed 64bit divide with 32bit divisor with remainder
34 * @dividend: signed 64bit dividend
35 * @divisor: signed 32bit divisor
36 * @remainder: pointer to signed 32bit remainder
73 * div64_s64 - signed 64bit divide with 64bit divisor
74 * @dividend: signed 64bit dividend
75 * @divisor: signed 64bit divisor
133 * div_s64 - signed 64bit divide with 32bit divisor
134 * @dividend: signed 64bit dividend
135 * @divisor: signed 32bit divisor
[all …]
/Linux-v6.1/tools/testing/selftests/kexec/
Dtest_kexec_file_load.sh8 # To determine whether the kernel image is signed, this test depends
19 # be signed, but these policy rules may be replaced with a custom
36 # kexec kernel image be signed. Policy rules are walked
67 log_info "kexec kernel image PE signed"
69 log_info "kexec kernel image not PE signed"
89 log_info "kexec kernel image IMA signed"
91 log_info "kexec kernel image not IMA signed"
106 log_info "kexec kernel image modsig signed"
108 log_info "kexec kernel image not modsig signed"
215 "kexec signed kernel image required"
[all …]
/Linux-v6.1/Documentation/admin-guide/
Dmodule-signing.rst11 .. - Signed modules and stripping.
12 .. - Loading signed modules.
24 or modules signed with an invalid key. Module signing increases security by
49 (1) :menuselection:`Require modules to be validly signed`
71 If this is on then modules will be automatically signed during the
73 be signed manually using::
78 (3) :menuselection:`Which hash algorithm should modules be signed with?`
92 than being a module) so that modules signed with that algorithm can have
101 and allow the kernel modules to be signed with a key of your choosing.
207 ``.builtin_trusted_keys`` **if** the new key's X.509 wrapper is validly signed by a key
[all …]
/Linux-v6.1/sound/core/oss/
Drate.c36 signed short last_S1;
37 signed short last_S2;
70 signed int val; in resample_expand()
71 signed short S1, S2; in resample_expand()
72 signed short *src, *dst; in resample_expand()
90 src = (signed short *)src_channels[channel].area.addr + in resample_expand()
92 dst = (signed short *)dst_channels[channel].area.addr + in resample_expand()
107 val = S1 + ((S2 - S1) * (signed int)pos) / BITS; in resample_expand()
129 signed int val; in resample_shrink()
130 signed short S1, S2; in resample_shrink()
[all …]
/Linux-v6.1/tools/testing/selftests/bpf/verifier/
Dbounds_mix_sign_unsign.c2 "bounds checks mixing signed and unsigned, positive bounds",
25 "bounds checks mixing signed and unsigned",
48 "bounds checks mixing signed and unsigned, variant 2",
73 "bounds checks mixing signed and unsigned, variant 3",
97 "bounds checks mixing signed and unsigned, variant 4",
119 "bounds checks mixing signed and unsigned, variant 5",
143 "bounds checks mixing signed and unsigned, variant 6",
164 "bounds checks mixing signed and unsigned, variant 7",
186 "bounds checks mixing signed and unsigned, variant 8",
211 "bounds checks mixing signed and unsigned, variant 9",
[all …]
/Linux-v6.1/tools/testing/selftests/bpf/prog_tests/
Dbtf_dedup_split.c26 "[1] INT 'int' size=4 bits_offset=0 nr_bits=32 encoding=SIGNED", in test_split_simple()
68 "[1] INT 'int' size=4 bits_offset=0 nr_bits=32 encoding=SIGNED", in test_split_simple()
76 "[5] INT 'int' size=4 bits_offset=0 nr_bits=32 encoding=SIGNED", in test_split_simple()
101 "[1] INT 'int' size=4 bits_offset=0 nr_bits=32 encoding=SIGNED", in test_split_simple()
149 "[1] INT 'int' size=4 bits_offset=0 nr_bits=32 encoding=SIGNED", in test_split_fwd_resolve()
173 "[1] INT 'int' size=4 bits_offset=0 nr_bits=32 encoding=SIGNED", in test_split_fwd_resolve()
181 "[6] INT 'int' size=4 bits_offset=0 nr_bits=32 encoding=SIGNED", in test_split_fwd_resolve()
195 "[1] INT 'int' size=4 bits_offset=0 nr_bits=32 encoding=SIGNED", in test_split_fwd_resolve()
230 "[1] INT 'int' size=4 bits_offset=0 nr_bits=32 encoding=SIGNED", in test_split_struct_duped()
263 "[1] INT 'int' size=4 bits_offset=0 nr_bits=32 encoding=SIGNED", in test_split_struct_duped()
[all …]
/Linux-v6.1/drivers/staging/rtl8723bs/include/
Drtw_xmit.h128 /* signed int txcmdcnt; */
309 signed int option;
310 signed int apsd_setting; /* When bit mask is on, the associated edca queue supports APSD. */
332 volatile signed int head;
333 volatile signed int tail;
334 volatile signed int free_sz; /* in units of 64 bytes */
335 volatile signed int free_cmdsz;
336 volatile signed int txsz[8];
339 signed int ac_tag;
450 struct tx_servq *rtw_get_sta_pending(struct adapter *padapter, struct sta_info *psta, signed int up…
[all …]
Drtw_mlme.h125 signed int traffic_busy;
287 signed int fw_state; /* shall we protect this variable? maybe not necessarily... */
447 extern signed int rtw_select_and_join_from_scanned_queue(struct mlme_priv *pmlmepriv);
448 extern signed int rtw_set_key(struct adapter *adapter, struct security_priv *psecuritypriv, signed
449 extern signed int rtw_set_auth(struct adapter *adapter, struct security_priv *psecuritypriv);
457 static inline signed int check_fwstate(struct mlme_priv *pmlmepriv, signed int state) in check_fwstate()
465 static inline signed int get_fwstate(struct mlme_priv *pmlmepriv) in get_fwstate()
477 static inline void set_fwstate(struct mlme_priv *pmlmepriv, signed int state) in set_fwstate()
485 static inline void _clr_fwstate_(struct mlme_priv *pmlmepriv, signed int state) in _clr_fwstate_()
497 static inline void clr_fwstate(struct mlme_priv *pmlmepriv, signed int state) in clr_fwstate()
[all …]
/Linux-v6.1/drivers/staging/fbtft/
Dfb_agm1264k-fl.c39 static const signed char
226 construct_line_bitmap(struct fbtft_par *par, u8 *dest, signed short *src, in construct_line_bitmap()
246 int y, signed short *convert_buf, in iterate_diffusion_matrix()
247 signed short pixel, signed short error) in iterate_diffusion_matrix()
255 signed short *write_pos; in iterate_diffusion_matrix()
256 signed char coeff; in iterate_diffusion_matrix()
267 signed short p = *write_pos + error * coeff; in iterate_diffusion_matrix()
286 signed short *convert_buf = kmalloc_array(par->info->var.xres * in write_vmem()
287 par->info->var.yres, sizeof(signed short), GFP_NOIO); in write_vmem()
306 (signed short)gamma_correction_table[pixel]; in write_vmem()
[all …]
/Linux-v6.1/Documentation/trace/
Duprobetracer.rst64 by given type. Prefix 's' and 'u' means those types are signed and unsigned
143 field:unsigned short common_type; offset:0; size:2; signed:0;
144 field:unsigned char common_flags; offset:2; size:1; signed:0;
145 field:unsigned char common_preempt_count; offset:3; size:1; signed:0;
146 field:int common_pid; offset:4; size:4; signed:1;
147 field:int common_padding; offset:8; size:4; signed:1;
149 field:unsigned long __probe_ip; offset:12; size:4; signed:0;
150 field:u32 arg1; offset:16; size:4; signed:0;
151 field:u32 arg2; offset:20; size:4; signed:0;
Dkprobetrace.rst72 by given type. Prefix 's' and 'u' means those types are signed and unsigned
195 field:unsigned short common_type; offset:0; size:2; signed:0;
196 field:unsigned char common_flags; offset:2; size:1; signed:0;
197 field:unsigned char common_preempt_count; offset:3; size:1;signed:0;
198 field:int common_pid; offset:4; size:4; signed:1;
200 field:unsigned long __probe_ip; offset:12; size:4; signed:0;
201 field:int __probe_nargs; offset:16; size:4; signed:1;
202 field:unsigned long dfd; offset:20; size:4; signed:0;
203 field:unsigned long filename; offset:24; size:4; signed:0;
204 field:unsigned long flags; offset:28; size:4; signed:0;
[all …]
/Linux-v6.1/arch/arm/nwfpe/
DARM-gcc.h22 typedef signed char int8;
26 typedef signed int int32;
29 typedef signed long long int sbits64;
37 `unsigned short int' and `signed short int' (or `short int'), respectively.
41 typedef signed char sbits8;
43 typedef signed short int sbits16;
45 typedef signed int sbits32;
48 typedef signed long long int int64;
/Linux-v6.1/Documentation/maintainer/
Dpull-requests.rst42 that will create a signed tag called ``char-misc-4.15-rc1`` based on the
46 Linus will only accept pull requests based on a signed tag. Other
75 the signed tag, so depending on your workflow, you can either
76 describe your work in the signed tag (which will also automatically
77 make it into the pull request email), or you can make the signed
120 Signed-off-by: Your-name-here <your_email@domain>
126 Now that you have a local signed tag, you need to push it up to where it
166 creating pull requests without a signed tag then ``https://`` may be a
/Linux-v6.1/drivers/clk/mediatek/
Dclk-mtk.h76 signed char mux_shift;
77 signed char mux_width;
78 signed char gate_shift;
80 signed char divider_shift;
81 signed char divider_width;
85 signed char num_parents;
/Linux-v6.1/arch/x86/include/asm/
Dpage_types.h22 /* Cast *PAGE_MASK to a signed type so that it is sign-extended if
25 #define PHYSICAL_PAGE_MASK (((signed long)PAGE_MASK) & __PHYSICAL_MASK)
26 #define PHYSICAL_PMD_PAGE_MASK (((signed long)PMD_PAGE_MASK) & __PHYSICAL_MASK)
27 #define PHYSICAL_PUD_PAGE_MASK (((signed long)PUD_PAGE_MASK) & __PHYSICAL_MASK)
/Linux-v6.1/crypto/asymmetric_keys/
Dx509_parser.h14 struct x509_certificate *signer; /* Certificate that signed this one */
23 const void *tbs; /* Signed data */
24 unsigned tbs_size; /* Size of signed data */
38 bool self_signed; /* T if self-signed (check unsupported_sig too) */
/Linux-v6.1/arch/powerpc/xmon/
Dansidecl.h17 SIGNED `signed' `'
95 #define SIGNED signed macro
119 #define SIGNED macro
/Linux-v6.1/arch/mips/include/asm/sn/
Dtypes.h17 typedef signed short nasid_t; /* node id in numa-as-id space */
18 typedef signed char partid_t; /* partition ID type */
19 typedef signed short moduleid_t; /* user-visible module number type */
/Linux-v6.1/Documentation/translations/zh_TW/process/
Dsubmitting-patches.rst344 Signed-off-by: Random J Developer <random@developer.example.org>
359 Signed-off-by: Random J Developer <random@developer.example.org>
361 Signed-off-by: Lucky K Maintainer <lucky@maintainer.example.org>
421 Signed-off-by: First Co-Author <first@coauthor.example.org>
423 Signed-off-by: Second Co-Author <second@coauthor.example.org>
424 Signed-off-by: From Author <from@author.example.org>
433 Signed-off-by: Random Co-Author <random@coauthor.example.org>
434 Signed-off-by: From Author <from@author.example.org>
436 Signed-off-by: Submitting Co-Author <sub@coauthor.example.org>
508 - 上面描述的「Signed-off-by」 行,也將出現在更改日誌中。
[all …]
/Linux-v6.1/Documentation/translations/zh_CN/process/
Dsubmitting-patches.rst324 Signed-off-by: Random J Developer <random@developer.example.org>
327 将会自动完成。撤销也应当包含“Signed-off-by”, ``git revert -s`` 会帮你搞定。
332 作者签署之后的任何其他签署(Signed-off-by:'s)均来自处理和传递补丁的人员,但
372 Signed-off-by: First Co-Author <first@coauthor.example.org>
374 Signed-off-by: Second Co-Author <second@coauthor.example.org>
375 Signed-off-by: From Author <from@author.example.org>
384 Signed-off-by: Random Co-Author <random@coauthor.example.org>
385 Signed-off-by: From Author <from@author.example.org>
387 Signed-off-by: Submitting Co-Author <sub@coauthor.example.org>
468 - 上述的 ``Signed-off-by:`` 行,也将出现在更改日志中。
[all …]

12345678910>>...39