Symbol: kexec_dprintk
arch/arm64/kernel/kexec_image.c
125
kexec_dprintk("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/arm64/kernel/machine_kexec.c
35
kexec_dprintk("%s:%d:\n", func, line);
arch/arm64/kernel/machine_kexec.c
36
kexec_dprintk(" kexec kimage info:\n");
arch/arm64/kernel/machine_kexec.c
37
kexec_dprintk(" type: %d\n", kimage->type);
arch/arm64/kernel/machine_kexec.c
38
kexec_dprintk(" head: %lx\n", kimage->head);
arch/arm64/kernel/machine_kexec.c
39
kexec_dprintk(" kern_reloc: %pa\n", &kimage->arch.kern_reloc);
arch/arm64/kernel/machine_kexec.c
40
kexec_dprintk(" el2_vectors: %pa\n", &kimage->arch.el2_vectors);
arch/arm64/kernel/machine_kexec_file.c
135
kexec_dprintk("Loaded elf core header at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/arm64/kernel/machine_kexec_file.c
157
kexec_dprintk("Loaded initrd at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/arm64/kernel/machine_kexec_file.c
188
kexec_dprintk("Loaded dtb at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/loongarch/kernel/kexec_efi.c
104
kexec_dprintk("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/loongarch/kernel/kexec_efi.c
26
kexec_dprintk("No LoongArch image header.\n");
arch/loongarch/kernel/kexec_efi.c
31
kexec_dprintk("No LoongArch PE image header.\n");
arch/loongarch/kernel/kexec_elf.c
94
kexec_dprintk("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/loongarch/kernel/machine_kexec_file.c
189
kexec_dprintk("Loaded elf core header at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/loongarch/kernel/machine_kexec_file.c
216
kexec_dprintk("Loaded initrd at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/parisc/kernel/kexec_file.c
41
kexec_dprintk("Loaded the kernel at 0x%lx, entry at 0x%lx\n",
arch/parisc/kernel/kexec_file.c
54
kexec_dprintk("Loaded initrd at 0x%lx\n", kbuf.mem);
arch/parisc/kernel/kexec_file.c
71
kexec_dprintk("Loaded cmdline at 0x%lx\n", kbuf.mem);
arch/powerpc/kexec/elf_64.c
104
kexec_dprintk("Loaded initrd at 0x%lx\n", initrd_load_addr);
arch/powerpc/kexec/elf_64.c
141
kexec_dprintk("Loaded device tree at 0x%lx\n", fdt_load_addr);
arch/powerpc/kexec/elf_64.c
64
kexec_dprintk("Loaded the kernel at 0x%lx\n", kernel_load_addr);
arch/powerpc/kexec/elf_64.c
72
kexec_dprintk("Loaded purgatory at 0x%lx\n", pbuf.mem);
arch/powerpc/kexec/file_load_64.c
209
kexec_dprintk("Memory node path: %s\n", path);
arch/powerpc/kexec/file_load_64.c
285
kexec_dprintk("No dynamic reconfiguration memory found\n");
arch/powerpc/kexec/file_load_64.c
397
kexec_dprintk("Backup region offset updated to 0x%lx\n",
arch/powerpc/kexec/file_load_64.c
501
kexec_dprintk("Loaded the backup region at 0x%lx\n", kbuf->mem);
arch/powerpc/kexec/file_load_64.c
509
kexec_dprintk("Loaded elf core header at 0x%lx, bufsz=0x%lx memsz=0x%lx\n",
arch/riscv/kernel/machine_kexec_file.c
298
kexec_dprintk("Loaded elf core header at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/riscv/kernel/machine_kexec_file.c
322
kexec_dprintk("Loaded purgatory at 0x%lx\n", kbuf.mem);
arch/riscv/kernel/machine_kexec_file.c
342
kexec_dprintk("Loaded initrd at 0x%lx\n", initrd_pbase);
arch/riscv/kernel/machine_kexec_file.c
367
kexec_dprintk("Loaded device tree at 0x%lx\n", kbuf.mem);
arch/x86/kernel/crash.c
458
kexec_dprintk("Loaded ELF headers at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/x86/kernel/kexec-bzimage64.c
342
kexec_dprintk("E820 memmap:\n");
arch/x86/kernel/kexec-bzimage64.c
344
kexec_dprintk("%016llx-%016llx (%d)\n",
arch/x86/kernel/kexec-bzimage64.c
529
kexec_dprintk("No dm crypt key to load\n");
arch/x86/kernel/kexec-bzimage64.c
553
kexec_dprintk("Loaded purgatory at 0x%lx\n", pbuf.mem);
arch/x86/kernel/kexec-bzimage64.c
610
kexec_dprintk("Loaded boot_param, command line and misc at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/x86/kernel/kexec-bzimage64.c
628
kexec_dprintk("Loaded 64bit kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/x86/kernel/kexec-bzimage64.c
643
kexec_dprintk("Loaded initrd at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
arch/x86/kernel/kexec-bzimage64.c
94
kexec_dprintk("Final command line is: %s\n", cmdline_ptr);
kernel/crash_core.c
265
kexec_dprintk("Crash PT_LOAD ELF header. phdr=%p vaddr=0x%llx, paddr=0x%llx, sz=0x%llx e_phnum=%d p_offset=0x%llx\n",
kernel/crash_dump_dm_crypt.c
112
kexec_dprintk("Failed to get the user keyring\n");
kernel/crash_dump_dm_crypt.c
119
kexec_dprintk("Failed to read the number of dm-crypt keys\n");
kernel/crash_dump_dm_crypt.c
123
kexec_dprintk("There are %u keys\n", key_count);
kernel/crash_dump_dm_crypt.c
135
kexec_dprintk("Get key (size=%u)\n", key->key_size);
kernel/crash_dump_dm_crypt.c
148
kexec_dprintk("Requesting logon key %s", dm_key->key_desc);
kernel/crash_dump_dm_crypt.c
171
kexec_dprintk("Get dm crypt key (size=%u) %s\n", dm_key->key_size,
kernel/crash_dump_dm_crypt.c
284
kexec_dprintk(
kernel/crash_dump_dm_crypt.c
392
kexec_dprintk("Failed to read key %s\n",
kernel/crash_dump_dm_crypt.c
397
kexec_dprintk("Found key: %s\n", item->ci_name);
kernel/crash_dump_dm_crypt.c
416
kexec_dprintk("No dm-crypt keys\n");
kernel/crash_dump_dm_crypt.c
440
kexec_dprintk(
kernel/crash_dump_dm_crypt.c
77
kexec_dprintk("Success adding key %s", dm_key->key_desc);
kernel/crash_dump_dm_crypt.c
80
kexec_dprintk("Error when adding key");
kernel/kexec_file.c
231
kexec_dprintk("kernel: %p kernel_size: %#lx\n",
kernel/kexec_file.c
432
kexec_dprintk("nr_segments = %lu\n", image->nr_segments);
kernel/kexec_file.c
437
kexec_dprintk("segment[%d]: buf=0x%p bufsz=0x%zx mem=0x%lx memsz=0x%zx\n",
kernel/kexec_file.c
452
kexec_dprintk("kexec_file_load: type:%u, start:0x%lx head:0x%lx flags:0x%lx\n",
security/integrity/ima/ima_kexec.c
198
kexec_dprintk("kexec measurement buffer for the loaded kernel at 0x%lx.\n",