/openbmc/linux/Documentation/ABI/stable/ |
H A D | sysfs-devices-node | 190 The total number of raw poisoned pages (pages containing 197 Of the raw poisoned pages on a NUMA node, how many pages are 206 Of the raw poisoned pages on a NUMA node, how many pages are 214 Of the raw poisoned pages on a NUMA node, how many pages are 215 delayed by memory error recovery attempt. Delayed poisoned 222 Of the raw poisoned pages on a NUMA node, how many pages are
|
/openbmc/linux/tools/testing/selftests/lkdtm/ |
H A D | tests.txt | 23 READ_AFTER_FREE call trace:|Memory correctly poisoned 25 READ_BUDDY_AFTER_FREE call trace:|Memory correctly poisoned
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-memory-page-offline | 17 The page must be still accessible, not poisoned. The 35 to access this page assuming it's poisoned by the
|
H A D | sysfs-bus-cxl | 486 list consists of addresses that are poisoned, or would result
|
H A D | sysfs-kernel-slab | 383 The poison file specifies whether objects should be poisoned
|
/openbmc/linux/drivers/usb/core/ |
H A D | urb.c | 136 if (unlikely(anchor->poisoned)) in usb_anchor_urb() 853 anchor->poisoned = 1; in usb_poison_anchored_urbs() 889 anchor->poisoned = 0; in usb_unpoison_anchored_urbs()
|
/openbmc/openbmc/poky/meta-selftest/recipes-test/poison/ |
H A D | poison.bb | 29 …bb.error(f"{name} is not poisoned. Exit status {proc.returncode}, output: {proc.stdout} {proc.stde…
|
/openbmc/openbmc/poky/meta/recipes-devtools/gcc/gcc/ |
H A D | 0002-gcc-poison-system-directories.patch | 120 +AC_MSG_NOTICE([poisoned directories $enable_poison_system_directories]) 122 + AC_MSG_NOTICE([poisoned directories enabled]) 127 + AC_MSG_NOTICE([poisoned directories are fatal])
|
/openbmc/linux/Documentation/translations/zh_CN/mm/ |
H A D | hwpoison.rst | 20 一个页面"poisoned",杀死与之相关的进程,并避免在未来使用它。
|
/openbmc/linux/Documentation/admin-guide/hw-vuln/ |
H A D | spectre.rst | 205 After entering the kernel, the kernel could use the poisoned branch 214 The kernel can protect itself against consuming poisoned branch 265 a deeper call stack. Any poisoned entries in the return stack buffer 289 for indirect branches to bypass the poisoned branch target buffer, 311 stack buffer. Such poisoned entries could be used to influence 537 This protects them from consuming poisoned entries in the branch 572 poisoned entries in branch target buffer left by rogue guests. It also 574 stack buffer underflow so poisoned branch target buffer could be used, 575 or attacker guests leaving poisoned entries in the return stack buffer.
|
H A D | srso.rst | 156 poisoned BTB entry and using that safe one for all function returns.
|
/openbmc/linux/Documentation/dev-tools/ |
H A D | kmsan.rst | 134 When a new variable is allocated on the stack, it is poisoned by default by 137 ``__GFP_ZERO`` is also poisoned. 174 If a poisoned value is written into memory, its origin is written to the 310 ``__msan_warning()`` in the case that value is poisoned::
|
/openbmc/linux/Documentation/mm/ |
H A D | hwpoison.rst | 9 (``MCA recovery``). This requires the OS to declare a page "poisoned", 42 a new page poison bit and various checks in the VM to handle poisoned
|
/openbmc/openbmc/poky/documentation/migration-guides/ |
H A D | migration-1.8.rst | 108 ``gcc's`` default sysroot and include directories are now "poisoned". In
|
/openbmc/linux/include/linux/ |
H A D | usb.h | 1402 unsigned int poisoned:1; member
|
/openbmc/qemu/qapi/ |
H A D | cxl.json | 201 # locally detected errors (e.g. ECC failure) or poisoned writes
|
/openbmc/linux/Documentation/admin-guide/mm/ |
H A D | userfaultfd.rst | 259 still poisoned, even though it's on a new physical host which ostensibly
|
/openbmc/linux/Documentation/driver-api/ |
H A D | libata.rst | 483 2. ``ap->active_tag`` and ``qc->tag`` are poisoned.
|
/openbmc/linux/arch/x86/ |
H A D | Kconfig | 2608 where the branch history buffer is poisoned to speculatively steer
|
/openbmc/linux/kernel/bpf/ |
H A D | verifier.c | 240 bool poisoned = bpf_map_key_poisoned(aux); in bpf_map_key_store() local 243 (poisoned ? BPF_MAP_KEY_POISON : 0ULL); in bpf_map_key_store()
|