Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp2159165ybz; Thu, 23 Apr 2020 12:39:12 -0700 (PDT) X-Google-Smtp-Source: APiQypJBPW5m7q4omrBhrgmPqUzPmI73f8fcojMbMK+h2lGZANIoShvi9Eki7aFNFo1Gr9K582tA X-Received: by 2002:a50:fa0b:: with SMTP id b11mr4034514edq.251.1587670752693; Thu, 23 Apr 2020 12:39:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587670752; cv=none; d=google.com; s=arc-20160816; b=VecVo0CPueBR4hVkdRcHa6e7/316QOl0xrtwYGggHQBeNCz/PnfP9FXpPNarAdpPbf OXPJfklmlPBPb5jNMhP53DXcNqJ0oWlFUFiE8yYzN0+z9yWeGcRrxoQym6ZYka+3FVQC RC3J6Ma+ymXOEYOUYWqkfJ1nPG4PlN9Yv5JgtZSuQO4lq7SCwyf2ukr/An1Dcg1e/rQW rS0JQx6n9/MitVdcWJUbdlytRKoNXcDz/mSBeKdxLgyfMYN+gVLbxsYnio/cQXao3bPk XDXrmIHMaxArWoPKzpnSGbyc6U69JV0G+9Xhdzjvqt9UunCjy02S92rZtpsMeWsThgOk 389w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=khlGijM0IVzosr4QsITMjwbTkarDXUfWjRrJnA0Ar2g=; b=GAGHCtS/qaxm0Qdx4VwUv0Va4SxgEY92g4GAD8McPiW+Yl5gBg2KoTFGS79MkxuNT0 OqN9hPquDkIjmmqtC7bBI59bu00edog8ClMWeiM1kjjqG1piLu/BCr+cHwFKJehWs9Rg Y9G23Nw66+7NSwNtST/0ltTbqNf2zTnX/7w6gjW2ly4ykuXRN1nwksb/8Yqii6RyeK0H pwzM8xmPAZoS+EGDTHA8VWtYhpxDORfjl+SV7rxytiP/7G9pNhYctpqoNqZ3i85tB+9U LMsHE2OKPNWSj2F0FKWO9nOBfgCKi1buB9OdGhH1j3yhtGYNK7+10cOZxDEwzQ7oKOPT Kgjg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a4si1843962edn.451.2020.04.23.12.38.49; Thu, 23 Apr 2020 12:39:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730319AbgDWSww (ORCPT + 99 others); Thu, 23 Apr 2020 14:52:52 -0400 Received: from 18.mo3.mail-out.ovh.net ([87.98.172.162]:39958 "EHLO 18.mo3.mail-out.ovh.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728396AbgDWSww (ORCPT ); Thu, 23 Apr 2020 14:52:52 -0400 X-Greylist: delayed 932 seconds by postgrey-1.27 at vger.kernel.org; Thu, 23 Apr 2020 14:52:51 EDT Received: from player796.ha.ovh.net (unknown [10.110.208.43]) by mo3.mail-out.ovh.net (Postfix) with ESMTP id 8054924D249 for ; Thu, 23 Apr 2020 20:37:18 +0200 (CEST) Received: from sk2.org (82-65-25-201.subs.proxad.net [82.65.25.201]) (Authenticated sender: steve@sk2.org) by player796.ha.ovh.net (Postfix) with ESMTPSA id C471011A47C7A; Thu, 23 Apr 2020 18:37:12 +0000 (UTC) From: Stephen Kitt To: Jonathan Corbet , Mauro Carvalho Chehab , linux-doc@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Stephen Kitt Subject: [PATCH 2/3] docs: sysctl/kernel: document ftrace entries Date: Thu, 23 Apr 2020 20:36:50 +0200 Message-Id: <20200423183651.15365-2-steve@sk2.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200423183651.15365-1-steve@sk2.org> References: <20200423183651.15365-1-steve@sk2.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Ovh-Tracer-Id: 16167359714264960389 X-VR-SPAMSTATE: OK X-VR-SPAMSCORE: -100 X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgeduhedrgeelgdeljecutefuodetggdotefrodftvfcurfhrohhfihhlvgemucfqggfjpdevjffgvefmvefgnecuuegrihhlohhuthemucehtddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfjughrpefhvffufffkofgjfhgggfestdekredtredttdenucfhrhhomhepufhtvghphhgvnhcumfhithhtuceoshhtvghvvgesshhkvddrohhrgheqnecukfhppedtrddtrddtrddtpdekvddrieehrddvhedrvddtudenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhhouggvpehsmhhtphdqohhuthdphhgvlhhopehplhgrhigvrhejleeirdhhrgdrohhvhhdrnhgvthdpihhnvghtpedtrddtrddtrddtpdhmrghilhhfrhhomhepshhtvghvvgesshhkvddrohhrghdprhgtphhtthhopehlihhnuhigqdhkvghrnhgvlhesvhhgvghrrdhkvghrnhgvlhdrohhrgh Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Based on the ftrace documentation, the tp_printk boot parameter documentation, and the implementation in kernel/trace/trace.c. Signed-off-by: Stephen Kitt --- Documentation/admin-guide/sysctl/kernel.rst | 50 +++++++++++++++++++++ 1 file changed, 50 insertions(+) diff --git a/Documentation/admin-guide/sysctl/kernel.rst b/Documentation/admin-guide/sysctl/kernel.rst index 82bfd5892663..d4bbdaf96ebc 100644 --- a/Documentation/admin-guide/sysctl/kernel.rst +++ b/Documentation/admin-guide/sysctl/kernel.rst @@ -265,6 +265,27 @@ domain names are in general different. For a detailed discussion see the ``hostname(1)`` man page. +ftrace_dump_on_oops +=================== + +Determines whether ``ftrace_dump()`` should be called on an oops (or +kernel panic). This will output the contents of the ftrace buffers to +the console. This is very useful for capturing traces that lead to +crashes and outputing it to a serial console. + += =================================================== +0 Disabled (default). +1 Dump buffers of all CPUs. +2 Dump the buffer of the CPU that triggered the oops. += =================================================== + + +ftrace_enabled, stack_tracer_enabled +==================================== + +See :doc:`/trace/ftrace`. + + hardlockup_all_cpu_backtrace ============================ @@ -1191,6 +1212,35 @@ If a value outside of this range is written to ``threads-max`` an ``EINVAL`` error occurs. +traceoff_on_warning +=================== + +When set, disables tracing (see :doc:`/trace/ftrace`) when a +``WARN()`` is hit. + + +tracepoint_printk +================= + +When tracepoints are sent to printk() (enabled by the ``tp_printk`` +boot parameter), this entry provides runtime control:: + + echo 0 > /proc/sys/kernel/tracepoint_printk + +will stop tracepoints from being sent to printk(), and + +:: + + echo 1 > /proc/sys/kernel/tracepoint_printk + +will send them to printk() again. + +This only works if the kernel was booted with ``tp_printk`` enabled. + +See :doc:`/admin-guide/kernel-parameters` and +:doc:`/trace/boottime-trace`. + + unknown_nmi_panic ================= -- 2.20.1