/linux-6.12.1/tools/testing/selftests/powerpc/mm/ |
D | exec_prot.c | 73 if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) { in segv_handler() 98 FAIL_IF(mprotect(insns, pgsize, rights) != 0); in check_exec_fault() 173 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); in test() 185 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); in test()
|
D | pkey_exec_prot.c | 62 if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE)) { in segv_handler() 84 if (mprotect(insns, pgsize, PROT_EXEC)) { in segv_handler()
|
/linux-6.12.1/Documentation/translations/zh_CN/core-api/ |
D | protection-keys.rst | 78 内核试图使保护密钥与普通的mprotect()的行为一致。例如,如果你这样做:: 80 mprotect(ptr, size, PROT_NONE); 99 将被设置为SEGV_PKERR,而当违反普通的mprotect()权限时,则是SEGV_ACCERR。
|
/linux-6.12.1/arch/um/kernel/ |
D | tlb.c | 26 int (*mprotect)(struct mm_id *mm_idp, member 94 ret = ops->mprotect(ops->mm_idp, addr, PAGE_SIZE, prot); in update_pte_range() 183 ops.mprotect = kern_mprotect; in um_tlb_sync() 187 ops.mprotect = protect; in um_tlb_sync()
|
/linux-6.12.1/tools/testing/selftests/mm/ |
D | mkdirty.c | 173 if (mprotect(mem, pagesize, PROT_READ)) { in test_page_migration() 206 if (mprotect(mem, thpsize, PROT_READ)) { in test_page_migration_thp() 245 if (mprotect(mem, thpsize, PROT_READ)) { in test_pte_mapped_thp() 257 if (mprotect(mem + thpsize - pagesize, pagesize, in test_pte_mapped_thp()
|
D | mdwe_test.c | 240 ret = mprotect(self->p, self->size, PROT_READ | PROT_EXEC); in TEST_F() 251 ret = mprotect(self->p, self->size, PROT_READ | PROT_EXEC); in TEST_F() 266 ret = mprotect(self->p, self->size, PROT_WRITE | PROT_EXEC); in TEST_F() 299 ret = mprotect(self->p, self->size, PROT_EXEC | PROT_BTI); in TEST_F()
|
D | cow.c | 230 ret = mprotect(mem, size, PROT_READ); in do_test_cow_in_parent() 231 ret |= mprotect(mem, size, PROT_READ|PROT_WRITE); in do_test_cow_in_parent() 485 ret = mprotect(mem, size, PROT_READ); in do_test_iouring() 487 ret |= mprotect(mem, size, PROT_READ | PROT_WRITE); in do_test_iouring() 645 ret = mprotect(mem, size, PROT_READ); in do_test_ro_pin() 647 ret |= mprotect(mem, size, PROT_READ | PROT_WRITE); in do_test_ro_pin() 847 ret = mprotect(mem + pagesize, pagesize, PROT_READ); in do_run_with_thp() 852 ret = mprotect(mem + pagesize, pagesize, PROT_READ | PROT_WRITE); in do_run_with_thp() 1237 ret = mprotect(mem + pagesize, pagesize, PROT_READ); in do_test_anon_thp_collapse() 1242 ret = mprotect(mem + pagesize, pagesize, PROT_READ | PROT_WRITE); in do_test_anon_thp_collapse()
|
D | pagemap_ioctl.c | 198 mprotect(mem, mem_size/8, PROT_READ|PROT_WRITE); in userfaultfd_tests() 199 mprotect(mem + 1 * mem_size/8, mem_size/8, PROT_READ); in userfaultfd_tests() 200 mprotect(mem + 2 * mem_size/8, mem_size/8, PROT_READ|PROT_WRITE); in userfaultfd_tests() 201 mprotect(mem + 3 * mem_size/8, mem_size/8, PROT_READ); in userfaultfd_tests() 202 mprotect(mem + 4 * mem_size/8, mem_size/8, PROT_READ|PROT_WRITE); in userfaultfd_tests() 203 mprotect(mem + 5 * mem_size/8, mem_size/8, PROT_NONE); in userfaultfd_tests() 204 mprotect(mem + 6 * mem_size/8, mem_size/8, PROT_READ|PROT_WRITE); in userfaultfd_tests() 205 mprotect(mem + 7 * mem_size/8, mem_size/8, PROT_READ); in userfaultfd_tests() 1265 mprotect(mem, page_size, PROT_NONE); in mprotect_tests() 1266 mprotect(mem, 2 * page_size, PROT_READ); in mprotect_tests() [all …]
|
D | soft-dirty.c | 161 mprotect(map, pagesize, PROT_READ); in test_mprotect() 165 mprotect(map, pagesize, PROT_READ|PROT_WRITE); in test_mprotect()
|
D | hmm-tests.c | 329 ret = mprotect(buffer->ptr, size, PROT_READ); in TEST_F() 392 ret = mprotect(buffer->ptr, size, PROT_NONE); in TEST_F() 400 ret = mprotect(buffer->ptr, size, PROT_READ); in TEST_F() 509 ret = mprotect(buffer->ptr, size, PROT_WRITE | PROT_READ); in TEST_F() 1191 ret = mprotect(buffer->ptr + 2 * self->page_size, self->page_size, in TEST_F() 1199 ret = mprotect(buffer->ptr + 3 * self->page_size, self->page_size, in TEST_F() 1204 ret = mprotect(buffer->ptr + 3 * self->page_size, self->page_size, in TEST_F() 1209 ret = mprotect(buffer->ptr + 4 * self->page_size, 2 * self->page_size, in TEST_F() 1501 ret = mprotect(buffer->ptr + 2 * self->page_size, self->page_size, in TEST_F() 1509 ret = mprotect(buffer->ptr + 3 * self->page_size, self->page_size, in TEST_F() [all …]
|
/linux-6.12.1/tools/testing/selftests/powerpc/primitives/ |
D | load_unaligned_zeropad.c | 43 if (mprotect(mem_region + page_size, page_size, PROT_NONE)) { in protect_region() 53 if (mprotect(mem_region + page_size, page_size, PROT_READ|PROT_WRITE)) { in unprotect_region()
|
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/ |
D | ringbuf.c | 170 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_cons_pos_protect"); in ringbuf_subtest() 194 ASSERT_ERR(mprotect(mmap_ptr, 4 * page_size, PROT_WRITE), "write_protect"); in ringbuf_subtest() 195 ASSERT_ERR(mprotect(mmap_ptr, 4 * page_size, PROT_EXEC), "exec_protect"); in ringbuf_subtest() 204 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_WRITE), "write_protect"); in ringbuf_subtest() 205 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_protect"); in ringbuf_subtest()
|
D | mmap.c | 135 err = mprotect(map_mmaped, map_sz, PROT_READ); in test_mmap() 152 err = mprotect(map_mmaped, map_sz, PROT_WRITE); in test_mmap() 155 err = mprotect(map_mmaped, map_sz, PROT_EXEC); in test_mmap()
|
D | user_ringbuf.c | 114 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_WRITE), "write_cons_pos_protect"); in test_user_ringbuf_mappings() 115 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_cons_pos_protect"); in test_user_ringbuf_mappings() 125 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_prod_pos_protect"); in test_user_ringbuf_mappings() 134 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_data_protect"); in test_user_ringbuf_mappings()
|
/linux-6.12.1/Documentation/core-api/ |
D | protection-keys.rst | 93 behavior of a plain mprotect(). For instance if you do this:: 95 mprotect(ptr, size, PROT_NONE); 116 the plain mprotect() permissions are violated. 120 userspace's value of the register or mprotect().
|
/linux-6.12.1/Documentation/ABI/removed/ |
D | sysfs-selinux-checkreqprot | 11 to check the protection requested by userspace for mmap/mprotect 23 check the actual protections being applied upon mmap/mprotect calls.
|
/linux-6.12.1/Documentation/arch/sparc/ |
D | adi.rst | 39 ADI is enabled on a set of pages using mprotect() with PROT_ADI flag. 83 range, enable ADI on the range using mprotect() and set version tags 84 for the entire range. mprotect() ensures range is aligned to page size 226 if (mprotect(shmaddr, BUFFER_SIZE, PROT_READ|PROT_WRITE|PROT_ADI)) { 227 perror("mprotect failed"); 270 if (mprotect(shmaddr, BUFFER_SIZE, PROT_READ|PROT_WRITE)) { 271 perror("mprotect failed");
|
/linux-6.12.1/Documentation/userspace-api/ |
D | mseal.rst | 93 - mprotect and pkey_mprotect 102 mprotect and pkey_mprotect are blocked because they changes the 120 - mprotect, pkey_mprotect, madvise: partial update might happen, e.g. 121 when mprotect over multiple VMAs, mprotect might update the beginning
|
/linux-6.12.1/tools/testing/selftests/kvm/s390x/ |
D | tprot.c | 219 mprotect(addr_gva2hva(vm, (vm_vaddr_t)pages), PAGE_SIZE * 2, PROT_READ); in main() 232 mprotect(addr_gva2hva(vm, (vm_vaddr_t)0), PAGE_SIZE, PROT_READ); in main()
|
/linux-6.12.1/Documentation/translations/zh_CN/mm/ |
D | overcommit-accounting.rst | 74 * 我们核算mprotect在提交中的变化
|
/linux-6.12.1/arch/x86/um/os-Linux/ |
D | task_size.c | 53 } else if (mprotect(address, UM_KERN_PAGE_SIZE, in page_ok()
|
/linux-6.12.1/tools/testing/selftests/arm64/mte/ |
D | check_mmap_options.c | 147 if (mprotect(map_ptr, map_size, prot_flag)) { in check_clear_prot_mte_flag() 170 if (mprotect(map_ptr, map_size, prot_flag)) { in check_clear_prot_mte_flag()
|
/linux-6.12.1/tools/testing/selftests/powerpc/signal/ |
D | sigreturn_vdso.c | 114 mprotect((void *)low, size, PROT_READ|PROT_WRITE|PROT_EXEC); in test_sigreturn_vdso()
|
/linux-6.12.1/tools/testing/selftests/powerpc/copyloops/ |
D | exc_validate.c | 98 if (mprotect(p + page_size, page_size, PROT_NONE)) { in test_copy_exception()
|
/linux-6.12.1/arch/um/os-Linux/ |
D | util.c | 23 if (mprotect((void *) address, UM_THREAD_SIZE, in stack_protections()
|