|
@@ -100,7 +100,7 @@ void panic(const char *fmt, ...)
|
|
va_start(args, fmt);
|
|
va_start(args, fmt);
|
|
vsnprintf(buf, sizeof(buf), fmt, args);
|
|
vsnprintf(buf, sizeof(buf), fmt, args);
|
|
va_end(args);
|
|
va_end(args);
|
|
- printk(KERN_EMERG "Kernel panic - not syncing: %s\n",buf);
|
|
|
|
|
|
+ pr_emerg("Kernel panic - not syncing: %s\n", buf);
|
|
#ifdef CONFIG_DEBUG_BUGVERBOSE
|
|
#ifdef CONFIG_DEBUG_BUGVERBOSE
|
|
/*
|
|
/*
|
|
* Avoid nested stack-dumping if a panic occurs during oops processing
|
|
* Avoid nested stack-dumping if a panic occurs during oops processing
|
|
@@ -141,7 +141,7 @@ void panic(const char *fmt, ...)
|
|
* Delay timeout seconds before rebooting the machine.
|
|
* Delay timeout seconds before rebooting the machine.
|
|
* We can't use the "normal" timers since we just panicked.
|
|
* We can't use the "normal" timers since we just panicked.
|
|
*/
|
|
*/
|
|
- printk(KERN_EMERG "Rebooting in %d seconds..", panic_timeout);
|
|
|
|
|
|
+ pr_emerg("Rebooting in %d seconds..", panic_timeout);
|
|
|
|
|
|
for (i = 0; i < panic_timeout * 1000; i += PANIC_TIMER_STEP) {
|
|
for (i = 0; i < panic_timeout * 1000; i += PANIC_TIMER_STEP) {
|
|
touch_nmi_watchdog();
|
|
touch_nmi_watchdog();
|
|
@@ -165,7 +165,7 @@ void panic(const char *fmt, ...)
|
|
extern int stop_a_enabled;
|
|
extern int stop_a_enabled;
|
|
/* Make sure the user can actually press Stop-A (L1-A) */
|
|
/* Make sure the user can actually press Stop-A (L1-A) */
|
|
stop_a_enabled = 1;
|
|
stop_a_enabled = 1;
|
|
- printk(KERN_EMERG "Press Stop-A (L1-A) to return to the boot prom\n");
|
|
|
|
|
|
+ pr_emerg("Press Stop-A (L1-A) to return to the boot prom\n");
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
#if defined(CONFIG_S390)
|
|
#if defined(CONFIG_S390)
|
|
@@ -176,6 +176,7 @@ void panic(const char *fmt, ...)
|
|
disabled_wait(caller);
|
|
disabled_wait(caller);
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
|
|
+ pr_emerg("---[ end Kernel panic - not syncing: %s\n", buf);
|
|
local_irq_enable();
|
|
local_irq_enable();
|
|
for (i = 0; ; i += PANIC_TIMER_STEP) {
|
|
for (i = 0; ; i += PANIC_TIMER_STEP) {
|
|
touch_softlockup_watchdog();
|
|
touch_softlockup_watchdog();
|
|
@@ -276,8 +277,7 @@ unsigned long get_taint(void)
|
|
void add_taint(unsigned flag, enum lockdep_ok lockdep_ok)
|
|
void add_taint(unsigned flag, enum lockdep_ok lockdep_ok)
|
|
{
|
|
{
|
|
if (lockdep_ok == LOCKDEP_NOW_UNRELIABLE && __debug_locks_off())
|
|
if (lockdep_ok == LOCKDEP_NOW_UNRELIABLE && __debug_locks_off())
|
|
- printk(KERN_WARNING
|
|
|
|
- "Disabling lock debugging due to kernel taint\n");
|
|
|
|
|
|
+ pr_warn("Disabling lock debugging due to kernel taint\n");
|
|
|
|
|
|
set_bit(flag, &tainted_mask);
|
|
set_bit(flag, &tainted_mask);
|
|
}
|
|
}
|
|
@@ -382,8 +382,7 @@ late_initcall(init_oops_id);
|
|
void print_oops_end_marker(void)
|
|
void print_oops_end_marker(void)
|
|
{
|
|
{
|
|
init_oops_id();
|
|
init_oops_id();
|
|
- printk(KERN_WARNING "---[ end trace %016llx ]---\n",
|
|
|
|
- (unsigned long long)oops_id);
|
|
|
|
|
|
+ pr_warn("---[ end trace %016llx ]---\n", (unsigned long long)oops_id);
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
/*
|