Lines Matching full:access
3 * KCSAN access checks and modifiers. These can be used to explicitly check
16 /* Access types -- if KCSAN_ACCESS_WRITE is not set, the access is a read. */
17 #define KCSAN_ACCESS_WRITE (1 << 0) /* Access is a write. */
19 #define KCSAN_ACCESS_ATOMIC (1 << 2) /* Access is atomic. */
21 #define KCSAN_ACCESS_ASSERT (1 << 3) /* Access is an assertion. */
22 #define KCSAN_ACCESS_SCOPED (1 << 4) /* Access is a scoped access. */
27 * to validate access to an address. Never use these in header files!
31 * __kcsan_check_access - check generic access for races
33 * @ptr: address of access
34 * @size: size of access
35 * @type: access type modifier
91 * kcsan_set_access_mask - set access mask
93 * Set the access mask for all accesses for the current context if non-zero.
100 /* Scoped access information. */
116 * kcsan_begin_scoped_access - begin scoped access
118 * Begin scoped access and initialize @sa, which will cause KCSAN to
126 * @ptr: address of access
127 * @size: size of access
128 * @type: access type modifier
129 * @sa: struct kcsan_scoped_access to use for the scope of the access
136 * kcsan_end_scoped_access - end scoped access
138 * End a scoped access, which will stop KCSAN checking the memory range.
191 * __kcsan_check_read - check regular read access for races
193 * @ptr: address of access
194 * @size: size of access
199 * __kcsan_check_write - check regular write access for races
201 * @ptr: address of access
202 * @size: size of access
208 * __kcsan_check_read_write - check regular read-write access for races
210 * @ptr: address of access
211 * @size: size of access
217 * kcsan_check_read - check regular read access for races
219 * @ptr: address of access
220 * @size: size of access
225 * kcsan_check_write - check regular write access for races
227 * @ptr: address of access
228 * @size: size of access
234 * kcsan_check_read_write - check regular read-write access for races
236 * @ptr: address of access
237 * @size: size of access
349 * For example, where exclusive access is expected after determining no other
414 * Note: The access that immediately follows ASSERT_EXCLUSIVE_BITS() is assumed
415 * to access the masked bits only, and KCSAN optimistically assumes it is