/Linux-v6.6/Documentation/ABI/testing/ |
D | debugfs-cxl | 7 attribute, the memdev driver sends an inject poison command to 9 aligned and the length of the injected poison is 64-bytes. If 10 successful, the device returns poison when the address is 11 accessed through the CXL.mem bus. Injecting poison adds the 13 to Injected. In addition, the device adds a poison creation 16 It is not an error to inject poison into an address that 17 already has poison present and no error is returned. The 28 attribute, the memdev driver sends a clear poison command to 29 the device for the specified address. Clearing poison removes 32 poison from an address that does not have poison set. If the [all …]
|
/Linux-v6.6/tools/testing/selftests/powerpc/tm/ |
D | tm-poison.c | 30 uint64_t poison = 0xdeadbeefc0dec0fe; in tm_poison_test() local 57 : : [poison] "r" (poison) : ); in tm_poison_test()
|
D | Makefile | 8 tm-signal-context-force-tm tm-poison tm-signal-pagefault 28 $(OUTPUT)/tm-poison: CFLAGS += -m64
|
D | .gitignore | 22 tm-poison
|
/Linux-v6.6/drivers/cxl/core/ |
D | mbox.c | 173 static void cxl_set_poison_cmd_enabled(struct cxl_poison_state *poison, in cxl_set_poison_cmd_enabled() argument 178 set_bit(CXL_POISON_ENABLED_LIST, poison->enabled_cmds); in cxl_set_poison_cmd_enabled() 181 set_bit(CXL_POISON_ENABLED_INJECT, poison->enabled_cmds); in cxl_set_poison_cmd_enabled() 184 set_bit(CXL_POISON_ENABLED_CLEAR, poison->enabled_cmds); in cxl_set_poison_cmd_enabled() 187 set_bit(CXL_POISON_ENABLED_SCAN_CAPS, poison->enabled_cmds); in cxl_set_poison_cmd_enabled() 190 set_bit(CXL_POISON_ENABLED_SCAN_MEDIA, poison->enabled_cmds); in cxl_set_poison_cmd_enabled() 193 set_bit(CXL_POISON_ENABLED_SCAN_RESULTS, poison->enabled_cmds); in cxl_set_poison_cmd_enabled() 726 cxl_set_poison_cmd_enabled(&mds->poison, opcode); in cxl_walk_cel() 1119 if (test_bit(CXL_POISON_ENABLED_LIST, mds->poison.enabled_cmds)) { in cxl_dev_state_identify() 1121 mds->poison.max_errors = min_t(u32, val, CXL_POISON_LIST_MAX); in cxl_dev_state_identify() [all …]
|
/Linux-v6.6/Documentation/translations/zh_CN/mm/ |
D | hwpoison.rst | 42 该代码由mm/memory-failure.c中的高级处理程序、一个新的页面poison位和虚拟机中的 43 各种检查组成,用来处理poison的页面。 133 page-types -p `pidof usemem` --hwpoison # poison its pages 136 当指定时,只有在((page_flags & mask) == value)的情况下才会poison页面。
|
/Linux-v6.6/drivers/gpu/drm/i915/gt/ |
D | selftest_lrc.c | 789 u32 poison; member 804 arg->ce[0]->lrc_reg_state[CTX_TIMESTAMP] = arg->poison; in __lrc_timestamp() 828 if (!timestamp_advanced(arg->poison, slot[1])) { in __lrc_timestamp() 831 arg->poison, slot[1]); in __lrc_timestamp() 854 const u32 poison[] = { in live_lrc_timestamp() local 893 for (i = 0; i < ARRAY_SIZE(poison); i++) { in live_lrc_timestamp() 894 data.poison = poison[i]; in live_lrc_timestamp() 950 static u32 safe_poison(u32 offset, u32 poison) in safe_poison() argument 958 poison &= ~REG_BIT(0); in safe_poison() 960 return poison; in safe_poison() [all …]
|
/Linux-v6.6/drivers/cxl/ |
D | mem.c | 135 if (test_bit(CXL_POISON_ENABLED_INJECT, mds->poison.enabled_cmds)) in cxl_mem_probe() 138 if (test_bit(CXL_POISON_ENABLED_CLEAR, mds->poison.enabled_cmds)) in cxl_mem_probe() 226 mds->poison.enabled_cmds)) in cxl_mem_visible()
|
/Linux-v6.6/kernel/ |
D | stackleak.c | 76 unsigned long poison) in __stackleak_poison() argument 79 *(unsigned long *)erase_low = poison; in __stackleak_poison()
|
/Linux-v6.6/arch/s390/include/asm/ |
D | processor.h | 124 unsigned long poison) in __stackleak_poison() argument 151 : [poison] "d" (poison) in __stackleak_poison()
|
/Linux-v6.6/tools/mm/ |
D | slabinfo.c | 35 int order, poison, reclaim_account, red_zone; member 93 int poison; variable 579 page_size << s->order, s->partial, onoff(s->poison), in report() 635 if (s->poison) in slabcache() 684 poison = 1; in debug_opt_scan() 698 if (poison) in debug_opt_scan() 700 poison = 1; in debug_opt_scan() 767 if (poison && !s->poison) { in slab_debug() 773 if (!poison && s->poison) { in slab_debug() 1266 slab->poison = get_obj("poison"); in read_slab_dir()
|
/Linux-v6.6/arch/arm64/kernel/ |
D | vdso.c | 300 __le32 poison = cpu_to_le32(COMPAT_SIGPAGE_POISON_WORD); in aarch32_alloc_sigpage() local 307 memset32(sigpage, (__force u32)poison, PAGE_SIZE / sizeof(poison)); in aarch32_alloc_sigpage()
|
/Linux-v6.6/arch/x86/kernel/cpu/sgx/ |
D | main.c | 77 if (page->poison) { in __sgx_sanitize_pages() 610 if (page->poison) in sgx_free_epc_page() 645 section->pages[i].poison = 0; in sgx_setup_epc_section() 706 if (page->poison) in arch_memory_failure() 709 page->poison = 1; in arch_memory_failure()
|
D | sgx.h | 35 u16 poison; member
|
/Linux-v6.6/tools/lib/bpf/ |
D | relo_core.c | 890 res->poison = false; in bpf_core_calc_relo() 953 res->poison = true; in bpf_core_calc_relo() 1033 if (res->poison) { in bpf_core_patch_insn() 1034 poison: in bpf_core_patch_insn() 1083 goto poison; in bpf_core_patch_insn() 1324 targ_res->poison = false; in bpf_core_calc_relo_insn() 1369 } else if (cand_res.poison != targ_res->poison || in bpf_core_calc_relo_insn() 1377 cand_res.poison ? "failure" : "success", in bpf_core_calc_relo_insn() 1379 targ_res->poison ? "failure" : "success", in bpf_core_calc_relo_insn()
|
D | str_error.c | 8 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
D | hashmap.c | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
D | libbpf_errno.c | 18 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
D | relo_core.h | 53 bool poison; member
|
D | libbpf_internal.h | 22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 25 #pragma GCC poison reallocarray
|
/Linux-v6.6/tools/perf/util/ |
D | hashmap.c | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
/Linux-v6.6/drivers/gpu/drm/amd/amdkfd/ |
D | kfd_int_process_v11.c | 201 if (atomic_read(&p->poison)) { in event_interrupt_poison_consumption_v11() 206 atomic_set(&p->poison, 1); in event_interrupt_poison_consumption_v11()
|
/Linux-v6.6/Documentation/mm/ |
D | hwpoison.rst | 42 a new page poison bit and various checks in the VM to handle poisoned 148 page-types -p `pidof usemem` --hwpoison # poison its pages 151 When specified, only poison pages if ((page_flags & mask) ==
|
/Linux-v6.6/mm/ |
D | Kconfig.debug | 29 fill the pages with poison patterns after free_pages() and verify 126 Fill the pages with poison patterns after free_pages() and verify 132 Note that "poison" here is not the same thing as the "HWPoison" 136 checking the poison pattern on alloc, you can boot the kernel with
|
/Linux-v6.6/tools/bpf/bpftool/ |
D | main.h | 22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|