Home
last modified time | relevance | path

Searched refs:poison (Results 1 – 25 of 59) sorted by relevance

123

/openbmc/qemu/include/exec/
H A Dpoison.h9 #pragma GCC poison TARGET_I386
10 #pragma GCC poison TARGET_X86_64
11 #pragma GCC poison TARGET_AARCH64
12 #pragma GCC poison TARGET_ALPHA
13 #pragma GCC poison TARGET_ARM
14 #pragma GCC poison TARGET_HEXAGON
15 #pragma GCC poison TARGET_HPPA
16 #pragma GCC poison TARGET_LOONGARCH64
17 #pragma GCC poison TARGET_M68K
18 #pragma GCC poison TARGET_MICROBLAZE
[all …]
/openbmc/linux/Documentation/ABI/testing/
H A Ddebugfs-cxl7 attribute, the memdev driver sends an inject poison command to
9 aligned and the length of the injected poison is 64-bytes. If
10 successful, the device returns poison when the address is
11 accessed through the CXL.mem bus. Injecting poison adds the
13 to Injected. In addition, the device adds a poison creation
16 It is not an error to inject poison into an address that
17 already has poison present and no error is returned. The
28 attribute, the memdev driver sends a clear poison command to
29 the device for the specified address. Clearing poison removes
32 poison from an address that does not have poison set. If the
[all …]
/openbmc/openbmc/poky/meta/recipes-devtools/binutils/binutils/
H A D0006-warn-for-uses-of-system-directories-when-cross-linki.patch10 * ld.texinfo (--error-poison-system-directories): Document.
17 (ld_options): Add --error-poison-system-directories.
25 * ld.texinfo (--no-poison-system-directories): Document.
32 (ld_options): Add --no-poison-system-directories.
42 * configure.in (--enable-poison-system-directories): New option.
95 + --enable-poison-system-directories
104 +# Check whether --enable-poison-system-directories was given.
128 +AC_ARG_ENABLE([poison-system-directories],
129 + AS_HELP_STRING([--enable-poison-system-directories],
169 +@kindex --no-poison-system-directories
[all …]
/openbmc/openbmc/poky/meta/recipes-devtools/gcc/gcc/
H A D0002-gcc-poison-system-directories.patch4 Subject: [PATCH] gcc: poison-system-directories
12 wants this to be a failure, they can add "-Werror=poison-system-directories".
80 + --enable-poison-system-directories
89 +# Check whether --enable-poison-system-directories was given.
116 +AC_ARG_ENABLE([poison-system-directories],
117 + AS_HELP_STRING([--enable-poison-system-directories],
128 + AC_DEFINE([POISON_BY_DEFAULT], [1], [Define to make poison warnings errors])
143 +-Wno-poison-system-directories
151 +@opindex Wno-poison-system-directories
152 +@item -Wno-poison-system-directories
[all …]
/openbmc/linux/tools/testing/selftests/powerpc/tm/
H A Dtm-poison.c30 uint64_t poison = 0xdeadbeefc0dec0fe; in tm_poison_test() local
57 : : [poison] "r" (poison) : ); in tm_poison_test()
H A DMakefile8 tm-signal-context-force-tm tm-poison tm-signal-pagefault
28 $(OUTPUT)/tm-poison: CFLAGS += -m64
H A D.gitignore22 tm-poison
/openbmc/linux/drivers/cxl/core/
H A Dmbox.c173 static void cxl_set_poison_cmd_enabled(struct cxl_poison_state *poison, in cxl_set_poison_cmd_enabled() argument
178 set_bit(CXL_POISON_ENABLED_LIST, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
181 set_bit(CXL_POISON_ENABLED_INJECT, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
184 set_bit(CXL_POISON_ENABLED_CLEAR, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
187 set_bit(CXL_POISON_ENABLED_SCAN_CAPS, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
190 set_bit(CXL_POISON_ENABLED_SCAN_MEDIA, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
193 set_bit(CXL_POISON_ENABLED_SCAN_RESULTS, poison->enabled_cmds); in cxl_set_poison_cmd_enabled()
726 cxl_set_poison_cmd_enabled(&mds->poison, opcode); in cxl_walk_cel()
1117 if (test_bit(CXL_POISON_ENABLED_LIST, mds->poison.enabled_cmds)) { in cxl_dev_state_identify()
1119 mds->poison.max_errors = min_t(u32, val, CXL_POISON_LIST_MAX); in cxl_dev_state_identify()
[all …]
/openbmc/linux/drivers/gpu/drm/i915/gt/
H A Dselftest_lrc.c789 u32 poison; member
804 arg->ce[0]->lrc_reg_state[CTX_TIMESTAMP] = arg->poison; in __lrc_timestamp()
828 if (!timestamp_advanced(arg->poison, slot[1])) { in __lrc_timestamp()
831 arg->poison, slot[1]); in __lrc_timestamp()
854 const u32 poison[] = { in live_lrc_timestamp() local
893 for (i = 0; i < ARRAY_SIZE(poison); i++) { in live_lrc_timestamp()
894 data.poison = poison[i]; in live_lrc_timestamp()
950 static u32 safe_poison(u32 offset, u32 poison) in safe_poison() argument
958 poison &= ~REG_BIT(0); in safe_poison()
960 return poison; in safe_poison()
[all …]
/openbmc/linux/Documentation/translations/zh_CN/mm/
H A Dhwpoison.rst42 该代码由mm/memory-failure.c中的高级处理程序、一个新的页面poison位和虚拟机中的
43 各种检查组成,用来处理poison的页面。
133 page-types -p `pidof usemem` --hwpoison # poison its pages
136 当指定时,只有在((page_flags & mask) == value)的情况下才会poison页面。
/openbmc/qemu/qapi/
H A Dcxl.json197 # @cxl-inject-poison:
203 # mechanism enables testing of the OS handling of poison records which
210 # @length: Length of poison to inject; must be a multiple of 64 bytes.
214 { 'command': 'cxl-inject-poison',
250 # @poison-received: Received poison from the peer.
275 'poison-received',
332 # @cache-poison-received: Received poison from a peer on CXL.cache.
334 # @mem-poison-received: Received poison from a peer on CXL.mem
345 'cache-poison-received',
346 'mem-poison-received',
/openbmc/linux/drivers/cxl/
H A Dmem.c135 if (test_bit(CXL_POISON_ENABLED_INJECT, mds->poison.enabled_cmds)) in cxl_mem_probe()
138 if (test_bit(CXL_POISON_ENABLED_CLEAR, mds->poison.enabled_cmds)) in cxl_mem_probe()
226 mds->poison.enabled_cmds)) in cxl_mem_visible()
/openbmc/linux/arch/s390/include/asm/
H A Dprocessor.h124 unsigned long poison) in __stackleak_poison() argument
150 : [poison] "d" (poison) in __stackleak_poison()
/openbmc/linux/kernel/
H A Dstackleak.c76 unsigned long poison) in __stackleak_poison() argument
79 *(unsigned long *)erase_low = poison; in __stackleak_poison()
/openbmc/linux/tools/mm/
H A Dslabinfo.c35 int order, poison, reclaim_account, red_zone; member
93 int poison; variable
579 page_size << s->order, s->partial, onoff(s->poison), in report()
635 if (s->poison) in slabcache()
684 poison = 1; in debug_opt_scan()
698 if (poison) in debug_opt_scan()
700 poison = 1; in debug_opt_scan()
767 if (poison && !s->poison) { in slab_debug()
773 if (!poison && s->poison) { in slab_debug()
1266 slab->poison = get_obj("poison"); in read_slab_dir()
/openbmc/linux/tools/lib/bpf/
H A Drelo_core.c890 res->poison = false; in bpf_core_calc_relo()
953 res->poison = true; in bpf_core_calc_relo()
1033 if (res->poison) { in bpf_core_patch_insn()
1034 poison: in bpf_core_patch_insn()
1083 goto poison; in bpf_core_patch_insn()
1324 targ_res->poison = false; in bpf_core_calc_relo_insn()
1369 } else if (cand_res.poison != targ_res->poison || in bpf_core_calc_relo_insn()
1377 cand_res.poison ? "failure" : "success", in bpf_core_calc_relo_insn()
1379 targ_res->poison ? "failure" : "success", in bpf_core_calc_relo_insn()
H A Dstr_error.c8 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
H A Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
H A Dlibbpf_errno.c18 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
H A Drelo_core.h53 bool poison; member
/openbmc/linux/arch/x86/kernel/cpu/sgx/
H A Dmain.c77 if (page->poison) { in __sgx_sanitize_pages()
611 if (page->poison) in sgx_free_epc_page()
646 section->pages[i].poison = 0; in sgx_setup_epc_section()
707 if (page->poison) in arch_memory_failure()
710 page->poison = 1; in arch_memory_failure()
H A Dsgx.h35 u16 poison; member
/openbmc/linux/arch/arm64/kernel/
H A Dvdso.c300 __le32 poison = cpu_to_le32(COMPAT_SIGPAGE_POISON_WORD); in aarch32_alloc_sigpage() local
307 memset32(sigpage, (__force u32)poison, PAGE_SIZE / sizeof(poison)); in aarch32_alloc_sigpage()
/openbmc/linux/tools/perf/util/
H A Dhashmap.c16 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
19 #pragma GCC poison reallocarray
/openbmc/openbmc/poky/meta/recipes-support/appstream/appstream/
H A D0001-remove-hardcoded-path.patch9 | cc1: error: include location "/usr/include" is unsafe for cross-compilation [-Werror=poison-syste…

123