| /linux/tools/debugging/ |
| H A D | kernel-chktaint | 26 taint=$1 38 taint=`cat $TAINTFILE` 41 if [ $taint -eq 0 ]; then 48 T=$taint 107 echo " * taint requested by userspace application (#6)" 187 echo " * auxiliary taint, defined for and used by distros (#16)" 215 echo "For a more detailed explanation of the various taint flags see" 218 echo "Raw taint value as int/string: $taint/'$out'"
|
| /linux/kernel/ |
| H A D | panic.c | 631 #define TAINT_FLAG(taint, _c_true, _c_false) \ argument 632 [ TAINT_##taint ] = { \ 634 .desc = #taint, \ 871 void __warn(const char *file, int line, void *caller, unsigned taint, in __warn() argument 912 add_taint(taint, LOCKDEP_STILL_OK); in __warn() 919 void warn_slowpath_fmt(const char *file, int line, unsigned taint, in warn_slowpath_fmt() argument 928 __warn(file, line, __builtin_return_address(0), taint, in warn_slowpath_fmt() 936 __warn(file, line, __builtin_return_address(0), taint, NULL, &args); in warn_slowpath_fmt()
|
| /linux/arch/arm64/kernel/ |
| H A D | cpufeature.c | 1288 int taint = 0; in update_32bit_cpu_features() local 1304 taint |= check_update_ftr_reg(SYS_ID_DFR0_EL1, cpu, in update_32bit_cpu_features() 1306 taint |= check_update_ftr_reg(SYS_ID_DFR1_EL1, cpu, in update_32bit_cpu_features() 1308 taint |= check_update_ftr_reg(SYS_ID_ISAR0_EL1, cpu, in update_32bit_cpu_features() 1310 taint |= check_update_ftr_reg(SYS_ID_ISAR1_EL1, cpu, in update_32bit_cpu_features() 1312 taint |= check_update_ftr_reg(SYS_ID_ISAR2_EL1, cpu, in update_32bit_cpu_features() 1314 taint |= check_update_ftr_reg(SYS_ID_ISAR3_EL1, cpu, in update_32bit_cpu_features() 1316 taint |= check_update_ftr_reg(SYS_ID_ISAR4_EL1, cpu, in update_32bit_cpu_features() 1318 taint |= check_update_ftr_reg(SYS_ID_ISAR5_EL1, cpu, in update_32bit_cpu_features() 1320 taint |= check_update_ftr_reg(SYS_ID_ISAR6_EL1, cpu, in update_32bit_cpu_features() [all …]
|
| /linux/Documentation/admin-guide/ |
| H A D | tainted-kernels.rst | 12 Note the kernel will remain tainted even after you undo what caused the taint 66 a more details explanation of the various taint flags. 67 Raw taint value as int/string: 4609/'P W O ' 73 a particular type of taint. It's best to leave that to the aforementioned 91 6 _/U 64 taint requested by userspace application 101 16 _/X 65536 auxiliary taint, defined for and used by distros 164 (Though some warnings may set more specific taint flags.) 180 16) ``X`` Auxiliary taint, defined for and used by Linux distributors.
|
| H A D | kernel-parameters.txt | 802 Note that using this option will taint your kernel. 1737 Warning: use of this parameter will taint the kernel 4750 extra details on the taint flags that users can pick
|
| /linux/drivers/block/aoe/ |
| H A D | aoecmd.c | 267 if (!t->taint) { in newframe() 272 && (use_tainted || !t->taint) in newframe() 660 if (t->taint) { in rexmit_deferred() 678 } else if (tsince_hr(f) < t->taint * rto(d)) { in rexmit_deferred() 711 n = t->taint++; in scorn() 712 t->taint += t->taint * 2; in scorn() 713 if (n > t->taint) in scorn() 714 t->taint = n; in scorn() 715 if (t->taint > MAX_TAINT) in scorn() 716 t->taint = MAX_TAINT; in scorn() [all …]
|
| H A D | aoe.h | 151 int taint; /* how much we want to avoid this aoetgt */ member
|
| /linux/Documentation/translations/zh_CN/admin-guide/ |
| H A D | tainted-kernels.rst | 66 a more details explanation of the various taint flags. 67 Raw taint value as int/string: 4609/'P W O '
|
| H A D | reporting-issues.rst | 374 (taint)”标志标记自己。如果您的内核受到污染,那么您面临的可能是这样的错误。
|
| /linux/Documentation/translations/zh_TW/admin-guide/ |
| H A D | tainted-kernels.rst | 69 a more details explanation of the various taint flags. 70 Raw taint value as int/string: 4609/'P W O '
|
| H A D | reporting-issues.rst | 375 (taint)”標誌標記自己。如果您的內核受到污染,那麼您面臨的可能是這樣的錯誤。
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-module | 51 What: /sys/module/*/taint 55 Description: Module taint flags:
|
| /linux/tools/testing/selftests/hid/tests/ |
| H A D | base.py | 354 taint = taint_file.int_value 358 assert taint_file.int_value == taint
|
| /linux/drivers/staging/ |
| H A D | Kconfig | 13 Using any of these drivers will taint your kernel which might
|
| /linux/arch/x86/kernel/cpu/mce/ |
| H A D | core.c | 1363 int severity, i, taint = 0; in __mc_scan_banks() local 1391 taint++; in __mc_scan_banks() 1431 return taint; in __mc_scan_banks() 1556 int worst = 0, order, no_way_out, kill_current_task, lmce, taint = 0; in do_machine_check() local 1640 taint = __mc_scan_banks(&err, regs, final, toclear, valid_banks, no_way_out, &worst); in do_machine_check() 1679 if (taint) in do_machine_check()
|
| /linux/drivers/vfio/ |
| H A D | Kconfig | 72 in an unsupportable kernel and will therefore taint the kernel.
|
| /linux/drivers/of/ |
| H A D | Kconfig | 32 will taint the kernel with TAINT_TEST. The tests will cause ERROR and
|
| /linux/arch/x86/kernel/cpu/ |
| H A D | common.c | 1629 int taint = 0; in parse_set_clear_cpuid() local 1658 taint++; in parse_set_clear_cpuid() 1694 taint++; in parse_set_clear_cpuid() 1703 return taint; in parse_set_clear_cpuid()
|
| /linux/kernel/module/ |
| H A D | Kconfig | 129 --force). Forced module loading sets the 'F' (forced) taint flag and 278 key. Without this, such modules will simply taint the kernel.
|
| H A D | main.c | 1055 __ATTR(taint, 0444, show_taint, NULL);
|
| /linux/Documentation/admin-guide/sysctl/ |
| H A D | kernel.rst | 1551 64 `(U)` taint requested by userspace application 1561 65536 `(X)` Auxiliary taint, defined and used by for distros
|