/openbmc/linux/arch/mips/kernel/ |
H A D | signal32.c | 39 struct compat_sigaction __user *, oact) 61 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); 63 if (!ret && oact) { 64 if (!access_ok(oact, sizeof(*oact))) 66 err |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); 68 &oact->sa_handler); 69 err |= __put_user(old_ka.sa.sa_mask.sig[0], oact->sa_mask.sig); 70 err |= __put_user(0, &oact->sa_mask.sig[1]); 71 err |= __put_user(0, &oact->sa_mask.sig[2]); 72 err |= __put_user(0, &oact->sa_mask.sig[3]);
|
H A D | signal.c | 596 struct sigaction __user *, oact) in SYSCALL_DEFINE3() argument 616 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in SYSCALL_DEFINE3() 618 if (!ret && oact) { in SYSCALL_DEFINE3() 619 if (!access_ok(oact, sizeof(*oact))) in SYSCALL_DEFINE3() 621 err |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in SYSCALL_DEFINE3() 622 err |= __put_user(old_ka.sa.sa_handler, &oact->sa_handler); in SYSCALL_DEFINE3() 623 err |= __put_user(old_ka.sa.sa_mask.sig[0], oact->sa_mask.sig); in SYSCALL_DEFINE3() 624 err |= __put_user(0, &oact->sa_mask.sig[1]); in SYSCALL_DEFINE3() 625 err |= __put_user(0, &oact->sa_mask.sig[2]); in SYSCALL_DEFINE3() 626 err |= __put_user(0, &oact->sa_mask.sig[3]); in SYSCALL_DEFINE3()
|
/openbmc/linux/arch/sparc/kernel/ |
H A D | sys_sparc32.c | 142 struct compat_old_sigaction __user *,oact) in COMPAT_SYSCALL_DEFINE3() argument 145 return compat_sys_sigaction(-sig, act, oact); in COMPAT_SYSCALL_DEFINE3() 150 struct compat_sigaction __user *,oact, in COMPAT_SYSCALL_DEFINE5() argument 175 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in COMPAT_SYSCALL_DEFINE5() 177 if (!ret && oact) { in COMPAT_SYSCALL_DEFINE5() 178 ret = put_user(ptr_to_compat(old_ka.sa.sa_handler), &oact->sa_handler); in COMPAT_SYSCALL_DEFINE5() 179 ret |= put_compat_sigset(&oact->sa_mask, &old_ka.sa.sa_mask, in COMPAT_SYSCALL_DEFINE5() 180 sizeof(oact->sa_mask)); in COMPAT_SYSCALL_DEFINE5() 181 ret |= put_user(old_ka.sa.sa_flags, &oact->sa_flags); in COMPAT_SYSCALL_DEFINE5() 182 ret |= put_user(ptr_to_compat(old_ka.sa.sa_restorer), &oact->sa_restorer); in COMPAT_SYSCALL_DEFINE5()
|
H A D | sys_sparc_32.c | 163 struct old_sigaction __user *,oact) in SYSCALL_DEFINE3() argument 166 return sys_sigaction(-sig, act, oact); in SYSCALL_DEFINE3() 171 struct sigaction __user *, oact, in SYSCALL_DEFINE5() argument 188 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in SYSCALL_DEFINE5() 190 if (!ret && oact) { in SYSCALL_DEFINE5() 191 if (copy_to_user(oact, &old_ka.sa, sizeof(*oact))) in SYSCALL_DEFINE5()
|
H A D | sys_sparc_64.c | 680 struct sigaction __user *, oact, void __user *, restorer, in SYSCALL_DEFINE5() argument 696 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in SYSCALL_DEFINE5() 698 if (!ret && oact) { in SYSCALL_DEFINE5() 699 if (copy_to_user(oact, &old_ka.sa, sizeof(*oact))) in SYSCALL_DEFINE5()
|
/openbmc/linux/arch/alpha/kernel/ |
H A D | signal.c | 61 struct osf_sigaction __user *, oact) in SYSCALL_DEFINE3() argument 77 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in SYSCALL_DEFINE3() 79 if (!ret && oact) { in SYSCALL_DEFINE3() 80 if (!access_ok(oact, sizeof(*oact)) || in SYSCALL_DEFINE3() 81 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in SYSCALL_DEFINE3() 82 __put_user(old_ka.sa.sa_flags, &oact->sa_flags) || in SYSCALL_DEFINE3() 83 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask)) in SYSCALL_DEFINE3() 91 struct sigaction __user *, oact, in SYSCALL_DEFINE5() argument 107 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in SYSCALL_DEFINE5() 109 if (!ret && oact) { in SYSCALL_DEFINE5() [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/ |
H A D | restore_sigalarm.patch | 11 + struct sigaction nact, oact; 25 + (void) sigaction(SIGALRM, &nact, &oact); 34 + (void) sigaction(SIGALRM, &oact, NULL);
|
/openbmc/linux/kernel/ |
H A D | signal.c | 4129 struct k_sigaction *oact) in sigaction_compat_abi() argument 4133 int do_sigaction(int sig, struct k_sigaction *act, struct k_sigaction *oact) in do_sigaction() argument 4149 if (oact) in do_sigaction() 4150 *oact = *k; in do_sigaction() 4165 if (oact) in do_sigaction() 4166 oact->sa.sa_flags &= UAPI_SA_FLAGS; in do_sigaction() 4168 sigaction_compat_abi(act, oact); in do_sigaction() 4458 struct sigaction __user *, oact, in SYSCALL_DEFINE4() argument 4471 ret = do_sigaction(sig, act ? &new_sa : NULL, oact ? &old_sa : NULL); in SYSCALL_DEFINE4() 4475 if (oact && copy_to_user(oact, &old_sa.sa, sizeof(old_sa.sa))) in SYSCALL_DEFINE4() [all …]
|
/openbmc/qemu/bsd-user/ |
H A D | signal.c | 657 struct target_sigaction *oact) in do_sigaction() argument 678 if (oact) { in do_sigaction() 679 oact->_sa_handler = tswapal(k->_sa_handler); in do_sigaction() 680 oact->sa_flags = tswap32(k->sa_flags); in do_sigaction() 681 oact->sa_mask = k->sa_mask; in do_sigaction() 841 struct sigaction oact; in signal_init() local 854 sigaction(host_sig, NULL, &oact); in signal_init() 855 if (oact.sa_sigaction == (void *)SIG_IGN) { in signal_init() 857 } else if (oact.sa_sigaction == (void *)SIG_DFL) { in signal_init()
|
H A D | signal-common.h | 34 struct target_sigaction *oact);
|
/openbmc/qemu/linux-user/ |
H A D | signal.c | 647 struct sigaction act, oact; in signal_init() local 677 sigaction(SIGABRT, NULL, &oact); in signal_init() 681 sigaction(hsig, iact, &oact); in signal_init() 684 if (oact.sa_sigaction != (void *)SIG_IGN) { in signal_init() 1149 struct target_sigaction *oact, abi_ulong ka_restorer) in do_sigaction() argument 1170 if (oact) { in do_sigaction() 1171 __put_user(k->_sa_handler, &oact->_sa_handler); in do_sigaction() 1172 __put_user(k->sa_flags, &oact->sa_flags); in do_sigaction() 1174 __put_user(k->sa_restorer, &oact->sa_restorer); in do_sigaction() 1177 oact->sa_mask = k->sa_mask; in do_sigaction()
|
H A D | syscall.c | 9944 struct target_sigaction act, oact, *pact, *old_act; in _syscall2() local 9958 ret = get_errno(do_sigaction(arg1, pact, &oact, 0)); in _syscall2() 9963 old_act->_sa_handler = oact._sa_handler; in _syscall2() 9964 old_act->sa_flags = oact.sa_flags; in _syscall2() 9965 old_act->sa_mask.sig[0] = oact.sa_mask.sig[0]; in _syscall2() 9973 struct target_sigaction act, oact, *pact; in _syscall2() 9988 ret = get_errno(do_sigaction(arg1, pact, &oact, 0)); in _syscall2() 9992 old_act->_sa_handler = oact._sa_handler; in _syscall2() 9993 old_act->sa_mask = oact.sa_mask.sig[0]; in _syscall2() 9994 old_act->sa_flags = oact.sa_flags; in _syscall2() [all …]
|
H A D | syscall_defs.h | 495 struct target_sigaction *oact, abi_ulong ka_restorer);
|
/openbmc/linux/include/linux/ |
H A D | ptrace.h | 402 extern void sigaction_compat_abi(struct k_sigaction *act, struct k_sigaction *oact);
|
H A D | compat.h | 858 struct compat_old_sigaction __user *oact);
|
/openbmc/linux/arch/x86/kernel/ |
H A D | signal_64.c | 392 void sigaction_compat_abi(struct k_sigaction *act, struct k_sigaction *oact) in sigaction_compat_abi() argument
|
/openbmc/linux/Documentation/trace/ |
H A D | ftrace.rst | 3655 …bash-1998 [000] d... 140.733516: sys_rt_sigaction(sig: 2, act: 7fff718846f0, oact: 7fff71884650…
|