/Linux-v4.19/arch/um/kernel/ |
D | tlb.c | 37 } mprotect; member 80 ret = protect(hvc->id, op->u.mprotect.addr, in do_ops() 81 op->u.mprotect.len, op->u.mprotect.prot, in do_ops() 172 (last->u.mprotect.addr + last->u.mprotect.len == addr) && in add_mprotect() 173 (last->u.mprotect.prot == prot)) { in add_mprotect() 174 last->u.mprotect.len += len; in add_mprotect() 186 .u = { .mprotect = { .addr = addr, in add_mprotect()
|
/Linux-v4.19/tools/testing/selftests/powerpc/primitives/ |
D | load_unaligned_zeropad.c | 47 if (mprotect(mem_region + page_size, page_size, PROT_NONE)) { in protect_region() 57 if (mprotect(mem_region + page_size, page_size, PROT_READ|PROT_WRITE)) { in unprotect_region()
|
/Linux-v4.19/Documentation/sparc/ |
D | adi.txt | 38 ADI is enabled on a set of pages using mprotect() with PROT_ADI flag. 79 range, enable ADI on the range using mprotect() and set version tags 80 for the entire range. mprotect() ensures range is aligned to page size 218 if (mprotect(shmaddr, BUFFER_SIZE, PROT_READ|PROT_WRITE|PROT_ADI)) { 219 perror("mprotect failed"); 262 if (mprotect(shmaddr, BUFFER_SIZE, PROT_READ|PROT_WRITE)) { 263 perror("mprotect failed");
|
/Linux-v4.19/Documentation/x86/ |
D | protection-keys.txt | 67 behavior of a plain mprotect(). For instance if you do this: 69 mprotect(ptr, size, PROT_NONE); 90 the plain mprotect() permissions are violated.
|
/Linux-v4.19/arch/x86/um/os-Linux/ |
D | task_size.c | 53 } else if (mprotect(address, UM_KERN_PAGE_SIZE, in page_ok()
|
/Linux-v4.19/arch/um/os-Linux/ |
D | util.c | 21 if (mprotect((void *) address, UM_THREAD_SIZE, in stack_protections()
|
D | process.c | 159 if (mprotect(addr, len, prot) < 0) in os_protect_memory()
|
/Linux-v4.19/tools/testing/selftests/powerpc/copyloops/ |
D | exc_validate.c | 98 if (mprotect(p + page_size, page_size, PROT_NONE)) { in test_copy_exception()
|
/Linux-v4.19/mm/ |
D | Makefile | 26 mlock.o mmap.o mprotect.o mremap.o msync.o \
|
D | mprotect.c | 577 SYSCALL_DEFINE3(mprotect, unsigned long, start, size_t, len, in SYSCALL_DEFINE3() argument
|
/Linux-v4.19/Documentation/vm/ |
D | overcommit-accounting.rst | 75 * We account mprotect changes in commit
|
/Linux-v4.19/tools/testing/selftests/memfd/ |
D | memfd_test.c | 318 r = mprotect(p, mfd_def_size, PROT_READ | PROT_WRITE); in mfd_assert_write() 384 r = mprotect(p, mfd_def_size, PROT_READ | PROT_WRITE); in mfd_fail_write()
|
/Linux-v4.19/kernel/ |
D | sys_ni.c | 264 COND_SYSCALL(mprotect);
|
/Linux-v4.19/tools/testing/selftests/x86/ |
D | protection_keys.c | 1357 ret = mprotect(p1, PAGE_SIZE, PROT_EXEC); in test_implicit_mprotect_exec_only_memory() 1376 ret = mprotect(p1, PAGE_SIZE, PROT_NONE); in test_implicit_mprotect_exec_only_memory() 1379 ret = mprotect(p1, PAGE_SIZE, PROT_READ|PROT_EXEC); in test_implicit_mprotect_exec_only_memory()
|
/Linux-v4.19/security/selinux/ |
D | Kconfig | 93 mmap and mprotect calls. If this option is set to 0 (zero),
|
/Linux-v4.19/arch/powerpc/include/asm/ |
D | systbl.h | 133 SYSCALL_SPU(mprotect)
|
/Linux-v4.19/arch/parisc/kernel/ |
D | syscall_table.S | 206 ENTRY_SAME(mprotect) /* 125 */
|
/Linux-v4.19/arch/s390/kernel/ |
D | compat_wrapper.c | 92 COMPAT_SYSCALL_WRAP3(mprotect, unsigned long, start, size_t, len, unsigned long, prot);
|
/Linux-v4.19/arch/x86/entry/syscalls/ |
D | syscall_64.tbl | 21 10 common mprotect __x64_sys_mprotect
|
D | syscall_32.tbl | 139 125 i386 mprotect sys_mprotect __ia32_sys_mprotect
|
/Linux-v4.19/tools/perf/arch/x86/entry/syscalls/ |
D | syscall_64.tbl | 21 10 common mprotect __x64_sys_mprotect
|
/Linux-v4.19/arch/arm/tools/ |
D | syscall.tbl | 141 125 common mprotect sys_mprotect
|
/Linux-v4.19/tools/perf/arch/s390/entry/syscalls/ |
D | syscall.tbl | 116 125 common mprotect sys_mprotect compat_sys_mprotect
|
/Linux-v4.19/arch/s390/kernel/syscalls/ |
D | syscall.tbl | 116 125 common mprotect sys_mprotect compat_sys_mprotect
|
/Linux-v4.19/Documentation/admin-guide/mm/ |
D | userfaultfd.rst | 34 management of mremap/mprotect is that the userfaults in all their
|