/linux/tools/testing/selftests/powerpc/tm/ |
A D | tm-poison.c | 30 uint64_t poison = 0xdeadbeefc0dec0fe; in tm_poison_test() local 57 : : [poison] "r" (poison) : ); in tm_poison_test()
|
A D | Makefile | 8 tm-signal-context-force-tm tm-poison tm-signal-pagefault 28 $(OUTPUT)/tm-poison: CFLAGS += -m64
|
A D | .gitignore | 22 tm-poison
|
/linux/drivers/gpu/drm/i915/gt/ |
A D | selftest_lrc.c | 751 u32 poison; member 793 arg->poison, slot[1]); in __lrc_timestamp() 816 const u32 poison[] = { in live_lrc_timestamp() local 855 for (i = 0; i < ARRAY_SIZE(poison); i++) { in live_lrc_timestamp() 856 data.poison = poison[i]; in live_lrc_timestamp() 1121 *cs++ = poison; in load_context() 1144 batch = load_context(ce, poison); in poison_registers() 1194 u32 poison) in compare_isolation() argument 1271 poison, lrc[dw + 1]); in compare_isolation() 1359 err = poison_registers(B, poison, sema); in __lrc_isolation() [all …]
|
/linux/tools/lib/bpf/ |
A D | relo_core.c | 750 bool poison; member 785 res->poison = false; in bpf_core_calc_relo() 848 res->poison = true; in bpf_core_calc_relo() 928 if (res->poison) { in bpf_core_patch_insn() 929 poison: in bpf_core_patch_insn() 976 goto poison; in bpf_core_patch_insn() 1190 targ_res.poison = false; in bpf_core_apply_relo_insn() 1238 } else if (cand_res.poison != targ_res.poison || cand_res.new_val != targ_res.new_val) { in bpf_core_apply_relo_insn() 1245 cand_res.poison ? "failure" : "success", cand_res.new_val, in bpf_core_apply_relo_insn() 1246 targ_res.poison ? "failure" : "success", targ_res.new_val); in bpf_core_apply_relo_insn()
|
A D | str_error.c | 8 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
A D | hashmap.c | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
A D | libbpf_errno.c | 18 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
A D | libbpf_internal.h | 22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 25 #pragma GCC poison reallocarray
|
/linux/tools/vm/ |
A D | slabinfo.c | 35 int order, poison, reclaim_account, red_zone; member 93 int poison; variable 555 page_size << s->order, s->partial, onoff(s->poison), in report() 611 if (s->poison) in slabcache() 660 poison = 1; in debug_opt_scan() 674 if (poison) in debug_opt_scan() 676 poison = 1; in debug_opt_scan() 743 if (poison && !s->poison) { in slab_debug() 749 if (!poison && s->poison) { in slab_debug() 1230 slab->poison = get_obj("poison"); in read_slab_dir()
|
/linux/mm/ |
A D | Kconfig.debug | 29 fill the pages with poison patterns after free_pages() and verify 68 Fill the pages with poison patterns after free_pages() and verify 74 Note that "poison" here is not the same thing as the "HWPoison" 78 checking the poison pattern on alloc, you can boot the kernel with
|
/linux/arch/arm64/kernel/ |
A D | vdso.c | 326 __le32 poison = cpu_to_le32(COMPAT_SIGPAGE_POISON_WORD); in aarch32_alloc_sigpage() local 333 memset32(sigpage, (__force u32)poison, PAGE_SIZE / sizeof(poison)); in aarch32_alloc_sigpage()
|
/linux/tools/perf/util/ |
A D | hashmap.c | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
/linux/Documentation/vm/ |
A D | hwpoison.rst | 44 a new page poison bit and various checks in the VM to handle poisoned 151 page-types -p `pidof usemem` --hwpoison # poison its pages 154 When specified, only poison pages if ((page_flags & mask) ==
|
A D | slub.rst | 73 example, here's how you can poison the dentry cache as well as all kmalloc 114 P poison 255 typically contain poison values. Any non-poison value shows a
|
/linux/Documentation/ABI/testing/ |
A D | sysfs-bus-nfit | 183 the address (cache line) where the MCE happened to the poison 190 insert the address of the memory error into the poison and
|
A D | sysfs-kernel-slab | 377 What: /sys/kernel/slab/<cache>/poison 383 The poison file specifies whether objects should be poisoned
|
/linux/tools/bpf/bpftool/ |
A D | main.h | 22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
/linux/arch/arm64/kvm/hyp/nvhe/ |
A D | .stub.nvhe.o.cmd | 65 include/linux/poison.h \
|
/linux/Documentation/admin-guide/hw-vuln/ |
A D | spectre.rst | 118 One other variant 2 attack vector is for the attacker to poison the 121 imbalanced subroutine call instructions might "poison" entries in the 191 A spectre variant 2 attacker can :ref:`poison <poison_btb>` the branch 272 For Spectre variant 2 attacks, rogue guests can :ref:`poison
|
/linux/include/linux/ |
A D | mm.h | 2498 int poison, const char *s); 2527 static inline unsigned long free_initmem_default(int poison) in free_initmem_default() argument 2532 poison, "unused kernel image (initmem)"); in free_initmem_default()
|
/linux/lib/ |
A D | .plist.o.cmd | 204 include/linux/poison.h \
|
A D | .list_sort.o.cmd | 236 include/linux/poison.h \
|
A D | .irq_regs.o.cmd | 216 include/linux/poison.h \
|
/linux/security/ |
A D | Kconfig.hardening | 159 the stack initialized to the poison value, which both reduces
|