Home
last modified time | relevance | path

Searched refs:poison (Results 1 – 24 of 24) sorted by relevance

/kernel/linux/linux-5.10/tools/testing/selftests/powerpc/tm/
Dtm-poison.c31 uint64_t poison = 0xdeadbeefc0dec0fe; in tm_poison_test() local
57 : : [poison] "r" (poison) : ); in tm_poison_test()
DMakefile8 tm-signal-context-force-tm tm-poison tm-signal-pagefault
28 $(OUTPUT)/tm-poison: CFLAGS += -m64
D.gitignore22 tm-poison
/kernel/linux/linux-5.10/mm/
DKconfig.debug29 fill the pages with poison patterns after free_pages() and verify
69 Fill the pages with poison patterns after free_pages() and verify
75 Note that "poison" here is not the same thing as the "HWPoison"
82 bool "Only poison, don't sanity check"
85 poison on free. This reduces some of the overhead of the
95 Instead of using the existing poison value, fill the pages with
Dpage_alloc.c7756 unsigned long free_reserved_area(void *start, void *end, int poison, const char *s) in free_reserved_area() argument
7775 if ((unsigned int)poison <= 0xFF) in free_reserved_area()
7776 memset(direct_map_addr, poison, PAGE_SIZE); in free_reserved_area()
Dslub.c5243 SLAB_ATTR_RO(poison);
/kernel/linux/linux-5.10/tools/vm/
Dslabinfo.c35 int order, poison, reclaim_account, red_zone; member
93 int poison; variable
555 page_size << s->order, s->partial, onoff(s->poison), in report()
611 if (s->poison) in slabcache()
660 poison = 1; in debug_opt_scan()
674 if (poison) in debug_opt_scan()
676 poison = 1; in debug_opt_scan()
743 if (poison && !s->poison) { in slab_debug()
749 if (!poison && s->poison) { in slab_debug()
1242 slab->poison = get_obj("poison"); in read_slab_dir()
/kernel/linux/linux-5.10/tools/lib/bpf/
Dstr_error.c8 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
Dlibbpf_errno.c17 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
Dlibbpf_internal.h16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
Dlibbpf.c5297 bool poison; member
5332 res->poison = false; in bpf_core_calc_relo()
5395 res->poison = true; in bpf_core_calc_relo()
5492 if (res->poison) { in bpf_core_patch_insn()
5493 poison: in bpf_core_patch_insn()
5540 goto poison; in bpf_core_patch_insn()
5772 targ_res.poison = false; in bpf_core_apply_relo()
5834 } else if (cand_res.poison != targ_res.poison || cand_res.new_val != targ_res.new_val) { in bpf_core_apply_relo()
5841 cand_res.poison ? "failure" : "success", cand_res.new_val, in bpf_core_apply_relo()
5842 targ_res.poison ? "failure" : "success", targ_res.new_val); in bpf_core_apply_relo()
/kernel/linux/linux-5.10/tools/perf/util/
Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
/kernel/linux/linux-5.10/Documentation/vm/
Dhwpoison.rst44 a new page poison bit and various checks in the VM to handle poisoned
151 page-types -p `pidof usemem` --hwpoison # poison its pages
154 When specified, only poison pages if ((page_flags & mask) ==
Dslub.rst73 example, here's how you can poison the dentry cache as well as all kmalloc
114 P poison
255 typically contain poison values. Any non-poison value shows a
/kernel/linux/linux-5.10/drivers/gpu/drm/i915/gt/
Dselftest_lrc.c5384 u32 poison; member
5399 arg->ce[0]->lrc_reg_state[CTX_TIMESTAMP] = arg->poison; in __lrc_timestamp()
5423 if (!timestamp_advanced(arg->poison, slot[1])) { in __lrc_timestamp()
5426 arg->poison, slot[1]); in __lrc_timestamp()
5449 const u32 poison[] = { in live_lrc_timestamp() local
5488 for (i = 0; i < ARRAY_SIZE(poison); i++) { in live_lrc_timestamp()
5489 data.poison = poison[i]; in live_lrc_timestamp()
5710 static struct i915_vma *load_context(struct intel_context *ce, u32 poison) in load_context() argument
5754 *cs++ = poison; in load_context()
5770 static int poison_registers(struct intel_context *ce, u32 poison, u32 *sema) in poison_registers() argument
[all …]
/kernel/linux/linux-5.10/tools/bpf/bpftool/
Dmain.h22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
/kernel/linux/linux-5.10/Documentation/ABI/testing/
Dsysfs-bus-nfit183 the address (cache line) where the MCE happened to the poison
190 insert the address of the memory error into the poison and
Dsysfs-kernel-slab377 What: /sys/kernel/slab/cache/poison
383 The poison file specifies whether objects should be poisoned
/kernel/linux/linux-5.10/Documentation/admin-guide/hw-vuln/
Dspectre.rst118 One other variant 2 attack vector is for the attacker to poison the
121 imbalanced subroutine call instructions might "poison" entries in the
134 Yet another variant 2 attack vector is for the attacker to poison the
204 A spectre variant 2 attacker can :ref:`poison <poison_btb>` the branch
285 For Spectre variant 2 attacks, rogue guests can :ref:`poison
/kernel/linux/linux-5.10/include/linux/
Dmm.h2404 int poison, const char *s);
2445 static inline unsigned long free_initmem_default(int poison) in free_initmem_default() argument
2450 poison, "unused kernel"); in free_initmem_default()
/kernel/linux/linux-5.10/security/
DKconfig.hardening162 the stack initialized to the poison value, which both reduces
/kernel/linux/linux-5.10/Documentation/security/
Dself-protection.rst305 When releasing memory, it is best to poison the contents, to avoid reuse
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dkernel-parameters.txt4973 may poison objects when not in use. Also tracks the