Home
last modified time | relevance | path

Searched refs:kbuf (Results 1 – 7 of 7) sorted by relevance

/kernel/
Dkexec_file.c424 struct kexec_buf *kbuf) in locate_mem_hole_top_down() argument
426 struct kimage *image = kbuf->image; in locate_mem_hole_top_down()
429 temp_end = min(end, kbuf->buf_max); in locate_mem_hole_top_down()
430 temp_start = temp_end - kbuf->memsz; in locate_mem_hole_top_down()
434 temp_start = temp_start & (~(kbuf->buf_align - 1)); in locate_mem_hole_top_down()
436 if (temp_start < start || temp_start < kbuf->buf_min) in locate_mem_hole_top_down()
439 temp_end = temp_start + kbuf->memsz - 1; in locate_mem_hole_top_down()
455 kbuf->mem = temp_start; in locate_mem_hole_top_down()
462 struct kexec_buf *kbuf) in locate_mem_hole_bottom_up() argument
464 struct kimage *image = kbuf->image; in locate_mem_hole_bottom_up()
[all …]
Dkexec_elf.c390 struct kexec_buf *kbuf, in kexec_elf_load() argument
411 kbuf->buffer = (void *) elf_info->buffer + phdr->p_offset; in kexec_elf_load()
412 kbuf->bufsz = size; in kexec_elf_load()
413 kbuf->memsz = phdr->p_memsz; in kexec_elf_load()
414 kbuf->buf_align = phdr->p_align; in kexec_elf_load()
415 kbuf->buf_min = phdr->p_paddr; in kexec_elf_load()
416 kbuf->mem = KEXEC_BUF_MEM_UNKNOWN; in kexec_elf_load()
417 ret = kexec_add_buffer(kbuf); in kexec_elf_load()
420 load_addr = kbuf->mem; in kexec_elf_load()
Dkexec_core.c789 unsigned char *kbuf = NULL; in kimage_load_normal_segment() local
793 kbuf = segment->kbuf; in kimage_load_normal_segment()
829 memcpy(ptr, kbuf, uchunk); in kimage_load_normal_segment()
840 kbuf += mchunk; in kimage_load_normal_segment()
862 unsigned char *kbuf = NULL; in kimage_load_crash_segment() local
866 kbuf = segment->kbuf; in kimage_load_crash_segment()
895 memcpy(ptr, kbuf, uchunk); in kimage_load_crash_segment()
908 kbuf += mchunk; in kimage_load_crash_segment()
Duser_namespace.c926 char *kbuf = NULL, *pos, *next_line; in map_write() local
934 kbuf = memdup_user_nul(buf, count); in map_write()
935 if (IS_ERR(kbuf)) in map_write()
936 return PTR_ERR(kbuf); in map_write()
974 pos = kbuf; in map_write()
1099 kfree(kbuf); in map_write()
1213 char kbuf[8], *pos; in proc_setgroups_write() local
1219 if ((*ppos != 0) || (count >= sizeof(kbuf))) in proc_setgroups_write()
1224 if (copy_from_user(kbuf, buf, count)) in proc_setgroups_write()
1226 kbuf[count] = '\0'; in proc_setgroups_write()
[all …]
/kernel/kcsan/
Ddebugfs.c226 char kbuf[KSYM_NAME_LEN]; in debugfs_write() local
228 int read_len = count < (sizeof(kbuf) - 1) ? count : (sizeof(kbuf) - 1); in debugfs_write()
230 if (copy_from_user(kbuf, buf, read_len)) in debugfs_write()
232 kbuf[read_len] = '\0'; in debugfs_write()
233 arg = strstrip(kbuf); in debugfs_write()
/kernel/trace/
Dtrace.c10139 char *kbuf, *buf, *tmp; in trace_parse_run_command() local
10144 kbuf = kmalloc(WRITE_BUFSIZE, GFP_KERNEL); in trace_parse_run_command()
10145 if (!kbuf) in trace_parse_run_command()
10154 if (copy_from_user(kbuf, buffer + done, size)) { in trace_parse_run_command()
10158 kbuf[size] = '\0'; in trace_parse_run_command()
10159 buf = kbuf; in trace_parse_run_command()
10168 if (buf != kbuf) in trace_parse_run_command()
10195 kfree(kbuf); in trace_parse_run_command()
/kernel/bpf/
Dverifier.c291 n = vscnprintf(log->kbuf, BPF_VERIFIER_TMP_LOG_SIZE, fmt, args); in bpf_verifier_vlog()
297 log->kbuf[n] = '\0'; in bpf_verifier_vlog()
300 pr_err("BPF:%s\n", log->kbuf); in bpf_verifier_vlog()
303 if (!copy_to_user(log->ubuf + log->len_used, log->kbuf, n + 1)) in bpf_verifier_vlog()