/linux-6.12.1/Documentation/userspace-api/ |
D | spec_ctrl.rst | 16 :manpage:`prctl(2)`. 18 There are two prctl options which are related to this: 28 which is selected with arg2 of prctl(2). The return value uses bits 0-3 with 41 subsequent prctl(..., PR_SPEC_ENABLE) will fail. 49 available. If not set, prctl(PR_SET_SPECULATION_CTRL) for the speculation 58 is selected by arg2 of :manpage:`prctl(2)` per task. arg3 is used to hand 67 EINVAL The prctl is not implemented by the architecture or unused 68 prctl(2) arguments are not 0. 95 * prctl(PR_GET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, 0, 0, 0); 96 * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, PR_SPEC_ENABLE, 0, 0); [all …]
|
/linux-6.12.1/tools/testing/selftests/syscall_user_dispatch/ |
D | sud_test.c | 68 ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 0, 0, &sel); in TEST_SIGNAL() 89 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0, 0, &sel); in TEST() 96 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x1, 0x0, 0); in TEST() 100 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0xff, 0); in TEST() 104 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x0, &sel); in TEST() 109 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x0, 0x0); in TEST() 116 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x1, 0x0, &sel); in TEST() 118 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, -1L, 0x0, &sel); in TEST() 122 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x1, (void *) -1); in TEST() 128 prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 1, -1L, &sel); in TEST() [all …]
|
/linux-6.12.1/tools/testing/selftests/riscv/vector/ |
D | vstate_prctl.c | 55 rc = prctl(PR_RISCV_V_SET_CONTROL, provided); in test_and_compare_child() 92 rc = prctl(PR_RISCV_V_GET_CONTROL); in main() 98 rc = prctl(PR_RISCV_V_SET_CONTROL, PR_RISCV_V_VSTATE_CTRL_ON); in main() 109 rc = prctl(PR_RISCV_V_SET_CONTROL, flag); in main() 116 rc = prctl(PR_RISCV_V_SET_CONTROL, flag); in main() 154 rc = prctl(PR_RISCV_V_SET_CONTROL, 0xff0); in main() 160 rc = prctl(PR_RISCV_V_SET_CONTROL, 0x3); in main() 166 rc = prctl(PR_RISCV_V_SET_CONTROL, 0xc); in main() 172 rc = prctl(PR_RISCV_V_SET_CONTROL, 0xc); in main()
|
/linux-6.12.1/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 342 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST() 353 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST_SIGNAL() 369 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST() 380 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, NULL, 0, 0); in TEST() 384 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, NULL, NULL, NULL); in TEST() 404 ret = prctl(PR_GET_NO_NEW_PRIVS, 0, NULL, 0, 0); in TEST() 409 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() 439 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST() 446 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() 453 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() [all …]
|
D | seccomp_benchmark.c | 220 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in main() 224 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main() 231 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main() 238 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog); in main() 245 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main()
|
/linux-6.12.1/tools/testing/selftests/mm/ |
D | mdwe_test.c | 25 EXPECT_LT(prctl(PR_SET_MDWE, PR_MDWE_NO_INHERIT, 0L, 0L, 7L), 0); in TEST() 28 EXPECT_LT(prctl(PR_SET_MDWE, 7L, 0L, 0L, 0L), 0); in TEST() 30 EXPECT_LT(prctl(PR_SET_MDWE, 0L, 7L, 0L, 0L), 0); in TEST() 32 EXPECT_LT(prctl(PR_SET_MDWE, 0L, 0L, 7L, 0L), 0); in TEST() 34 EXPECT_LT(prctl(PR_SET_MDWE, 0L, 0L, 0L, 7L), 0); in TEST() 37 EXPECT_LT(prctl(PR_GET_MDWE, 7L, 0L, 0L, 0L), 0); in TEST() 39 EXPECT_LT(prctl(PR_GET_MDWE, 0L, 7L, 0L, 0L), 0); in TEST() 41 EXPECT_LT(prctl(PR_GET_MDWE, 0L, 0L, 7L, 0L), 0); in TEST() 43 EXPECT_LT(prctl(PR_GET_MDWE, 0L, 0L, 0L, 7L), 0); in TEST() 111 EXPECT_EQ(prctl(PR_SET_MDWE, variant->first_flags, 0L, 0L, 0L), 0); in TEST_F() [all …]
|
D | ksm_functional_tests.c | 200 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in __mmap_and_merge_range() 440 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in test_prctl() 449 ret = prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0); in test_prctl() 458 ret = prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0); in test_prctl() 464 ret = prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0); in test_prctl() 482 if (prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0) != 1) in test_child_ksm() 514 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in test_prctl_fork() 542 if (prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0)) { in test_prctl_fork() 557 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in test_prctl_fork_exec() 594 if (prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0)) { in test_prctl_fork_exec() [all …]
|
/linux-6.12.1/tools/testing/selftests/powerpc/dexcr/ |
D | dexcr.h | 35 unsigned long prctl; /* 'which' value for get/set prctl */ member 44 .prctl = PR_PPC_DEXCR_SBHE, 51 .prctl = PR_PPC_DEXCR_IBRTPD, 58 .prctl = PR_PPC_DEXCR_SRAPD, 65 .prctl = PR_PPC_DEXCR_NPHIE, 72 .prctl = -1,
|
D | chdexcr.c | 38 if (aspect->prctl == -1) in help() 48 if (aspects[i].prctl != -1 && !strcmp(aspects[i].opt, opt)) in opt_to_aspect() 84 err = pr_set_dexcr(aspect->prctl, ctrl); in apply_option()
|
D | dexcr.c | 65 return prctl(PR_PPC_GET_DEXCR, which, 0UL, 0UL, 0UL); in pr_get_dexcr() 70 return prctl(PR_PPC_SET_DEXCR, which, ctrl, 0UL, 0UL); in pr_set_dexcr()
|
/linux-6.12.1/Documentation/arch/riscv/ |
D | cmodx.rst | 22 or use the ``PR_RISCV_SET_ICACHE_FLUSH_CTX`` prctl() and emit fence.i in 23 userspace. The syscall performs a one-off icache flushing operation. The prctl 29 when the memory map being used by a hart changes. If the prctl() context caused 32 syscall inside of the prctl() context. 34 prctl() Interface 37 Call prctl() with ``PR_RISCV_SET_ICACHE_FLUSH_CTX`` as the first argument. The 54 #include <sys/prctl.h> 64 // Call prctl before first fence.i is called inside modify_instruction 65 prctl(PR_RISCV_SET_ICACHE_FLUSH_CTX, PR_RISCV_CTX_SW_FENCEI_ON, PR_RISCV_SCOPE_PER_PROCESS); 67 // Call prctl after final fence.i is called in process [all …]
|
/linux-6.12.1/tools/testing/selftests/prctl/ |
D | disable-tsc-test.c | 49 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in sigsegv_cb() 55 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in sigsegv_cb() 71 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in main() 79 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in main() 86 if ( prctl(PR_SET_TSC, PR_TSC_SIGSEGV) == -1) in main()
|
D | set-process-name.c | 21 res = prctl(PR_SET_NAME, name, NULL, NULL, NULL); in set_name() 33 res = prctl(PR_GET_NAME, name, NULL, NULL, NULL); in check_is_name_correct() 46 res = prctl(PR_GET_NAME, name, NULL, NULL, NULL); in check_null_pointer() 72 int res = prctl(PR_GET_NAME, name, NULL, NULL, NULL); in check_name()
|
D | disable-tsc-on-off-stress-test.c | 50 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in sigsegv_cb() 72 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in task()
|
D | disable-tsc-ctxt-sw-stress-test.c | 46 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in segvtask() 67 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in rdtsctask()
|
/linux-6.12.1/tools/testing/selftests/capabilities/ |
D | test_execve.c | 93 if (prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0) != 0) in create_and_enter_ns() 279 …if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != -1 || errno != E… in do_tests() 296 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_RAW, 0, 0, 0) != -1 || errno != EPERM) { in do_tests() 307 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 314 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 1) { in do_tests() 319 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_CLEAR_ALL, 0, 0, 0, 0) != 0) in do_tests() 323 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 329 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests() 337 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 357 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests()
|
/linux-6.12.1/tools/testing/selftests/arm64/fp/ |
D | vec-syscfg.c | 316 ret = prctl(data->prctl_get); in prctl_get() 341 ret = prctl(data->prctl_set, cur_vl); in prctl_set_same() 365 ret = prctl(data->prctl_set, data->min_vl); in prctl_set() 386 ret = prctl(data->prctl_set, data->max_vl); in prctl_set() 401 ret = prctl(data->prctl_get); in prctl_set() 428 ret = prctl(data->prctl_set, data->min_vl); in prctl_set_no_child() 466 ret = prctl(data->prctl_set, data->min_vl | PR_SVE_VL_INHERIT); in prctl_set_for_child() 475 ret = prctl(data->prctl_get); in prctl_set_for_child() 522 ret = prctl(data->prctl_set, data->max_vl); in prctl_set_onexec() 531 ret = prctl(data->prctl_set, data->min_vl | PR_SVE_SET_VL_ONEXEC); in prctl_set_onexec() [all …]
|
/linux-6.12.1/Documentation/arch/powerpc/ |
D | dexcr.rst | 39 prctl section in Configuration 44 :manpage:`prctl(2)` commands. These calls have the form:: 46 prctl(PR_PPC_GET_DEXCR, unsigned long which, 0, 0, 0); 47 prctl(PR_PPC_SET_DEXCR, unsigned long which, unsigned long ctrl, 0, 0); 56 * - ``prctl()`` which 80 * - ``prctl()`` ctrl 107 ``PR_PPC_SET_DEXCR`` prctl. 112 prctl(PR_PPC_SET_DEXCR, PR_PPC_DEXCR_IBRTPD, PR_PPC_DEXCR_CTRL_SET, 0, 0); 124 :manpage:`execve(2)`. The PR_PPC_SET_DEXCR prctl() can control both of these 165 - This aspect cannot be modified with prctl() (check for the
|
/linux-6.12.1/tools/perf/trace/beauty/ |
D | prctl_option.sh | 8 grep -E $regex ${beauty_uapi_linux_dir}/prctl.h | grep -v PR_SET_PTRACER | \ 15 grep -E $regex ${beauty_uapi_linux_dir}/prctl.h | \
|
/linux-6.12.1/Documentation/translations/zh_CN/userspace-api/ |
D | seccomp_filter.rst | 45 添加了一个额外的seccomp模式,它可以使用和严格seccomp相同的 prctl(2) 调用来启用。 55 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, prog); 63 在调用之前,进程必须调用 ``prctl(PR_SET_NO_NEW_PRIVS, 1)`` 或者在它的 68 另外,如果 ``prctl(2)`` 被安装的过滤器所允许,就可以叠加额外的过滤器。这会增
|
/linux-6.12.1/Documentation/admin-guide/LSM/ |
D | Yama.rst | 30 For a solution, some applications use ``prctl(PR_SET_DUMPABLE, ...)`` to 39 ``prctl(PR_SET_PTRACER, pid, ...)`` can be used. An inferior can declare which 45 restrictions, it can call ``prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, ...)`` 55 ``prctl(PR_SET_DUMPABLE...)`` already). Similarly, ``PTRACE_TRACEME`` is 63 inferior can call ``prctl(PR_SET_PTRACER, debugger, ...)`` to declare
|
/linux-6.12.1/samples/seccomp/ |
D | dropper.c | 49 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { in install_filter() 53 if (prctl(PR_SET_SECCOMP, 2, &prog)) { in install_filter()
|
/linux-6.12.1/tools/testing/selftests/arm64/mte/ |
D | check_prctl.c | 19 ret = prctl(PR_SET_TAGGED_ADDR_CTRL, val, 0, 0, 0); in set_tagged_addr_ctrl() 30 ret = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0); in get_tagged_addr_ctrl()
|
D | check_gcr_el1_cswitch.c | 49 if (prctl(PR_SET_TAGGED_ADDR_CTRL, prctl_set, 0, 0, 0)) { in execute_thread() 54 prctl_get = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0); in execute_thread()
|
/linux-6.12.1/tools/testing/selftests/powerpc/pmu/ |
D | per_event_excludes.c | 74 prctl(PR_TASK_PERF_EVENTS_ENABLE); in per_event_excludes() 80 prctl(PR_TASK_PERF_EVENTS_DISABLE); in per_event_excludes()
|