• Home
  • Raw
  • Download

Lines Matching +full:no +full:- +full:dump +full:- +full:oops

1 // SPDX-License-Identifier: GPL-2.0-only
9 * This function is used through-out the kernel (including mm and fs)
42 * Should we dump all CPUs backtraces in an oops event?
137 * Stop ourself in panic -- architecture code may override this
157 * crash dump, it should save registers of each stopped CPU and disable
158 * per-CPU features such as virtualization extensions.
186 * as saving register state for crash dump.
237 * panic - halt the system
273 * It's possible to come here directly from a panic-assertion and in panic()
275 * preempt to be disabled. No point enabling it later though... in panic()
299 if (len && buf[len - 1] == '\n') in panic()
300 buf[len - 1] = '\0'; in panic()
302 pr_emerg("Kernel panic - not syncing: %s\n", buf); in panic()
305 * Avoid nested stack-dumping if a panic occurs during oops processing in panic()
338 * If we want to do crash dump after notifier calls and in panic()
347 * add information to the kmsg dump output. in panic()
378 * panic() is not being callled from OOPS. in panic()
417 /* Make sure the user can actually press Stop-A (L1-A) */ in panic()
419 pr_emerg("Press Stop-A (L1-A) from sun keyboard or send break\n" in panic()
426 pr_emerg("---[ end Kernel panic - not syncing: %s ]---\n", buf); in panic()
444 * TAINT_FORCED_RMMOD could be a per-module flag but the module
469 * print_tainted - return a string to represent the kernel taint state.
471 * For individual taint flag meanings, see Documentation/admin-guide/sysctl/kernel.rst
490 t->c_true : t->c_false; in print_tainted()
516 * some notewortht-but-not-corrupting cases, it can be set to true.
556 /* This CPU may now print the oops message */ in do_oops_enter_exit()
567 } while (--spin_counter); in do_oops_enter_exit()
582 * Return true if the calling CPU is allowed to print oops-related info.
591 * Called when the architecture enters its oops handler, before it prints
592 * anything. If this is the first CPU to oops, and it's oopsing the first
597 * side-effect of preventing later-oopsing CPUs from mucking up the display,
616 * 64-bit random ID for oopses:
634 pr_warn("---[ end trace %016llx ]---\n", (unsigned long long)oops_id); in print_oops_end_marker()
638 * Called when the architecture exits its oops handler, after printing
660 raw_smp_processor_id(), current->pid, file, line, in __warn()
664 raw_smp_processor_id(), current->pid, caller); in __warn()
667 vprintk(args->fmt, args->args); in __warn()
728 memset(__start_once, 0, __end_once - __start_once); in clear_warn_once_set()
749 * Called when gcc's -fstack-protector feature is used, and
750 * gcc detects corruption of the on-stack canary value
755 panic("stack-protector: Kernel stack is corrupted in: %pB", in __stack_chk_fail()
772 return -EINVAL; in oops_setup()
777 early_param("oops", oops_setup);
784 return -EINVAL; in panic_on_taint_setup()
788 return -EINVAL; in panic_on_taint_setup()
790 /* make sure panic_on_taint doesn't hold out-of-range TAINT flags */ in panic_on_taint_setup()
794 return -EINVAL; in panic_on_taint_setup()