| /linux/kernel/ |
| H A D | crash_dump_dm_crypt.c | 77 kexec_dprintk("Success adding key %s", dm_key->key_desc); in add_key_to_keyring() 80 kexec_dprintk("Error when adding key"); in add_key_to_keyring() 112 kexec_dprintk("Failed to get the user keyring\n"); in restore_dm_crypt_keys_to_thread_keyring() 119 kexec_dprintk("Failed to read the number of dm-crypt keys\n"); in restore_dm_crypt_keys_to_thread_keyring() 123 kexec_dprintk("There are %u keys\n", key_count); in restore_dm_crypt_keys_to_thread_keyring() 135 kexec_dprintk("Get key (size=%u)\n", key->key_size); in restore_dm_crypt_keys_to_thread_keyring() 147 kexec_dprintk("Requesting logon key %s", dm_key->key_desc); in read_key_from_user_keying() 166 kexec_dprintk("Get dm crypt key (size=%u) %s: %8ph\n", dm_key->key_size, in read_key_from_user_keying() 275 kexec_dprintk( in config_keys_reuse_store() 383 kexec_dprintk("Failed to read key %s\n", in build_keys_header() [all …]
|
| H A D | kexec_file.c | 231 kexec_dprintk("kernel: %p kernel_size: %#lx\n", in kimage_file_prepare_segments() 432 kexec_dprintk("nr_segments = %lu\n", image->nr_segments); in SYSCALL_DEFINE5() 437 kexec_dprintk("segment[%d]: buf=0x%p bufsz=0x%zx mem=0x%lx memsz=0x%zx\n", in SYSCALL_DEFINE5() 452 kexec_dprintk("kexec_file_load: type:%u, start:0x%lx head:0x%lx flags:0x%lx\n", in SYSCALL_DEFINE5()
|
| H A D | crash_core.c | 256 …kexec_dprintk("Crash PT_LOAD ELF header. phdr=%p vaddr=0x%llx, paddr=0x%llx, sz=0x%llx e_phnum=%d … in crash_prepare_elf64_headers()
|
| /linux/arch/powerpc/kexec/ |
| H A D | elf_64.c | 64 kexec_dprintk("Loaded the kernel at 0x%lx\n", kernel_load_addr); in elf64_load() 72 kexec_dprintk("Loaded purgatory at 0x%lx\n", pbuf.mem); in elf64_load() 104 kexec_dprintk("Loaded initrd at 0x%lx\n", initrd_load_addr); in elf64_load() 141 kexec_dprintk("Loaded device tree at 0x%lx\n", fdt_load_addr); in elf64_load()
|
| /linux/arch/loongarch/kernel/ |
| H A D | kexec_efi.c | 26 kexec_dprintk("No LoongArch image header.\n"); in efi_kexec_probe() 31 kexec_dprintk("No LoongArch PE image header.\n"); in efi_kexec_probe() 104 kexec_dprintk("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in efi_kexec_load()
|
| H A D | machine_kexec_file.c | 189 kexec_dprintk("Loaded elf core header at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in load_other_segments() 216 kexec_dprintk("Loaded initrd at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in load_other_segments()
|
| H A D | kexec_elf.c | 94 kexec_dprintk("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in elf_kexec_load()
|
| /linux/arch/parisc/kernel/ |
| H A D | kexec_file.c | 41 kexec_dprintk("Loaded the kernel at 0x%lx, entry at 0x%lx\n", in elf_load() 54 kexec_dprintk("Loaded initrd at 0x%lx\n", kbuf.mem); in elf_load() 71 kexec_dprintk("Loaded cmdline at 0x%lx\n", kbuf.mem); in elf_load()
|
| /linux/arch/x86/kernel/ |
| H A D | kexec-bzimage64.c | 93 kexec_dprintk("Final command line is: %s\n", cmdline_ptr); in setup_cmdline() 333 kexec_dprintk("E820 memmap:\n"); in setup_boot_parameters() 335 kexec_dprintk("%016llx-%016llx (%d)\n", in setup_boot_parameters() 520 kexec_dprintk("No dm crypt key to load\n"); in bzImage64_load() 544 kexec_dprintk("Loaded purgatory at 0x%lx\n", pbuf.mem); in bzImage64_load() 601 kexec_dprintk("Loaded boot_param, command line and misc at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in bzImage64_load() 619 kexec_dprintk("Loaded 64bit kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in bzImage64_load() 634 kexec_dprintk("Loaded initrd at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in bzImage64_load()
|
| H A D | crash.c | 458 kexec_dprintk("Loaded ELF headers at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in crash_load_segments()
|
| /linux/arch/arm64/kernel/ |
| H A D | machine_kexec_file.c | 135 kexec_dprintk("Loaded elf core header at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in load_other_segments() 157 kexec_dprintk("Loaded initrd at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in load_other_segments() 188 kexec_dprintk("Loaded dtb at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in load_other_segments()
|
| H A D | kexec_image.c | 125 kexec_dprintk("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in image_load()
|
| /linux/arch/riscv/kernel/ |
| H A D | machine_kexec_file.c | 298 kexec_dprintk("Loaded elf core header at 0x%lx bufsz=0x%lx memsz=0x%lx\n", in load_extra_segments() 322 kexec_dprintk("Loaded purgatory at 0x%lx\n", kbuf.mem); in load_extra_segments() 342 kexec_dprintk("Loaded initrd at 0x%lx\n", initrd_pbase); in load_extra_segments() 367 kexec_dprintk("Loaded device tree at 0x%lx\n", kbuf.mem); in load_extra_segments()
|
| /linux/security/integrity/ima/ |
| H A D | ima_kexec.c | 196 kexec_dprintk("kexec measurement buffer for the loaded kernel at 0x%lx.\n", in ima_add_kexec_buffer()
|
| /linux/include/linux/ |
| H A D | kexec.h | 530 #define kexec_dprintk(fmt, arg...) \ macro
|