Searched refs:image (Results 1 – 11 of 11) sorted by relevance
| /kernel/ |
| A D | image.ld | 7 * This is the linker script for the final load image of the kernel. The 9 * (see kernel/$ARCH/image.S). The purpose of this link is to resolve 10 * symbols used in image.S but defined in the kernel proper. That's made 13 * image.S can encode things like the entry point address, the exact load 14 * image size including KASLR fixup code, and the "end of .bss" memory 17 * Boot loaders use only the raw binary load image extracted from this 18 * link, not the ELF file itself; image.S encodes the platform-specific 22 * the load image. However, other loaders (e.g. qemu) actually use the ELF 23 * file container of the load image to guide their loading. So we need 41 * know how much memory to reserve after the load image (p_filesz is [all …]
|
| A D | kernel.ld | 25 * This just leaves space in the memory image for the boot headers. 26 * The actual boot header will be constructed in image.S, which see. 31 * section and that makes objcopy -O binary skip it in the image. 194 * Make sure the total file size is aligned to 8 bytes so the image 254 * This is not actually used since the entry point is set in image.ld, 262 * --just-symbols to the link of image.S.
|
| /kernel/target/pc/multiboot/ |
| A D | README.md | 6 [ZBI](../../../../system/public/zircon/boot/image.h)-compatible boot loader. 11 `multiboot.bin` is a Multiboot-compatible ELF kernel image. It requires a 13 contains a complete ZBI image (kernel and BOOTFS). With QEMU, use:
|
| /kernel/lib/vdso/ |
| A D | rodso.cpp | 18 RoDso::RoDso(const char* name, const void* image, size_t size, in RoDso() argument 29 zx_status_t status = VmObjectPaged::CreateFromROData(image, size, &vmo); in RoDso() 46 reinterpret_cast<vaddr_t>(image), in RoDso()
|
| A D | rules.mk | 14 $(LOCAL_DIR)/vdso-image.S \
|
| /kernel/platform/pc/ |
| A D | platform.cpp | 150 zbi::Zbi image(zbi_base); in process_zbi() local 154 zbi_result_t result = image.Check(&bad_hdr); in process_zbi() 162 printf("zbi: @ %p (%u bytes)\n", image.Base(), image.Length()); in process_zbi() 164 result = image.ForEach(process_zbi_item, nullptr); in process_zbi() 170 boot_alloc_reserve(phys, image.Length()); in process_zbi() 172 bootloader.ramdisk_size = image.Length(); in process_zbi() 500 zbi::Zbi image(bootdata, len); in platform_mexec_patch_zbi() local 518 result = image.AppendSection(sizeof(bootloader.fb), in platform_mexec_patch_zbi() 543 result = image.AppendSection(sizeof(bootloader.acpi_rsdp), in platform_mexec_patch_zbi() 568 result = image.AppendSection(sizeof(bootloader.uart), in platform_mexec_patch_zbi() [all …]
|
| /kernel/target/arm64/boot-shim/ |
| A D | boot-shim.ld | 34 * Pad the shim image out to the alignment the kernel requires. 41 * this as part of bss, i.e. not actually in the image. The magic
|
| /kernel/syscalls/ |
| A D | system.cpp | 176 zbi::Zbi image(buffer.get(), buffer_size); in sys_system_mexec_payload_get() local 177 zbi_result_t zbi_result = image.Reset(); in sys_system_mexec_payload_get() 233 zbi::Zbi image(bootimage_buffer, new_bootimage_len); in sys_system_mexec() local 235 zbi_result_t res = image.CreateSection(static_cast<uint32_t>(crashlog_len), in sys_system_mexec()
|
| /kernel/lib/vdso/include/lib/ |
| A D | rodso.h | 31 RoDso(const char* name, const void* image, size_t size,
|
| /kernel/lib/userboot/ |
| A D | rules.mk | 14 $(LOCAL_DIR)/userboot-image.S \
|
| /kernel/platform/generic-arm/ |
| A D | platform.cpp | 294 zbi::Zbi image(zbi_base); in process_zbi() local 297 result = image.Check(nullptr); in process_zbi() 303 image.ForEach(process_zbi_item, nullptr); in process_zbi() 553 zbi::Zbi image(zbi, len); in platform_mexec_patch_zbi() local 558 status = image.AppendSection(item->length, item->type, item->extra, in platform_mexec_patch_zbi()
|
Completed in 20 milliseconds