Lines Matching +full:no +full:- +full:dump +full:- +full:oops
1 // SPDX-License-Identifier: GPL-2.0-only
9 * This function is used through-out the kernel (including mm and fs)
46 * Should we dump all CPUs backtraces in an oops event?
142 * Stop ourself in panic -- architecture code may override this
162 * crash dump, it should save registers of each stopped CPU and disable
163 * per-CPU features such as virtualization extensions.
191 * as saving register state for crash dump.
246 * and then performs the secondary CPUs shutdown - we cannot have
257 * situation. If we want to do crash dump after notifier calls in panic_other_cpus_shutdown()
269 * panic - halt the system
305 * It's possible to come here directly from a panic-assertion and in panic()
307 * preempt to be disabled. No point enabling it later though... in panic()
331 if (len && buf[len - 1] == '\n') in panic()
332 buf[len - 1] = '\0'; in panic()
334 pr_emerg("Kernel panic - not syncing: %s\n", buf); in panic()
337 * Avoid nested stack-dumping if a panic occurs during oops processing in panic()
365 * add information to the kmsg dump output. in panic()
393 * panic() is not being callled from OOPS. in panic()
432 /* Make sure the user can actually press Stop-A (L1-A) */ in panic()
434 pr_emerg("Press Stop-A (L1-A) from sun keyboard or send break\n" in panic()
441 pr_emerg("---[ end Kernel panic - not syncing: %s ]---\n", buf); in panic()
459 * TAINT_FORCED_RMMOD could be a per-module flag but the module
485 * print_tainted - return a string to represent the kernel taint state.
487 * For individual taint flag meanings, see Documentation/admin-guide/sysctl/kernel.rst
506 t->c_true : t->c_false; in print_tainted()
532 * some notewortht-but-not-corrupting cases, it can be set to true.
572 /* This CPU may now print the oops message */ in do_oops_enter_exit()
583 } while (--spin_counter); in do_oops_enter_exit()
598 * Return true if the calling CPU is allowed to print oops-related info.
607 * Called when the architecture enters its oops handler, before it prints
608 * anything. If this is the first CPU to oops, and it's oopsing the first
613 * side-effect of preventing later-oopsing CPUs from mucking up the display,
633 pr_warn("---[ end trace %016llx ]---\n", 0ULL); in print_oops_end_marker()
637 * Called when the architecture exits its oops handler, after printing
659 raw_smp_processor_id(), current->pid, file, line, in __warn()
663 raw_smp_processor_id(), current->pid, caller); in __warn()
666 vprintk(args->fmt, args->args); in __warn()
732 memset(__start_once, 0, __end_once - __start_once); in clear_warn_once_set()
753 * Called when gcc's -fstack-protector feature is used, and
754 * gcc detects corruption of the on-stack canary value
759 panic("stack-protector: Kernel stack is corrupted in: %pB", in __stack_chk_fail()
776 return -EINVAL; in oops_setup()
781 early_param("oops", oops_setup);
788 return -EINVAL; in panic_on_taint_setup()
792 return -EINVAL; in panic_on_taint_setup()
794 /* make sure panic_on_taint doesn't hold out-of-range TAINT flags */ in panic_on_taint_setup()
798 return -EINVAL; in panic_on_taint_setup()