/linux-master/tools/include/nolibc/ |
H A D | sys.h | 23 #include <linux/prctl.h> 803 * int prctl(int option, unsigned long arg2, unsigned long arg3, 815 int prctl(int option, unsigned long arg2, unsigned long arg3, function
|
/linux-master/tools/perf/bench/ |
H A D | numa.c | 29 #include <sys/prctl.h> 420 prctl(PR_SET_NAME, name); \ 913 prctl(0, bytes_worked);
|
/linux-master/tools/perf/ |
H A D | builtin-top.c | 76 #include <sys/prctl.h> 633 prctl(PR_SET_NAME, "perf-top-UI", 0, 0, 0); 687 prctl(PR_SET_NAME, "perf-top-UI", 0, 0, 0);
|
H A D | Makefile.perf | 620 $(prctl_option_array): $(prctl_hdr_dir)/prctl.h $(prctl_option_tbl) 632 $(x86_arch_prctl_code_array): $(x86_arch_asm_uapi_dir)/prctl.h $(x86_arch_prctl_code_tbl)
|
H A D | builtin-kvm.c | 32 #include <sys/prctl.h>
|
H A D | builtin-sched.c | 34 #include <sys/prctl.h> 616 prctl(PR_SET_NAME, comm2);
|
H A D | builtin-lock.c | 33 #include <sys/prctl.h>
|
/linux-master/arch/arm64/kernel/ |
H A D | proton-pack.c | 25 #include <linux/prctl.h> 360 * allow EL0 to toggle SSBS directly, which can end up with the prctl() state 453 return sprintf(buf, "Mitigation: Speculative Store Bypass disabled via prctl\n"); 668 * The Spectre-v4 mitigation can be controlled via a prctl() from userspace. 671 * prctl() may be necessary even when PSTATE.SSBS can be toggled directly
|
H A D | fpsimd.c | 24 #include <linux/prctl.h> 928 * This is only required for prctl(): ptrace has separate fields.
|
/linux-master/arch/mips/kernel/ |
H A D | process.c | 19 #include <linux/prctl.h>
|
/linux-master/tools/testing/selftests/pidfd/ |
H A D | pidfd_setns_test.c | 14 #include <sys/prctl.h>
|
/linux-master/tools/perf/util/ |
H A D | evlist.c | 47 #include <sys/prctl.h> 1448 prctl(PR_SET_NAME, "perf-exec");
|
/linux-master/arch/powerpc/math-emu/ |
H A D | math_efp.c | 19 #include <linux/prctl.h>
|
/linux-master/arch/x86/kernel/ |
H A D | ptrace.c | 37 #include <asm/prctl.h>
|
/linux-master/security/ |
H A D | commoncap.c | 22 #include <linux/prctl.h> 1076 * A process may, via prctl(), elect to keep its capabilities when it 1282 * The next four prctl's remain to assist with transitioning a
|
/linux-master/fs/proc/ |
H A D | array.c | 88 #include <linux/prctl.h>
|
/linux-master/arch/x86/kernel/fpu/ |
H A D | xstate.c | 23 #include <asm/prctl.h>
|
/linux-master/kernel/ |
H A D | sys.c | 14 #include <linux/prctl.h> 2454 SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3,
|
H A D | seccomp.c | 24 #include <linux/prctl.h> 2045 /* Common entry point for both prctl and syscall. */ 2093 * Setting strict mode through prctl always ignored filter, 2107 /* prctl interface doesn't have flags, so they are always zero. */
|
/linux-master/tools/testing/selftests/landlock/ |
H A D | net_test.c | 18 #include <sys/prctl.h>
|
H A D | fs_test.c | 20 #include <sys/prctl.h> 527 ASSERT_EQ(0, prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)); 819 /* enforce_ruleset() calls prctl(no_new_privs). */
|
/linux-master/tools/testing/selftests/kvm/include/x86_64/ |
H A D | processor.h | 16 #include <asm/prctl.h>
|
/linux-master/arch/powerpc/kernel/ |
H A D | process.c | 27 #include <linux/prctl.h> 2039 * directly by userspace, it must call prctl 2041 * in the existing prctl settings) or 2046 * anyway to restore the prctl settings from 2083 * directly by userspace, it must call prctl 2085 * in the existing prctl settings) or 2090 * anyway to restore the prctl settings from
|
H A D | traps.c | 28 #include <linux/prctl.h>
|
/linux-master/arch/x86/kernel/cpu/ |
H A D | bugs.c | 15 #include <linux/prctl.h> 1249 [SPECTRE_V2_USER_PRCTL] = "User space: Mitigation: STIBP via prctl", 1250 [SPECTRE_V2_USER_SECCOMP] = "User space: Mitigation: STIBP via seccomp and prctl", 1261 { "prctl", SPECTRE_V2_USER_CMD_PRCTL, false }, 1262 { "prctl,ibpb", SPECTRE_V2_USER_CMD_PRCTL_IBPB, false }, 2001 [SPEC_STORE_BYPASS_PRCTL] = "Mitigation: Speculative Store Bypass disabled via prctl", 2002 [SPEC_STORE_BYPASS_SECCOMP] = "Mitigation: Speculative Store Bypass disabled via prctl and seccomp", 2012 { "prctl", SPEC_STORE_BYPASS_CMD_PRCTL }, /* Disable Speculative Store Bypass via prctl */ 2013 { "seccomp", SPEC_STORE_BYPASS_CMD_SECCOMP }, /* Disable Speculative Store Bypass via prctl an [all...] |