/Linux-v5.10/tools/testing/selftests/powerpc/tm/ |
D | tm-poison.c | 31 uint64_t poison = 0xdeadbeefc0dec0fe; in tm_poison_test() local 57 : : [poison] "r" (poison) : ); in tm_poison_test()
|
D | Makefile | 8 tm-signal-context-force-tm tm-poison tm-signal-pagefault 28 $(OUTPUT)/tm-poison: CFLAGS += -m64
|
D | .gitignore | 22 tm-poison
|
/Linux-v5.10/mm/ |
D | Kconfig.debug | 29 fill the pages with poison patterns after free_pages() and verify 69 Fill the pages with poison patterns after free_pages() and verify 75 Note that "poison" here is not the same thing as the "HWPoison" 82 bool "Only poison, don't sanity check" 85 poison on free. This reduces some of the overhead of the 95 Instead of using the existing poison value, fill the pages with
|
D | page_alloc.c | 7582 unsigned long free_reserved_area(void *start, void *end, int poison, const char *s) in free_reserved_area() argument 7601 if ((unsigned int)poison <= 0xFF) in free_reserved_area() 7602 memset(direct_map_addr, poison, PAGE_SIZE); in free_reserved_area()
|
D | slub.c | 5239 SLAB_ATTR_RO(poison);
|
/Linux-v5.10/tools/vm/ |
D | slabinfo.c | 35 int order, poison, reclaim_account, red_zone; member 93 int poison; variable 555 page_size << s->order, s->partial, onoff(s->poison), in report() 611 if (s->poison) in slabcache() 660 poison = 1; in debug_opt_scan() 674 if (poison) in debug_opt_scan() 676 poison = 1; in debug_opt_scan() 743 if (poison && !s->poison) { in slab_debug() 749 if (!poison && s->poison) { in slab_debug() 1230 slab->poison = get_obj("poison"); in read_slab_dir()
|
/Linux-v5.10/tools/lib/bpf/ |
D | str_error.c | 8 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
D | hashmap.c | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
D | libbpf_errno.c | 17 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
D | libbpf_internal.h | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
D | libbpf.c | 5235 bool poison; member 5270 res->poison = false; in bpf_core_calc_relo() 5333 res->poison = true; in bpf_core_calc_relo() 5430 if (res->poison) { in bpf_core_patch_insn() 5431 poison: in bpf_core_patch_insn() 5478 goto poison; in bpf_core_patch_insn() 5710 targ_res.poison = false; in bpf_core_apply_relo() 5772 } else if (cand_res.poison != targ_res.poison || cand_res.new_val != targ_res.new_val) { in bpf_core_apply_relo() 5779 cand_res.poison ? "failure" : "success", cand_res.new_val, in bpf_core_apply_relo() 5780 targ_res.poison ? "failure" : "success", targ_res.new_val); in bpf_core_apply_relo()
|
/Linux-v5.10/tools/perf/util/ |
D | hashmap.c | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
/Linux-v5.10/Documentation/vm/ |
D | hwpoison.rst | 44 a new page poison bit and various checks in the VM to handle poisoned 151 page-types -p `pidof usemem` --hwpoison # poison its pages 154 When specified, only poison pages if ((page_flags & mask) ==
|
D | slub.rst | 73 example, here's how you can poison the dentry cache as well as all kmalloc 114 P poison 255 typically contain poison values. Any non-poison value shows a
|
/Linux-v5.10/drivers/gpu/drm/i915/gt/ |
D | selftest_lrc.c | 5384 u32 poison; member 5399 arg->ce[0]->lrc_reg_state[CTX_TIMESTAMP] = arg->poison; in __lrc_timestamp() 5423 if (!timestamp_advanced(arg->poison, slot[1])) { in __lrc_timestamp() 5426 arg->poison, slot[1]); in __lrc_timestamp() 5449 const u32 poison[] = { in live_lrc_timestamp() local 5488 for (i = 0; i < ARRAY_SIZE(poison); i++) { in live_lrc_timestamp() 5489 data.poison = poison[i]; in live_lrc_timestamp() 5710 static struct i915_vma *load_context(struct intel_context *ce, u32 poison) in load_context() argument 5754 *cs++ = poison; in load_context() 5770 static int poison_registers(struct intel_context *ce, u32 poison, u32 *sema) in poison_registers() argument [all …]
|
/Linux-v5.10/tools/bpf/bpftool/ |
D | main.h | 22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
/Linux-v5.10/Documentation/ABI/testing/ |
D | sysfs-bus-nfit | 183 the address (cache line) where the MCE happened to the poison 190 insert the address of the memory error into the poison and
|
D | sysfs-kernel-slab | 377 What: /sys/kernel/slab/cache/poison 383 The poison file specifies whether objects should be poisoned
|
/Linux-v5.10/Documentation/admin-guide/hw-vuln/ |
D | spectre.rst | 118 One other variant 2 attack vector is for the attacker to poison the 121 imbalanced subroutine call instructions might "poison" entries in the 191 A spectre variant 2 attacker can :ref:`poison <poison_btb>` the branch 272 For Spectre variant 2 attacks, rogue guests can :ref:`poison
|
/Linux-v5.10/include/linux/ |
D | mm.h | 2342 int poison, const char *s); 2383 static inline unsigned long free_initmem_default(int poison) in free_initmem_default() argument 2388 poison, "unused kernel"); in free_initmem_default()
|
/Linux-v5.10/security/ |
D | Kconfig.hardening | 141 the stack initialized to the poison value, which both reduces
|
/Linux-v5.10/Documentation/security/ |
D | self-protection.rst | 305 When releasing memory, it is best to poison the contents, to avoid reuse
|
/Linux-v5.10/Documentation/admin-guide/ |
D | kernel-parameters.txt | 4846 may poison objects when not in use. Also tracks the
|