Home
last modified time | relevance | path

Searched refs:poisoned (Results 1 – 7 of 7) sorted by relevance

/Linux-v5.4/Documentation/ABI/testing/
Dsysfs-memory-page-offline17 The page must be still accessible, not poisoned. The
35 to access this page assuming it's poisoned by the
Dsysfs-kernel-slab381 The poison file specifies whether objects should be poisoned
/Linux-v5.4/drivers/usb/core/
Durb.c134 if (unlikely(anchor->poisoned)) in usb_anchor_urb()
820 anchor->poisoned = 1; in usb_poison_anchored_urbs()
852 anchor->poisoned = 0; in usb_unpoison_anchored_urbs()
/Linux-v5.4/Documentation/admin-guide/hw-vuln/
Dspectre.rst193 After entering the kernel, the kernel could use the poisoned branch
202 The kernel can protect itself against consuming poisoned branch
253 a deeper call stack. Any poisoned entries in the return stack buffer
277 for indirect branches to bypass the poisoned branch target buffer,
299 stack buffer. Such poisoned entries could be used to influence
483 This protects them from consuming poisoned entries in the branch
516 poisoned entries in branch target buffer left by rogue guests. It also
518 stack buffer underflow so poisoned branch target buffer could be used,
519 or attacker guests leaving poisoned entries in the return stack buffer.
/Linux-v5.4/Documentation/vm/
Dhwpoison.rst11 (``MCA recovery``). This requires the OS to declare a page "poisoned",
44 a new page poison bit and various checks in the VM to handle poisoned
/Linux-v5.4/include/linux/
Dusb.h1354 unsigned int poisoned:1; member
/Linux-v5.4/Documentation/driver-api/
Dlibata.rst519 2. ``ap->active_tag`` and ``qc->tag`` are poisoned.