Home
last modified time | relevance | path

Searched refs:poison (Results 1 – 25 of 43) sorted by relevance

12

/linux-6.12.1/Documentation/ABI/testing/
Ddebugfs-cxl7 attribute, the memdev driver sends an inject poison command to
9 aligned and the length of the injected poison is 64-bytes. If
10 successful, the device returns poison when the address is
11 accessed through the CXL.mem bus. Injecting poison adds the
13 to Injected. In addition, the device adds a poison creation
16 It is not an error to inject poison into an address that
17 already has poison present and no error is returned. If the
29 attribute, the memdev driver sends a clear poison command to
30 the device for the specified address. Clearing poison removes
33 poison from an address that does not have poison set. If the
[all …]
/linux-6.12.1/tools/testing/selftests/powerpc/tm/
Dtm-poison.c30 uint64_t poison = 0xdeadbeefc0dec0fe; in tm_poison_test() local
57 : : [poison] "r" (poison) : ); in tm_poison_test()
DMakefile8 tm-signal-context-force-tm tm-poison tm-signal-pagefault
29 $(OUTPUT)/tm-poison: CFLAGS += -m64
D.gitignore22 tm-poison
/linux-6.12.1/drivers/cxl/core/
Dmbox.c177 static void cxl_set_poison_cmd_enabled(struct cxl_poison_state *poison, in cxl_set_poison_cmd_enabled() argument
182 set_bit(CXL_POISON_ENABLED_LIST, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
185 set_bit(CXL_POISON_ENABLED_INJECT, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
188 set_bit(CXL_POISON_ENABLED_CLEAR, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
191 set_bit(CXL_POISON_ENABLED_SCAN_CAPS, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
194 set_bit(CXL_POISON_ENABLED_SCAN_MEDIA, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
197 set_bit(CXL_POISON_ENABLED_SCAN_RESULTS, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
745 cxl_set_poison_cmd_enabled(&mds->poison, opcode); in cxl_walk_cel()
1151 if (test_bit(CXL_POISON_ENABLED_LIST, mds->poison.enabled_cmds)) { in cxl_dev_state_identify()
1153 mds->poison.max_errors = min_t(u32, val, CXL_POISON_LIST_MAX); in cxl_dev_state_identify()
[all …]
/linux-6.12.1/Documentation/translations/zh_CN/mm/
Dhwpoison.rst42 该代码由mm/memory-failure.c中的高级处理程序、一个新的页面poison位和虚拟机中的
43 各种检查组成,用来处理poison的页面。
133 page-types -p `pidof usemem` --hwpoison # poison its pages
136 当指定时,只有在((page_flags & mask) == value)的情况下才会poison页面。
/linux-6.12.1/drivers/gpu/drm/i915/gt/
Dselftest_lrc.c789 u32 poison; member
804 arg->ce[0]->lrc_reg_state[CTX_TIMESTAMP] = arg->poison; in __lrc_timestamp()
828 if (!timestamp_advanced(arg->poison, slot[1])) { in __lrc_timestamp()
831 arg->poison, slot[1]); in __lrc_timestamp()
854 const u32 poison[] = { in live_lrc_timestamp() local
893 for (i = 0; i < ARRAY_SIZE(poison); i++) { in live_lrc_timestamp()
894 data.poison = poison[i]; in live_lrc_timestamp()
950 static u32 safe_poison(u32 offset, u32 poison) in safe_poison() argument
958 poison &= ~REG_BIT(0); in safe_poison()
960 return poison; in safe_poison()
[all …]
/linux-6.12.1/drivers/cxl/
Dmem.c133 if (test_bit(CXL_POISON_ENABLED_INJECT, mds->poison.enabled_cmds)) in cxl_mem_probe()
136 if (test_bit(CXL_POISON_ENABLED_CLEAR, mds->poison.enabled_cmds)) in cxl_mem_probe()
224 mds->poison.enabled_cmds)) in cxl_mem_visible()
/linux-6.12.1/kernel/
Dstackleak.c75 unsigned long poison) in __stackleak_poison() argument
78 *(unsigned long *)erase_low = poison; in __stackleak_poison()
/linux-6.12.1/tools/mm/
Dslabinfo.c35 int order, poison, reclaim_account, red_zone; member
93 int poison; variable
579 page_size << s->order, s->partial, onoff(s->poison), in report()
635 if (s->poison) in slabcache()
684 poison = 1; in debug_opt_scan()
698 if (poison) in debug_opt_scan()
700 poison = 1; in debug_opt_scan()
767 if (poison && !s->poison) { in slab_debug()
773 if (!poison && s->poison) { in slab_debug()
1266 slab->poison = get_obj("poison"); in read_slab_dir()
/linux-6.12.1/arch/s390/include/asm/
Dprocessor.h146 unsigned long poison) in __stackleak_poison() argument
173 : [poison] "d" (poison) in __stackleak_poison()
/linux-6.12.1/arch/arm64/kernel/
Dvdso.c291 __le32 poison = cpu_to_le32(COMPAT_SIGPAGE_POISON_WORD); in aarch32_alloc_sigpage() local
298 memset32(sigpage, (__force u32)poison, PAGE_SIZE / sizeof(poison)); in aarch32_alloc_sigpage()
/linux-6.12.1/tools/lib/bpf/
Drelo_core.c890 res->poison = false; in bpf_core_calc_relo()
953 res->poison = true; in bpf_core_calc_relo()
1033 if (res->poison) { in bpf_core_patch_insn()
1034 poison: in bpf_core_patch_insn()
1083 goto poison; in bpf_core_patch_insn()
1324 targ_res->poison = false; in bpf_core_calc_relo_insn()
1369 } else if (cand_res.poison != targ_res->poison || in bpf_core_calc_relo_insn()
1377 cand_res.poison ? "failure" : "success", in bpf_core_calc_relo_insn()
1379 targ_res->poison ? "failure" : "success", in bpf_core_calc_relo_insn()
Dstr_error.c9 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
Dlibbpf_errno.c18 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
Drelo_core.h53 bool poison; member
Dlibbpf_internal.h37 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
40 #pragma GCC poison reallocarray
/linux-6.12.1/arch/x86/kernel/cpu/sgx/
Dmain.c78 if (page->poison) { in __sgx_sanitize_pages()
612 if (page->poison) in sgx_free_epc_page()
647 section->pages[i].poison = 0; in sgx_setup_epc_section()
708 if (page->poison) in arch_memory_failure()
711 page->poison = 1; in arch_memory_failure()
Dsgx.h35 u16 poison; member
/linux-6.12.1/tools/perf/util/
Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
/linux-6.12.1/Documentation/mm/
Dhwpoison.rst42 a new page poison bit and various checks in the VM to handle poisoned
148 page-types -p `pidof usemem` --hwpoison # poison its pages
151 When specified, only poison pages if ((page_flags & mask) ==
Dslub.rst71 example, here's how you can poison the dentry cache as well as all kmalloc
112 P poison
255 typically contain poison values. Any non-poison value shows a
/linux-6.12.1/drivers/gpu/drm/amd/amdkfd/
Dkfd_int_process_v11.c203 if (atomic_read(&p->poison)) { in event_interrupt_poison_consumption_v11()
208 atomic_set(&p->poison, 1); in event_interrupt_poison_consumption_v11()
/linux-6.12.1/mm/
DKconfig.debug29 fill the pages with poison patterns after free_pages() and verify
150 Fill the pages with poison patterns after free_pages() and verify
156 Note that "poison" here is not the same thing as the "HWPoison"
160 checking the poison pattern on alloc, you can boot the kernel with

12