Home
last modified time | relevance | path

Searched refs:access (Results 1 – 6 of 6) sorted by relevance

/lib/
DKconfig.kcsan35 also provides assertions to check data access constraints.
160 Currently disabled by default, because not all safe per-CPU access
182 If KCSAN should report races where only one access is known, and the
183 conflicting access is of unknown origin. This type of race is
185 change while an access is being delayed on a watchpoint.
226 races where at least one access is marked atomic will never be
Diomap.c39 static void bad_io_access(unsigned long port, const char *access) in bad_io_access() argument
44 WARN(1, KERN_ERR "Bad IO access at port %#lx (%s)\n", port, access); in bad_io_access()
DKconfig.kfence13 access, use-after-free, and invalid-free errors. KFENCE is designed
DKconfig.debug568 prompt "Debugfs default access"
572 This selects the default access restrictions for debugfs.
574 debugfs=[on,no-mount,off]. The restrictions apply for API access
591 bool "No access"
595 Client can then back-off or continue without debugfs access.
742 In order to access the kmemleak file, debugfs needs to be
921 bool "Debug access to per_cpu maps"
1740 this feature to remotely access the memory of the crashed machine
1745 firescope and access all memory below 4GB using fireproxy from gdb.
1769 bool "Filter access to /dev/mem"
[all …]
DKconfig.kasan134 Before every memory access compiler insert function call
DKconfig102 system can access the I/O devices with the mapped-logic PIO through