| /Linux-v5.15/tools/testing/selftests/powerpc/tm/ |
| D | tm-poison.c | 30 uint64_t poison = 0xdeadbeefc0dec0fe; in tm_poison_test() local 57 : : [poison] "r" (poison) : ); in tm_poison_test()
|
| D | Makefile | 8 tm-signal-context-force-tm tm-poison tm-signal-pagefault 28 $(OUTPUT)/tm-poison: CFLAGS += -m64
|
| D | .gitignore | 22 tm-poison
|
| /Linux-v5.15/drivers/gpu/drm/i915/gt/ |
| D | selftest_lrc.c | 751 u32 poison; member 766 arg->ce[0]->lrc_reg_state[CTX_TIMESTAMP] = arg->poison; in __lrc_timestamp() 790 if (!timestamp_advanced(arg->poison, slot[1])) { in __lrc_timestamp() 793 arg->poison, slot[1]); in __lrc_timestamp() 816 const u32 poison[] = { in live_lrc_timestamp() local 855 for (i = 0; i < ARRAY_SIZE(poison); i++) { in live_lrc_timestamp() 856 data.poison = poison[i]; in live_lrc_timestamp() 1077 static struct i915_vma *load_context(struct intel_context *ce, u32 poison) in load_context() argument 1121 *cs++ = poison; in load_context() 1137 static int poison_registers(struct intel_context *ce, u32 poison, u32 *sema) in poison_registers() argument [all …]
|
| /Linux-v5.15/tools/lib/bpf/ |
| D | relo_core.c | 750 bool poison; member 785 res->poison = false; in bpf_core_calc_relo() 848 res->poison = true; in bpf_core_calc_relo() 928 if (res->poison) { in bpf_core_patch_insn() 929 poison: in bpf_core_patch_insn() 976 goto poison; in bpf_core_patch_insn() 1190 targ_res.poison = false; in bpf_core_apply_relo_insn() 1238 } else if (cand_res.poison != targ_res.poison || cand_res.new_val != targ_res.new_val) { in bpf_core_apply_relo_insn() 1245 cand_res.poison ? "failure" : "success", cand_res.new_val, in bpf_core_apply_relo_insn() 1246 targ_res.poison ? "failure" : "success", targ_res.new_val); in bpf_core_apply_relo_insn()
|
| D | str_error.c | 8 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
| D | hashmap.c | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
| D | libbpf_errno.c | 18 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
| D | libbpf_internal.h | 20 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 23 #pragma GCC poison reallocarray
|
| /Linux-v5.15/tools/vm/ |
| D | slabinfo.c | 35 int order, poison, reclaim_account, red_zone; member 93 int poison; variable 555 page_size << s->order, s->partial, onoff(s->poison), in report() 611 if (s->poison) in slabcache() 660 poison = 1; in debug_opt_scan() 674 if (poison) in debug_opt_scan() 676 poison = 1; in debug_opt_scan() 743 if (poison && !s->poison) { in slab_debug() 749 if (!poison && s->poison) { in slab_debug() 1230 slab->poison = get_obj("poison"); in read_slab_dir()
|
| /Linux-v5.15/arch/arm64/kernel/ |
| D | vdso.c | 326 __le32 poison = cpu_to_le32(COMPAT_SIGPAGE_POISON_WORD); in aarch32_alloc_sigpage() local 333 memset32(sigpage, (__force u32)poison, PAGE_SIZE / sizeof(poison)); in aarch32_alloc_sigpage()
|
| /Linux-v5.15/mm/ |
| D | Kconfig.debug | 29 fill the pages with poison patterns after free_pages() and verify 68 Fill the pages with poison patterns after free_pages() and verify 74 Note that "poison" here is not the same thing as the "HWPoison" 78 checking the poison pattern on alloc, you can boot the kernel with
|
| D | page_alloc.c | 8104 unsigned long free_reserved_area(void *start, void *end, int poison, const char *s) in free_reserved_area() argument 8128 if ((unsigned int)poison <= 0xFF) in free_reserved_area() 8129 memset(direct_map_addr, poison, PAGE_SIZE); in free_reserved_area()
|
| D | slub.c | 5557 SLAB_ATTR_RO(poison);
|
| /Linux-v5.15/tools/perf/util/ |
| D | hashmap.c | 16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64 19 #pragma GCC poison reallocarray
|
| /Linux-v5.15/Documentation/vm/ |
| D | hwpoison.rst | 44 a new page poison bit and various checks in the VM to handle poisoned 151 page-types -p `pidof usemem` --hwpoison # poison its pages 154 When specified, only poison pages if ((page_flags & mask) ==
|
| D | slub.rst | 73 example, here's how you can poison the dentry cache as well as all kmalloc 114 P poison 255 typically contain poison values. Any non-poison value shows a
|
| /Linux-v5.15/tools/bpf/bpftool/ |
| D | main.h | 22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
| /Linux-v5.15/Documentation/ABI/testing/ |
| D | sysfs-bus-nfit | 183 the address (cache line) where the MCE happened to the poison 190 insert the address of the memory error into the poison and
|
| D | sysfs-kernel-slab | 377 What: /sys/kernel/slab/cache/poison 383 The poison file specifies whether objects should be poisoned
|
| /Linux-v5.15/Documentation/admin-guide/hw-vuln/ |
| D | spectre.rst | 118 One other variant 2 attack vector is for the attacker to poison the 121 imbalanced subroutine call instructions might "poison" entries in the 191 A spectre variant 2 attacker can :ref:`poison <poison_btb>` the branch 272 For Spectre variant 2 attacks, rogue guests can :ref:`poison
|
| /Linux-v5.15/include/linux/ |
| D | mm.h | 2389 int poison, const char *s); 2418 static inline unsigned long free_initmem_default(int poison) in free_initmem_default() argument 2423 poison, "unused kernel image (initmem)"); in free_initmem_default()
|
| /Linux-v5.15/security/ |
| D | Kconfig.hardening | 153 the stack initialized to the poison value, which both reduces
|
| /Linux-v5.15/Documentation/security/ |
| D | self-protection.rst | 305 When releasing memory, it is best to poison the contents, to avoid reuse
|
| /Linux-v5.15/Documentation/admin-guide/ |
| D | kernel-parameters.txt | 5167 may poison objects when not in use. Also tracks the
|