Lines Matching full:panic
3 * linux/kernel/panic.c
142 * Stop ourself in panic -- architecture code may override this
160 * Stop other CPUs in panic. Architecture dependent code may override this
170 * This function can be called twice in panic path, but obviously in crash_smp_send_stop()
178 * unfortunately means it may not be hardened to work in a panic in crash_smp_send_stop()
188 * A variant of panic() called from NMI context. We return if we've already
202 panic("%s", msg); in nmi_panic()
237 panic("%s: panic_on_warn set ...\n", origin); in check_panic_on_warn()
241 panic("%s: system warned too often (kernel.warn_limit is %d)", in check_panic_on_warn()
257 * which unfortunately may not be hardened to work in a panic in panic_other_cpus_shutdown()
270 * panic - halt the system
277 void panic(const char *fmt, ...) in panic() function
288 * This thread may hit another WARN() in the panic path. in panic()
291 * panic_mutex in panic(). in panic()
298 * from deadlocking the first cpu that invokes the panic, since in panic()
300 * after setting panic_cpu) from invoking panic() again. in panic()
306 * It's possible to come here directly from a panic-assertion and in panic()
310 * Only one CPU is allowed to execute the panic code from here. For in panic()
311 * multiple parallel invocations of panic, all other CPUs either in panic()
338 pr_emerg("Kernel panic - not syncing: %s\n", buf); in panic()
341 * Avoid nested stack-dumping if a panic occurs during oops processing in panic()
368 * Run any panic handlers, including those that might need to in panic()
397 * panic() is not being callled from OOPS. in panic()
445 pr_emerg("---[ end Kernel panic - not syncing: %s ]---\n", buf); in panic()
460 EXPORT_SYMBOL(panic);
547 panic("panic_on_taint set ..."); in add_taint()
763 panic("stack-protector: Kernel stack is corrupted in: %pB", in __stack_chk_fail()
771 core_param(panic, panic_timeout, int, 0644);
781 if (!strcmp(s, "panic")) in oops_setup()