Searched full:accessible (Results 1 – 25 of 169) sorted by relevance
1234567
/Documentation/virt/kvm/devices/ |
D | vm.rst | 42 :Returns: -EFAULT if the given address is not accessible; 75 :Returns: -EFAULT if the given address is not accessible from kernel space; 100 -EFAULT if the given address is not accessible from kernel space; 120 :Returns: -EFAULT if the given address is not accessible from kernel space; 133 :Returns: -EFAULT if the given address is not accessible from kernel space; 176 :Returns: -EFAULT if the given address is not accessible from kernel space; 199 :Returns: -EFAULT if the given address is not accessible from kernel space; 216 :Returns: -EFAULT if the given address is not accessible from kernel space; 227 :Returns: -EFAULT if the given address is not accessible from kernel space 240 :Returns: -EFAULT if the given address is not accessible from kernel space; [all …]
|
/Documentation/virt/kvm/ |
D | s390-pv-boot.rst | 9 The memory of Protected Virtual Machines (PVMs) is not accessible to 11 access the memory of a PVM, that memory must be made accessible. 12 Memory made accessible to the hypervisor will be encrypted. See
|
/Documentation/core-api/ |
D | memory-allocation.rst | 61 will be directly accessible by the kernel and implies that the 65 but it is not required to be directly accessible by the kernel. An 70 must be directly accessible by the kernel. 81 used to ensure that the allocated memory is accessible by hardware
|
/Documentation/filesystems/ |
D | romfs.rst | 50 structure is very simple. Every accessible structure begins on 16 67 8 | full size | The number of accessible bytes in this fs. 82 bytes accessible from the start of this filesystem. The 4th longword 84 accessible, whichever is smaller). The applied algorithm is the same 116 they are never accessible for other than owner. The owner of every
|
/Documentation/admin-guide/pm/ |
D | strategies.rst | 35 be accessible. 56 accessible.
|
/Documentation/ABI/testing/ |
D | sysfs-firmware-dmi-tables | 16 presented as binary attributes and are accessible via:
|
D | sysfs-memory-page-offline | 17 The page must be still accessible, not poisoned. The
|
/Documentation/networking/ |
D | netfilter-sysctl.rst | 17 namespaces. This variable is only accessible from init_net.
|
/Documentation/process/ |
D | development-process.rst | 24 accessible to those who are not intimately familiar with Linux kernel
|
/Documentation/arm/sa1100/ |
D | lart.rst | 7 other StrongARM-gadgets. Almost all SA signals are directly accessible
|
/Documentation/admin-guide/nfs/ |
D | pnfs-scsi-server.rst | 14 file system must sit on a SCSI LUN that is accessible to the clients in
|
D | pnfs-block-server.rst | 13 file system must sit on shared storage (typically iSCSI) that is accessible
|
/Documentation/devicetree/bindings/iommu/ |
D | rockchip,iommu.txt | 17 - clocks : A list of clocks required for the IOMMU to be accessible by
|
/Documentation/driver-api/mmc/ |
D | mmc-dev-parts.rst | 40 not accessible through sysfs in order to avoid accidental or malicious
|
/Documentation/w1/slaves/ |
D | w1_ds28e04.rst | 37 The 2 PIOs of the DS28E04-100 are accessible via the "pio" sysfs file.
|
/Documentation/devicetree/bindings/media/i2c/ |
D | imi,rdacm2x-gmsl.yaml | 23 accessible by the host SoC by direct addressing. 27 the serializer local I2C bus while the image sensor is not accessible from
|
/Documentation/vm/ |
D | free_page_reporting.rst | 29 accessible to the allocator. Once the report function has been completed
|
/Documentation/devicetree/bindings/arm/ |
D | coresight-cpu-debug.txt | 39 domain are accessible.
|
/Documentation/devicetree/bindings/mtd/ |
D | nxp-spifi.txt | 6 mode. In memory mode the Flash is accessible from the CPU as
|
/Documentation/userspace-api/media/v4l/ |
D | dev-osd.rst | 16 The OSD function is accessible through the same character special file 40 accessible as a framebuffer device (``/dev/fbN``). Given a V4L2 device,
|
/Documentation/devicetree/bindings/remoteproc/ |
D | wkup_m3_rproc.txt | 14 (l4_wkup) through which it is accessible to the MPU.
|
/Documentation/dev-tools/ |
D | kasan.rst | 140 granule is encoded in one shadow byte. Those 8 bytes can be accessible, 141 partially accessible, freed or be a part of a redzone. KASAN uses the following 143 memory region are accessible; number N (1 <= N <= 7) means that the first N 144 bytes are accessible, and other (8 - N) bytes are not; any negative value 150 the accessed address is partially accessible. For tag-based KASAN modes this
|
/Documentation/devicetree/bindings/bus/ |
D | baikal,bt1-axi.yaml | 23 accessible by means of the Baikal-T1 System Controller.
|
/Documentation/powerpc/ |
D | cxlflash.rst | 70 | User Accessible | 74 | Trusted Process accessible | 77 | Trusted Process accessible | 246 When a LUN is accessible from more than one port, this ioctl will 318 context (still resident/accessible in the parent process) following the
|
/Documentation/ide/ |
D | ide-tape.rst | 25 include/linux/mtio.h, is accessible through the character device.
|
1234567