Searched refs:prctl (Results 126 - 150 of 151) sorted by relevance

1234567

/linux-master/tools/include/nolibc/
H A Dsys.h23 #include <linux/prctl.h>
803 * int prctl(int option, unsigned long arg2, unsigned long arg3,
815 int prctl(int option, unsigned long arg2, unsigned long arg3, function
/linux-master/tools/perf/bench/
H A Dnuma.c29 #include <sys/prctl.h>
420 prctl(PR_SET_NAME, name); \
913 prctl(0, bytes_worked);
/linux-master/tools/perf/
H A Dbuiltin-top.c76 #include <sys/prctl.h>
633 prctl(PR_SET_NAME, "perf-top-UI", 0, 0, 0);
687 prctl(PR_SET_NAME, "perf-top-UI", 0, 0, 0);
H A DMakefile.perf620 $(prctl_option_array): $(prctl_hdr_dir)/prctl.h $(prctl_option_tbl)
632 $(x86_arch_prctl_code_array): $(x86_arch_asm_uapi_dir)/prctl.h $(x86_arch_prctl_code_tbl)
H A Dbuiltin-kvm.c32 #include <sys/prctl.h>
H A Dbuiltin-sched.c34 #include <sys/prctl.h>
616 prctl(PR_SET_NAME, comm2);
H A Dbuiltin-lock.c33 #include <sys/prctl.h>
/linux-master/arch/arm64/kernel/
H A Dproton-pack.c25 #include <linux/prctl.h>
360 * allow EL0 to toggle SSBS directly, which can end up with the prctl() state
453 return sprintf(buf, "Mitigation: Speculative Store Bypass disabled via prctl\n");
668 * The Spectre-v4 mitigation can be controlled via a prctl() from userspace.
671 * prctl() may be necessary even when PSTATE.SSBS can be toggled directly
H A Dfpsimd.c24 #include <linux/prctl.h>
928 * This is only required for prctl(): ptrace has separate fields.
/linux-master/arch/mips/kernel/
H A Dprocess.c19 #include <linux/prctl.h>
/linux-master/tools/testing/selftests/pidfd/
H A Dpidfd_setns_test.c14 #include <sys/prctl.h>
/linux-master/tools/perf/util/
H A Devlist.c47 #include <sys/prctl.h>
1448 prctl(PR_SET_NAME, "perf-exec");
/linux-master/arch/powerpc/math-emu/
H A Dmath_efp.c19 #include <linux/prctl.h>
/linux-master/arch/x86/kernel/
H A Dptrace.c37 #include <asm/prctl.h>
/linux-master/security/
H A Dcommoncap.c22 #include <linux/prctl.h>
1076 * A process may, via prctl(), elect to keep its capabilities when it
1282 * The next four prctl's remain to assist with transitioning a
/linux-master/fs/proc/
H A Darray.c88 #include <linux/prctl.h>
/linux-master/arch/x86/kernel/fpu/
H A Dxstate.c23 #include <asm/prctl.h>
/linux-master/kernel/
H A Dsys.c14 #include <linux/prctl.h>
2454 SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3,
H A Dseccomp.c24 #include <linux/prctl.h>
2045 /* Common entry point for both prctl and syscall. */
2093 * Setting strict mode through prctl always ignored filter,
2107 /* prctl interface doesn't have flags, so they are always zero. */
/linux-master/tools/testing/selftests/landlock/
H A Dnet_test.c18 #include <sys/prctl.h>
H A Dfs_test.c20 #include <sys/prctl.h>
527 ASSERT_EQ(0, prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0));
819 /* enforce_ruleset() calls prctl(no_new_privs). */
/linux-master/tools/testing/selftests/kvm/include/x86_64/
H A Dprocessor.h16 #include <asm/prctl.h>
/linux-master/arch/powerpc/kernel/
H A Dprocess.c27 #include <linux/prctl.h>
2039 * directly by userspace, it must call prctl
2041 * in the existing prctl settings) or
2046 * anyway to restore the prctl settings from
2083 * directly by userspace, it must call prctl
2085 * in the existing prctl settings) or
2090 * anyway to restore the prctl settings from
H A Dtraps.c28 #include <linux/prctl.h>
/linux-master/arch/x86/kernel/cpu/
H A Dbugs.c15 #include <linux/prctl.h>
1249 [SPECTRE_V2_USER_PRCTL] = "User space: Mitigation: STIBP via prctl",
1250 [SPECTRE_V2_USER_SECCOMP] = "User space: Mitigation: STIBP via seccomp and prctl",
1261 { "prctl", SPECTRE_V2_USER_CMD_PRCTL, false },
1262 { "prctl,ibpb", SPECTRE_V2_USER_CMD_PRCTL_IBPB, false },
2001 [SPEC_STORE_BYPASS_PRCTL] = "Mitigation: Speculative Store Bypass disabled via prctl",
2002 [SPEC_STORE_BYPASS_SECCOMP] = "Mitigation: Speculative Store Bypass disabled via prctl and seccomp",
2012 { "prctl", SPEC_STORE_BYPASS_CMD_PRCTL }, /* Disable Speculative Store Bypass via prctl */
2013 { "seccomp", SPEC_STORE_BYPASS_CMD_SECCOMP }, /* Disable Speculative Store Bypass via prctl an
[all...]

Completed in 327 milliseconds

1234567