/mm/ |
D | zswap.c | 159 unsigned long value; member 961 static int zswap_is_page_same_filled(void *ptr, unsigned long *value) in zswap_is_page_same_filled() argument 971 *value = page[0]; in zswap_is_page_same_filled() 975 static void zswap_fill_page(void *ptr, unsigned long value) in zswap_fill_page() argument 980 memset_l(page, value, PAGE_SIZE / sizeof(unsigned long)); in zswap_fill_page() 995 unsigned long handle, value; in zswap_frontswap_store() local 1041 if (zswap_is_page_same_filled(src, &value)) { in zswap_frontswap_store() 1045 entry->value = value; in zswap_frontswap_store() 1151 zswap_fill_page(dst, entry->value); in zswap_frontswap_load()
|
D | Kconfig.debug | 45 Enable debug page memory allocations by default? This value 92 bool "Use zero for poisoning instead of debugging value" 95 Instead of using the existing poison value, fill the pages with
|
D | Kconfig | 313 a value of 65536 is reasonable and should cause no problems. 317 protection by setting the value to 0. 319 This value can be changed after boot using the 365 This option specifies the initial value of this option. The default 511 If unsure, leave the default value "7". 614 the given value, unless the RLIMIT_STACK hard limit is changed to a 615 smaller value in which case that is used. 617 A sane initial value is 80 MB.
|
D | shmem.c | 3204 new_xattr = simple_xattr_alloc(xattr->value, xattr->value_len); in shmem_initxattrs() 3240 const char *name, const void *value, in shmem_xattr_handler_set() argument 3246 return simple_xattr_set(&info->xattrs, name, value, size, flags); in shmem_xattr_handler_set() 3515 char *value = strchr(this_char,'='); in shmem_parse_options() local 3519 if (value) { in shmem_parse_options() 3520 *value++ = '\0'; in shmem_parse_options() 3521 len = strlen(value); in shmem_parse_options() 3523 err = vfs_parse_fs_string(fc, this_char, value, len); in shmem_parse_options()
|
D | huge_memory.c | 218 unsigned long value; in single_hugepage_flag_store() local 221 ret = kstrtoul(buf, 10, &value); in single_hugepage_flag_store() 224 if (value > 1) in single_hugepage_flag_store() 227 if (value) in single_hugepage_flag_store()
|
D | ksm.c | 3008 bool value; in use_zero_pages_store() local 3010 err = kstrtobool(buf, &value); in use_zero_pages_store() 3014 ksm_use_zero_pages = value; in use_zero_pages_store()
|
D | slub.c | 735 u8 *start, unsigned int value, unsigned int bytes) in check_bytes_and_report() argument 741 fault = memchr_inv(start, value, bytes); in check_bytes_and_report() 747 while (end > fault && end[-1] == value) in check_bytes_and_report() 752 fault, end - 1, fault[0], value); in check_bytes_and_report() 755 restore_bytes(s, what, value, fault, end); in check_bytes_and_report()
|
D | migrate.c | 1490 static int store_status(int __user *status, int start, int value, int nr) in store_status() argument 1493 if (put_user(value, status + start)) in store_status()
|
D | memcontrol.c | 6007 static int seq_puts_memcg_tunable(struct seq_file *m, unsigned long value) in seq_puts_memcg_tunable() argument 6009 if (value == PAGE_COUNTER_MAX) in seq_puts_memcg_tunable() 6012 seq_printf(m, "%llu\n", (u64)value * PAGE_SIZE); in seq_puts_memcg_tunable()
|
D | hugetlb.c | 694 unsigned long value) in set_vma_private_data() argument 696 vma->vm_private_data = (void *)value; in set_vma_private_data()
|
D | memory.c | 153 long value) in mm_trace_rss_stat() argument 158 if ((count & thresh_mask) != ((count - value) & thresh_mask)) in mm_trace_rss_stat()
|
/mm/kasan/ |
D | report.c | 210 unsigned long *value) in tokenize_frame_descr() argument 233 if (value != NULL && kstrtoul(token, 10, value)) { in tokenize_frame_descr()
|
D | common.c | 132 void kasan_poison_shadow(const void *address, size_t size, u8 value) in kasan_poison_shadow() argument 146 __memset(shadow_start, value, shadow_end - shadow_start); in kasan_poison_shadow()
|
D | kasan.h | 139 void kasan_poison_shadow(const void *address, size_t size, u8 value);
|