Home
last modified time | relevance | path

Searched refs:poison (Results 1 – 25 of 33) sorted by relevance

12

/linux-6.3-rc2/tools/testing/selftests/powerpc/tm/
A Dtm-poison.c30 uint64_t poison = 0xdeadbeefc0dec0fe; in tm_poison_test() local
57 : : [poison] "r" (poison) : ); in tm_poison_test()
A DMakefile8 tm-signal-context-force-tm tm-poison tm-signal-pagefault
28 $(OUTPUT)/tm-poison: CFLAGS += -m64
A D.gitignore22 tm-poison
/linux-6.3-rc2/Documentation/translations/zh_CN/mm/
A Dhwpoison.rst42 该代码由mm/memory-failure.c中的高级处理程序、一个新的页面poison位和虚拟机中的
43 各种检查组成,用来处理poison的页面。
133 page-types -p `pidof usemem` --hwpoison # poison its pages
136 当指定时,只有在((page_flags & mask) == value)的情况下才会poison页面。
/linux-6.3-rc2/drivers/gpu/drm/i915/gt/
A Dselftest_lrc.c789 u32 poison; member
831 arg->poison, slot[1]); in __lrc_timestamp()
854 const u32 poison[] = { in live_lrc_timestamp() local
894 data.poison = poison[i]; in live_lrc_timestamp()
958 poison &= ~REG_BIT(0); in safe_poison()
960 return poison; in safe_poison()
1192 poison); in load_context()
1215 batch = load_context(ce, poison); in poison_registers()
1265 u32 poison) in compare_isolation() argument
1353 poison, lrc[dw + 1]); in compare_isolation()
[all …]
/linux-6.3-rc2/tools/mm/
A Dslabinfo.c35 int order, poison, reclaim_account, red_zone; member
93 int poison; variable
579 page_size << s->order, s->partial, onoff(s->poison), in report()
635 if (s->poison) in slabcache()
684 poison = 1; in debug_opt_scan()
698 if (poison) in debug_opt_scan()
700 poison = 1; in debug_opt_scan()
767 if (poison && !s->poison) { in slab_debug()
773 if (!poison && s->poison) { in slab_debug()
1266 slab->poison = get_obj("poison"); in read_slab_dir()
/linux-6.3-rc2/arch/arm64/kernel/
A Dvdso.c300 __le32 poison = cpu_to_le32(COMPAT_SIGPAGE_POISON_WORD); in aarch32_alloc_sigpage() local
307 memset32(sigpage, (__force u32)poison, PAGE_SIZE / sizeof(poison)); in aarch32_alloc_sigpage()
/linux-6.3-rc2/tools/lib/bpf/
A Dstr_error.c8 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
A Drelo_core.c890 res->poison = false; in bpf_core_calc_relo()
953 res->poison = true; in bpf_core_calc_relo()
1033 if (res->poison) { in bpf_core_patch_insn()
1034 poison: in bpf_core_patch_insn()
1083 goto poison; in bpf_core_patch_insn()
1324 targ_res->poison = false; in bpf_core_calc_relo_insn()
1369 } else if (cand_res.poison != targ_res->poison || in bpf_core_calc_relo_insn()
1377 cand_res.poison ? "failure" : "success", in bpf_core_calc_relo_insn()
1379 targ_res->poison ? "failure" : "success", in bpf_core_calc_relo_insn()
A Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
A Dlibbpf_errno.c18 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
A Drelo_core.h53 bool poison; member
A Dlibbpf_internal.h21 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
24 #pragma GCC poison reallocarray strlcpy
/linux-6.3-rc2/arch/x86/kernel/cpu/sgx/
A Dmain.c77 if (page->poison) { in __sgx_sanitize_pages()
610 if (page->poison) in sgx_free_epc_page()
645 section->pages[i].poison = 0; in sgx_setup_epc_section()
706 if (page->poison) in arch_memory_failure()
709 page->poison = 1; in arch_memory_failure()
A Dsgx.h35 u16 poison; member
/linux-6.3-rc2/tools/perf/util/
A Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
/linux-6.3-rc2/drivers/gpu/drm/amd/amdkfd/
A Dkfd_int_process_v11.c200 if (atomic_read(&p->poison)) { in event_interrupt_poison_consumption_v11()
205 atomic_set(&p->poison, 1); in event_interrupt_poison_consumption_v11()
A Dkfd_int_process_v9.c103 old_poison = atomic_cmpxchg(&p->poison, 0, 1); in event_interrupt_poison_consumption_v9()
/linux-6.3-rc2/Documentation/mm/
A Dhwpoison.rst42 a new page poison bit and various checks in the VM to handle poisoned
148 page-types -p `pidof usemem` --hwpoison # poison its pages
151 When specified, only poison pages if ((page_flags & mask) ==
A Dslub.rst71 example, here's how you can poison the dentry cache as well as all kmalloc
112 P poison
255 typically contain poison values. Any non-poison value shows a
/linux-6.3-rc2/mm/
A DKconfig.debug29 fill the pages with poison patterns after free_pages() and verify
125 Fill the pages with poison patterns after free_pages() and verify
131 Note that "poison" here is not the same thing as the "HWPoison"
135 checking the poison pattern on alloc, you can boot the kernel with
/linux-6.3-rc2/tools/bpf/bpftool/
A Dmain.h22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
/linux-6.3-rc2/Documentation/ABI/testing/
A Dsysfs-bus-nfit183 the address (cache line) where the MCE happened to the poison
190 insert the address of the memory error into the poison and
/linux-6.3-rc2/arch/x86/kernel/
A Dalternative.c660 u32 endbr, poison = gen_endbr_poison(); in poison_endbr() local
676 DUMP_BYTES(((u8*)&poison), 4, "%px: repl: ", addr); in poison_endbr()
677 text_poke_early(addr, &poison, 4); in poison_endbr()
/linux-6.3-rc2/Documentation/admin-guide/hw-vuln/
A Dspectre.rst118 One other variant 2 attack vector is for the attacker to poison the
121 imbalanced subroutine call instructions might "poison" entries in the
134 Yet another variant 2 attack vector is for the attacker to poison the
204 A spectre variant 2 attacker can :ref:`poison <poison_btb>` the branch
285 For Spectre variant 2 attacks, rogue guests can :ref:`poison

Completed in 46 milliseconds

12