Home
last modified time | relevance | path

Searched refs:corruption (Results 1 – 25 of 105) sorted by relevance

12345

/linux/arch/arm64/kvm/hyp/nvhe/
H A Dlist_debug.c17 bool corruption = unlikely(condition); \
18 if (corruption) { \
24 corruption; \
/linux/include/linux/
H A Dbug.h83 * Since detected data corruption should stop operation on the affected
89 bool corruption = unlikely(condition); \
90 if (corruption) { \
99 corruption; \
/linux/arch/x86/kernel/
H A Dcheck.c143 int corruption = 0; in check_for_bios_corruption() local
156 corruption = 1; in check_for_bios_corruption()
161 WARN_ONCE(corruption, KERN_ERR "Memory corruption detected in low memory\n"); in check_for_bios_corruption()
/linux/tools/testing/selftests/net/rds/
H A DREADME.txt7 corruption. A workload of 50000 hashes, each 64 characters in size,
22 -c Simulates a percentage of packet corruption
H A Dtest.py85 packet_corruption=str(args.corruption)+'%'
/linux/tools/testing/selftests/lkdtm/
H A Dtests.txt12 CORRUPT_LIST_ADD list_add corruption
13 CORRUPT_LIST_DEL list_del corruption
/linux/drivers/ras/
H A DKconfig26 correctly, including avoiding data corruption, whereas Availability
30 data corruption.
/linux/Documentation/admin-guide/device-mapper/
H A Ddm-flakey.rst73 0 and 1000000000 meaning 0% to 100% probability of corruption.
78 0 and 1000000000 meaning 0% to 100% probability of corruption.
H A Ddm-integrity.rst26 corruption on the disk or in the I/O path.
33 twice, but it is also less reliable, because if data corruption happens
135 will protect the data against accidental corruption.
/linux/Documentation/filesystems/xfs/
H A Dxfs-self-describing-metadata.rst26 determine the root cause of a corruption problem, but it is still mainly a
28 weren't the ultimate cause of a corruption event. It may take a few hours to a
108 determine the scope of the corruption. For example, if we have a extent btree
110 filesystem to find the owner of the block. Worse, the corruption could mean that
112 in the metadata we have no idea of the scope of the corruption. If we have an
127 whether the corruptions are related, whether there's been multiple corruption
145 modification occurred between the corruption being written and when it was
159 As such, we cannot catch all types of corruption that can occur within a block
161 metadata, or there may be corruption of interblock relationships (e.g. corrupted
/linux/Documentation/ABI/obsolete/
H A Dsysfs-firmware-acpi7 the offline failure might lead to memory corruption and crashes)
/linux/Documentation/driver-api/md/
H A Draid5-ppl.rst9 disks is missing. This can lead to silent data corruption when rebuilding the
36 silent data corruption. If a dirty disk of a stripe is lost, no PPL recovery is
/linux/Documentation/arch/sparc/
H A Dadi.rst97 Disrupting memory corruption
103 the corresponding cacheline, a memory corruption trap occurs. By
117 Precise memory corruption
123 the corresponding cacheline, a memory corruption trap occurs. If
/linux/Documentation/block/
H A Ddata-integrity.rst9 protect against data corruption. However, the detection of the
10 corruption is done at read time which could potentially be months
31 integrity of the I/O and reject it if corruption is detected. This
32 allows not only corruption prevention but also isolation of the point
/linux/Documentation/mm/
H A Dslub.rst242 INFO: <corruption start>-<corruption_end> <more info>
259 Can be useful if the corruption does not stop with the start of the
265 corruption by a write after free.
285 of the corruption is may be more likely found by looking at the function that
318 may be optimized further by locating the slab that experiences corruption
325 If the corruption occurs by writing after the end of the object then it
H A Dhwpoison.rst21 When the current CPU tries to consume corruption the currently
24 just ignore it because no corruption has been consumed yet. Instead
/linux/Documentation/ABI/removed/
H A Dsysfs-mce23 better uptime with the risk of a crash or even corruption
/linux/mm/
H A DKconfig.debug19 slowdown, but helps to find certain types of memory corruption.
23 often happen for same reasons as memory corruption (e.g. double free,
32 incorrect warnings of memory corruption after a resume because free
131 entries are added and removed to user page tables, leaking, corruption
/linux/drivers/memstick/core/
H A DKconfig15 in most cases result in data corruption.
/linux/Documentation/driver-api/
H A Dio_ordering.rst51 possible data corruption.
/linux/fs/ubifs/
H A Drecovery.c687 int corruption = first_non_ff(buf, len); in ubifs_recover_leb() local
694 lnum, offs, corruption); in ubifs_recover_leb()
696 offs += corruption; in ubifs_recover_leb()
697 buf += corruption; in ubifs_recover_leb()
/linux/drivers/block/drbd/
H A DKconfig63 512 insert data corruption on receiving side
/linux/drivers/soc/samsung/
H A DKconfig71 corruption over suspend and resume. A smaller value will mean that
/linux/Documentation/userspace-api/
H A Dmseal.rst10 permission feature improves security stance on memory corruption bugs, i.e.
15 modifications. This is useful to mitigate memory corruption issues where a
/linux/tools/perf/Documentation/
H A DBuild.txt57 AddressSanitizer (or ASan) is a GCC feature that detects memory corruption bugs

12345