Home
last modified time | relevance | path

Searched refs:image (Results 1 – 11 of 11) sorted by relevance

/kernel/
Dkexec_core.c144 static struct page *kimage_alloc_page(struct kimage *image,
148 int sanity_check_segment_list(struct kimage *image) in sanity_check_segment_list() argument
151 unsigned long nr_segments = image->nr_segments; in sanity_check_segment_list()
171 mstart = image->segment[i].mem; in sanity_check_segment_list()
172 mend = mstart + image->segment[i].memsz; in sanity_check_segment_list()
190 mstart = image->segment[i].mem; in sanity_check_segment_list()
191 mend = mstart + image->segment[i].memsz; in sanity_check_segment_list()
195 pstart = image->segment[j].mem; in sanity_check_segment_list()
196 pend = pstart + image->segment[j].memsz; in sanity_check_segment_list()
209 if (image->segment[i].bufsz > image->segment[i].memsz) in sanity_check_segment_list()
[all …]
Dkexec_file.c31 static int kexec_calculate_store_digests(struct kimage *image);
38 int kexec_image_probe_default(struct kimage *image, void *buf, in kexec_image_probe_default() argument
47 image->fops = *fops; in kexec_image_probe_default()
56 int __weak arch_kexec_kernel_image_probe(struct kimage *image, void *buf, in arch_kexec_kernel_image_probe() argument
59 return kexec_image_probe_default(image, buf, buf_len); in arch_kexec_kernel_image_probe()
62 static void *kexec_image_load_default(struct kimage *image) in kexec_image_load_default() argument
64 if (!image->fops || !image->fops->load) in kexec_image_load_default()
67 return image->fops->load(image, image->kernel_buf, in kexec_image_load_default()
68 image->kernel_buf_len, image->initrd_buf, in kexec_image_load_default()
69 image->initrd_buf_len, image->cmdline_buf, in kexec_image_load_default()
[all …]
Dkexec.c22 static int copy_user_segment_list(struct kimage *image, in copy_user_segment_list() argument
30 image->nr_segments = nr_segments; in copy_user_segment_list()
32 ret = copy_from_user(image->segment, segments, segment_bytes); in copy_user_segment_list()
45 struct kimage *image; in kimage_alloc_init() local
56 image = do_kimage_alloc_init(); in kimage_alloc_init()
57 if (!image) in kimage_alloc_init()
60 image->start = entry; in kimage_alloc_init()
62 ret = copy_user_segment_list(image, nr_segments, segments); in kimage_alloc_init()
68 image->control_page = crashk_res.start; in kimage_alloc_init()
69 image->type = KEXEC_TYPE_CRASH; in kimage_alloc_init()
[all …]
Dkexec_internal.h8 int sanity_check_segment_list(struct kimage *image);
10 void kimage_free(struct kimage *image);
11 int kimage_load_segment(struct kimage *image, struct kexec_segment *segment);
12 void kimage_terminate(struct kimage *image);
13 int kimage_is_destination_range(struct kimage *image,
20 void kimage_file_post_load_cleanup(struct kimage *image);
24 static inline void kimage_file_post_load_cleanup(struct kimage *image) { } in kimage_file_post_load_cleanup() argument
Dkexec_elf.c388 int kexec_elf_load(struct kimage *image, struct elfhdr *ehdr, in kexec_elf_load() argument
/kernel/power/
DKconfig60 It creates an image which is saved in your active swap. Upon the next
62 have it detect the saved image, restore memory state from it, and
89 to-disk implementation will look for a suspended disk image.
102 suspended image to. It will simply pick the first available swap
Dswap.c109 sector_t image; member
315 swsusp_header->image = handle->first_sector; in mark_swapfiles()
970 if (!swsusp_header->image) /* how can this happen? */ in get_swap_reader()
975 offset = swsusp_header->image; in get_swap_reader()
/kernel/gcov/
DKconfig52 which are not linked to the kernel image to prevent linker errors.
/kernel/time/
DKconfig165 the size of the kernel image.
/kernel/trace/
DKconfig538 dynamically (will patch them out of the binary image and
542 image. When this is enabled, functions can be individually
/kernel/bpf/
Dcore.c836 *image_ptr = &hdr->image[start]; in bpf_jit_binary_alloc()