/linux-6.1.9/tools/testing/selftests/powerpc/tm/ |
D | tm-poison.c | 30 uint64_t poison = 0xdeadbeefc0dec0fe; in tm_poison_test() local 57 : : [poison] "r" (poison) : ); in tm_poison_test()
|
D | Makefile | 8 tm-signal-context-force-tm tm-poison tm-signal-pagefault 28 $(OUTPUT)/tm-poison: CFLAGS += -m64
|
D | .gitignore | 22 tm-poison
|
/linux-6.1.9/Documentation/translations/zh_CN/mm/ |
D | hwpoison.rst | 42 该代码由mm/memory-failure.c中的高级处理程序、一个新的页面poison位和虚拟机中的 43 各种检查组成,用来处理poison的页面。 133 page-types -p `pidof usemem` --hwpoison # poison its pages 136 当指定时,只有在((page_flags & mask) == value)的情况下才会poison页面。
|
/linux-6.1.9/drivers/gpu/drm/i915/gt/ |
D | selftest_lrc.c | 795 u32 poison; member 810 arg->ce[0]->lrc_reg_state[CTX_TIMESTAMP] = arg->poison; in __lrc_timestamp() 834 if (!timestamp_advanced(arg->poison, slot[1])) { in __lrc_timestamp() 837 arg->poison, slot[1]); in __lrc_timestamp() 860 const u32 poison[] = { in live_lrc_timestamp() local 899 for (i = 0; i < ARRAY_SIZE(poison); i++) { in live_lrc_timestamp() 900 data.poison = poison[i]; in live_lrc_timestamp() 956 static u32 safe_poison(u32 offset, u32 poison) in safe_poison() argument 964 poison &= ~REG_BIT(0); in safe_poison() 966 return poison; in safe_poison() [all …]
|
/linux-6.1.9/tools/vm/ |
D | slabinfo.c | 35 int order, poison, reclaim_account, red_zone; member 93 int poison; variable 577 page_size << s->order, s->partial, onoff(s->poison), in report() 633 if (s->poison) in slabcache() 682 poison = 1; in debug_opt_scan() 696 if (poison) in debug_opt_scan() 698 poison = 1; in debug_opt_scan() 765 if (poison && !s->poison) { in slab_debug() 771 if (!poison && s->poison) { in slab_debug() 1264 slab->poison = get_obj("poison"); in read_slab_dir()
|
/linux-6.1.9/arch/arm64/kernel/ |
D | vdso.c | 324 __le32 poison = cpu_to_le32(COMPAT_SIGPAGE_POISON_WORD); in aarch32_alloc_sigpage() local 331 memset32(sigpage, (__force u32)poison, PAGE_SIZE / sizeof(poison)); in aarch32_alloc_sigpage()
|
/linux-6.1.9/tools/lib/bpf/ |
D | str_error.c | 8 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
D | relo_core.c | 890 res->poison = false; in bpf_core_calc_relo() 953 res->poison = true; in bpf_core_calc_relo() 1033 if (res->poison) { in bpf_core_patch_insn() 1034 poison: in bpf_core_patch_insn() 1083 goto poison; in bpf_core_patch_insn() 1324 targ_res->poison = false; in bpf_core_calc_relo_insn() 1369 } else if (cand_res.poison != targ_res->poison || in bpf_core_calc_relo_insn() 1377 cand_res.poison ? "failure" : "success", in bpf_core_calc_relo_insn() 1379 targ_res->poison ? "failure" : "success", in bpf_core_calc_relo_insn()
|
D | hashmap.c | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
D | libbpf_errno.c | 18 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
D | relo_core.h | 53 bool poison; member
|
D | libbpf_internal.h | 21 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 24 #pragma GCC poison reallocarray
|
/linux-6.1.9/arch/x86/kernel/cpu/sgx/ |
D | main.c | 77 if (page->poison) { in __sgx_sanitize_pages() 610 if (page->poison) in sgx_free_epc_page() 645 section->pages[i].poison = 0; in sgx_setup_epc_section() 706 if (page->poison) in arch_memory_failure() 709 page->poison = 1; in arch_memory_failure()
|
D | sgx.h | 35 u16 poison; member
|
/linux-6.1.9/tools/perf/util/ |
D | hashmap.c | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
/linux-6.1.9/mm/ |
D | Kconfig.debug | 29 fill the pages with poison patterns after free_pages() and verify 125 Fill the pages with poison patterns after free_pages() and verify 131 Note that "poison" here is not the same thing as the "HWPoison" 135 checking the poison pattern on alloc, you can boot the kernel with
|
/linux-6.1.9/drivers/gpu/drm/amd/amdkfd/ |
D | kfd_int_process_v11.c | 200 if (atomic_read(&p->poison)) { in event_interrupt_poison_consumption_v11() 205 atomic_set(&p->poison, 1); in event_interrupt_poison_consumption_v11()
|
D | kfd_int_process_v9.c | 103 old_poison = atomic_cmpxchg(&p->poison, 0, 1); in event_interrupt_poison_consumption_v9()
|
/linux-6.1.9/Documentation/mm/ |
D | hwpoison.rst | 44 a new page poison bit and various checks in the VM to handle poisoned 150 page-types -p `pidof usemem` --hwpoison # poison its pages 153 When specified, only poison pages if ((page_flags & mask) ==
|
D | slub.rst | 73 example, here's how you can poison the dentry cache as well as all kmalloc 114 P poison 255 typically contain poison values. Any non-poison value shows a
|
/linux-6.1.9/tools/bpf/bpftool/ |
D | main.h | 22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
/linux-6.1.9/Documentation/ABI/testing/ |
D | sysfs-bus-nfit | 183 the address (cache line) where the MCE happened to the poison 190 insert the address of the memory error into the poison and
|
/linux-6.1.9/arch/x86/kernel/ |
D | alternative.c | 605 u32 endbr, poison = gen_endbr_poison(); in apply_ibt_endbr() local 620 DUMP_BYTES(((u8*)&poison), 4, "%px: repl: ", addr); in apply_ibt_endbr() 621 text_poke_early(addr, &poison, 4); in apply_ibt_endbr()
|
/linux-6.1.9/Documentation/admin-guide/hw-vuln/ |
D | spectre.rst | 118 One other variant 2 attack vector is for the attacker to poison the 121 imbalanced subroutine call instructions might "poison" entries in the 134 Yet another variant 2 attack vector is for the attacker to poison the 204 A spectre variant 2 attacker can :ref:`poison <poison_btb>` the branch 285 For Spectre variant 2 attacks, rogue guests can :ref:`poison
|