Lines Matching +full:no +full:- +full:dump +full:- +full:oops
1 // SPDX-License-Identifier: GPL-2.0-only
9 * This function is used through-out the kernel (including mm and fs)
47 * Should we dump all CPUs backtraces in an oops event?
145 * Stop ourself in panic -- architecture code may override this
165 * crash dump, it should save registers of each stopped CPU and disable
166 * per-CPU features such as virtualization extensions.
194 * as saving register state for crash dump.
253 * and then performs the secondary CPUs shutdown - we cannot have
259 /* Temporary allow non-panic CPUs to write their backtraces. */ in panic_other_cpus_shutdown()
268 * situation. If we want to do crash dump after notifier calls in panic_other_cpus_shutdown()
280 * panic - halt the system
316 * It's possible to come here directly from a panic-assertion and in panic()
318 * preempt to be disabled. No point enabling it later though... in panic()
345 if (len && buf[len - 1] == '\n') in panic()
346 buf[len - 1] = '\0'; in panic()
348 pr_emerg("Kernel panic - not syncing: %s\n", buf); in panic()
351 * Avoid nested stack-dumping if a panic occurs during oops processing in panic()
381 * add information to the kmsg dump output. in panic()
409 * panic() is not being callled from OOPS. in panic()
448 /* Make sure the user can actually press Stop-A (L1-A) */ in panic()
450 pr_emerg("Press Stop-A (L1-A) from sun keyboard or send break\n" in panic()
457 pr_emerg("---[ end Kernel panic - not syncing: %s ]---\n", buf); in panic()
491 * TAINT_FORCED_RMMOD could be a per-module flag but the module
532 char c = is_set ? t->c_true : t->c_false; in print_tainted_seq()
536 seq_buf_printf(s, "%s[%c]=%s", sep, c, t->desc); in print_tainted_seq()
561 * print_tainted - return a string to represent the kernel taint state.
563 * For individual taint flag meanings, see Documentation/admin-guide/sysctl/kernel.rst
574 * print_tainted_verbose - A more verbose version of print_tainted()
598 * some notewortht-but-not-corrupting cases, it can be set to true.
638 /* This CPU may now print the oops message */ in do_oops_enter_exit()
649 } while (--spin_counter); in do_oops_enter_exit()
664 * Return true if the calling CPU is allowed to print oops-related info.
673 * Called when the architecture enters its oops handler, before it prints
674 * anything. If this is the first CPU to oops, and it's oopsing the first
679 * side-effect of preventing later-oopsing CPUs from mucking up the display,
700 pr_warn("---[ end trace %016llx ]---\n", 0ULL); in print_oops_end_marker()
704 * Called when the architecture exits its oops handler, after printing
729 raw_smp_processor_id(), current->pid, file, line, in __warn()
733 raw_smp_processor_id(), current->pid, caller); in __warn()
737 #pragma GCC diagnostic ignored "-Wsuggest-attribute=format" in __warn()
740 vprintk(args->fmt, args->args); in __warn()
809 memset(__start_once, 0, __end_once - __start_once); in clear_warn_once_set()
830 * Called when gcc's -fstack-protector feature is used, and
831 * gcc detects corruption of the on-stack canary value
836 panic("stack-protector: Kernel stack is corrupted in: %pB", in __stack_chk_fail()
853 return -EINVAL; in oops_setup()
858 early_param("oops", oops_setup);
865 return -EINVAL; in panic_on_taint_setup()
869 return -EINVAL; in panic_on_taint_setup()
871 /* make sure panic_on_taint doesn't hold out-of-range TAINT flags */ in panic_on_taint_setup()
875 return -EINVAL; in panic_on_taint_setup()