Home
last modified time | relevance | path

Searched refs:sig (Results 1 – 25 of 37) sorted by relevance

12

/xen/xen/arch/x86/cpu/microcode/
A Damd.c88 uint32_t sig; member
98 csig->sig = cpuid_eax(1); in collect_cpu_info()
177 if ( equiv.sig != sig->sig || in microcode_fits()
181 if ( patch->patch_id <= sig->rev ) in microcode_fits()
217 uint32_t rev, old_rev = sig->rev; in apply_microcode()
226 cpu, sig->rev); in apply_microcode()
234 sig->rev = rev; in apply_microcode()
265 if ( et->eq[i].installed_cpu != sig->sig ) in scan_equiv_cpu_table()
270 equiv.sig = sig->sig; in scan_equiv_cpu_table()
275 if ( equiv.sig != sig->sig || equiv.id != et->eq[i].equiv_cpu ) in scan_equiv_cpu_table()
[all …]
A Dintel.c40 unsigned int sig; member
64 unsigned int sig; member
113 if ( cpu_sig->sig != ucode_sig ) in signature_matches()
131 csig->sig = cpuid_eax(1); in collect_cpu_info()
137 csig->sig, csig->pf, csig->rev); in collect_cpu_info()
211 sum = patch->sig + patch->pf + patch->cksum; in microcode_sanity_check()
213 if ( sum != (ext->sigs[i].sig + ext->sigs[i].pf + ext->sigs[i].cksum) ) in microcode_sanity_check()
233 if ( signature_matches(cpu_sig, mc->sig, mc->pf) ) in microcode_update_match()
265 struct cpu_signature *sig = &this_cpu(cpu_sig); in apply_microcode() local
266 uint32_t rev, old_rev = sig->rev; in apply_microcode()
[all …]
/xen/xen/arch/x86/pv/
A Demul-inv-op.c28 char sig[5], instr[2]; in emulate_forced_invalid_op() local
36 if ( (rc = copy_from_user(sig, (char *)eip, sizeof(sig))) != 0 ) in emulate_forced_invalid_op()
38 pv_inject_page_fault(0, eip + sizeof(sig) - rc); in emulate_forced_invalid_op()
41 if ( memcmp(sig, "\xf\xbxen", sizeof(sig)) ) in emulate_forced_invalid_op()
43 eip += sizeof(sig); in emulate_forced_invalid_op()
/xen/stubdom/
A Dvtpm-deepquote-anyloc.patch10 - BYTE *sig;
28 - res = TPM_DeepQuote(&nonce, &myPCR, &ptPCR, &req->auth1, &sigSize, &sig);
35 - if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) {
40 - tpm_free(sig);
55 * @sig: [out] The resulting digital signature and PCR values
63 BYTE **sig
78 TPM_AUTH *auth1, UINT32 *sigSize, BYTE **sig)
92 - res = VTPM_GetParentQuote(&hres, sel, sigSize, sig);
93 + res = VTPM_GetParentQuote((TPM_NONCE*)&hres, sel, extraInfoFlags, sigSize, sig);
101 - UINT32 *sigSize, BYTE **sig)
[all …]
A Dvtpm-deepquote.patch14 + BYTE *sig;
29 + res = TPM_DeepQuote(&nonce, &myPCR, &ptPCR, &req->auth1, &sigSize, &sig);
33 + if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) {
37 + tpm_free(sig);
62 BYTE **sig
72 + * @sig: [out] The resulting digital signature and PCR values
81 + BYTE **sig
102 + UINT32 *sigSize, BYTE **sig)
137 + res = VTPM_GetParentQuote(&hres, ptPCR, sigSize, sig);
167 + * BYTE[] sig Signature provided by physical TPM
A Dvtpm-parent-sign-ek.patch14 + BYTE *sig;
27 + res = TPM_ParentSignEK(&nonce, &targetPCR, &req->auth1, &sigSize, &sig);
31 + if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) {
35 + tpm_free(sig);
69 + * @sig: [out] The resulting digital signature and PCR values
77 + BYTE **sig
94 …_RESULT VTPM_GetParentQuote(TPM_DIGEST* data, TPM_PCR_SELECTION *sel, UINT32 *sigSize, BYTE **sig);
97 + TPM_AUTH *auth1, UINT32 *sigSize, BYTE **sig)
117 + res = VTPM_GetParentQuote(&hres, sel, sigSize, sig);
171 + * BYTE[] sig Signature provided by physical TPM
/xen/tools/debugger/gdbsx/gx/
A Dgx_main.c373 prepare_stop_reply(enum target_signal sig, char *buf, vcpuid_t vcpu) in prepare_stop_reply() argument
379 nib = ((sig & 0xf0) >> 4); in prepare_stop_reply()
381 nib = sig & 0x0f; in prepare_stop_reply()
407 enum target_signal sig; in process_c_request() local
411 sig = TARGET_SIGNAL_INT; in process_c_request()
413 sig = TARGET_SIGNAL_TRAP; in process_c_request()
415 prepare_stop_reply(sig, remote_buf, current_vcpu); in process_c_request()
/xen/tools/misc/
A Dxenwatchdogd.c39 void catch_exit(int sig) in catch_exit() argument
46 void catch_usr1(int sig) in catch_usr1() argument
A Dxen-detect.c106 void sigill_handler(int sig) in sigill_handler() argument
/xen/tools/libxl/
A Dlibxl_exec.c123 int sig = WTERMSIG(status); in libxl_report_child_exitstatus() local
124 const char *str = strsignal(sig); in libxl_report_child_exitstatus()
133 sig, coredump); in libxl_report_child_exitstatus()
439 int sig = status - 128; in spawn_middle_death() local
440 const char *str = strsignal(sig); in spawn_middle_death()
446 " signal number %d", ss->what, (unsigned long)pid, sig); in spawn_middle_death()
A Dlibxl_fork.c688 int sig) in libxl__ev_child_kill_deregister() argument
706 int r = kill(pid, sig); in libxl__ev_child_kill_deregister()
710 (unsigned long)pid, sig); in libxl__ev_child_kill_deregister()
A Dlibxl_aoutils.c622 void libxl__kill(libxl__gc *gc, pid_t pid, int sig, const char *what) in libxl__kill() argument
624 int r = kill(pid, sig); in libxl__kill()
626 what, (unsigned long)pid, sig); in libxl__kill()
/xen/tools/ocaml/libs/xl/
A Dxenlight.mli.in38 module Domain : sig
53 module Host : sig
64 module Async : sig
/xen/xen/include/asm-x86/
A Dmicrocode.h11 unsigned int sig; member
/xen/xen/arch/x86/hvm/
A Ddom0_build.c891 static bool __init pvh_acpi_table_allowed(const char *sig, in pvh_acpi_table_allowed() argument
904 if ( strncmp(sig, allowed_tables[i], ACPI_NAME_SIZE) ) in pvh_acpi_table_allowed()
912 sig); in pvh_acpi_table_allowed()
920 static bool __init pvh_acpi_xsdt_table_allowed(const char *sig, in pvh_acpi_xsdt_table_allowed() argument
928 return (pvh_acpi_table_allowed(sig, address, size) && in pvh_acpi_xsdt_table_allowed()
929 strncmp(sig, ACPI_SIG_DSDT, ACPI_NAME_SIZE) && in pvh_acpi_xsdt_table_allowed()
930 strncmp(sig, ACPI_SIG_FACS, ACPI_NAME_SIZE)); in pvh_acpi_xsdt_table_allowed()
1057 const char *sig = acpi_gbl_root_table_list.tables[i].signature.ascii; in pvh_setup_acpi() local
1066 if ( strncmp(sig, ACPI_SIG_MADT, ACPI_NAME_SIZE) in pvh_setup_acpi()
1067 ? pvh_acpi_table_allowed(sig, addr, size) in pvh_setup_acpi()
/xen/stubdom/vtpmmgr/
A Dmgmt_authority.c330 BYTE* sig; in vtpm_do_quote() local
370 rc = TPM_Quote(handle, data_to_quote, sel, (void*)&group->aik_authdata, &oiap, &pcrs, &sig, &size); in vtpm_do_quote()
389 memcpy(sig_out, sig, size); in vtpm_do_quote()
393 free(sig); in vtpm_do_quote()
A Dvtpm_cmd_handler.c533 void *dhkx1, *dhkx2, *gk, *sig; in vtpmmgr_GroupRegister() local
538 UNPACK_IN(VPTR, &sig, 256, UNPACK_ALIAS); in vtpmmgr_GroupRegister()
553 if (tpmrsa_sigcheck(&saa_rsa, sig, digest.bits)) in vtpmmgr_GroupRegister()
591 void *sig, *seal_bits, *kern_bits; in vtpmmgr_GroupUpdate() local
594 UNPACK_IN(VPTR, &sig, 256, UNPACK_ALIAS); in vtpmmgr_GroupUpdate()
644 rc = tpmrsa_sigcheck(&saa_rsa, sig, digest); in vtpmmgr_GroupUpdate()
A Dtpm.h175 BYTE** sig, // out
/xen/tools/ocaml/libs/xb/
A Dxb.mli2 sig
35 sig
/xen/tools/console/daemon/
A Dutils.c41 static void child_exit(int sig) in child_exit() argument
A Dmain.c45 static void handle_hup(int sig) in handle_hup() argument
/xen/tools/python/scripts/
A Dconvert-legacy-stream540 sig, = unpack("21s", rawsig)
541 info("Qemu signature: %s" % (sig, ))
543 if sig == b"DeviceModelRecord0002":
556 raise RuntimeError("Unrecognised Qemu sig '%s'" % (sig, ))
/xen/xen/arch/x86/
A Dplatform_hypercall.c360 const struct mbr_signature *sig; in do_platform_op() local
366 sig = bootsym(boot_mbr_signature) + op->u.firmware_info.index; in do_platform_op()
368 op->u.firmware_info.u.disk_mbr_signature.device = sig->device; in do_platform_op()
370 sig->signature; in do_platform_op()
/xen/xen/arch/x86/efi/
A Defi-boot.h463 struct mbr_signature *sig = boot_mbr_signature + in efi_arch_edd() local
466 sig->device = 0x80 + boot_edd_info_nr; /* fake */ in efi_arch_edd()
467 memcpy(&sig->signature, devp.HardDrive->Signature, in efi_arch_edd()
468 sizeof(sig->signature)); in efi_arch_edd()
/xen/docs/process/
A Drelease-technician-checklist.txt137 cvs add -kb xen-$v.tar.gz.sig
147 # U oss-xen/release/4.8.0-rc2/xen-4.8.0-rc2.tar.gz.sig

Completed in 656 milliseconds

12