Home
last modified time | relevance | path

Searched refs:corruption (Results 1 – 25 of 114) sorted by relevance

12345

/linux-6.12.1/arch/arm64/kvm/hyp/nvhe/
Dlist_debug.c17 bool corruption = unlikely(condition); \
18 if (corruption) { \
24 corruption; \
/linux-6.12.1/include/linux/
Dbug.h83 bool corruption = unlikely(condition); \
84 if (corruption) { \
91 corruption; \
/linux-6.12.1/arch/x86/kernel/
Dcheck.c143 int corruption = 0; in check_for_bios_corruption() local
156 corruption = 1; in check_for_bios_corruption()
161 WARN_ONCE(corruption, KERN_ERR "Memory corruption detected in low memory\n"); in check_for_bios_corruption()
/linux-6.12.1/Documentation/mm/
Dpage_table_check.rst17 In case of most detected corruption, the kernel is crashed. There is a small
21 is synchronous, it can help with debugging double map memory corruption issues,
29 corruption in this case immediately, but that will cause read-only data to
75 still being mapped in the userspace, leading to "corruption" detected by the
Dslub.rst233 INFO: <corruption start>-<corruption_end> <more info>
250 Can be useful if the corruption does not stop with the start of the
256 corruption by a write after free.
276 of the corruption is may be more likely found by looking at the function that
309 may be optimized further by locating the slab that experiences corruption
316 If the corruption occurs by writing after the end of the object then it
Dhwpoison.rst21 When the current CPU tries to consume corruption the currently
24 just ignore it because no corruption has been consumed yet. Instead
/linux-6.12.1/tools/testing/selftests/net/rds/
DREADME.txt7 corruption. A workload of 50000 hashes, each 64 characters in size,
22 -c Simulates a percentage of packet corruption
Dtest.py85 packet_corruption=str(args.corruption)+'%'
/linux-6.12.1/tools/testing/selftests/lkdtm/
Dtests.txt12 CORRUPT_LIST_ADD list_add corruption
13 CORRUPT_LIST_DEL list_del corruption
/linux-6.12.1/drivers/ras/
DKconfig26 correctly, including avoiding data corruption, whereas Availability
30 data corruption.
/linux-6.12.1/Documentation/ABI/obsolete/
Dsysfs-firmware-acpi7 the offline failure might lead to memory corruption and crashes)
/linux-6.12.1/Documentation/admin-guide/device-mapper/
Ddm-flakey.rst73 0 and 1000000000 meaning 0% to 100% probability of corruption.
78 0 and 1000000000 meaning 0% to 100% probability of corruption.
/linux-6.12.1/Documentation/filesystems/xfs/
Dxfs-self-describing-metadata.rst26 determine the root cause of a corruption problem, but it is still mainly a
28 weren't the ultimate cause of a corruption event. It may take a few hours to a
108 determine the scope of the corruption. For example, if we have a extent btree
110 filesystem to find the owner of the block. Worse, the corruption could mean that
112 in the metadata we have no idea of the scope of the corruption. If we have an
127 whether the corruptions are related, whether there's been multiple corruption
145 modification occurred between the corruption being written and when it was
159 As such, we cannot catch all types of corruption that can occur within a block
161 metadata, or there may be corruption of interblock relationships (e.g. corrupted
/linux-6.12.1/Documentation/driver-api/md/
Draid5-ppl.rst9 disks is missing. This can lead to silent data corruption when rebuilding the
36 silent data corruption. If a dirty disk of a stripe is lost, no PPL recovery is
/linux-6.12.1/Documentation/arch/sparc/
Dadi.rst97 Disrupting memory corruption
103 the corresponding cacheline, a memory corruption trap occurs. By
117 Precise memory corruption
123 the corresponding cacheline, a memory corruption trap occurs. If
/linux-6.12.1/Documentation/block/
Ddata-integrity.rst9 protect against data corruption. However, the detection of the
10 corruption is done at read time which could potentially be months
31 integrity of the I/O and reject it if corruption is detected. This
32 allows not only corruption prevention but also isolation of the point
/linux-6.12.1/Documentation/ABI/removed/
Dsysfs-mce23 better uptime with the risk of a crash or even corruption
/linux-6.12.1/drivers/memstick/core/
DKconfig15 in most cases result in data corruption.
/linux-6.12.1/mm/
DKconfig.debug19 slowdown, but helps to find certain types of memory corruption.
23 often happen for same reasons as memory corruption (e.g. double free,
32 incorrect warnings of memory corruption after a resume because free
131 entries are added and removed to user page tables, leaking, corruption
/linux-6.12.1/Documentation/gpu/amdgpu/display/
Ddc-debug.rst41 * There should **not** be any visual corruption
44 * There should **not** be any cursor corruption
/linux-6.12.1/Documentation/driver-api/
Dio_ordering.rst51 possible data corruption.
/linux-6.12.1/fs/ubifs/
Drecovery.c687 int corruption = first_non_ff(buf, len); in ubifs_recover_leb() local
694 lnum, offs, corruption); in ubifs_recover_leb()
696 offs += corruption; in ubifs_recover_leb()
697 buf += corruption; in ubifs_recover_leb()
/linux-6.12.1/drivers/block/drbd/
DKconfig63 512 insert data corruption on receiving side
/linux-6.12.1/drivers/soc/samsung/
DKconfig71 corruption over suspend and resume. A smaller value will mean that
/linux-6.12.1/Documentation/userspace-api/
Dmseal.rst10 permission feature improves security stance on memory corruption bugs, i.e.
15 modifications. This is useful to mitigate memory corruption issues where a

12345