Lines Matching +full:timeout +full:- +full:press +full:- +full:ms
1 // SPDX-License-Identifier: GPL-2.0-only
9 * This function is used through-out the kernel (including mm and fs)
137 /* Returns how long it waited in ms */
142 * Stop ourself in panic -- architecture code may override this
163 * per-CPU features such as virtualization extensions.
246 * and then performs the secondary CPUs shutdown - we cannot have
269 * panic - halt the system
305 * It's possible to come here directly from a panic-assertion and in panic()
331 if (len && buf[len - 1] == '\n') in panic()
332 buf[len - 1] = '\0'; in panic()
334 pr_emerg("Kernel panic - not syncing: %s\n", buf); in panic()
337 * Avoid nested stack-dumping if a panic occurs during oops processing in panic()
405 * Delay timeout seconds before rebooting the machine. in panic()
432 /* Make sure the user can actually press Stop-A (L1-A) */ in panic()
434 pr_emerg("Press Stop-A (L1-A) from sun keyboard or send break\n" in panic()
441 pr_emerg("---[ end Kernel panic - not syncing: %s ]---\n", buf); in panic()
467 * TAINT_FORCED_RMMOD could be a per-module flag but the module
493 * print_tainted - return a string to represent the kernel taint state.
495 * For individual taint flag meanings, see Documentation/admin-guide/sysctl/kernel.rst
514 t->c_true : t->c_false; in print_tainted()
540 * some notewortht-but-not-corrupting cases, it can be set to true.
591 } while (--spin_counter); in do_oops_enter_exit()
606 * Return true if the calling CPU is allowed to print oops-related info.
621 * side-effect of preventing later-oopsing CPUs from mucking up the display,
641 pr_warn("---[ end trace %016llx ]---\n", 0ULL); in print_oops_end_marker()
667 raw_smp_processor_id(), current->pid, file, line, in __warn()
671 raw_smp_processor_id(), current->pid, caller); in __warn()
674 vprintk(args->fmt, args->args); in __warn()
740 memset(__start_once, 0, __end_once - __start_once); in clear_warn_once_set()
761 * Called when gcc's -fstack-protector feature is used, and
762 * gcc detects corruption of the on-stack canary value
767 panic("stack-protector: Kernel stack is corrupted in: %pB", in __stack_chk_fail()
784 return -EINVAL; in oops_setup()
796 return -EINVAL; in panic_on_taint_setup()
800 return -EINVAL; in panic_on_taint_setup()
802 /* make sure panic_on_taint doesn't hold out-of-range TAINT flags */ in panic_on_taint_setup()
806 return -EINVAL; in panic_on_taint_setup()