Searched refs:access (Results 1 – 6 of 6) sorted by relevance
/kernel/kcsan/ |
D | kcsan_test.c | 152 } access[2]; member 159 const bool is_assert = (r->access[0].type | r->access[1].type) & KCSAN_ACCESS_ASSERT; in __report_matches() 182 if (r->access[1].fn) { in __report_matches() 187 scnprintf(tmp[0], sizeof(tmp[0]), "%pS", r->access[0].fn); in __report_matches() 188 scnprintf(tmp[1], sizeof(tmp[1]), "%pS", r->access[1].fn); in __report_matches() 191 cmp < 0 ? r->access[0].fn : r->access[1].fn, in __report_matches() 192 cmp < 0 ? r->access[1].fn : r->access[0].fn); in __report_matches() 194 scnprintf(cur, end - cur, "%pS", r->access[0].fn); in __report_matches() 204 if (!r->access[1].fn) in __report_matches() 209 const int ty = r->access[i].type; in __report_matches() [all …]
|
/kernel/gcov/ |
D | Kconfig | 34 Note that the debugfs filesystem has to be mounted to access
|
/kernel/module/ |
D | Kconfig | 142 - Allows other modules to load if they don't violate the access to 145 -EACCES (Permission denied) if symbol access conditions are not met.
|
/kernel/power/ |
D | Kconfig | 209 Add extra sysfs attributes allowing one to access some Power Management 349 from which subsystems can access the energy models.
|
/kernel/bpf/ |
D | cgroup.c | 1521 short access, enum cgroup_bpf_attach_type atype) in __cgroup_bpf_check_dev_permission() argument 1525 .access_type = (access << 16) | dev_type, in __cgroup_bpf_check_dev_permission()
|
/kernel/trace/ |
D | Kconfig | 479 Mmiotrace traces Memory Mapped I/O access and is meant for
|