/kernel/ |
D | kexec_core.c | 145 static struct page *kimage_alloc_page(struct kimage *image, 149 int sanity_check_segment_list(struct kimage *image) in sanity_check_segment_list() argument 152 unsigned long nr_segments = image->nr_segments; in sanity_check_segment_list() 172 mstart = image->segment[i].mem; in sanity_check_segment_list() 173 mend = mstart + image->segment[i].memsz; in sanity_check_segment_list() 191 mstart = image->segment[i].mem; in sanity_check_segment_list() 192 mend = mstart + image->segment[i].memsz; in sanity_check_segment_list() 196 pstart = image->segment[j].mem; in sanity_check_segment_list() 197 pend = pstart + image->segment[j].memsz; in sanity_check_segment_list() 210 if (image->segment[i].bufsz > image->segment[i].memsz) in sanity_check_segment_list() [all …]
|
D | kexec_file.c | 41 static int kexec_calculate_store_digests(struct kimage *image); 48 int kexec_image_probe_default(struct kimage *image, void *buf, in kexec_image_probe_default() argument 57 image->fops = *fops; in kexec_image_probe_default() 66 int __weak arch_kexec_kernel_image_probe(struct kimage *image, void *buf, in arch_kexec_kernel_image_probe() argument 69 return kexec_image_probe_default(image, buf, buf_len); in arch_kexec_kernel_image_probe() 72 static void *kexec_image_load_default(struct kimage *image) in kexec_image_load_default() argument 74 if (!image->fops || !image->fops->load) in kexec_image_load_default() 77 return image->fops->load(image, image->kernel_buf, in kexec_image_load_default() 78 image->kernel_buf_len, image->initrd_buf, in kexec_image_load_default() 79 image->initrd_buf_len, image->cmdline_buf, in kexec_image_load_default() [all …]
|
D | kexec.c | 28 struct kimage *image; in kimage_alloc_init() local 39 image = do_kimage_alloc_init(); in kimage_alloc_init() 40 if (!image) in kimage_alloc_init() 43 image->start = entry; in kimage_alloc_init() 44 image->nr_segments = nr_segments; in kimage_alloc_init() 45 memcpy(image->segment, segments, nr_segments * sizeof(*segments)); in kimage_alloc_init() 49 image->control_page = crashk_res.start; in kimage_alloc_init() 50 image->type = KEXEC_TYPE_CRASH; in kimage_alloc_init() 53 ret = sanity_check_segment_list(image); in kimage_alloc_init() 63 image->control_code_page = kimage_alloc_control_pages(image, in kimage_alloc_init() [all …]
|
D | kexec_internal.h | 8 int sanity_check_segment_list(struct kimage *image); 10 void kimage_free(struct kimage *image); 11 int kimage_load_segment(struct kimage *image, struct kexec_segment *segment); 12 void kimage_terminate(struct kimage *image); 13 int kimage_is_destination_range(struct kimage *image, 33 void kimage_file_post_load_cleanup(struct kimage *image); 37 static inline void kimage_file_post_load_cleanup(struct kimage *image) { } in kimage_file_post_load_cleanup() argument
|
D | kexec_elf.c | 388 int kexec_elf_load(struct kimage *image, struct elfhdr *ehdr, in kexec_elf_load() argument
|
/kernel/bpf/ |
D | dispatcher.c | 88 int __weak arch_prepare_bpf_dispatcher(void *image, s64 *funcs, int num_funcs) in arch_prepare_bpf_dispatcher() argument 93 static int bpf_dispatcher_prepare(struct bpf_dispatcher *d, void *image) in bpf_dispatcher_prepare() argument 102 return arch_prepare_bpf_dispatcher(image, &ips[0], d->num_progs); in bpf_dispatcher_prepare() 115 old = d->image + d->image_off; in bpf_dispatcher_update() 119 new = d->num_progs ? d->image + noff : NULL; in bpf_dispatcher_update() 142 if (!d->image) { in bpf_dispatcher_change_prog() 143 d->image = bpf_jit_alloc_exec_page(); in bpf_dispatcher_change_prog() 144 if (!d->image) in bpf_dispatcher_change_prog() 146 bpf_image_ksym_add(d->image, &d->ksym); in bpf_dispatcher_change_prog()
|
D | trampoline.c | 31 void *image; in bpf_jit_alloc_exec_page() local 33 image = bpf_jit_alloc_exec(PAGE_SIZE); in bpf_jit_alloc_exec_page() 34 if (!image) in bpf_jit_alloc_exec_page() 37 set_vm_flush_reset_perms(image); in bpf_jit_alloc_exec_page() 41 set_memory_x((long)image, 1); in bpf_jit_alloc_exec_page() 42 return image; in bpf_jit_alloc_exec_page() 206 bpf_jit_free_exec(im->image); in __bpf_tramp_image_put_deferred() 297 void *image; in bpf_tramp_image_alloc() local 309 im->image = image = bpf_jit_alloc_exec_page(); in bpf_tramp_image_alloc() 310 if (!image) in bpf_tramp_image_alloc() [all …]
|
D | bpf_struct_ops.c | 45 void *image; member 326 void *image; in bpf_struct_ops_map_update_elem() local 365 image = st_map->image; in bpf_struct_ops_map_update_elem() 437 err = arch_prepare_bpf_trampoline(NULL, image, in bpf_struct_ops_map_update_elem() 438 st_map->image + PAGE_SIZE, in bpf_struct_ops_map_update_elem() 444 *(void **)(kdata + moff) = image; in bpf_struct_ops_map_update_elem() 445 image += err; in bpf_struct_ops_map_update_elem() 454 set_memory_ro((long)st_map->image, 1); in bpf_struct_ops_map_update_elem() 455 set_memory_x((long)st_map->image, 1); in bpf_struct_ops_map_update_elem() 472 set_memory_nx((long)st_map->image, 1); in bpf_struct_ops_map_update_elem() [all …]
|
D | core.c | 905 *image_ptr = &hdr->image[start]; in bpf_jit_binary_alloc()
|
/kernel/power/ |
D | Kconfig | 63 It creates an image which is saved in your active swap. Upon the next 65 have it detect the saved image, restore memory state from it, and 101 to-disk implementation will look for a suspended disk image. 114 suspended image to. It will simply pick the first available swap
|
D | swap.c | 109 sector_t image; member 326 swsusp_header->image = handle->first_sector; in mark_swapfiles() 980 if (!swsusp_header->image) /* how can this happen? */ in get_swap_reader() 985 offset = swsusp_header->image; in get_swap_reader()
|
/kernel/gcov/ |
D | Kconfig | 54 which are not linked to the kernel image to prevent linker errors.
|
/kernel/time/ |
D | Kconfig | 182 the size of the kernel image.
|
/kernel/trace/ |
D | Kconfig | 202 dynamically (will patch them out of the binary image and 206 image. When this is enabled, functions can be individually
|