/Linux-v5.15/arch/um/kernel/ |
D | tlb.c | 36 } mprotect; member 97 op->u.mprotect.addr, in do_ops() 98 op->u.mprotect.len, in do_ops() 99 op->u.mprotect.prot, in do_ops() 103 (void *) op->u.mprotect.addr, in do_ops() 104 op->u.mprotect.len, in do_ops() 195 (last->u.mprotect.addr + last->u.mprotect.len == addr) && in add_mprotect() 196 (last->u.mprotect.prot == prot)) { in add_mprotect() 197 last->u.mprotect.len += len; in add_mprotect() 209 .u = { .mprotect = { .addr = addr, in add_mprotect()
|
/Linux-v5.15/Documentation/translations/zh_CN/core-api/ |
D | protection-keys.rst | 78 内核试图使保护密钥与普通的mprotect()的行为一致。例如,如果你这样做:: 80 mprotect(ptr, size, PROT_NONE); 99 将被设置为SEGV_PKERR,而当违反普通的mprotect()权限时,则是SEGV_ACCERR。
|
/Linux-v5.15/tools/testing/selftests/bpf/prog_tests/ |
D | ringbuf.c | 110 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_cons_pos_protect"); in test_ringbuf() 134 ASSERT_ERR(mprotect(mmap_ptr, 4 * page_size, PROT_WRITE), "write_protect"); in test_ringbuf() 135 ASSERT_ERR(mprotect(mmap_ptr, 4 * page_size, PROT_EXEC), "exec_protect"); in test_ringbuf() 144 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_WRITE), "write_protect"); in test_ringbuf() 145 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_protect"); in test_ringbuf()
|
D | mmap.c | 135 err = mprotect(map_mmaped, map_sz, PROT_READ); in test_mmap() 152 err = mprotect(map_mmaped, map_sz, PROT_WRITE); in test_mmap() 155 err = mprotect(map_mmaped, map_sz, PROT_EXEC); in test_mmap()
|
D | test_lsm.c | 32 ret = mprotect(GET_PAGE_ADDR(buf, sz), sz, in stack_mprotect()
|
/Linux-v5.15/tools/testing/selftests/powerpc/primitives/ |
D | load_unaligned_zeropad.c | 43 if (mprotect(mem_region + page_size, page_size, PROT_NONE)) { in protect_region() 53 if (mprotect(mem_region + page_size, page_size, PROT_READ|PROT_WRITE)) { in unprotect_region()
|
/Linux-v5.15/Documentation/ABI/obsolete/ |
D | sysfs-selinux-checkreqprot | 8 to check the protection requested by userspace for mmap/mprotect 20 check the actual protections being applied upon mmap/mprotect calls.
|
/Linux-v5.15/Documentation/sparc/ |
D | adi.rst | 39 ADI is enabled on a set of pages using mprotect() with PROT_ADI flag. 83 range, enable ADI on the range using mprotect() and set version tags 84 for the entire range. mprotect() ensures range is aligned to page size 226 if (mprotect(shmaddr, BUFFER_SIZE, PROT_READ|PROT_WRITE|PROT_ADI)) { 227 perror("mprotect failed"); 270 if (mprotect(shmaddr, BUFFER_SIZE, PROT_READ|PROT_WRITE)) { 271 perror("mprotect failed");
|
/Linux-v5.15/tools/testing/selftests/vm/ |
D | hmm-tests.c | 261 ret = mprotect(buffer->ptr, size, PROT_READ); in TEST_F() 324 ret = mprotect(buffer->ptr, size, PROT_NONE); in TEST_F() 332 ret = mprotect(buffer->ptr, size, PROT_READ); in TEST_F() 441 ret = mprotect(buffer->ptr, size, PROT_WRITE | PROT_READ); in TEST_F() 1030 ret = mprotect(buffer->ptr + 2 * self->page_size, self->page_size, in TEST_F() 1038 ret = mprotect(buffer->ptr + 3 * self->page_size, self->page_size, in TEST_F() 1043 ret = mprotect(buffer->ptr + 3 * self->page_size, self->page_size, in TEST_F() 1048 ret = mprotect(buffer->ptr + 4 * self->page_size, 2 * self->page_size, in TEST_F() 1289 ret = mprotect(buffer->ptr + 2 * self->page_size, self->page_size, in TEST_F() 1297 ret = mprotect(buffer->ptr + 3 * self->page_size, self->page_size, in TEST_F() [all …]
|
/Linux-v5.15/Documentation/core-api/ |
D | protection-keys.rst | 77 behavior of a plain mprotect(). For instance if you do this:: 79 mprotect(ptr, size, PROT_NONE); 100 the plain mprotect() permissions are violated.
|
/Linux-v5.15/tools/testing/selftests/powerpc/mm/ |
D | pkey_exec_prot.c | 62 if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE)) { in segv_handler() 84 if (mprotect(insns, pgsize, PROT_EXEC)) { in segv_handler()
|
D | tlbie_test.c | 577 mprotect(map1, size, PROT_READ); in mem_snapshot_fn() 597 mprotect(map1, size, PROT_READ|PROT_WRITE); in mem_snapshot_fn()
|
D | pkey_siginfo.c | 83 mprotect(pgstart, pgsize, PROT_EXEC)) in segv_handler()
|
/Linux-v5.15/arch/x86/um/os-Linux/ |
D | task_size.c | 53 } else if (mprotect(address, UM_KERN_PAGE_SIZE, in page_ok()
|
/Linux-v5.15/arch/um/os-Linux/ |
D | util.c | 22 if (mprotect((void *) address, UM_THREAD_SIZE, in stack_protections()
|
D | process.c | 159 if (mprotect(addr, len, prot) < 0) in os_protect_memory()
|
/Linux-v5.15/tools/testing/selftests/powerpc/signal/ |
D | sigreturn_vdso.c | 114 mprotect((void *)low, size, PROT_READ|PROT_WRITE|PROT_EXEC); in test_sigreturn_vdso()
|
/Linux-v5.15/tools/testing/selftests/arm64/mte/ |
D | check_mmap_options.c | 148 if (mprotect(map_ptr, map_size, prot_flag)) { in check_clear_prot_mte_flag() 171 if (mprotect(map_ptr, map_size, prot_flag)) { in check_clear_prot_mte_flag()
|
/Linux-v5.15/tools/testing/selftests/powerpc/copyloops/ |
D | exc_validate.c | 98 if (mprotect(p + page_size, page_size, PROT_NONE)) { in test_copy_exception()
|
/Linux-v5.15/mm/ |
D | mprotect.c | 630 if (vma->vm_ops && vma->vm_ops->mprotect) { in do_mprotect_pkey() 631 error = vma->vm_ops->mprotect(vma, nstart, tmp, newflags); in do_mprotect_pkey() 659 SYSCALL_DEFINE3(mprotect, unsigned long, start, size_t, len, in SYSCALL_DEFINE3() argument
|
D | Makefile | 39 mlock.o mmap.o mmu_gather.o mprotect.o mremap.o \
|
/Linux-v5.15/Documentation/arm64/ |
D | memory-tagging-extension.rst | 38 ``mmap()`` and ``mprotect()``: 52 be cleared by ``mprotect()``. 309 if (mprotect(a, page_sz, PROT_READ | PROT_WRITE | PROT_MTE)) { 310 perror("mprotect() failed");
|
/Linux-v5.15/Documentation/vm/ |
D | overcommit-accounting.rst | 75 * We account mprotect changes in commit
|
/Linux-v5.15/tools/testing/selftests/memfd/ |
D | memfd_test.c | 387 r = mprotect(p, mfd_def_size, PROT_READ | PROT_WRITE); in mfd_assert_write() 453 r = mprotect(p, mfd_def_size, PROT_READ | PROT_WRITE); in mfd_fail_write()
|
/Linux-v5.15/kernel/ |
D | sys_ni.c | 283 COND_SYSCALL(mprotect);
|