/linux-5.19.10/include/asm-generic/ |
D | bug.h | 16 #define BUGFLAG_TAINT(taint) ((taint) << 8) argument 27 void __warn(const char *file, int line, void *caller, unsigned taint, 92 void warn_slowpath_fmt(const char *file, const int line, unsigned taint, 95 #define __WARN_printf(taint, arg...) do { \ argument 97 warn_slowpath_fmt(__FILE__, __LINE__, taint, arg); \ 103 #define __WARN_printf(taint, arg...) do { \ argument 106 __WARN_FLAGS(BUGFLAG_NO_CUT_HERE | BUGFLAG_TAINT(taint));\ 138 #define WARN_TAINT(condition, taint, format...) ({ \ argument 141 __WARN_printf(taint, format); \ 153 #define WARN_TAINT_ONCE(condition, taint, format...) \ argument [all …]
|
/linux-5.19.10/tools/debugging/ |
D | kernel-chktaint | 26 taint=$1 38 taint=`cat $TAINTFILE` 41 if [ $taint -eq 0 ]; then 48 T=$taint 201 echo "Raw taint value as int/string: $taint/'$out'"
|
/linux-5.19.10/arch/arm64/kernel/ |
D | cpufeature.c | 1094 int taint = 0; in update_32bit_cpu_features() local 1110 taint |= check_update_ftr_reg(SYS_ID_DFR0_EL1, cpu, in update_32bit_cpu_features() 1112 taint |= check_update_ftr_reg(SYS_ID_DFR1_EL1, cpu, in update_32bit_cpu_features() 1114 taint |= check_update_ftr_reg(SYS_ID_ISAR0_EL1, cpu, in update_32bit_cpu_features() 1116 taint |= check_update_ftr_reg(SYS_ID_ISAR1_EL1, cpu, in update_32bit_cpu_features() 1118 taint |= check_update_ftr_reg(SYS_ID_ISAR2_EL1, cpu, in update_32bit_cpu_features() 1120 taint |= check_update_ftr_reg(SYS_ID_ISAR3_EL1, cpu, in update_32bit_cpu_features() 1122 taint |= check_update_ftr_reg(SYS_ID_ISAR4_EL1, cpu, in update_32bit_cpu_features() 1124 taint |= check_update_ftr_reg(SYS_ID_ISAR5_EL1, cpu, in update_32bit_cpu_features() 1126 taint |= check_update_ftr_reg(SYS_ID_ISAR6_EL1, cpu, in update_32bit_cpu_features() [all …]
|
/linux-5.19.10/drivers/gpu/drm/i915/ |
D | i915_utils.c | 54 void add_taint_for_CI(struct drm_i915_private *i915, unsigned int taint) in add_taint_for_CI() argument 57 taint, (void *)_RET_IP_); in add_taint_for_CI() 61 __add_taint_for_CI(taint); in add_taint_for_CI()
|
D | i915_utils.h | 407 void add_taint_for_CI(struct drm_i915_private *i915, unsigned int taint); 408 static inline void __add_taint_for_CI(unsigned int taint) in __add_taint_for_CI() argument 416 add_taint(taint, LOCKDEP_STILL_OK); in __add_taint_for_CI()
|
/linux-5.19.10/kernel/ |
D | panic.c | 601 void __warn(const char *file, int line, void *caller, unsigned taint, in __warn() argument 634 add_taint(taint, LOCKDEP_STILL_OK); in __warn() 638 void warn_slowpath_fmt(const char *file, int line, unsigned taint, in warn_slowpath_fmt() argument 646 __warn(file, line, __builtin_return_address(0), taint, in warn_slowpath_fmt() 653 __warn(file, line, __builtin_return_address(0), taint, NULL, &args); in warn_slowpath_fmt()
|
/linux-5.19.10/Documentation/admin-guide/ |
D | tainted-kernels.rst | 12 Note the kernel will remain tainted even after you undo what caused the taint 66 a more details explanation of the various taint flags. 67 Raw taint value as int/string: 4609/'P W O ' 73 a particular type of taint. It's best to leave that to the aforementioned 91 6 _/U 64 taint requested by userspace application 101 16 _/X 65536 auxiliary taint, defined for and used by distros 156 (Though some warnings may set more specific taint flags.) 172 16) ``X`` Auxiliary taint, defined for and used by Linux distributors.
|
D | reporting-issues.rst | 125 * Ensure the kernel you just installed does not 'taint' itself when 479 Check 'taint' flag 485 The kernel marks itself with a 'taint' flag when something happens that might 490 install the latest mainline kernel; you will need to check the taint flag again 497 why the kernel also mentions the taint status when it reports an internal 541 question is the only reason for the taint. If the issue happens in an 910 Check 'taint' flag 913 *Ensure the kernel you just installed does not 'taint' itself when 916 As outlined above in more detail already: the kernel sets a 'taint' flag when
|
D | bug-hunting.rst | 61 "(...)", where the taint flags are described in
|
/linux-5.19.10/Documentation/ABI/testing/ |
D | sysfs-module | 51 What: /sys/module/*/taint 55 Description: Module taint flags:
|
/linux-5.19.10/drivers/block/aoe/ |
D | aoecmd.c | 267 if (!t->taint) { in newframe() 272 && (use_tainted || !t->taint) in newframe() 652 if (t->taint) { in rexmit_deferred() 670 } else if (tsince_hr(f) < t->taint * rto(d)) { in rexmit_deferred() 703 n = t->taint++; in scorn() 704 t->taint += t->taint * 2; in scorn() 705 if (n > t->taint) in scorn() 706 t->taint = n; in scorn() 707 if (t->taint > MAX_TAINT) in scorn() 708 t->taint = MAX_TAINT; in scorn() [all …]
|
D | aoe.h | 150 int taint; /* how much we want to avoid this aoetgt */ member
|
D | aoeblk.c | 139 seq_printf(s, "\ttaint:%d\n", (*t)->taint); in aoedisk_debugfs_show()
|
/linux-5.19.10/Documentation/translations/zh_CN/admin-guide/ |
D | tainted-kernels.rst | 66 a more details explanation of the various taint flags. 67 Raw taint value as int/string: 4609/'P W O '
|
D | reporting-issues.rst | 380 (taint)”标志标记自己。如果您的内核受到污染,那么您面临的可能是这样的错误。
|
/linux-5.19.10/Documentation/translations/zh_TW/admin-guide/ |
D | tainted-kernels.rst | 69 a more details explanation of the various taint flags. 70 Raw taint value as int/string: 4609/'P W O '
|
D | reporting-issues.rst | 381 (taint)」標誌標記自己。如果您的內核受到汙染,那麼您面臨的可能是這樣的錯誤。
|
/linux-5.19.10/drivers/vfio/ |
D | Kconfig | 40 in an unsupportable kernel and will therefore taint the kernel.
|
/linux-5.19.10/drivers/staging/ |
D | Kconfig | 13 Using any of these drivers will taint your kernel which might
|
/linux-5.19.10/arch/x86/kernel/cpu/mce/ |
D | core.c | 1229 int severity, i, taint = 0; in __mc_scan_banks() local 1256 taint++; in __mc_scan_banks() 1296 return taint; in __mc_scan_banks() 1415 int worst = 0, order, no_way_out, kill_current_task, lmce, taint = 0; in do_machine_check() local 1496 taint = __mc_scan_banks(&m, regs, final, toclear, valid_banks, no_way_out, &worst); in do_machine_check() 1535 if (taint) in do_machine_check()
|
/linux-5.19.10/drivers/gpu/drm/i915/gt/ |
D | intel_reset.c | 1134 goto taint; in intel_gt_reset() 1155 goto taint; in intel_gt_reset() 1160 goto taint; in intel_gt_reset() 1168 taint: in intel_gt_reset()
|
/linux-5.19.10/arch/x86/kernel/cpu/ |
D | common.c | 1429 int arglen, taint = 0; in cpu_parse_early_param() local 1480 taint++; in cpu_parse_early_param() 1499 taint++; in cpu_parse_early_param() 1510 if (taint) in cpu_parse_early_param()
|
/linux-5.19.10/Documentation/admin-guide/sysctl/ |
D | kernel.rst | 1352 64 `(U)` taint requested by userspace application 1362 65536 `(X)` Auxiliary taint, defined and used by for distros
|
/linux-5.19.10/kernel/module/ |
D | main.c | 962 __ATTR(taint, 0444, show_taint, NULL);
|
/linux-5.19.10/init/ |
D | Kconfig | 1953 --force). Forced module loading sets the 'F' (forced) taint flag and 2041 key. Without this, such modules will simply taint the kernel.
|