/linux/tools/debugging/ |
H A D | kernel-chktaint | 26 taint=$1 38 taint=`cat $TAINTFILE` 41 if [ $taint -eq 0 ]; then 48 T=$taint 210 echo "Raw taint value as int/string: $taint/'$out'"
|
/linux/drivers/gpu/drm/i915/ |
H A D | i915_utils.c | 14 void add_taint_for_CI(struct drm_i915_private *i915, unsigned int taint) in add_taint_for_CI() argument 17 taint, __builtin_return_address(0)); in add_taint_for_CI() 21 __add_taint_for_CI(taint); in add_taint_for_CI()
|
H A D | i915_utils.h | 339 void add_taint_for_CI(struct drm_i915_private *i915, unsigned int taint); 340 static inline void __add_taint_for_CI(unsigned int taint) in __add_taint_for_CI() argument 348 add_taint(taint, LOCKDEP_STILL_OK); in __add_taint_for_CI()
|
/linux/kernel/ |
H A D | panic.c | 483 #define TAINT_FLAG(taint, _c_true, _c_false, _module) \ argument 484 [ TAINT_##taint ] = { \ 487 .desc = #taint, \ 561 * print_tainted - return a string to represent the kernel taint state. 563 * For individual taint flag meanings, see Documentation/admin-guide/sysctl/kernel.rst 593 * add_taint: add a taint flag if not already set. 603 pr_warn("Disabling lock debugging due to kernel taint\n"); in add_taint() 720 void __warn(const char *file, int line, void *caller, unsigned taint, in __warn() argument 759 add_taint(taint, LOCKDEP_STILL_OK); in __warn() 766 void warn_slowpath_fmt(const char *file, int line, unsigned taint, in warn_slowpath_fmt() argument [all...] |
/linux/arch/arm64/kernel/ |
H A D | cpufeature.c | 1269 int taint = 0; in update_32bit_cpu_features() local 1285 taint |= check_update_ftr_reg(SYS_ID_DFR0_EL1, cpu, in update_32bit_cpu_features() 1287 taint |= check_update_ftr_reg(SYS_ID_DFR1_EL1, cpu, in update_32bit_cpu_features() 1289 taint |= check_update_ftr_reg(SYS_ID_ISAR0_EL1, cpu, in update_32bit_cpu_features() 1291 taint |= check_update_ftr_reg(SYS_ID_ISAR1_EL1, cpu, in update_32bit_cpu_features() 1293 taint |= check_update_ftr_reg(SYS_ID_ISAR2_EL1, cpu, in update_32bit_cpu_features() 1295 taint |= check_update_ftr_reg(SYS_ID_ISAR3_EL1, cpu, in update_32bit_cpu_features() 1297 taint |= check_update_ftr_reg(SYS_ID_ISAR4_EL1, cpu, in update_32bit_cpu_features() 1299 taint |= check_update_ftr_reg(SYS_ID_ISAR5_EL1, cpu, in update_32bit_cpu_features() 1301 taint |= check_update_ftr_reg(SYS_ID_ISAR6_EL1, cpu, in update_32bit_cpu_features() [all …]
|
/linux/Documentation/admin-guide/ |
H A D | tainted-kernels.rst | 12 Note the kernel will remain tainted even after you undo what caused the taint 66 a more details explanation of the various taint flags. 67 Raw taint value as int/string: 4609/'P W O ' 73 a particular type of taint. It's best to leave that to the aforementioned 91 6 _/U 64 taint requested by userspace application 101 16 _/X 65536 auxiliary taint, defined for and used by distros 163 (Though some warnings may set more specific taint flags.) 179 16) ``X`` Auxiliary taint, defined for and used by Linux distributors.
|
H A D | reporting-issues.rst | 125 * Ensure the kernel you just installed does not 'taint' itself when 479 Check 'taint' flag 485 The kernel marks itself with a 'taint' flag when something happens that might 490 install the latest mainline kernel; you will need to check the taint flag again 497 why the kernel also mentions the taint status when it reports an internal 541 question is the only reason for the taint. If the issue happens in an 910 Check 'taint' flag 913 *Ensure the kernel you just installed does not 'taint' itself when 916 As outlined above in more detail already: the kernel sets a 'taint' flag when
|
H A D | kernel-parameters.txt | 671 Note that using this option will taint your kernel. 1584 Warning: use of this parameter will taint the kernel 4441 extra details on the taint flags that users can pick
|
/linux/Documentation/translations/zh_CN/admin-guide/ |
H A D | tainted-kernels.rst | 66 a more details explanation of the various taint flags. 67 Raw taint value as int/string: 4609/'P W O '
|
H A D | reporting-issues.rst | 374 (taint)”标志标记自己。如果您的内核受到污染,那么您面临的可能是这样的错误。
|
/linux/Documentation/translations/zh_TW/admin-guide/ |
H A D | tainted-kernels.rst | 69 a more details explanation of the various taint flags. 70 Raw taint value as int/string: 4609/'P W O '
|
H A D | reporting-issues.rst | 375 (taint)”標誌標記自己。如果您的內核受到污染,那麼您面臨的可能是這樣的錯誤。
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-module | 51 What: /sys/module/*/taint 55 Description: Module taint flags:
|
/linux/tools/testing/selftests/hid/tests/ |
H A D | base.py | 340 taint = taint_file.int_value 344 assert taint_file.int_value == taint
|
/linux/drivers/block/aoe/ |
H A D | aoe.h | 150 int taint; /* how much we want to avoid this aoetgt */ member
|
/linux/drivers/gpu/drm/i915/gt/ |
H A D | intel_reset.c | 1242 goto taint; in intel_gt_reset() 1264 goto taint; in intel_gt_reset() 1270 goto taint; in intel_gt_reset() 1279 taint: in intel_gt_reset()
|
/linux/drivers/vfio/ |
H A D | Kconfig | 72 in an unsupportable kernel and will therefore taint the kernel.
|
/linux/drivers/of/ |
H A D | Kconfig | 32 will taint the kernel with TAINT_TEST. The tests will cause ERROR and
|
/linux/arch/x86/kernel/cpu/ |
H A D | common.c | 1490 int arglen, taint = 0; in cpu_parse_early_param() local 1547 taint++; in cpu_parse_early_param() 1565 taint++; in cpu_parse_early_param() 1575 if (taint) in cpu_parse_early_param()
|
/linux/kernel/module/ |
H A D | Kconfig | 129 --force). Forced module loading sets the 'F' (forced) taint flag and 273 key. Without this, such modules will simply taint the kernel.
|
/linux/Documentation/admin-guide/sysctl/ |
H A D | kernel.rst | 1515 64 `(U)` taint requested by userspace application 1525 65536 `(X)` Auxiliary taint, defined and used by for distros
|