| /Linux-v6.6/tools/testing/selftests/powerpc/mm/ |
| D | exec_prot.c | 73 if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) { in segv_handler() 95 if (!(rights & PROT_EXEC)) in check_exec_fault() 102 if (!(rights & PROT_EXEC)) in check_exec_fault() 173 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); in test() 185 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); in test() 207 FAIL_IF(check_exec_fault(PROT_EXEC)); in test() 211 FAIL_IF(check_exec_fault(PROT_READ | PROT_EXEC)); in test() 215 FAIL_IF(check_exec_fault(PROT_WRITE | PROT_EXEC)); in test() 219 FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE | PROT_EXEC)); in test()
|
| D | pkey_exec_prot.c | 84 if (mprotect(insns, pgsize, PROT_EXEC)) { in segv_handler() 179 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 196 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 216 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 233 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 270 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test()
|
| D | pkey_siginfo.c | 26 #define PROT_RWX (PROT_READ | PROT_WRITE | PROT_EXEC) 83 mprotect(pgstart, pgsize, PROT_EXEC)) in segv_handler()
|
| /Linux-v6.6/tools/testing/selftests/mm/ |
| D | mdwe_test.c | 109 self->p = mmap(NULL, self->size, PROT_READ | PROT_EXEC, self->flags, 0, 0); in TEST_F() 115 self->p = mmap(NULL, self->size, PROT_WRITE | PROT_EXEC, self->flags, 0, 0); in TEST_F() 127 self->p = mmap(NULL, self->size, PROT_READ | PROT_EXEC, self->flags, 0, 0); in TEST_F() 130 ret = mprotect(self->p, self->size, PROT_READ | PROT_EXEC); in TEST_F() 141 ret = mprotect(self->p, self->size, PROT_READ | PROT_EXEC); in TEST_F() 156 ret = mprotect(self->p, self->size, PROT_WRITE | PROT_EXEC); in TEST_F() 171 p = mmap(self->p + self->size, self->size, PROT_READ | PROT_EXEC, in TEST_F() 189 self->p = mmap(NULL, self->size, PROT_EXEC, self->flags, 0, 0); in TEST_F() 192 ret = mprotect(self->p, self->size, PROT_EXEC | PROT_BTI); in TEST_F()
|
| /Linux-v6.6/drivers/misc/lkdtm/ |
| D | usercopy.c | 82 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_stack() 150 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_slab_size() 226 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_slab_whitelist() 316 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_USERCOPY_KERNEL()
|
| D | perms.c | 205 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_EXEC_USERSPACE() 226 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_ACCESS_USERSPACE()
|
| /Linux-v6.6/include/linux/ |
| D | mman.h | 109 return (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM)) == 0; in arch_validate_prot() 146 _calc_vm_trans(prot, PROT_EXEC, VM_EXEC) | in calc_vm_prot_bits()
|
| /Linux-v6.6/tools/arch/mips/include/uapi/asm/ |
| D | mman.h | 32 #define PROT_EXEC 0x04 macro
|
| /Linux-v6.6/tools/arch/xtensa/include/uapi/asm/ |
| D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
| /Linux-v6.6/tools/arch/alpha/include/uapi/asm/ |
| D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
| /Linux-v6.6/tools/arch/parisc/include/uapi/asm/ |
| D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
| /Linux-v6.6/arch/powerpc/include/asm/ |
| D | mman.h | 30 if (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM | PROT_SAO)) in arch_validate_prot()
|
| /Linux-v6.6/tools/testing/selftests/bpf/prog_tests/ |
| D | ringbuf.c | 112 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_cons_pos_protect"); in ringbuf_subtest() 137 ASSERT_ERR(mprotect(mmap_ptr, 4 * page_size, PROT_EXEC), "exec_protect"); in ringbuf_subtest() 147 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_protect"); in ringbuf_subtest()
|
| /Linux-v6.6/include/uapi/asm-generic/ |
| D | mman-common.h | 12 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
| /Linux-v6.6/tools/include/uapi/asm-generic/ |
| D | mman-common.h | 12 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
| /Linux-v6.6/arch/um/os-Linux/ |
| D | process.c | 145 (x ? PROT_EXEC : 0); in os_map_memory() 157 (x ? PROT_EXEC : 0)); in os_protect_memory()
|
| /Linux-v6.6/arch/xtensa/include/uapi/asm/ |
| D | mman.h | 28 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
| /Linux-v6.6/arch/mips/include/uapi/asm/ |
| D | mman.h | 21 #define PROT_EXEC 0x04 /* page can be executed */ macro
|
| /Linux-v6.6/arch/parisc/include/uapi/asm/ |
| D | mman.h | 7 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
| /Linux-v6.6/arch/alpha/include/uapi/asm/ |
| D | mman.h | 7 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
| /Linux-v6.6/arch/arm64/include/asm/ |
| D | mman.h | 41 unsigned long supported = PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM; in arch_validate_prot()
|
| /Linux-v6.6/arch/sparc/include/asm/ |
| D | mman.h | 52 if (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM | PROT_ADI)) in sparc_validate_prot()
|
| /Linux-v6.6/mm/kasan/ |
| D | kasan_test_module.c | 30 PROT_READ | PROT_WRITE | PROT_EXEC, in copy_user_test()
|
| /Linux-v6.6/arch/powerpc/mm/book3s64/ |
| D | pkeys.c | 397 if (vma_is_pkey_exec_only(vma) && (prot != PROT_EXEC)) in __arch_override_mprotect_pkey() 404 if (prot == PROT_EXEC) { in __arch_override_mprotect_pkey()
|
| /Linux-v6.6/Documentation/admin-guide/mm/ |
| D | nommu-mmap.rst | 34 (#) File, MAP_PRIVATE, PROT_READ / PROT_EXEC, !PROT_WRITE 59 (#) File, MAP_PRIVATE, PROT_READ / PROT_EXEC, PROT_WRITE 69 (#) Regular file / blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE 77 (#) Memory backed regular file, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE 88 (#) Memory backed blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE 97 (#) Memory backed chardev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE
|