/Linux-v6.1/tools/testing/selftests/powerpc/mm/ |
D | exec_prot.c | 73 if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) { in segv_handler() 95 if (!(rights & PROT_EXEC)) in check_exec_fault() 102 if (!(rights & PROT_EXEC)) in check_exec_fault() 173 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); in test() 185 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); in test() 207 FAIL_IF(check_exec_fault(PROT_EXEC)); in test() 211 FAIL_IF(check_exec_fault(PROT_READ | PROT_EXEC)); in test() 215 FAIL_IF(check_exec_fault(PROT_WRITE | PROT_EXEC)); in test() 219 FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE | PROT_EXEC)); in test()
|
D | pkey_exec_prot.c | 84 if (mprotect(insns, pgsize, PROT_EXEC)) { in segv_handler() 179 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 196 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 216 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 233 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 270 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test()
|
D | pkey_siginfo.c | 26 #define PROT_RWX (PROT_READ | PROT_WRITE | PROT_EXEC) 83 mprotect(pgstart, pgsize, PROT_EXEC)) in segv_handler()
|
/Linux-v6.1/drivers/misc/lkdtm/ |
D | usercopy.c | 82 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_stack() 150 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_slab_size() 226 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_slab_whitelist() 316 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_USERCOPY_KERNEL()
|
D | perms.c | 205 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_EXEC_USERSPACE() 226 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_ACCESS_USERSPACE()
|
/Linux-v6.1/include/linux/ |
D | mman.h | 105 return (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM)) == 0; in arch_validate_prot() 142 _calc_vm_trans(prot, PROT_EXEC, VM_EXEC) | in calc_vm_prot_bits()
|
/Linux-v6.1/tools/testing/selftests/bpf/prog_tests/ |
D | ringbuf.c | 110 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_cons_pos_protect"); in test_ringbuf() 135 ASSERT_ERR(mprotect(mmap_ptr, 4 * page_size, PROT_EXEC), "exec_protect"); in test_ringbuf() 145 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_protect"); in test_ringbuf()
|
D | test_lsm.c | 33 PROT_READ | PROT_WRITE | PROT_EXEC); in stack_mprotect()
|
/Linux-v6.1/tools/arch/xtensa/include/uapi/asm/ |
D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/Linux-v6.1/tools/arch/alpha/include/uapi/asm/ |
D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/Linux-v6.1/tools/arch/mips/include/uapi/asm/ |
D | mman.h | 32 #define PROT_EXEC 0x04 macro
|
/Linux-v6.1/tools/arch/parisc/include/uapi/asm/ |
D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/Linux-v6.1/arch/powerpc/include/asm/ |
D | mman.h | 30 if (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM | PROT_SAO)) in arch_validate_prot()
|
/Linux-v6.1/include/uapi/asm-generic/ |
D | mman-common.h | 12 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
/Linux-v6.1/tools/include/uapi/asm-generic/ |
D | mman-common.h | 12 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
/Linux-v6.1/arch/um/os-Linux/ |
D | process.c | 145 (x ? PROT_EXEC : 0); in os_map_memory() 157 (x ? PROT_EXEC : 0)); in os_protect_memory()
|
/Linux-v6.1/arch/xtensa/include/uapi/asm/ |
D | mman.h | 28 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
/Linux-v6.1/arch/parisc/include/uapi/asm/ |
D | mman.h | 7 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
/Linux-v6.1/arch/alpha/include/uapi/asm/ |
D | mman.h | 7 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
/Linux-v6.1/arch/mips/include/uapi/asm/ |
D | mman.h | 21 #define PROT_EXEC 0x04 /* page can be executed */ macro
|
/Linux-v6.1/arch/arm64/include/asm/ |
D | mman.h | 41 unsigned long supported = PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM; in arch_validate_prot()
|
/Linux-v6.1/arch/sparc/include/asm/ |
D | mman.h | 52 if (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM | PROT_ADI)) in sparc_validate_prot()
|
/Linux-v6.1/arch/powerpc/mm/book3s64/ |
D | pkeys.c | 397 if (vma_is_pkey_exec_only(vma) && (prot != PROT_EXEC)) in __arch_override_mprotect_pkey() 404 if (prot == PROT_EXEC) { in __arch_override_mprotect_pkey()
|
/Linux-v6.1/Documentation/admin-guide/mm/ |
D | nommu-mmap.rst | 34 (#) File, MAP_PRIVATE, PROT_READ / PROT_EXEC, !PROT_WRITE 59 (#) File, MAP_PRIVATE, PROT_READ / PROT_EXEC, PROT_WRITE 69 (#) Regular file / blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE 77 (#) Memory backed regular file, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE 88 (#) Memory backed blockdev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE 97 (#) Memory backed chardev, MAP_SHARED, PROT_READ / PROT_EXEC / PROT_WRITE
|
/Linux-v6.1/tools/testing/selftests/powerpc/signal/ |
D | sigreturn_vdso.c | 114 mprotect((void *)low, size, PROT_READ|PROT_WRITE|PROT_EXEC); in test_sigreturn_vdso()
|