/linux/arch/arm64/kernel/ |
A D | kexec_image.c | 23 static int image_probe(const char *kernel_buf, unsigned long kernel_len) in image_probe() argument 28 if (!h || (kernel_len < sizeof(*h))) in image_probe() 38 char *kernel, unsigned long kernel_len, in image_load() argument 82 kbuf.bufsz = kernel_len; in image_load() 134 static int image_verify_sig(const char *kernel, unsigned long kernel_len) in image_verify_sig() argument 136 return verify_pefile_signature(kernel, kernel_len, NULL, in image_verify_sig()
|
/linux/arch/s390/kernel/ |
A D | machine_kexec_file.c | 29 int s390_verify_sig(const char *kernel, unsigned long kernel_len) in s390_verify_sig() argument 39 if (marker_len > kernel_len) in s390_verify_sig() 42 if (memcmp(kernel + kernel_len - marker_len, MODULE_SIG_STRING, in s390_verify_sig() 45 kernel_len -= marker_len; in s390_verify_sig() 47 ms = (void *)kernel + kernel_len - sizeof(*ms); in s390_verify_sig() 48 kernel_len -= sizeof(*ms); in s390_verify_sig() 51 if (sig_len >= kernel_len) in s390_verify_sig() 53 kernel_len -= sig_len; in s390_verify_sig() 68 return verify_pkcs7_signature(kernel, kernel_len, in s390_verify_sig() 69 kernel + kernel_len, sig_len, in s390_verify_sig()
|
A D | kexec_elf.c | 67 char *kernel, unsigned long kernel_len, in s390_elf_load() argument 89 if (size > kernel_len) in s390_elf_load() 98 if (phdr->p_offset > kernel_len) in s390_elf_load() 104 if (size > kernel_len) in s390_elf_load()
|
A D | kexec_image.c | 44 char *kernel, unsigned long kernel_len, in s390_image_load() argument
|
/linux/arch/parisc/boot/compressed/ |
A D | misc.c | 288 unsigned long kernel_addr, kernel_len; in decompress_kernel() local 302 kernel_len = __pa(SZ_end) - __pa(SZparisc_kernel_start); in decompress_kernel() 357 printf("kernel_len = %x\n", kernel_len); in decompress_kernel() 365 flush_data_cache(output, kernel_len); in decompress_kernel()
|
/linux/arch/x86/kernel/ |
A D | kexec-bzimage64.c | 325 unsigned long kernel_len, char *initrd, in bzImage64_load() argument 351 if (kernel_len < kern16_size) { in bzImage64_load() 431 kbuf.bufsz = kernel_len - kern16_size; in bzImage64_load() 532 static int bzImage64_verify_sig(const char *kernel, unsigned long kernel_len) in bzImage64_verify_sig() argument 536 ret = verify_pefile_signature(kernel, kernel_len, in bzImage64_verify_sig() 540 ret = verify_pefile_signature(kernel, kernel_len, in bzImage64_verify_sig()
|
/linux/arch/parisc/kernel/ |
A D | kexec_file.c | 17 unsigned long kernel_len, char *initrd, in elf_load() argument 28 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf_load()
|
/linux/arch/powerpc/kexec/ |
A D | elf_64.c | 28 unsigned long kernel_len, char *initrd, in elf64_load() argument 46 ret = kexec_build_elf_info(kernel_buf, kernel_len, &ehdr, &elf_info); in elf64_load()
|
/linux/arch/x86/mm/ |
A D | mem_encrypt_identity.c | 294 unsigned long kernel_start, kernel_end, kernel_len; in sme_encrypt_kernel() local 327 kernel_len = kernel_end - kernel_start; in sme_encrypt_kernel() 473 kernel_len, workarea_start, (unsigned long)ppd.pgd); in sme_encrypt_kernel()
|
/linux/arch/s390/include/asm/ |
A D | kexec.h | 70 int s390_verify_sig(const char *kernel, unsigned long kernel_len);
|
/linux/include/linux/ |
A D | kexec.h | 123 unsigned long kernel_len, char *initrd, 130 unsigned long kernel_len);
|
/linux/arch/x86/include/asm/ |
A D | mem_encrypt.h | 27 unsigned long kernel_len,
|