Home
last modified time | relevance | path

Searched refs:prctl (Results 1 – 25 of 155) sorted by relevance

1234567

/linux-6.12.1/Documentation/userspace-api/
Dspec_ctrl.rst16 :manpage:`prctl(2)`.
18 There are two prctl options which are related to this:
28 which is selected with arg2 of prctl(2). The return value uses bits 0-3 with
41 subsequent prctl(..., PR_SPEC_ENABLE) will fail.
49 available. If not set, prctl(PR_SET_SPECULATION_CTRL) for the speculation
58 is selected by arg2 of :manpage:`prctl(2)` per task. arg3 is used to hand
67 EINVAL The prctl is not implemented by the architecture or unused
68 prctl(2) arguments are not 0.
95 * prctl(PR_GET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, 0, 0, 0);
96 * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, PR_SPEC_ENABLE, 0, 0);
[all …]
/linux-6.12.1/tools/testing/selftests/syscall_user_dispatch/
Dsud_test.c68 ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 0, 0, &sel); in TEST_SIGNAL()
89 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0, 0, &sel); in TEST()
96 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x1, 0x0, 0); in TEST()
100 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0xff, 0); in TEST()
104 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x0, &sel); in TEST()
109 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x0, 0x0); in TEST()
116 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x1, 0x0, &sel); in TEST()
118 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, -1L, 0x0, &sel); in TEST()
122 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x1, (void *) -1); in TEST()
128 prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 1, -1L, &sel); in TEST()
[all …]
/linux-6.12.1/tools/testing/selftests/riscv/vector/
Dvstate_prctl.c55 rc = prctl(PR_RISCV_V_SET_CONTROL, provided); in test_and_compare_child()
92 rc = prctl(PR_RISCV_V_GET_CONTROL); in main()
98 rc = prctl(PR_RISCV_V_SET_CONTROL, PR_RISCV_V_VSTATE_CTRL_ON); in main()
109 rc = prctl(PR_RISCV_V_SET_CONTROL, flag); in main()
116 rc = prctl(PR_RISCV_V_SET_CONTROL, flag); in main()
154 rc = prctl(PR_RISCV_V_SET_CONTROL, 0xff0); in main()
160 rc = prctl(PR_RISCV_V_SET_CONTROL, 0x3); in main()
166 rc = prctl(PR_RISCV_V_SET_CONTROL, 0xc); in main()
172 rc = prctl(PR_RISCV_V_SET_CONTROL, 0xc); in main()
/linux-6.12.1/tools/testing/selftests/seccomp/
Dseccomp_bpf.c342 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST()
353 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST_SIGNAL()
369 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST()
380 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, NULL, 0, 0); in TEST()
384 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, NULL, NULL, NULL); in TEST()
404 ret = prctl(PR_GET_NO_NEW_PRIVS, 0, NULL, 0, 0); in TEST()
409 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST()
439 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST()
446 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST()
453 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST()
[all …]
Dseccomp_benchmark.c220 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in main()
224 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main()
231 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main()
238 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog); in main()
245 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main()
/linux-6.12.1/tools/testing/selftests/mm/
Dmdwe_test.c25 EXPECT_LT(prctl(PR_SET_MDWE, PR_MDWE_NO_INHERIT, 0L, 0L, 7L), 0); in TEST()
28 EXPECT_LT(prctl(PR_SET_MDWE, 7L, 0L, 0L, 0L), 0); in TEST()
30 EXPECT_LT(prctl(PR_SET_MDWE, 0L, 7L, 0L, 0L), 0); in TEST()
32 EXPECT_LT(prctl(PR_SET_MDWE, 0L, 0L, 7L, 0L), 0); in TEST()
34 EXPECT_LT(prctl(PR_SET_MDWE, 0L, 0L, 0L, 7L), 0); in TEST()
37 EXPECT_LT(prctl(PR_GET_MDWE, 7L, 0L, 0L, 0L), 0); in TEST()
39 EXPECT_LT(prctl(PR_GET_MDWE, 0L, 7L, 0L, 0L), 0); in TEST()
41 EXPECT_LT(prctl(PR_GET_MDWE, 0L, 0L, 7L, 0L), 0); in TEST()
43 EXPECT_LT(prctl(PR_GET_MDWE, 0L, 0L, 0L, 7L), 0); in TEST()
111 EXPECT_EQ(prctl(PR_SET_MDWE, variant->first_flags, 0L, 0L, 0L), 0); in TEST_F()
[all …]
Dksm_functional_tests.c200 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in __mmap_and_merge_range()
440 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in test_prctl()
449 ret = prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0); in test_prctl()
458 ret = prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0); in test_prctl()
464 ret = prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0); in test_prctl()
482 if (prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0) != 1) in test_child_ksm()
514 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in test_prctl_fork()
542 if (prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0)) { in test_prctl_fork()
557 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in test_prctl_fork_exec()
594 if (prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0)) { in test_prctl_fork_exec()
[all …]
/linux-6.12.1/tools/testing/selftests/powerpc/dexcr/
Ddexcr.h35 unsigned long prctl; /* 'which' value for get/set prctl */ member
44 .prctl = PR_PPC_DEXCR_SBHE,
51 .prctl = PR_PPC_DEXCR_IBRTPD,
58 .prctl = PR_PPC_DEXCR_SRAPD,
65 .prctl = PR_PPC_DEXCR_NPHIE,
72 .prctl = -1,
Dchdexcr.c38 if (aspect->prctl == -1) in help()
48 if (aspects[i].prctl != -1 && !strcmp(aspects[i].opt, opt)) in opt_to_aspect()
84 err = pr_set_dexcr(aspect->prctl, ctrl); in apply_option()
Ddexcr.c65 return prctl(PR_PPC_GET_DEXCR, which, 0UL, 0UL, 0UL); in pr_get_dexcr()
70 return prctl(PR_PPC_SET_DEXCR, which, ctrl, 0UL, 0UL); in pr_set_dexcr()
/linux-6.12.1/Documentation/arch/riscv/
Dcmodx.rst22 or use the ``PR_RISCV_SET_ICACHE_FLUSH_CTX`` prctl() and emit fence.i in
23 userspace. The syscall performs a one-off icache flushing operation. The prctl
29 when the memory map being used by a hart changes. If the prctl() context caused
32 syscall inside of the prctl() context.
34 prctl() Interface
37 Call prctl() with ``PR_RISCV_SET_ICACHE_FLUSH_CTX`` as the first argument. The
54 #include <sys/prctl.h>
64 // Call prctl before first fence.i is called inside modify_instruction
65 prctl(PR_RISCV_SET_ICACHE_FLUSH_CTX, PR_RISCV_CTX_SW_FENCEI_ON, PR_RISCV_SCOPE_PER_PROCESS);
67 // Call prctl after final fence.i is called in process
[all …]
/linux-6.12.1/tools/testing/selftests/prctl/
Ddisable-tsc-test.c49 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in sigsegv_cb()
55 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in sigsegv_cb()
71 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in main()
79 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in main()
86 if ( prctl(PR_SET_TSC, PR_TSC_SIGSEGV) == -1) in main()
Dset-process-name.c21 res = prctl(PR_SET_NAME, name, NULL, NULL, NULL); in set_name()
33 res = prctl(PR_GET_NAME, name, NULL, NULL, NULL); in check_is_name_correct()
46 res = prctl(PR_GET_NAME, name, NULL, NULL, NULL); in check_null_pointer()
72 int res = prctl(PR_GET_NAME, name, NULL, NULL, NULL); in check_name()
Ddisable-tsc-on-off-stress-test.c50 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in sigsegv_cb()
72 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in task()
Ddisable-tsc-ctxt-sw-stress-test.c46 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in segvtask()
67 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in rdtsctask()
/linux-6.12.1/tools/testing/selftests/capabilities/
Dtest_execve.c93 if (prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0) != 0) in create_and_enter_ns()
279 …if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != -1 || errno != E… in do_tests()
296 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_RAW, 0, 0, 0) != -1 || errno != EPERM) { in do_tests()
307 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests()
314 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 1) { in do_tests()
319 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_CLEAR_ALL, 0, 0, 0, 0) != 0) in do_tests()
323 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests()
329 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests()
337 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests()
357 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests()
/linux-6.12.1/tools/testing/selftests/arm64/fp/
Dvec-syscfg.c316 ret = prctl(data->prctl_get); in prctl_get()
341 ret = prctl(data->prctl_set, cur_vl); in prctl_set_same()
365 ret = prctl(data->prctl_set, data->min_vl); in prctl_set()
386 ret = prctl(data->prctl_set, data->max_vl); in prctl_set()
401 ret = prctl(data->prctl_get); in prctl_set()
428 ret = prctl(data->prctl_set, data->min_vl); in prctl_set_no_child()
466 ret = prctl(data->prctl_set, data->min_vl | PR_SVE_VL_INHERIT); in prctl_set_for_child()
475 ret = prctl(data->prctl_get); in prctl_set_for_child()
522 ret = prctl(data->prctl_set, data->max_vl); in prctl_set_onexec()
531 ret = prctl(data->prctl_set, data->min_vl | PR_SVE_SET_VL_ONEXEC); in prctl_set_onexec()
[all …]
/linux-6.12.1/Documentation/arch/powerpc/
Ddexcr.rst39 prctl section in Configuration
44 :manpage:`prctl(2)` commands. These calls have the form::
46 prctl(PR_PPC_GET_DEXCR, unsigned long which, 0, 0, 0);
47 prctl(PR_PPC_SET_DEXCR, unsigned long which, unsigned long ctrl, 0, 0);
56 * - ``prctl()`` which
80 * - ``prctl()`` ctrl
107 ``PR_PPC_SET_DEXCR`` prctl.
112 prctl(PR_PPC_SET_DEXCR, PR_PPC_DEXCR_IBRTPD, PR_PPC_DEXCR_CTRL_SET, 0, 0);
124 :manpage:`execve(2)`. The PR_PPC_SET_DEXCR prctl() can control both of these
165 - This aspect cannot be modified with prctl() (check for the
/linux-6.12.1/tools/perf/trace/beauty/
Dprctl_option.sh8 grep -E $regex ${beauty_uapi_linux_dir}/prctl.h | grep -v PR_SET_PTRACER | \
15 grep -E $regex ${beauty_uapi_linux_dir}/prctl.h | \
/linux-6.12.1/Documentation/translations/zh_CN/userspace-api/
Dseccomp_filter.rst45 添加了一个额外的seccomp模式,它可以使用和严格seccomp相同的 prctl(2) 调用来启用。
55 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, prog);
63 在调用之前,进程必须调用 ``prctl(PR_SET_NO_NEW_PRIVS, 1)`` 或者在它的
68 另外,如果 ``prctl(2)`` 被安装的过滤器所允许,就可以叠加额外的过滤器。这会增
/linux-6.12.1/Documentation/admin-guide/LSM/
DYama.rst30 For a solution, some applications use ``prctl(PR_SET_DUMPABLE, ...)`` to
39 ``prctl(PR_SET_PTRACER, pid, ...)`` can be used. An inferior can declare which
45 restrictions, it can call ``prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, ...)``
55 ``prctl(PR_SET_DUMPABLE...)`` already). Similarly, ``PTRACE_TRACEME`` is
63 inferior can call ``prctl(PR_SET_PTRACER, debugger, ...)`` to declare
/linux-6.12.1/samples/seccomp/
Ddropper.c49 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { in install_filter()
53 if (prctl(PR_SET_SECCOMP, 2, &prog)) { in install_filter()
/linux-6.12.1/tools/testing/selftests/arm64/mte/
Dcheck_prctl.c19 ret = prctl(PR_SET_TAGGED_ADDR_CTRL, val, 0, 0, 0); in set_tagged_addr_ctrl()
30 ret = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0); in get_tagged_addr_ctrl()
Dcheck_gcr_el1_cswitch.c49 if (prctl(PR_SET_TAGGED_ADDR_CTRL, prctl_set, 0, 0, 0)) { in execute_thread()
54 prctl_get = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0); in execute_thread()
/linux-6.12.1/tools/testing/selftests/powerpc/pmu/
Dper_event_excludes.c74 prctl(PR_TASK_PERF_EVENTS_ENABLE); in per_event_excludes()
80 prctl(PR_TASK_PERF_EVENTS_DISABLE); in per_event_excludes()

1234567