/Linux-v6.6/arch/s390/kernel/ |
D | machine_kexec_file.c | 29 int s390_verify_sig(const char *kernel, unsigned long kernel_len) in s390_verify_sig() argument 40 if (marker_len > kernel_len) in s390_verify_sig() 43 if (memcmp(kernel + kernel_len - marker_len, MODULE_SIG_STRING, in s390_verify_sig() 46 kernel_len -= marker_len; in s390_verify_sig() 48 ms = (void *)kernel + kernel_len - sizeof(*ms); in s390_verify_sig() 49 kernel_len -= sizeof(*ms); in s390_verify_sig() 52 if (sig_len >= kernel_len) in s390_verify_sig() 54 kernel_len -= sig_len; in s390_verify_sig() 69 ret = verify_pkcs7_signature(kernel, kernel_len, in s390_verify_sig() 70 kernel + kernel_len, sig_len, in s390_verify_sig() [all …]
|
D | kexec_elf.c | 67 char *kernel, unsigned long kernel_len, in s390_elf_load() argument 89 if (size > kernel_len) in s390_elf_load() 98 if (phdr->p_offset > kernel_len) in s390_elf_load() 104 if (size > kernel_len) in s390_elf_load()
|
D | kexec_image.c | 44 char *kernel, unsigned long kernel_len, in s390_image_load() argument
|
/Linux-v6.6/arch/arm64/kernel/ |
D | kexec_image.c | 22 static int image_probe(const char *kernel_buf, unsigned long kernel_len) in image_probe() argument 27 if (!h || (kernel_len < sizeof(*h))) in image_probe() 37 char *kernel, unsigned long kernel_len, in image_load() argument 81 kbuf.bufsz = kernel_len; in image_load()
|
/Linux-v6.6/arch/parisc/boot/compressed/ |
D | misc.c | 288 unsigned long kernel_addr, kernel_len; in decompress_kernel() local 302 kernel_len = __pa(SZ_end) - __pa(SZparisc_kernel_start); in decompress_kernel() 357 printf("kernel_len = %x\n", kernel_len); in decompress_kernel() 365 flush_data_cache(output, kernel_len); in decompress_kernel()
|
/Linux-v6.6/arch/riscv/kernel/ |
D | elf_kexec.c | 75 static int elf_find_pbase(struct kimage *image, unsigned long kernel_len, in elf_find_pbase() argument 109 kbuf.memsz = ALIGN(kernel_len, PAGE_SIZE); in elf_find_pbase() 194 unsigned long kernel_len, char *initrd, in elf_kexec_load() argument 210 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf_kexec_load() 214 ret = elf_find_pbase(image, kernel_len, &ehdr, &elf_info, in elf_kexec_load() 228 kbuf.buf_min = new_kernel_pbase + kernel_len; in elf_kexec_load()
|
/Linux-v6.6/arch/parisc/kernel/ |
D | kexec_file.c | 17 unsigned long kernel_len, char *initrd, in elf_load() argument 28 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf_load()
|
/Linux-v6.6/arch/powerpc/kexec/ |
D | elf_64.c | 28 unsigned long kernel_len, char *initrd, in elf64_load() argument 46 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf64_load()
|
/Linux-v6.6/include/linux/ |
D | kexec.h | 132 unsigned long kernel_len, char *initrd, 139 unsigned long kernel_len); 212 int kexec_kernel_verify_pe_sig(const char *kernel, unsigned long kernel_len);
|
/Linux-v6.6/arch/s390/include/asm/ |
D | kexec.h | 72 int s390_verify_sig(const char *kernel, unsigned long kernel_len);
|
/Linux-v6.6/arch/x86/kernel/ |
D | kexec-bzimage64.c | 386 unsigned long kernel_len, char *initrd, in bzImage64_load() argument 412 if (kernel_len < kern16_size) { in bzImage64_load() 498 kbuf.bufsz = kernel_len - kern16_size; in bzImage64_load()
|
/Linux-v6.6/arch/x86/mm/ |
D | mem_encrypt_identity.c | 296 unsigned long kernel_start, kernel_end, kernel_len; in sme_encrypt_kernel() local 329 kernel_len = kernel_end - kernel_start; in sme_encrypt_kernel() 475 kernel_len, workarea_start, (unsigned long)ppd.pgd); in sme_encrypt_kernel()
|
/Linux-v6.6/arch/x86/include/asm/ |
D | mem_encrypt.h | 33 unsigned long kernel_len,
|
/Linux-v6.6/kernel/ |
D | kexec_file.c | 130 int kexec_kernel_verify_pe_sig(const char *kernel, unsigned long kernel_len) in kexec_kernel_verify_pe_sig() argument 134 ret = verify_pefile_signature(kernel, kernel_len, in kexec_kernel_verify_pe_sig() 138 ret = verify_pefile_signature(kernel, kernel_len, in kexec_kernel_verify_pe_sig()
|