Home
last modified time | relevance | path

Searched refs:poison (Results 1 – 25 of 32) sorted by relevance

12

/linux/tools/testing/selftests/powerpc/tm/
H A Dtm-poison.c30 uint64_t poison = 0xdeadbeefc0dec0fe; in tm_poison_test() local
57 : : [poison] "r" (poison) : ); in tm_poison_test()
H A DMakefile8 tm-signal-context-force-tm tm-poison tm-signal-pagefault
29 $(OUTPUT)/tm-poison: CFLAGS += -m64
H A D.gitignore22 tm-poison
/linux/drivers/cxl/core/
H A Dmbox.c178 static void cxl_set_poison_cmd_enabled(struct cxl_poison_state *poison, in cxl_set_poison_cmd_enabled() argument
183 set_bit(CXL_POISON_ENABLED_LIST, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
186 set_bit(CXL_POISON_ENABLED_INJECT, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
189 set_bit(CXL_POISON_ENABLED_CLEAR, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
192 set_bit(CXL_POISON_ENABLED_SCAN_CAPS, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
195 set_bit(CXL_POISON_ENABLED_SCAN_MEDIA, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
198 set_bit(CXL_POISON_ENABLED_SCAN_RESULTS, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
772 cxl_set_poison_cmd_enabled(&mds->poison, opcode); in cxl_walk_cel()
1214 if (test_bit(CXL_POISON_ENABLED_LIST, mds->poison.enabled_cmds)) { in cxl_dev_state_identify()
1216 mds->poison.max_errors = min_t(u32, val, CXL_POISON_LIST_MAX); in cxl_dev_state_identify()
[all …]
/linux/Documentation/translations/zh_CN/mm/
H A Dhwpoison.rst42 该代码由mm/memory-failure.c中的高级处理程序、一个新的页面poison位和虚拟机中的
43 各种检查组成,用来处理poison的页面。
133 page-types -p `pidof usemem` --hwpoison # poison its pages
136 当指定时,只有在((page_flags & mask) == value)的情况下才会poison页面。
/linux/drivers/cxl/
H A Dmem.c133 if (test_bit(CXL_POISON_ENABLED_INJECT, mds->poison.enabled_cmds)) in cxl_mem_probe()
136 if (test_bit(CXL_POISON_ENABLED_CLEAR, mds->poison.enabled_cmds)) in cxl_mem_probe()
228 mds->poison.enabled_cmds)) in cxl_mem_visible()
/linux/kernel/
H A Dkstack_erase.c76 unsigned long poison) in __stackleak_poison() argument
79 *(unsigned long *)erase_low = poison; in __stackleak_poison()
/linux/tools/mm/
H A Dslabinfo.c35 int order, poison, reclaim_account, red_zone; member
93 int poison; variable
582 page_size << s->order, s->partial, onoff(s->poison), in report()
638 if (s->poison) in slabcache()
687 poison = 1; in debug_opt_scan()
701 if (poison) in debug_opt_scan()
703 poison = 1; in debug_opt_scan()
770 if (poison && !s->poison) { in slab_debug()
776 if (!poison && s->poison) { in slab_debug()
1273 slab->poison = get_obj("poison"); in read_slab_dir()
/linux/arch/arm64/kernel/
H A Dvdso.c207 __le32 poison = cpu_to_le32(COMPAT_SIGPAGE_POISON_WORD); in aarch32_alloc_sigpage() local
214 memset32(sigpage, (__force u32)poison, PAGE_SIZE / sizeof(poison)); in aarch32_alloc_sigpage()
/linux/drivers/gpu/drm/amd/amdgpu/
H A Damdgpu_cper.c112 bool poison, in amdgpu_cper_entry_fill_section_desc() argument
134 if (poison) in amdgpu_cper_entry_fill_section_desc()
174 bool poison; in amdgpu_cper_entry_fill_runtime_section() local
176 poison = sev != CPER_SEV_NON_FATAL_CORRECTED; in amdgpu_cper_entry_fill_runtime_section()
181 amdgpu_cper_entry_fill_section_desc(adev, section_desc, false, poison, in amdgpu_cper_entry_fill_runtime_section()
/linux/tools/testing/memblock/
H A Dinternal.h28 int poison, const char *s) in free_reserved_area() argument
/linux/tools/lib/bpf/
H A Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
H A Drelo_core.h53 bool poison; member
H A Dlibbpf_utils.c25 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
/linux/tools/perf/util/
H A Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
/linux/Documentation/mm/
H A Dhwpoison.rst42 a new page poison bit and various checks in the VM to handle poisoned
148 page-types -p `pidof usemem` --hwpoison # poison its pages
151 When specified, only poison pages if ((page_flags & mask) ==
/linux/mm/
H A DKconfig.debug29 fill the pages with poison patterns after free_pages() and verify
150 Fill the pages with poison patterns after free_pages() and verify
156 Note that "poison" here is not the same thing as the "HWPoison"
160 checking the poison pattern on alloc, you can boot the kernel with
/linux/Documentation/admin-guide/mm/
H A Dslab.rst70 example, here's how you can poison the dentry cache as well as all kmalloc
111 P poison
263 typically contain poison values. Any non-poison value shows a
/linux/Documentation/ABI/testing/
H A Dsysfs-bus-nfit183 the address (cache line) where the MCE happened to the poison
190 insert the address of the memory error into the poison and
H A Dsysfs-bus-cxl575 memdev driver retrieves the poison list from the device. The
577 in poison if accessed, and the source of the poison. This
H A Dsysfs-kernel-slab378 What: /sys/kernel/slab/<cache>/poison
384 The poison file specifies whether objects should be poisoned
/linux/Documentation/admin-guide/hw-vuln/
H A Dspectre.rst118 One other variant 2 attack vector is for the attacker to poison the
121 imbalanced subroutine call instructions might "poison" entries in the
134 Yet another variant 2 attack vector is for the attacker to poison the
203 A spectre variant 2 attacker can :ref:`poison <poison_btb>` the branch
284 For Spectre variant 2 attacks, rogue guests can :ref:`poison
/linux/arch/x86/kernel/
H A Dalternative.c1120 u32 poison = gen_endbr_poison(); in poison_endbr() local
1131 DUMP_BYTES(ENDBR, ((u8*)&poison), 4, "%px: repl: ", addr); in poison_endbr()
1132 text_poke_early(addr, &poison, 4); in poison_endbr()
/linux/arch/x86/kvm/vmx/
H A Dpmu_intel.c55 #pragma GCC poison to_vmx
/linux/include/linux/
H A Dmm.h3492 int poison, const char *s);
3519 static inline unsigned long free_initmem_default(int poison) in free_initmem_default() argument
3524 poison, "unused kernel image (initmem)"); in free_initmem_default()

12