kexec_dprintk
kexec_dprintk("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("%s:%d:\n", func, line);
kexec_dprintk(" kexec kimage info:\n");
kexec_dprintk(" type: %d\n", kimage->type);
kexec_dprintk(" head: %lx\n", kimage->head);
kexec_dprintk(" kern_reloc: %pa\n", &kimage->arch.kern_reloc);
kexec_dprintk(" el2_vectors: %pa\n", &kimage->arch.el2_vectors);
kexec_dprintk("Loaded elf core header at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("Loaded initrd at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("Loaded dtb at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("No LoongArch image header.\n");
kexec_dprintk("No LoongArch PE image header.\n");
kexec_dprintk("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("Loaded elf core header at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("Loaded initrd at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("Loaded the kernel at 0x%lx, entry at 0x%lx\n",
kexec_dprintk("Loaded initrd at 0x%lx\n", kbuf.mem);
kexec_dprintk("Loaded cmdline at 0x%lx\n", kbuf.mem);
kexec_dprintk("Loaded initrd at 0x%lx\n", initrd_load_addr);
kexec_dprintk("Loaded device tree at 0x%lx\n", fdt_load_addr);
kexec_dprintk("Loaded the kernel at 0x%lx\n", kernel_load_addr);
kexec_dprintk("Loaded purgatory at 0x%lx\n", pbuf.mem);
kexec_dprintk("Memory node path: %s\n", path);
kexec_dprintk("No dynamic reconfiguration memory found\n");
kexec_dprintk("Backup region offset updated to 0x%lx\n",
kexec_dprintk("Loaded the backup region at 0x%lx\n", kbuf->mem);
kexec_dprintk("Loaded elf core header at 0x%lx, bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("Loaded elf core header at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("Loaded purgatory at 0x%lx\n", kbuf.mem);
kexec_dprintk("Loaded initrd at 0x%lx\n", initrd_pbase);
kexec_dprintk("Loaded device tree at 0x%lx\n", kbuf.mem);
kexec_dprintk("Loaded ELF headers at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("E820 memmap:\n");
kexec_dprintk("%016llx-%016llx (%d)\n",
kexec_dprintk("No dm crypt key to load\n");
kexec_dprintk("Loaded purgatory at 0x%lx\n", pbuf.mem);
kexec_dprintk("Loaded boot_param, command line and misc at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("Loaded 64bit kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("Loaded initrd at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kexec_dprintk("Final command line is: %s\n", cmdline_ptr);
kexec_dprintk("Crash PT_LOAD ELF header. phdr=%p vaddr=0x%llx, paddr=0x%llx, sz=0x%llx e_phnum=%d p_offset=0x%llx\n",
kexec_dprintk("Failed to get the user keyring\n");
kexec_dprintk("Failed to read the number of dm-crypt keys\n");
kexec_dprintk("There are %u keys\n", key_count);
kexec_dprintk("Get key (size=%u)\n", key->key_size);
kexec_dprintk("Requesting logon key %s", dm_key->key_desc);
kexec_dprintk("Get dm crypt key (size=%u) %s\n", dm_key->key_size,
kexec_dprintk(
kexec_dprintk("Failed to read key %s\n",
kexec_dprintk("Found key: %s\n", item->ci_name);
kexec_dprintk("No dm-crypt keys\n");
kexec_dprintk(
kexec_dprintk("Success adding key %s", dm_key->key_desc);
kexec_dprintk("Error when adding key");
kexec_dprintk("kernel: %p kernel_size: %#lx\n",
kexec_dprintk("nr_segments = %lu\n", image->nr_segments);
kexec_dprintk("segment[%d]: buf=0x%p bufsz=0x%zx mem=0x%lx memsz=0x%zx\n",
kexec_dprintk("kexec_file_load: type:%u, start:0x%lx head:0x%lx flags:0x%lx\n",
kexec_dprintk("kexec measurement buffer for the loaded kernel at 0x%lx.\n",