Home
last modified time | relevance | path

Searched refs:kbuf (Results 1 – 7 of 7) sorted by relevance

/kernel/
Dkexec_file.c420 struct kexec_buf *kbuf) in locate_mem_hole_top_down() argument
422 struct kimage *image = kbuf->image; in locate_mem_hole_top_down()
425 temp_end = min(end, kbuf->buf_max); in locate_mem_hole_top_down()
426 temp_start = temp_end - kbuf->memsz; in locate_mem_hole_top_down()
430 temp_start = temp_start & (~(kbuf->buf_align - 1)); in locate_mem_hole_top_down()
432 if (temp_start < start || temp_start < kbuf->buf_min) in locate_mem_hole_top_down()
435 temp_end = temp_start + kbuf->memsz - 1; in locate_mem_hole_top_down()
451 kbuf->mem = temp_start; in locate_mem_hole_top_down()
458 struct kexec_buf *kbuf) in locate_mem_hole_bottom_up() argument
460 struct kimage *image = kbuf->image; in locate_mem_hole_bottom_up()
[all …]
Dkexec_elf.c390 struct kexec_buf *kbuf, in kexec_elf_load() argument
411 kbuf->buffer = (void *) elf_info->buffer + phdr->p_offset; in kexec_elf_load()
412 kbuf->bufsz = size; in kexec_elf_load()
413 kbuf->memsz = phdr->p_memsz; in kexec_elf_load()
414 kbuf->buf_align = phdr->p_align; in kexec_elf_load()
415 kbuf->buf_min = phdr->p_paddr; in kexec_elf_load()
416 kbuf->mem = KEXEC_BUF_MEM_UNKNOWN; in kexec_elf_load()
417 ret = kexec_add_buffer(kbuf); in kexec_elf_load()
420 load_addr = kbuf->mem; in kexec_elf_load()
Dkexec_core.c783 unsigned char *kbuf = NULL; in kimage_load_normal_segment() local
786 kbuf = segment->kbuf; in kimage_load_normal_segment()
822 memcpy(ptr, kbuf, uchunk); in kimage_load_normal_segment()
833 kbuf += mchunk; in kimage_load_normal_segment()
855 unsigned char *kbuf = NULL; in kimage_load_crash_segment() local
859 kbuf = segment->kbuf; in kimage_load_crash_segment()
888 memcpy(ptr, kbuf, uchunk); in kimage_load_crash_segment()
901 kbuf += mchunk; in kimage_load_crash_segment()
Duser_namespace.c931 char *kbuf = NULL, *pos, *next_line; in map_write() local
939 kbuf = memdup_user_nul(buf, count); in map_write()
940 if (IS_ERR(kbuf)) in map_write()
941 return PTR_ERR(kbuf); in map_write()
979 pos = kbuf; in map_write()
1104 kfree(kbuf); in map_write()
1218 char kbuf[8], *pos; in proc_setgroups_write() local
1224 if ((*ppos != 0) || (count >= sizeof(kbuf))) in proc_setgroups_write()
1229 if (copy_from_user(kbuf, buf, count)) in proc_setgroups_write()
1231 kbuf[count] = '\0'; in proc_setgroups_write()
[all …]
/kernel/kcsan/
Ddebugfs.c226 char kbuf[KSYM_NAME_LEN]; in debugfs_write() local
228 int read_len = count < (sizeof(kbuf) - 1) ? count : (sizeof(kbuf) - 1); in debugfs_write()
230 if (copy_from_user(kbuf, buf, read_len)) in debugfs_write()
232 kbuf[read_len] = '\0'; in debugfs_write()
233 arg = strstrip(kbuf); in debugfs_write()
/kernel/trace/
Dtrace.c10189 char *kbuf, *buf, *tmp; in trace_parse_run_command() local
10194 kbuf = kmalloc(WRITE_BUFSIZE, GFP_KERNEL); in trace_parse_run_command()
10195 if (!kbuf) in trace_parse_run_command()
10204 if (copy_from_user(kbuf, buffer + done, size)) { in trace_parse_run_command()
10208 kbuf[size] = '\0'; in trace_parse_run_command()
10209 buf = kbuf; in trace_parse_run_command()
10218 if (buf != kbuf) in trace_parse_run_command()
10245 kfree(kbuf); in trace_parse_run_command()
/kernel/bpf/
Dverifier.c299 n = vscnprintf(log->kbuf, BPF_VERIFIER_TMP_LOG_SIZE, fmt, args); in bpf_verifier_vlog()
305 bool newline = n > 0 && log->kbuf[n - 1] == '\n'; in bpf_verifier_vlog()
307 pr_err("BPF: %s%s", log->kbuf, newline ? "" : "\n"); in bpf_verifier_vlog()
312 log->kbuf[n] = '\0'; in bpf_verifier_vlog()
313 if (!copy_to_user(log->ubuf + log->len_used, log->kbuf, n + 1)) in bpf_verifier_vlog()