Searched refs:kbuf (Results 1 – 7 of 7) sorted by relevance
/kernel/ |
D | kexec_file.c | 420 struct kexec_buf *kbuf) in locate_mem_hole_top_down() argument 422 struct kimage *image = kbuf->image; in locate_mem_hole_top_down() 425 temp_end = min(end, kbuf->buf_max); in locate_mem_hole_top_down() 426 temp_start = temp_end - kbuf->memsz; in locate_mem_hole_top_down() 430 temp_start = temp_start & (~(kbuf->buf_align - 1)); in locate_mem_hole_top_down() 432 if (temp_start < start || temp_start < kbuf->buf_min) in locate_mem_hole_top_down() 435 temp_end = temp_start + kbuf->memsz - 1; in locate_mem_hole_top_down() 451 kbuf->mem = temp_start; in locate_mem_hole_top_down() 458 struct kexec_buf *kbuf) in locate_mem_hole_bottom_up() argument 460 struct kimage *image = kbuf->image; in locate_mem_hole_bottom_up() [all …]
|
D | kexec_elf.c | 390 struct kexec_buf *kbuf, in kexec_elf_load() argument 411 kbuf->buffer = (void *) elf_info->buffer + phdr->p_offset; in kexec_elf_load() 412 kbuf->bufsz = size; in kexec_elf_load() 413 kbuf->memsz = phdr->p_memsz; in kexec_elf_load() 414 kbuf->buf_align = phdr->p_align; in kexec_elf_load() 415 kbuf->buf_min = phdr->p_paddr; in kexec_elf_load() 416 kbuf->mem = KEXEC_BUF_MEM_UNKNOWN; in kexec_elf_load() 417 ret = kexec_add_buffer(kbuf); in kexec_elf_load() 420 load_addr = kbuf->mem; in kexec_elf_load()
|
D | kexec_core.c | 783 unsigned char *kbuf = NULL; in kimage_load_normal_segment() local 786 kbuf = segment->kbuf; in kimage_load_normal_segment() 822 memcpy(ptr, kbuf, uchunk); in kimage_load_normal_segment() 833 kbuf += mchunk; in kimage_load_normal_segment() 855 unsigned char *kbuf = NULL; in kimage_load_crash_segment() local 859 kbuf = segment->kbuf; in kimage_load_crash_segment() 888 memcpy(ptr, kbuf, uchunk); in kimage_load_crash_segment() 901 kbuf += mchunk; in kimage_load_crash_segment()
|
D | user_namespace.c | 931 char *kbuf = NULL, *pos, *next_line; in map_write() local 939 kbuf = memdup_user_nul(buf, count); in map_write() 940 if (IS_ERR(kbuf)) in map_write() 941 return PTR_ERR(kbuf); in map_write() 979 pos = kbuf; in map_write() 1104 kfree(kbuf); in map_write() 1218 char kbuf[8], *pos; in proc_setgroups_write() local 1224 if ((*ppos != 0) || (count >= sizeof(kbuf))) in proc_setgroups_write() 1229 if (copy_from_user(kbuf, buf, count)) in proc_setgroups_write() 1231 kbuf[count] = '\0'; in proc_setgroups_write() [all …]
|
/kernel/kcsan/ |
D | debugfs.c | 226 char kbuf[KSYM_NAME_LEN]; in debugfs_write() local 228 int read_len = count < (sizeof(kbuf) - 1) ? count : (sizeof(kbuf) - 1); in debugfs_write() 230 if (copy_from_user(kbuf, buf, read_len)) in debugfs_write() 232 kbuf[read_len] = '\0'; in debugfs_write() 233 arg = strstrip(kbuf); in debugfs_write()
|
/kernel/trace/ |
D | trace.c | 10189 char *kbuf, *buf, *tmp; in trace_parse_run_command() local 10194 kbuf = kmalloc(WRITE_BUFSIZE, GFP_KERNEL); in trace_parse_run_command() 10195 if (!kbuf) in trace_parse_run_command() 10204 if (copy_from_user(kbuf, buffer + done, size)) { in trace_parse_run_command() 10208 kbuf[size] = '\0'; in trace_parse_run_command() 10209 buf = kbuf; in trace_parse_run_command() 10218 if (buf != kbuf) in trace_parse_run_command() 10245 kfree(kbuf); in trace_parse_run_command()
|
/kernel/bpf/ |
D | verifier.c | 299 n = vscnprintf(log->kbuf, BPF_VERIFIER_TMP_LOG_SIZE, fmt, args); in bpf_verifier_vlog() 305 bool newline = n > 0 && log->kbuf[n - 1] == '\n'; in bpf_verifier_vlog() 307 pr_err("BPF: %s%s", log->kbuf, newline ? "" : "\n"); in bpf_verifier_vlog() 312 log->kbuf[n] = '\0'; in bpf_verifier_vlog() 313 if (!copy_to_user(log->ubuf + log->len_used, log->kbuf, n + 1)) in bpf_verifier_vlog()
|