Home
last modified time | relevance | path

Searched refs:poison (Results 1 – 25 of 2661) sorted by relevance

12345678910>>...107

/linux/tools/testing/selftests/powerpc/tm/
A Dtm-poison.c30 uint64_t poison = 0xdeadbeefc0dec0fe; in tm_poison_test() local
57 : : [poison] "r" (poison) : ); in tm_poison_test()
A DMakefile8 tm-signal-context-force-tm tm-poison tm-signal-pagefault
28 $(OUTPUT)/tm-poison: CFLAGS += -m64
A D.gitignore22 tm-poison
/linux/drivers/gpu/drm/i915/gt/
A Dselftest_lrc.c751 u32 poison; member
793 arg->poison, slot[1]); in __lrc_timestamp()
816 const u32 poison[] = { in live_lrc_timestamp() local
855 for (i = 0; i < ARRAY_SIZE(poison); i++) { in live_lrc_timestamp()
856 data.poison = poison[i]; in live_lrc_timestamp()
1121 *cs++ = poison; in load_context()
1144 batch = load_context(ce, poison); in poison_registers()
1194 u32 poison) in compare_isolation() argument
1271 poison, lrc[dw + 1]); in compare_isolation()
1359 err = poison_registers(B, poison, sema); in __lrc_isolation()
[all …]
/linux/tools/lib/bpf/
A Drelo_core.c750 bool poison; member
785 res->poison = false; in bpf_core_calc_relo()
848 res->poison = true; in bpf_core_calc_relo()
928 if (res->poison) { in bpf_core_patch_insn()
929 poison: in bpf_core_patch_insn()
976 goto poison; in bpf_core_patch_insn()
1190 targ_res.poison = false; in bpf_core_apply_relo_insn()
1238 } else if (cand_res.poison != targ_res.poison || cand_res.new_val != targ_res.new_val) { in bpf_core_apply_relo_insn()
1245 cand_res.poison ? "failure" : "success", cand_res.new_val, in bpf_core_apply_relo_insn()
1246 targ_res.poison ? "failure" : "success", targ_res.new_val); in bpf_core_apply_relo_insn()
A Dstr_error.c8 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
A Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
A Dlibbpf_errno.c18 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
A Dlibbpf_internal.h22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
25 #pragma GCC poison reallocarray
/linux/tools/vm/
A Dslabinfo.c35 int order, poison, reclaim_account, red_zone; member
93 int poison; variable
555 page_size << s->order, s->partial, onoff(s->poison), in report()
611 if (s->poison) in slabcache()
660 poison = 1; in debug_opt_scan()
674 if (poison) in debug_opt_scan()
676 poison = 1; in debug_opt_scan()
743 if (poison && !s->poison) { in slab_debug()
749 if (!poison && s->poison) { in slab_debug()
1230 slab->poison = get_obj("poison"); in read_slab_dir()
/linux/mm/
A DKconfig.debug29 fill the pages with poison patterns after free_pages() and verify
68 Fill the pages with poison patterns after free_pages() and verify
74 Note that "poison" here is not the same thing as the "HWPoison"
78 checking the poison pattern on alloc, you can boot the kernel with
/linux/arch/arm64/kernel/
A Dvdso.c326 __le32 poison = cpu_to_le32(COMPAT_SIGPAGE_POISON_WORD); in aarch32_alloc_sigpage() local
333 memset32(sigpage, (__force u32)poison, PAGE_SIZE / sizeof(poison)); in aarch32_alloc_sigpage()
/linux/tools/perf/util/
A Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
/linux/Documentation/vm/
A Dhwpoison.rst44 a new page poison bit and various checks in the VM to handle poisoned
151 page-types -p `pidof usemem` --hwpoison # poison its pages
154 When specified, only poison pages if ((page_flags & mask) ==
A Dslub.rst73 example, here's how you can poison the dentry cache as well as all kmalloc
114 P poison
255 typically contain poison values. Any non-poison value shows a
/linux/Documentation/ABI/testing/
A Dsysfs-bus-nfit183 the address (cache line) where the MCE happened to the poison
190 insert the address of the memory error into the poison and
A Dsysfs-kernel-slab377 What: /sys/kernel/slab/<cache>/poison
383 The poison file specifies whether objects should be poisoned
/linux/tools/bpf/bpftool/
A Dmain.h22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
/linux/arch/arm64/kvm/hyp/nvhe/
A D.stub.nvhe.o.cmd65 include/linux/poison.h \
/linux/Documentation/admin-guide/hw-vuln/
A Dspectre.rst118 One other variant 2 attack vector is for the attacker to poison the
121 imbalanced subroutine call instructions might "poison" entries in the
191 A spectre variant 2 attacker can :ref:`poison <poison_btb>` the branch
272 For Spectre variant 2 attacks, rogue guests can :ref:`poison
/linux/include/linux/
A Dmm.h2498 int poison, const char *s);
2527 static inline unsigned long free_initmem_default(int poison) in free_initmem_default() argument
2532 poison, "unused kernel image (initmem)"); in free_initmem_default()
/linux/lib/
A D.plist.o.cmd204 include/linux/poison.h \
A D.list_sort.o.cmd236 include/linux/poison.h \
A D.irq_regs.o.cmd216 include/linux/poison.h \
/linux/security/
A DKconfig.hardening159 the stack initialized to the poison value, which both reduces

Completed in 62 milliseconds

12345678910>>...107