setup.c (9e87e48f8e5de2146842fd0ff436e0256b52c4a9) setup.c (78cac48c0434c82e860fade3cd0420a7a4adbb08)
1/*
2 * Copyright (C) 1995 Linus Torvalds
3 *
4 * Support of BIGMEM added by Gerhard Wichert, Siemens AG, July 1999
5 *
6 * Memory region support
7 * David Parsons <orc@pell.chi.il.us>, July-August 1999
8 *

--- 818 unchanged lines hidden (view full) ---

827}
828
829/*
830 * Dump out kernel offset information on panic.
831 */
832static int
833dump_kernel_offset(struct notifier_block *self, unsigned long v, void *p)
834{
1/*
2 * Copyright (C) 1995 Linus Torvalds
3 *
4 * Support of BIGMEM added by Gerhard Wichert, Siemens AG, July 1999
5 *
6 * Memory region support
7 * David Parsons <orc@pell.chi.il.us>, July-August 1999
8 *

--- 818 unchanged lines hidden (view full) ---

827}
828
829/*
830 * Dump out kernel offset information on panic.
831 */
832static int
833dump_kernel_offset(struct notifier_block *self, unsigned long v, void *p)
834{
835 pr_emerg("Kernel Offset: 0x%lx from 0x%lx "
836 "(relocation range: 0x%lx-0x%lx)\n",
837 (unsigned long)&_text - __START_KERNEL, __START_KERNEL,
838 __START_KERNEL_map, MODULES_VADDR-1);
835 if (kaslr_enabled()) {
836 pr_emerg("Kernel Offset: 0x%lx from 0x%lx (relocation range: 0x%lx-0x%lx)\n",
837 (unsigned long)&_text - __START_KERNEL,
838 __START_KERNEL,
839 __START_KERNEL_map,
840 MODULES_VADDR-1);
841 } else {
842 pr_emerg("Kernel Offset: disabled\n");
843 }
839
840 return 0;
841}
842
843/*
844 * Determine if we were loaded by an EFI loader. If so, then we have also been
845 * passed the efi memmap, systab, etc., so we should use these data structures
846 * for initialization. Note, the efi init code path is determined by the

--- 437 unchanged lines hidden ---
844
845 return 0;
846}
847
848/*
849 * Determine if we were loaded by an EFI loader. If so, then we have also been
850 * passed the efi memmap, systab, etc., so we should use these data structures
851 * for initialization. Note, the efi init code path is determined by the

--- 437 unchanged lines hidden ---