Home
last modified time | relevance | path

Searched refs:image (Results 1 – 16 of 16) sorted by relevance

/kernel/
Dkexec_file.c41 static int kexec_calculate_store_digests(struct kimage *image);
51 int kexec_image_probe_default(struct kimage *image, void *buf, in kexec_image_probe_default() argument
60 image->fops = *fops; in kexec_image_probe_default()
68 static void *kexec_image_load_default(struct kimage *image) in kexec_image_load_default() argument
70 if (!image->fops || !image->fops->load) in kexec_image_load_default()
73 return image->fops->load(image, image->kernel_buf, in kexec_image_load_default()
74 image->kernel_buf_len, image->initrd_buf, in kexec_image_load_default()
75 image->initrd_buf_len, image->cmdline_buf, in kexec_image_load_default()
76 image->cmdline_buf_len); in kexec_image_load_default()
79 int kexec_image_post_load_cleanup_default(struct kimage *image) in kexec_image_post_load_cleanup_default() argument
[all …]
Dkexec_core.c143 static struct page *kimage_alloc_page(struct kimage *image,
147 int sanity_check_segment_list(struct kimage *image) in sanity_check_segment_list() argument
150 unsigned long nr_segments = image->nr_segments; in sanity_check_segment_list()
170 mstart = image->segment[i].mem; in sanity_check_segment_list()
171 mend = mstart + image->segment[i].memsz; in sanity_check_segment_list()
189 mstart = image->segment[i].mem; in sanity_check_segment_list()
190 mend = mstart + image->segment[i].memsz; in sanity_check_segment_list()
194 pstart = image->segment[j].mem; in sanity_check_segment_list()
195 pend = pstart + image->segment[j].memsz; in sanity_check_segment_list()
208 if (image->segment[i].bufsz > image->segment[i].memsz) in sanity_check_segment_list()
[all …]
Dkexec.c28 struct kimage *image; in kimage_alloc_init() local
39 image = do_kimage_alloc_init(); in kimage_alloc_init()
40 if (!image) in kimage_alloc_init()
43 image->start = entry; in kimage_alloc_init()
44 image->nr_segments = nr_segments; in kimage_alloc_init()
45 memcpy(image->segment, segments, nr_segments * sizeof(*segments)); in kimage_alloc_init()
49 image->control_page = crashk_res.start; in kimage_alloc_init()
50 image->type = KEXEC_TYPE_CRASH; in kimage_alloc_init()
53 ret = sanity_check_segment_list(image); in kimage_alloc_init()
63 image->control_code_page = kimage_alloc_control_pages(image, in kimage_alloc_init()
[all …]
Dkexec_internal.h8 int sanity_check_segment_list(struct kimage *image);
10 void kimage_free(struct kimage *image);
11 int kimage_load_segment(struct kimage *image, struct kexec_segment *segment);
12 void kimage_terminate(struct kimage *image);
13 int kimage_is_destination_range(struct kimage *image,
33 void kimage_file_post_load_cleanup(struct kimage *image);
37 static inline void kimage_file_post_load_cleanup(struct kimage *image) { } in kimage_file_post_load_cleanup() argument
Dcrash_core.c797 struct kimage *image; in crash_handle_hotplug_event() local
811 image = kexec_crash_image; in crash_handle_hotplug_event()
814 if (!(image->file_mode || image->update_elfcorehdr)) in crash_handle_hotplug_event()
828 if (image->elfcorehdr_index < 0) { in crash_handle_hotplug_event()
833 for (n = 0; n < image->nr_segments; n++) { in crash_handle_hotplug_event()
834 mem = image->segment[n].mem; in crash_handle_hotplug_event()
839 image->elfcorehdr_index = (int)n; in crash_handle_hotplug_event()
845 if (image->elfcorehdr_index < 0) { in crash_handle_hotplug_event()
854 image->hp_action = hp_action; in crash_handle_hotplug_event()
857 arch_crash_handle_hotplug_event(image); in crash_handle_hotplug_event()
[all …]
DKconfig.kexec54 signature of the kernel image. The image can still be loaded without
59 verification for the corresponding kernel image type being
108 PHYSICAL_START, or it must be built as a relocatable image
Dkexec_elf.c388 int kexec_elf_load(struct kimage *image, struct elfhdr *ehdr, in kexec_elf_load() argument
/kernel/bpf/
Ddispatcher.c89 int __weak arch_prepare_bpf_dispatcher(void *image, void *buf, s64 *funcs, int num_funcs) in arch_prepare_bpf_dispatcher() argument
94 static int bpf_dispatcher_prepare(struct bpf_dispatcher *d, void *image, void *buf) in bpf_dispatcher_prepare() argument
103 return arch_prepare_bpf_dispatcher(image, buf, &ips[0], d->num_progs); in bpf_dispatcher_prepare()
114 new = d->num_progs ? d->image + noff : NULL; in bpf_dispatcher_update()
147 if (!d->image) { in bpf_dispatcher_change_prog()
148 d->image = bpf_prog_pack_alloc(PAGE_SIZE, bpf_jit_fill_hole_with_zero); in bpf_dispatcher_change_prog()
149 if (!d->image) in bpf_dispatcher_change_prog()
155 bpf_arch_text_copy(d->image, &size, sizeof(size)); in bpf_dispatcher_change_prog()
156 bpf_prog_pack_free((struct bpf_binary_header *)d->image); in bpf_dispatcher_change_prog()
157 d->image = NULL; in bpf_dispatcher_change_prog()
[all …]
Dbpf_struct_ops.c48 void *image; member
355 void *image, void *image_end) in bpf_struct_ops_prepare_trampoline() argument
365 return arch_prepare_bpf_trampoline(NULL, image, image_end, in bpf_struct_ops_prepare_trampoline()
380 void *image, *image_end; in bpf_struct_ops_map_update_elem() local
419 image = st_map->image; in bpf_struct_ops_map_update_elem()
420 image_end = st_map->image + PAGE_SIZE; in bpf_struct_ops_map_update_elem()
500 image, image_end); in bpf_struct_ops_map_update_elem()
504 *(void **)(kdata + moff) = image; in bpf_struct_ops_map_update_elem()
505 image += err; in bpf_struct_ops_map_update_elem()
518 set_memory_rox((long)st_map->image, 1); in bpf_struct_ops_map_update_elem()
[all …]
Dtrampoline.c257 bpf_jit_free_exec(im->image); in bpf_tramp_image_free()
356 void *image; in bpf_tramp_image_alloc() local
368 im->image = image = bpf_jit_alloc_exec(PAGE_SIZE); in bpf_tramp_image_alloc()
369 if (!image) in bpf_tramp_image_alloc()
371 set_vm_flush_reset_perms(image); in bpf_tramp_image_alloc()
380 bpf_image_ksym_add(image, ksym); in bpf_tramp_image_alloc()
384 bpf_jit_free_exec(im->image); in bpf_tramp_image_alloc()
406 err = unregister_fentry(tr, tr->cur_image->image); in bpf_trampoline_update()
441 err = arch_prepare_bpf_trampoline(im, im->image, im->image + PAGE_SIZE, in bpf_trampoline_update()
447 set_memory_rox((long)im->image, 1); in bpf_trampoline_update()
[all …]
Dcore.c1065 *image_ptr = &hdr->image[start]; in bpf_jit_binary_alloc()
1126 *image_ptr = &ro_header->image[start]; in bpf_jit_binary_pack_alloc()
1127 *rw_image = &(*rw_header)->image[start]; in bpf_jit_binary_pack_alloc()
/kernel/gcov/
DKconfig53 which are not linked to the kernel image to prevent linker errors.
/kernel/power/
DKconfig63 It creates an image which is saved in your active swap. Upon the next
65 have it detect the saved image, restore memory state from it, and
101 to-disk implementation will look for a suspended disk image.
114 suspended image to. It will simply pick the first available swap
Dswap.c111 sector_t image; member
323 swsusp_header->image = handle->first_sector; in mark_swapfiles()
978 if (!swsusp_header->image) /* how can this happen? */ in get_swap_reader()
983 offset = swsusp_header->image; in get_swap_reader()
/kernel/time/
DKconfig197 the size of the kernel image.
/kernel/trace/
DKconfig252 dynamically (will patch them out of the binary image and
256 image. When this is enabled, functions can be individually