Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1171790ybz; Wed, 29 Apr 2020 16:27:06 -0700 (PDT) X-Google-Smtp-Source: APiQypKJOSzrBKy9PKTTXoiG0+fpTZljLT7EcgkHqjLKc2bag3f1a+A+R6f9BYmrKWW7WuW7Y85T X-Received: by 2002:aa7:d403:: with SMTP id z3mr330432edq.43.1588202826077; Wed, 29 Apr 2020 16:27:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588202826; cv=none; d=google.com; s=arc-20160816; b=FTasZgGRFLBDSMfyiDQlBFUIiYPtTuPZdvY5M6S+oL9ZDMKvxHNoSXMvpPHbWzbZUZ L3RMeH9EwHKR2XQt7kxATk+5jHG32szYOmlmQoAtY2XiOREd8kxkPilgVLUDZYzKDSaW sOn5MTM74Wcts7rB84kfkbLVaPbl5wV/btweAlBgmw3DbEUhItmWYgeaP2ZSTwRB7owU qlzEYrG39WTD7XK3Wi0WAPxF3XsfaDuWFdIvniOc+6UjDo1IpJZD6TgpG2qH/s/AP02a beTdlrQgHpAxjYv5gTtUNQ99jNkh5ICmWM/5DxijwcZYz5iOoH4nIo9aaDS1HLN1CuJg F30A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=3Ifi402PGyEEIqN5gGZtOq0RpThwPvtlExyC0T/0hZw=; b=u/wgnln20fz+VrxSsfd/2pBaV+n/XAJF9OSxiZKS0JUjiAH3uwAV08X8KKEifV5JR8 yt9sVUjMF6BKtC3+ZPv3S0ACPksjTKtSGccn48sO95JpQS5/EeyRvRruYe0fwFNpPtLj 8x0CJ2Tbay/gIyFKOctG98RhX6+odK/aHtAD9FjI26tmRhXta21L4sZFG+Q8cf3Ljbfs tzX/vX/lbXdoM7ikvjUjdVCpGBixK/GWllKdtOk1SixYpDApyl1pvVtA/LPMfCZLijIA XSoCRh22izU4JqStjzIawIekT0DJt5ZGBd3Fubr7wuGopmYfL5OMAlFkKpdSegaxjaNY h8Qg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d23si4635676ejt.267.2020.04.29.16.26.43; Wed, 29 Apr 2020 16:27:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727073AbgD2XYj (ORCPT + 99 others); Wed, 29 Apr 2020 19:24:39 -0400 Received: from 6.mo7.mail-out.ovh.net ([188.165.39.218]:55106 "EHLO 6.mo7.mail-out.ovh.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726929AbgD2XYj (ORCPT ); Wed, 29 Apr 2020 19:24:39 -0400 Received: from player693.ha.ovh.net (unknown [10.108.57.38]) by mo7.mail-out.ovh.net (Postfix) with ESMTP id CC179160976 for ; Wed, 29 Apr 2020 22:58:25 +0200 (CEST) Received: from sk2.org (82-65-25-201.subs.proxad.net [82.65.25.201]) (Authenticated sender: steve@sk2.org) by player693.ha.ovh.net (Postfix) with ESMTPSA id 025B411DB2FC6; Wed, 29 Apr 2020 20:58:15 +0000 (UTC) From: Stephen Kitt To: Jonathan Corbet , Mauro Carvalho Chehab , linux-doc@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Steven Rostedt , Stephen Kitt Subject: [PATCH v2 1/2] docs: sysctl/kernel: document ftrace entries Date: Wed, 29 Apr 2020 22:57:56 +0200 Message-Id: <20200429205757.8677-1-steve@sk2.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Ovh-Tracer-Id: 16893283679029906821 X-VR-SPAMSTATE: OK X-VR-SPAMSCORE: -100 X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgeduhedrieefgdduheegucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuqfggjfdpvefjgfevmfevgfenuceurghilhhouhhtmecuhedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmnecujfgurhephffvufffkffoggfgsedtkeertdertddtnecuhfhrohhmpefuthgvphhhvghnucfmihhtthcuoehsthgvvhgvsehskhdvrdhorhhgqeenucggtffrrghtthgvrhhnpeetgedugfelkeeikeetgeegteevfeeufeetuefgudeiiedthfehtdeffeekvdeffeenucfkpheptddrtddrtddrtddpkedvrdeihedrvdehrddvtddunecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmohguvgepshhmthhpqdhouhhtpdhhvghlohepphhlrgihvghrieelfedrhhgrrdhovhhhrdhnvghtpdhinhgvtheptddrtddrtddrtddpmhgrihhlfhhrohhmpehsthgvvhgvsehskhdvrdhorhhgpdhrtghpthhtoheplhhinhhugidqkhgvrhhnvghlsehvghgvrhdrkhgvrhhnvghlrdhorhhg Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Based on the ftrace documentation, the tp_printk boot parameter documentation, and the implementation in kernel/trace/trace.c. Signed-off-by: Stephen Kitt --- Changes since v2: - spelling and grammar fixes in ftrace_dump_on_oops ("outputing it" -> "outputting them") - "and::" in a single line in tracepoint_printk Documentation/admin-guide/sysctl/kernel.rst | 48 +++++++++++++++++++++ 1 file changed, 48 insertions(+) diff --git a/Documentation/admin-guide/sysctl/kernel.rst b/Documentation/admin-guide/sysctl/kernel.rst index 82bfd5892663..b1ad4c86274d 100644 --- a/Documentation/admin-guide/sysctl/kernel.rst +++ b/Documentation/admin-guide/sysctl/kernel.rst @@ -265,6 +265,27 @@ domain names are in general different. For a detailed discussion see the ``hostname(1)`` man page. +ftrace_dump_on_oops +=================== + +Determines whether ``ftrace_dump()`` should be called on an oops (or +kernel panic). This will output the contents of the ftrace buffers to +the console. This is very useful for capturing traces that lead to +crashes and outputting them to a serial console. + += =================================================== +0 Disabled (default). +1 Dump buffers of all CPUs. +2 Dump the buffer of the CPU that triggered the oops. += =================================================== + + +ftrace_enabled, stack_tracer_enabled +==================================== + +See :doc:`/trace/ftrace`. + + hardlockup_all_cpu_backtrace ============================ @@ -1191,6 +1212,33 @@ If a value outside of this range is written to ``threads-max`` an ``EINVAL`` error occurs. +traceoff_on_warning +=================== + +When set, disables tracing (see :doc:`/trace/ftrace`) when a +``WARN()`` is hit. + + +tracepoint_printk +================= + +When tracepoints are sent to printk() (enabled by the ``tp_printk`` +boot parameter), this entry provides runtime control:: + + echo 0 > /proc/sys/kernel/tracepoint_printk + +will stop tracepoints from being sent to printk(), and:: + + echo 1 > /proc/sys/kernel/tracepoint_printk + +will send them to printk() again. + +This only works if the kernel was booted with ``tp_printk`` enabled. + +See :doc:`/admin-guide/kernel-parameters` and +:doc:`/trace/boottime-trace`. + + unknown_nmi_panic ================= -- 2.20.1