Lines Matching full:image

32 static int kexec_calculate_store_digests(struct kimage *image);
39 int kexec_image_probe_default(struct kimage *image, void *buf, in kexec_image_probe_default() argument
48 image->fops = *fops; in kexec_image_probe_default()
57 int __weak arch_kexec_kernel_image_probe(struct kimage *image, void *buf, in arch_kexec_kernel_image_probe() argument
60 return kexec_image_probe_default(image, buf, buf_len); in arch_kexec_kernel_image_probe()
63 static void *kexec_image_load_default(struct kimage *image) in kexec_image_load_default() argument
65 if (!image->fops || !image->fops->load) in kexec_image_load_default()
68 return image->fops->load(image, image->kernel_buf, in kexec_image_load_default()
69 image->kernel_buf_len, image->initrd_buf, in kexec_image_load_default()
70 image->initrd_buf_len, image->cmdline_buf, in kexec_image_load_default()
71 image->cmdline_buf_len); in kexec_image_load_default()
74 void * __weak arch_kexec_kernel_image_load(struct kimage *image) in arch_kexec_kernel_image_load() argument
76 return kexec_image_load_default(image); in arch_kexec_kernel_image_load()
79 int kexec_image_post_load_cleanup_default(struct kimage *image) in kexec_image_post_load_cleanup_default() argument
81 if (!image->fops || !image->fops->cleanup) in kexec_image_post_load_cleanup_default()
84 return image->fops->cleanup(image->image_loader_data); in kexec_image_post_load_cleanup_default()
87 int __weak arch_kimage_file_post_load_cleanup(struct kimage *image) in arch_kimage_file_post_load_cleanup() argument
89 return kexec_image_post_load_cleanup_default(image); in arch_kimage_file_post_load_cleanup()
93 static int kexec_image_verify_sig_default(struct kimage *image, void *buf, in kexec_image_verify_sig_default() argument
96 if (!image->fops || !image->fops->verify_sig) { in kexec_image_verify_sig_default()
101 return image->fops->verify_sig(buf, buf_len); in kexec_image_verify_sig_default()
104 int __weak arch_kexec_kernel_verify_sig(struct kimage *image, void *buf, in arch_kexec_kernel_verify_sig() argument
107 return kexec_image_verify_sig_default(image, buf, buf_len); in arch_kexec_kernel_verify_sig()
150 void kimage_file_post_load_cleanup(struct kimage *image) in kimage_file_post_load_cleanup() argument
152 struct purgatory_info *pi = &image->purgatory_info; in kimage_file_post_load_cleanup()
154 vfree(image->kernel_buf); in kimage_file_post_load_cleanup()
155 image->kernel_buf = NULL; in kimage_file_post_load_cleanup()
157 vfree(image->initrd_buf); in kimage_file_post_load_cleanup()
158 image->initrd_buf = NULL; in kimage_file_post_load_cleanup()
160 kfree(image->cmdline_buf); in kimage_file_post_load_cleanup()
161 image->cmdline_buf = NULL; in kimage_file_post_load_cleanup()
170 arch_kimage_file_post_load_cleanup(image); in kimage_file_post_load_cleanup()
177 kfree(image->image_loader_data); in kimage_file_post_load_cleanup()
178 image->image_loader_data = NULL; in kimage_file_post_load_cleanup()
183 kimage_validate_signature(struct kimage *image) in kimage_validate_signature() argument
187 ret = arch_kexec_kernel_verify_sig(image, image->kernel_buf, in kimage_validate_signature()
188 image->kernel_buf_len); in kimage_validate_signature()
198 * image, permit it even if the kernel is otherwise locked in kimage_validate_signature()
217 kimage_file_prepare_segments(struct kimage *image, int kernel_fd, int initrd_fd, in kimage_file_prepare_segments() argument
224 ret = kernel_read_file_from_fd(kernel_fd, 0, &image->kernel_buf, in kimage_file_prepare_segments()
228 image->kernel_buf_len = ret; in kimage_file_prepare_segments()
230 /* Call arch image probe handlers */ in kimage_file_prepare_segments()
231 ret = arch_kexec_kernel_image_probe(image, image->kernel_buf, in kimage_file_prepare_segments()
232 image->kernel_buf_len); in kimage_file_prepare_segments()
237 ret = kimage_validate_signature(image); in kimage_file_prepare_segments()
244 ret = kernel_read_file_from_fd(initrd_fd, 0, &image->initrd_buf, in kimage_file_prepare_segments()
249 image->initrd_buf_len = ret; in kimage_file_prepare_segments()
254 image->cmdline_buf = memdup_user(cmdline_ptr, cmdline_len); in kimage_file_prepare_segments()
255 if (IS_ERR(image->cmdline_buf)) { in kimage_file_prepare_segments()
256 ret = PTR_ERR(image->cmdline_buf); in kimage_file_prepare_segments()
257 image->cmdline_buf = NULL; in kimage_file_prepare_segments()
261 image->cmdline_buf_len = cmdline_len; in kimage_file_prepare_segments()
264 if (image->cmdline_buf[cmdline_len - 1] != '\0') { in kimage_file_prepare_segments()
269 ima_kexec_cmdline(kernel_fd, image->cmdline_buf, in kimage_file_prepare_segments()
270 image->cmdline_buf_len - 1); in kimage_file_prepare_segments()
274 ima_add_kexec_buffer(image); in kimage_file_prepare_segments()
276 /* Call arch image load handlers */ in kimage_file_prepare_segments()
277 ldata = arch_kexec_kernel_image_load(image); in kimage_file_prepare_segments()
284 image->image_loader_data = ldata; in kimage_file_prepare_segments()
288 kimage_file_post_load_cleanup(image); in kimage_file_prepare_segments()
298 struct kimage *image; in kimage_file_alloc_init() local
301 image = do_kimage_alloc_init(); in kimage_file_alloc_init()
302 if (!image) in kimage_file_alloc_init()
305 image->file_mode = 1; in kimage_file_alloc_init()
309 image->control_page = crashk_res.start; in kimage_file_alloc_init()
310 image->type = KEXEC_TYPE_CRASH; in kimage_file_alloc_init()
313 ret = kimage_file_prepare_segments(image, kernel_fd, initrd_fd, in kimage_file_alloc_init()
318 ret = sanity_check_segment_list(image); in kimage_file_alloc_init()
323 image->control_code_page = kimage_alloc_control_pages(image, in kimage_file_alloc_init()
325 if (!image->control_code_page) { in kimage_file_alloc_init()
331 image->swap_page = kimage_alloc_control_pages(image, 0); in kimage_file_alloc_init()
332 if (!image->swap_page) { in kimage_file_alloc_init()
338 *rimage = image; in kimage_file_alloc_init()
341 kimage_free_page_list(&image->control_pages); in kimage_file_alloc_init()
343 kimage_file_post_load_cleanup(image); in kimage_file_alloc_init()
345 kfree(image); in kimage_file_alloc_init()
354 struct kimage **dest_image, *image; in SYSCALL_DEFINE5() local
364 image = NULL; in SYSCALL_DEFINE5()
387 ret = kimage_file_alloc_init(&image, kernel_fd, initrd_fd, cmdline_ptr, in SYSCALL_DEFINE5()
392 ret = machine_kexec_prepare(image); in SYSCALL_DEFINE5()
400 ret = kimage_crash_copy_vmcoreinfo(image); in SYSCALL_DEFINE5()
404 ret = kexec_calculate_store_digests(image); in SYSCALL_DEFINE5()
408 for (i = 0; i < image->nr_segments; i++) { in SYSCALL_DEFINE5()
411 ksegment = &image->segment[i]; in SYSCALL_DEFINE5()
416 ret = kimage_load_segment(image, &image->segment[i]); in SYSCALL_DEFINE5()
421 kimage_terminate(image); in SYSCALL_DEFINE5()
423 ret = machine_kexec_post_load(image); in SYSCALL_DEFINE5()
429 * after image has been loaded in SYSCALL_DEFINE5()
431 kimage_file_post_load_cleanup(image); in SYSCALL_DEFINE5()
433 image = xchg(dest_image, image); in SYSCALL_DEFINE5()
439 kimage_free(image); in SYSCALL_DEFINE5()
446 struct kimage *image = kbuf->image; in locate_mem_hole_top_down() local
465 if (kimage_is_destination_range(image, temp_start, temp_end)) { in locate_mem_hole_top_down()
484 struct kimage *image = kbuf->image; in locate_mem_hole_bottom_up() local
499 if (kimage_is_destination_range(image, temp_start, temp_end)) { in locate_mem_hole_bottom_up()
551 if (kbuf->image->type == KEXEC_TYPE_CRASH) in kexec_walk_memblock()
606 if (kbuf->image->type == KEXEC_TYPE_CRASH) in kexec_walk_resources()
668 if (!kbuf->image->file_mode) in kexec_add_buffer()
671 if (kbuf->image->nr_segments >= KEXEC_SEGMENT_MAX) in kexec_add_buffer()
681 if (!list_empty(&kbuf->image->control_pages)) { in kexec_add_buffer()
696 ksegment = &kbuf->image->segment[kbuf->image->nr_segments]; in kexec_add_buffer()
701 kbuf->image->nr_segments++; in kexec_add_buffer()
706 static int kexec_calculate_store_digests(struct kimage *image) in kexec_calculate_store_digests() argument
715 struct purgatory_info *pi = &image->purgatory_info; in kexec_calculate_store_digests()
753 for (j = i = 0; i < image->nr_segments; i++) { in kexec_calculate_store_digests()
756 ksegment = &image->segment[i]; in kexec_calculate_store_digests()
797 ret = kexec_purgatory_get_set_symbol(image, "purgatory_sha_regions", in kexec_calculate_store_digests()
802 ret = kexec_purgatory_get_set_symbol(image, "purgatory_sha256_digest", in kexec_calculate_store_digests()
913 kbuf->image->start = pi->ehdr->e_entry; in kexec_purgatory_setup_sechdrs()
935 kbuf->image->start -= sechdrs[i].sh_addr; in kexec_purgatory_setup_sechdrs()
936 kbuf->image->start += kbuf->mem + offset; in kexec_purgatory_setup_sechdrs()
951 static int kexec_apply_relocations(struct kimage *image) in kexec_apply_relocations() argument
954 struct purgatory_info *pi = &image->purgatory_info; in kexec_apply_relocations()
1013 * @image: Image to add the purgatory to.
1016 * Allocates the memory needed for image->purgatory_info.sechdrs and
1017 * image->purgatory_info.purgatory_buf/kbuf->buffer. Caller is responsible
1022 int kexec_load_purgatory(struct kimage *image, struct kexec_buf *kbuf) in kexec_load_purgatory() argument
1024 struct purgatory_info *pi = &image->purgatory_info; in kexec_load_purgatory()
1040 ret = kexec_apply_relocations(image); in kexec_load_purgatory()
1109 void *kexec_purgatory_get_symbol_addr(struct kimage *image, const char *name) in kexec_purgatory_get_symbol_addr() argument
1111 struct purgatory_info *pi = &image->purgatory_info; in kexec_purgatory_get_symbol_addr()
1132 int kexec_purgatory_get_set_symbol(struct kimage *image, const char *name, in kexec_purgatory_get_set_symbol() argument
1135 struct purgatory_info *pi = &image->purgatory_info; in kexec_purgatory_get_set_symbol()