/Linux-v4.19/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 181 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST() 192 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST_SIGNAL() 208 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST() 219 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, NULL, 0, 0); in TEST() 223 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, NULL, NULL, NULL); in TEST() 241 ret = prctl(PR_GET_NO_NEW_PRIVS, 0, NULL, 0, 0); in TEST() 246 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() 276 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST() 283 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() 290 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() [all …]
|
D | seccomp_benchmark.c | 83 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in main() 86 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog); in main()
|
/Linux-v4.19/Documentation/userspace-api/ |
D | spec_ctrl.rst | 16 :manpage:`prctl(2)`. 18 There are two prctl options which are related to this: 28 which is selected with arg2 of prctl(2). The return value uses bits 0-3 with 41 subsequent prctl(..., PR_SPEC_ENABLE) will fail. 47 available. If not set, prctl(PR_SET_SPECULATION_CTRL) for the speculation 54 is selected by arg2 of :manpage:`prctl(2)` per task. arg3 is used to hand 63 EINVAL The prctl is not implemented by the architecture or unused 64 prctl(2) arguments are not 0. 91 * prctl(PR_GET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, 0, 0, 0); 92 * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, PR_SPEC_ENABLE, 0, 0); [all …]
|
/Linux-v4.19/tools/testing/selftests/prctl/ |
D | disable-tsc-test.c | 49 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in sigsegv_cb() 55 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in sigsegv_cb() 71 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in main() 79 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in main() 86 if ( prctl(PR_SET_TSC, PR_TSC_SIGSEGV) == -1) in main()
|
D | disable-tsc-on-off-stress-test.c | 50 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in sigsegv_cb() 72 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in task()
|
D | disable-tsc-ctxt-sw-stress-test.c | 46 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in segvtask() 67 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in rdtsctask()
|
/Linux-v4.19/tools/testing/selftests/capabilities/ |
D | test_execve.c | 105 if (prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0) != 0) in create_and_enter_ns() 285 …if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != -1 || errno != E… in do_tests() 302 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_RAW, 0, 0, 0) != -1 || errno != EPERM) { in do_tests() 313 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 320 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 1) { in do_tests() 325 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_CLEAR_ALL, 0, 0, 0, 0) != 0) in do_tests() 329 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 335 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests() 343 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 363 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests()
|
D | validate_cap.c | 72 …if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != bool_arg(argv, … in main()
|
/Linux-v4.19/tools/perf/trace/beauty/ |
D | prctl_option.sh | 7 egrep $regex ${header_dir}/prctl.h | grep -v PR_SET_PTRACER | \ 14 egrep $regex ${header_dir}/prctl.h | \
|
D | Build | 9 libperf-y += prctl.o
|
/Linux-v4.19/samples/seccomp/ |
D | dropper.c | 45 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { in install_filter() 49 if (prctl(PR_SET_SECCOMP, 2, &prog)) { in install_filter()
|
D | bpf-fancy.c | 88 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { in main() 93 if (prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog)) { in main()
|
D | bpf-direct.c | 150 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { in install_filter() 156 if (prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog)) { in install_filter()
|
/Linux-v4.19/Documentation/admin-guide/LSM/ |
D | Yama.rst | 29 For a solution, some applications use ``prctl(PR_SET_DUMPABLE, ...)`` to 38 ``prctl(PR_SET_PTRACER, pid, ...)`` can be used. An inferior can declare which 44 restrictions, it can call ``prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, ...)`` 54 ``prctl(PR_SET_DUMPABLE...)`` already). Similarly, ``PTRACE_TRACEME`` is 62 inferior can call ``prctl(PR_SET_PTRACER, debugger, ...)`` to declare
|
/Linux-v4.19/tools/testing/selftests/powerpc/pmu/ |
D | per_event_excludes.c | 77 prctl(PR_TASK_PERF_EVENTS_ENABLE); in per_event_excludes() 83 prctl(PR_TASK_PERF_EVENTS_DISABLE); in per_event_excludes()
|
D | count_instructions.c | 35 prctl(PR_TASK_PERF_EVENTS_ENABLE); in do_count_loop() 40 prctl(PR_TASK_PERF_EVENTS_DISABLE); in do_count_loop()
|
/Linux-v4.19/tools/perf/tests/ |
D | keep-tracking.c | 113 CHECK__(prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0)); in test__keep_tracking() 135 CHECK__(prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0)); in test__keep_tracking()
|
D | thread-map.c | 18 !prctl(PR_SET_NAME, NAMEUL, 0, 0, 0)); in test__thread_map() 85 !prctl(PR_SET_NAME, NAMEUL, 0, 0, 0)); in test__thread_map_synthesize()
|
D | switch-tracking.c | 479 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking() 492 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking() 505 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking() 518 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking()
|
/Linux-v4.19/tools/perf/arch/x86/tests/ |
D | perf-time-to-tsc.c | 103 CHECK__(prctl(PR_SET_NAME, (unsigned long)comm1, 0, 0, 0)); in test__perf_time_to_tsc() 108 CHECK__(prctl(PR_SET_NAME, (unsigned long)comm2, 0, 0, 0)); in test__perf_time_to_tsc()
|
/Linux-v4.19/tools/lib/lockdep/ |
D | common.c | 24 prctl(PR_GET_NAME, current_obj.comm); in __curr()
|
/Linux-v4.19/arch/x86/um/os-Linux/ |
D | Makefile | 9 obj-$(CONFIG_64BIT) += prctl.o
|
/Linux-v4.19/samples/bpf/ |
D | tracex5_user.c | 24 if (prctl(PR_SET_SECCOMP, 2, &prog)) in install_accept_all_seccomp()
|
/Linux-v4.19/tools/testing/selftests/nsfs/ |
D | pidns.c | 35 prctl(PR_SET_PDEATHSIG, SIGKILL); in child()
|
/Linux-v4.19/Documentation/x86/ |
D | intel_mpx.txt | 38 bit) and notifies the kernel (via the new prctl(PR_MPX_ENABLE_MANAGEMENT)) 41 when it calls the prctl(). This might be hard to guarantee if the app 46 3) The kernel detects that the CPU has MPX, allows the new prctl() to 73 * calls a new prctl(PR_MPX_ENABLE_MANAGEMENT) to notify the kernel to 207 Adding new prctl commands 210 Two new prctl commands are added to enable and disable MPX bounds tables
|