Searched refs:prctl (Results 151 - 158 of 158) sorted by relevance

1234567

/linux-master/tools/perf/
H A Dbuiltin-kvm.c32 #include <sys/prctl.h>
H A Dbuiltin-sched.c34 #include <sys/prctl.h>
616 prctl(PR_SET_NAME, comm2);
H A Dbuiltin-stat.c81 #include <sys/prctl.h>
H A Dbuiltin-lock.c33 #include <sys/prctl.h>
/linux-master/arch/powerpc/kernel/
H A Dtraps.c28 #include <linux/prctl.h>
H A Dprocess.c27 #include <linux/prctl.h>
2039 * directly by userspace, it must call prctl
2041 * in the existing prctl settings) or
2046 * anyway to restore the prctl settings from
2083 * directly by userspace, it must call prctl
2085 * in the existing prctl settings) or
2090 * anyway to restore the prctl settings from
/linux-master/arch/x86/kernel/cpu/
H A Dbugs.c15 #include <linux/prctl.h>
1249 [SPECTRE_V2_USER_PRCTL] = "User space: Mitigation: STIBP via prctl",
1250 [SPECTRE_V2_USER_SECCOMP] = "User space: Mitigation: STIBP via seccomp and prctl",
1261 { "prctl", SPECTRE_V2_USER_CMD_PRCTL, false },
1262 { "prctl,ibpb", SPECTRE_V2_USER_CMD_PRCTL_IBPB, false },
2001 [SPEC_STORE_BYPASS_PRCTL] = "Mitigation: Speculative Store Bypass disabled via prctl",
2002 [SPEC_STORE_BYPASS_SECCOMP] = "Mitigation: Speculative Store Bypass disabled via prctl and seccomp",
2012 { "prctl", SPEC_STORE_BYPASS_CMD_PRCTL }, /* Disable Speculative Store Bypass via prctl */
2013 { "seccomp", SPEC_STORE_BYPASS_CMD_SECCOMP }, /* Disable Speculative Store Bypass via prctl an
[all...]
/linux-master/kernel/
H A Dseccomp.c24 #include <linux/prctl.h>
2045 /* Common entry point for both prctl and syscall. */
2093 * Setting strict mode through prctl always ignored filter,
2107 /* prctl interface doesn't have flags, so they are always zero. */

Completed in 133 milliseconds

1234567