Home
last modified time | relevance | path

Searched refs:kernel_len (Results 1 – 14 of 14) sorted by relevance

/linux-6.12.1/arch/s390/kernel/
Dmachine_kexec_file.c29 int s390_verify_sig(const char *kernel, unsigned long kernel_len) in s390_verify_sig() argument
40 if (marker_len > kernel_len) in s390_verify_sig()
43 if (memcmp(kernel + kernel_len - marker_len, MODULE_SIG_STRING, in s390_verify_sig()
46 kernel_len -= marker_len; in s390_verify_sig()
48 ms = (void *)kernel + kernel_len - sizeof(*ms); in s390_verify_sig()
49 kernel_len -= sizeof(*ms); in s390_verify_sig()
52 if (sig_len >= kernel_len) in s390_verify_sig()
54 kernel_len -= sig_len; in s390_verify_sig()
69 ret = verify_pkcs7_signature(kernel, kernel_len, in s390_verify_sig()
70 kernel + kernel_len, sig_len, in s390_verify_sig()
[all …]
Dkexec_elf.c69 char *kernel, unsigned long kernel_len, in s390_elf_load() argument
91 if (size > kernel_len) in s390_elf_load()
100 if (phdr->p_offset > kernel_len) in s390_elf_load()
106 if (size > kernel_len) in s390_elf_load()
Dkexec_image.c46 char *kernel, unsigned long kernel_len, in s390_image_load() argument
/linux-6.12.1/arch/arm64/kernel/
Dkexec_image.c22 static int image_probe(const char *kernel_buf, unsigned long kernel_len) in image_probe() argument
27 if (!h || (kernel_len < sizeof(*h))) in image_probe()
37 char *kernel, unsigned long kernel_len, in image_load() argument
81 kbuf.bufsz = kernel_len; in image_load()
/linux-6.12.1/arch/parisc/boot/compressed/
Dmisc.c288 unsigned long kernel_addr, kernel_len; in decompress_kernel() local
302 kernel_len = __pa(SZ_end) - __pa(SZparisc_kernel_start); in decompress_kernel()
357 printf("kernel_len = %x\n", kernel_len); in decompress_kernel()
365 flush_data_cache(output, kernel_len); in decompress_kernel()
/linux-6.12.1/arch/riscv/kernel/
Delf_kexec.c76 static int elf_find_pbase(struct kimage *image, unsigned long kernel_len, in elf_find_pbase() argument
110 kbuf.memsz = ALIGN(kernel_len, PAGE_SIZE); in elf_find_pbase()
197 unsigned long kernel_len, char *initrd, in elf_kexec_load() argument
212 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf_kexec_load()
216 ret = elf_find_pbase(image, kernel_len, &ehdr, &elf_info, in elf_kexec_load()
229 kbuf.buf_min = new_kernel_pbase + kernel_len; in elf_kexec_load()
/linux-6.12.1/arch/parisc/kernel/
Dkexec_file.c17 unsigned long kernel_len, char *initrd, in elf_load() argument
28 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf_load()
/linux-6.12.1/include/linux/
Dkexec.h130 unsigned long kernel_len, char *initrd,
137 unsigned long kernel_len);
210 int kexec_kernel_verify_pe_sig(const char *kernel, unsigned long kernel_len);
/linux-6.12.1/arch/powerpc/kexec/
Delf_64.c29 unsigned long kernel_len, char *initrd, in elf64_load() argument
48 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf64_load()
/linux-6.12.1/arch/s390/include/asm/
Dkexec.h72 int s390_verify_sig(const char *kernel, unsigned long kernel_len);
/linux-6.12.1/arch/x86/mm/
Dmem_encrypt_identity.c292 unsigned long kernel_start, kernel_end, kernel_len; in sme_encrypt_kernel() local
325 kernel_len = kernel_end - kernel_start; in sme_encrypt_kernel()
463 kernel_len, workarea_start, (unsigned long)ppd.pgd); in sme_encrypt_kernel()
/linux-6.12.1/arch/x86/include/asm/
Dmem_encrypt.h36 unsigned long kernel_len,
/linux-6.12.1/arch/x86/kernel/
Dkexec-bzimage64.c393 unsigned long kernel_len, char *initrd, in bzImage64_load() argument
419 if (kernel_len < kern16_size) { in bzImage64_load()
507 kbuf.bufsz = kernel_len - kern16_size; in bzImage64_load()
/linux-6.12.1/kernel/
Dkexec_file.c132 int kexec_kernel_verify_pe_sig(const char *kernel, unsigned long kernel_len) in kexec_kernel_verify_pe_sig() argument
136 ret = verify_pefile_signature(kernel, kernel_len, in kexec_kernel_verify_pe_sig()
140 ret = verify_pefile_signature(kernel, kernel_len, in kexec_kernel_verify_pe_sig()