/linux-6.12.1/arch/s390/kernel/ |
D | machine_kexec_file.c | 29 int s390_verify_sig(const char *kernel, unsigned long kernel_len) in s390_verify_sig() argument 40 if (marker_len > kernel_len) in s390_verify_sig() 43 if (memcmp(kernel + kernel_len - marker_len, MODULE_SIG_STRING, in s390_verify_sig() 46 kernel_len -= marker_len; in s390_verify_sig() 48 ms = (void *)kernel + kernel_len - sizeof(*ms); in s390_verify_sig() 49 kernel_len -= sizeof(*ms); in s390_verify_sig() 52 if (sig_len >= kernel_len) in s390_verify_sig() 54 kernel_len -= sig_len; in s390_verify_sig() 69 ret = verify_pkcs7_signature(kernel, kernel_len, in s390_verify_sig() 70 kernel + kernel_len, sig_len, in s390_verify_sig() [all …]
|
D | kexec_elf.c | 69 char *kernel, unsigned long kernel_len, in s390_elf_load() argument 91 if (size > kernel_len) in s390_elf_load() 100 if (phdr->p_offset > kernel_len) in s390_elf_load() 106 if (size > kernel_len) in s390_elf_load()
|
D | kexec_image.c | 46 char *kernel, unsigned long kernel_len, in s390_image_load() argument
|
/linux-6.12.1/arch/arm64/kernel/ |
D | kexec_image.c | 22 static int image_probe(const char *kernel_buf, unsigned long kernel_len) in image_probe() argument 27 if (!h || (kernel_len < sizeof(*h))) in image_probe() 37 char *kernel, unsigned long kernel_len, in image_load() argument 81 kbuf.bufsz = kernel_len; in image_load()
|
/linux-6.12.1/arch/parisc/boot/compressed/ |
D | misc.c | 288 unsigned long kernel_addr, kernel_len; in decompress_kernel() local 302 kernel_len = __pa(SZ_end) - __pa(SZparisc_kernel_start); in decompress_kernel() 357 printf("kernel_len = %x\n", kernel_len); in decompress_kernel() 365 flush_data_cache(output, kernel_len); in decompress_kernel()
|
/linux-6.12.1/arch/riscv/kernel/ |
D | elf_kexec.c | 76 static int elf_find_pbase(struct kimage *image, unsigned long kernel_len, in elf_find_pbase() argument 110 kbuf.memsz = ALIGN(kernel_len, PAGE_SIZE); in elf_find_pbase() 197 unsigned long kernel_len, char *initrd, in elf_kexec_load() argument 212 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf_kexec_load() 216 ret = elf_find_pbase(image, kernel_len, &ehdr, &elf_info, in elf_kexec_load() 229 kbuf.buf_min = new_kernel_pbase + kernel_len; in elf_kexec_load()
|
/linux-6.12.1/arch/parisc/kernel/ |
D | kexec_file.c | 17 unsigned long kernel_len, char *initrd, in elf_load() argument 28 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf_load()
|
/linux-6.12.1/include/linux/ |
D | kexec.h | 130 unsigned long kernel_len, char *initrd, 137 unsigned long kernel_len); 210 int kexec_kernel_verify_pe_sig(const char *kernel, unsigned long kernel_len);
|
/linux-6.12.1/arch/powerpc/kexec/ |
D | elf_64.c | 29 unsigned long kernel_len, char *initrd, in elf64_load() argument 48 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf64_load()
|
/linux-6.12.1/arch/s390/include/asm/ |
D | kexec.h | 72 int s390_verify_sig(const char *kernel, unsigned long kernel_len);
|
/linux-6.12.1/arch/x86/mm/ |
D | mem_encrypt_identity.c | 292 unsigned long kernel_start, kernel_end, kernel_len; in sme_encrypt_kernel() local 325 kernel_len = kernel_end - kernel_start; in sme_encrypt_kernel() 463 kernel_len, workarea_start, (unsigned long)ppd.pgd); in sme_encrypt_kernel()
|
/linux-6.12.1/arch/x86/include/asm/ |
D | mem_encrypt.h | 36 unsigned long kernel_len,
|
/linux-6.12.1/arch/x86/kernel/ |
D | kexec-bzimage64.c | 393 unsigned long kernel_len, char *initrd, in bzImage64_load() argument 419 if (kernel_len < kern16_size) { in bzImage64_load() 507 kbuf.bufsz = kernel_len - kern16_size; in bzImage64_load()
|
/linux-6.12.1/kernel/ |
D | kexec_file.c | 132 int kexec_kernel_verify_pe_sig(const char *kernel, unsigned long kernel_len) in kexec_kernel_verify_pe_sig() argument 136 ret = verify_pefile_signature(kernel, kernel_len, in kexec_kernel_verify_pe_sig() 140 ret = verify_pefile_signature(kernel, kernel_len, in kexec_kernel_verify_pe_sig()
|