/arch/arm64/kernel/ |
D | kexec_image.c | 23 static int image_probe(const char *kernel_buf, unsigned long kernel_len) in image_probe() argument 28 if (!h || (kernel_len < sizeof(*h))) in image_probe() 38 char *kernel, unsigned long kernel_len, in image_load() argument 86 kbuf.bufsz = kernel_len; in image_load() 117 static int image_verify_sig(const char *kernel, unsigned long kernel_len) in image_verify_sig() argument 119 return verify_pefile_signature(kernel, kernel_len, NULL, in image_verify_sig()
|
/arch/s390/kernel/ |
D | machine_kexec_file.c | 26 int s390_verify_sig(const char *kernel, unsigned long kernel_len) in s390_verify_sig() argument 36 if (marker_len > kernel_len) in s390_verify_sig() 39 if (memcmp(kernel + kernel_len - marker_len, MODULE_SIG_STRING, in s390_verify_sig() 42 kernel_len -= marker_len; in s390_verify_sig() 44 ms = (void *)kernel + kernel_len - sizeof(*ms); in s390_verify_sig() 45 kernel_len -= sizeof(*ms); in s390_verify_sig() 48 if (sig_len >= kernel_len) in s390_verify_sig() 50 kernel_len -= sig_len; in s390_verify_sig() 65 return verify_pkcs7_signature(kernel, kernel_len, in s390_verify_sig() 66 kernel + kernel_len, sig_len, in s390_verify_sig()
|
D | kexec_elf.c | 67 char *kernel, unsigned long kernel_len, in s390_elf_load() argument 89 if (size > kernel_len) in s390_elf_load() 98 if (phdr->p_offset > kernel_len) in s390_elf_load() 104 if (size > kernel_len) in s390_elf_load()
|
D | kexec_image.c | 44 char *kernel, unsigned long kernel_len, in s390_image_load() argument
|
/arch/parisc/boot/compressed/ |
D | misc.c | 288 unsigned long kernel_addr, kernel_len; in decompress_kernel() local 302 kernel_len = __pa(SZ_end) - __pa(SZparisc_kernel_start); in decompress_kernel() 357 printf("kernel_len = %x\n", kernel_len); in decompress_kernel() 365 flush_data_cache(output, kernel_len); in decompress_kernel()
|
/arch/parisc/kernel/ |
D | kexec_file.c | 17 unsigned long kernel_len, char *initrd, in elf_load() argument 28 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf_load()
|
/arch/x86/kernel/ |
D | kexec-bzimage64.c | 336 unsigned long kernel_len, char *initrd, in bzImage64_load() argument 362 if (kernel_len < kern16_size) { in bzImage64_load() 442 kbuf.bufsz = kernel_len - kern16_size; in bzImage64_load() 543 static int bzImage64_verify_sig(const char *kernel, unsigned long kernel_len) in bzImage64_verify_sig() argument 547 ret = verify_pefile_signature(kernel, kernel_len, in bzImage64_verify_sig() 551 ret = verify_pefile_signature(kernel, kernel_len, in bzImage64_verify_sig()
|
/arch/powerpc/kernel/ |
D | kexec_elf_64.c | 27 unsigned long kernel_len, char *initrd, in elf64_load() argument 45 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf64_load()
|
/arch/s390/include/asm/ |
D | kexec.h | 70 int s390_verify_sig(const char *kernel, unsigned long kernel_len);
|
/arch/x86/include/asm/ |
D | mem_encrypt.h | 26 unsigned long kernel_len,
|
/arch/x86/mm/ |
D | mem_encrypt_identity.c | 284 unsigned long kernel_start, kernel_end, kernel_len; in sme_encrypt_kernel() local 311 kernel_len = kernel_end - kernel_start; in sme_encrypt_kernel() 457 kernel_len, workarea_start, (unsigned long)ppd.pgd); in sme_encrypt_kernel()
|