Searched refs:poisoned (Results 1 - 20 of 20) sorted by relevance
/linux-4.1.27/include/linux/ |
H A D | page_ext.h | 18 * PAGE_EXT_DEBUG_POISON is set for poisoned pages. This is used to 20 * poison patterns and set this flag after free_pages(). The poisoned 26 PAGE_EXT_DEBUG_POISON, /* Page is poisoned */
|
H A D | swapops.h | 168 * Support for hardware poisoned pages
|
H A D | page-flags.h | 107 PG_hwpoison, /* hardware poisoned page. Don't touch */
|
H A D | swap.h | 64 * Handling of hardware poisoned pages with memory corruption.
|
H A D | mm.h | 1044 #define VM_FAULT_HWPOISON 0x0010 /* Hit poisoned small page */ 1045 #define VM_FAULT_HWPOISON_LARGE 0x0020 /* Hit poisoned large page. Index encoded in upper bits */ 1644 * into the buddy system. The freed pages will be poisoned with pattern 1684 * The freed pages will be poisoned with pattern "poison" if it's within
|
H A D | usb.h | 1249 unsigned int poisoned:1; member in struct:usb_anchor
|
/linux-4.1.27/mm/ |
H A D | memory-failure.c | 251 * Kill all processes that have a poisoned page mapped and then isolate 552 [MSG_POISONED_HUGE] = "huge page already hardware poisoned", 955 "MCE %#lx: keeping poisoned page in swap cache\n", pfn); hwpoison_user_mappings() 980 * ppage: poisoned page hwpoison_user_mappings() 982 * ppage == real poisoned page; hwpoison_user_mappings() 1027 /* THP is split, so ppage should be the real poisoned page. */ hwpoison_user_mappings() 1056 * any accesses to the poisoned memory. hwpoison_user_mappings() 1121 printk(KERN_ERR "MCE %#lx: already hardware poisoned\n", pfn); memory_failure() 1417 * unpoison_memory - Unpoison a previously poisoned page 1420 * Software-unpoison a page that has been poisoned by 1586 pr_info("soft offline: %#lx hugepage already poisoned\n", pfn); soft_offline_huge_page() 1646 pr_info("soft offline: %#lx page already poisoned\n", pfn); __soft_offline_page() 1737 pr_info("soft offline: %#lx page already poisoned\n", pfn); soft_offline_page()
|
H A D | page_alloc.c | 307 /* Don't complain about poisoned pages */ bad_page()
|
/linux-4.1.27/arch/ia64/kernel/ |
H A D | mca_drv.c | 106 * mca_page_isolate - isolate a poisoned page in order not to use it later 107 * @paddr: poisoned memory location 152 * @paddr: poisoned address received from MCA Handler 426 /* e.g. a load from poisoned memory */ is_mca_global()
|
/linux-4.1.27/drivers/usb/core/ |
H A D | urb.c | 132 if (unlikely(anchor->poisoned)) { usb_anchor_urb() 781 * this allows all outstanding URBs to be poisoned starting 783 * poisoned 793 anchor->poisoned = 1; usb_poison_anchored_urbs() 825 anchor->poisoned = 0; usb_unpoison_anchored_urbs()
|
/linux-4.1.27/drivers/edac/ |
H A D | ghes_edac.c | 395 p += sprintf(p, "A read was issued to data that has been poisoned "); ghes_edac_report_mem_error()
|
/linux-4.1.27/arch/ia64/include/asm/ |
H A D | pal.h | 509 dp : 1, /* Data poisoned on MBE */ 583 dp : 1, /* Data poisoned on MBE */
|
/linux-4.1.27/drivers/isdn/i4l/ |
H A D | isdn_bsdcomp.c | 217 * or if it looks as if it has been poisoned bsd_check()
|
/linux-4.1.27/drivers/net/ppp/ |
H A D | bsd_comp.c | 265 * or if it looks as if it has been poisoned bsd_check()
|
/linux-4.1.27/drivers/net/wireless/b43/ |
H A D | dma.c | 1676 b43dbg(ring->dev->wl, "DMA RX: Dropping poisoned buffer.\n"); dma_rx()
|
/linux-4.1.27/drivers/net/ethernet/broadcom/ |
H A D | bgmac.c | 452 bgmac_err(bgmac, "Found poisoned packet at slot %d, DMA issue!\n", bgmac_dma_rx_read()
|
/linux-4.1.27/drivers/scsi/ |
H A D | constants.c | 844 {0x4B11, "PCIe poisoned tlp received"},
|
/linux-4.1.27/arch/x86/kernel/cpu/mcheck/ |
H A D | mce.c | 1195 * doomed. We still need to mark the page as poisoned and alert any do_machine_check()
|
/linux-4.1.27/arch/ia64/hp/common/ |
H A D | sba_iommu.c | 86 ** used for spill-over is poisoned, so that should help debugging somewhat.
|
/linux-4.1.27/drivers/usb/gadget/function/ |
H A D | f_fs.c | 219 * not use it at all. Let's provide some poisoned pointer to catch __ffs_ep0_queue_wait()
|
Completed in 1094 milliseconds