| /linux-6.15/fs/ubifs/ |
| H A D | scan.c | 290 goto corrupted; in ubifs_scan() 296 goto corrupted; in ubifs_scan() 317 goto corrupted; in ubifs_scan() 330 goto corrupted; in ubifs_scan() 335 corrupted: in ubifs_scan()
|
| /linux-6.15/Documentation/ABI/testing/ |
| H A D | sysfs-fs-ubifs | 9 with a corrupted magic number. 21 with a corrupted node type.
|
| /linux-6.15/fs/verity/ |
| H A D | verify.c | 208 goto corrupted; in verify_data_block() 228 goto corrupted; in verify_data_block() 231 corrupted: in verify_data_block()
|
| /linux-6.15/drivers/mtd/ubi/ |
| H A D | kapi.c | 75 vi->corrupted = vol->corrupted; in ubi_do_get_volume_info() 204 vol->corrupted = 1; in ubi_open_volume() 462 vol->corrupted = 1; in ubi_leb_read() 502 vol->corrupted = 1; in ubi_leb_read_sg()
|
| H A D | vmt.c | 32 __ATTR(corrupted, S_IRUGO, vol_attribute_show, NULL); 83 ret = sprintf(buf, "%d\n", vol->corrupted); in vol_attribute_show() 730 if (vol->upd_marker && vol->corrupted) { in self_check_volume() 760 if (vol->corrupted) { in self_check_volume()
|
| H A D | upd.c | 87 vol->corrupted = 0; in clear_update_marker()
|
| /linux-6.15/tools/testing/selftests/bpf/ |
| H A D | DENYLIST.s390x | 3 get_stack_raw_tp # user_stack corrupted user stack …
|
| /linux-6.15/drivers/gpu/drm/i915/gt/uc/ |
| H A D | intel_guc_ct.c | 446 goto corrupted; in ct_write() 455 goto corrupted; in ct_write() 461 goto corrupted; in ct_write() 516 corrupted: in ct_write() 916 goto corrupted; in ct_read() 926 goto corrupted; in ct_read() 933 goto corrupted; in ct_read() 962 goto corrupted; in ct_read() 994 corrupted: in ct_read()
|
| /linux-6.15/Documentation/mm/ |
| H A D | hwpoison.rst | 17 hardware as being corrupted usually due to a 2bit ECC memory or cache 20 This focusses on pages detected as corrupted in the background. 70 Send SIGBUS when the application runs into the corrupted page. 116 some early filtering to avoid corrupted unintended pages in test suites.
|
| /linux-6.15/arch/arm/mach-lpc32xx/ |
| H A D | suspend.S | 37 @ Save a copy of the used registers in IRAM, r0 is corrupted
|
| /linux-6.15/drivers/gpu/drm/xe/ |
| H A D | xe_guc_ct.c | 650 goto corrupted; in h2g_write() 660 goto corrupted; in h2g_write() 667 goto corrupted; in h2g_write() 674 goto corrupted; in h2g_write() 730 corrupted: in h2g_write() 1373 goto corrupted; in g2h_read() 1405 goto corrupted; in g2h_read() 1412 goto corrupted; in g2h_read() 1432 goto corrupted; in g2h_read() 1479 corrupted: in g2h_read()
|
| /linux-6.15/include/linux/mtd/ |
| H A D | ubi.h | 106 int corrupted; member
|
| /linux-6.15/Documentation/ABI/stable/ |
| H A D | sysfs-class-ubi | 154 What: /sys/class/ubi/ubiX/ubiX_Y/corrupted 160 if it is corrupted (e.g., due to an interrupted volume update). 212 checked using the "corrupted" sysfs file.
|
| /linux-6.15/Documentation/admin-guide/device-mapper/ |
| H A D | verity.rst | 79 Log corrupted blocks, but allow read operations to proceed normally. 82 Restart the system when a corrupted block is discovered. This option is 87 Panic the device when a corrupted block is discovered. This option is 184 corrupted data will be verified using the cryptographic hash of the
|
| /linux-6.15/Documentation/driver-api/md/ |
| H A D | raid5-cache.rst | 106 from the log. The sequence ID and checksum will help us detect corrupted meta 109 parities are incompleted, they are discarded. If part of data is corrupted,
|
| /linux-6.15/Documentation/i2c/ |
| H A D | gpio-fault-injection.rst | 101 should be corrupted and that should be detected properly. That means that the 106 corrupted. A good starting point for using this fault injector on an otherwise
|
| /linux-6.15/drivers/of/ |
| H A D | Kconfig | 35 leave the devicetree in a corrupted state.
|
| /linux-6.15/Documentation/userspace-api/ |
| H A D | mseal.rst | 16 corrupted pointer is passed to a memory management system. For example, 140 corrupted pointer is passed to a memory management system.
|
| /linux-6.15/Documentation/filesystems/xfs/ |
| H A D | xfs-self-describing-metadata.rst | 106 and/or corrupted, and how long ago that it was last modified. Knowing the owner 125 analysis is how recently the block was modified. Correlation of set of corrupted 142 the LSN we can tell if the corrupted metadata all belonged to the same log 161 metadata, or there may be corruption of interblock relationships (e.g. corrupted
|
| /linux-6.15/arch/arm64/boot/dts/freescale/ |
| H A D | imx8mm-kontron-bl-osm-s.dts | 80 * with corrupted data due to chip errata.
|
| /linux-6.15/Documentation/arch/arm64/ |
| H A D | kdump.rst | 7 Kdump mechanism is used to capture a corrupted kernel vmcore so that
|
| /linux-6.15/arch/m68k/math-emu/ |
| H A D | fp_entry.S | 113 | and the stack gets corrupted.
|
| /linux-6.15/tools/build/ |
| H A D | Build.include | 127 # delete partially updated (i.e. corrupted) files on error
|
| /linux-6.15/Documentation/filesystems/ |
| H A D | ocfs2-online-filecheck.rst | 17 filesystem is not corrupted further. The filesystem is not converted to
|
| H A D | hpfs.rst | 43 corrupted filesystems. check=strict means many superfluous checks - 290 1.95 Fixed one buffer leak, that could happen on corrupted filesystem 341 2.06 Fixed some crash on corrupted disk structures
|