/linux-master/tools/testing/selftests/powerpc/mm/ |
H A D | exec_prot.c | 73 if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) { 95 if (!(rights & PROT_EXEC)) 102 if (!(rights & PROT_EXEC)) 173 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); 185 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); 207 FAIL_IF(check_exec_fault(PROT_EXEC)); 211 FAIL_IF(check_exec_fault(PROT_READ | PROT_EXEC)); 215 FAIL_IF(check_exec_fault(PROT_WRITE | PROT_EXEC)); 219 FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE | PROT_EXEC));
|
H A D | pkey_exec_prot.c | 84 if (mprotect(insns, pgsize, PROT_EXEC)) { 173 * This should not generate a fault as having PROT_EXEC 179 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); 191 * PROT_EXEC also restricts writes. The pkey currently 196 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); 213 * as having PROT_EXEC implicitly allows reads. 216 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); 230 * PROT_EXEC does not allow writes. 233 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); 270 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pke [all...] |
H A D | pkey_siginfo.c | 26 #define PROT_RWX (PROT_READ | PROT_WRITE | PROT_EXEC) 83 mprotect(pgstart, pgsize, PROT_EXEC))
|
/linux-master/arch/powerpc/include/asm/ |
H A D | mman.h | 30 if (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM | PROT_SAO))
|
/linux-master/tools/testing/selftests/mm/ |
H A D | mdwe_test.c | 219 self->p = mmap(NULL, self->size, PROT_READ | PROT_EXEC, self->flags, 0, 0); 225 self->p = mmap(NULL, self->size, PROT_WRITE | PROT_EXEC, self->flags, 0, 0); 237 self->p = mmap(NULL, self->size, PROT_READ | PROT_EXEC, self->flags, 0, 0); 240 ret = mprotect(self->p, self->size, PROT_READ | PROT_EXEC); 251 ret = mprotect(self->p, self->size, PROT_READ | PROT_EXEC); 266 ret = mprotect(self->p, self->size, PROT_WRITE | PROT_EXEC); 282 p = mmap(self->p, self->size, PROT_READ | PROT_EXEC, 296 self->p = mmap(NULL, self->size, PROT_EXEC, self->flags, 0, 0); 299 ret = mprotect(self->p, self->size, PROT_EXEC | PROT_BTI);
|
/linux-master/tools/arch/alpha/include/uapi/asm/ |
H A D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/linux-master/tools/arch/mips/include/uapi/asm/ |
H A D | mman.h | 32 #define PROT_EXEC 0x04 macro
|
/linux-master/tools/arch/xtensa/include/uapi/asm/ |
H A D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/linux-master/arch/arm64/include/asm/ |
H A D | mman.h | 41 unsigned long supported = PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM;
|
/linux-master/include/uapi/asm-generic/ |
H A D | mman-common.h | 12 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
/linux-master/tools/include/uapi/asm-generic/ |
H A D | mman-common.h | 12 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
/linux-master/tools/arch/parisc/include/uapi/asm/ |
H A D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/linux-master/include/linux/ |
H A D | mman.h | 109 return (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM)) == 0; 146 _calc_vm_trans(prot, PROT_EXEC, VM_EXEC) | 178 * a) mmap(PROT_WRITE | PROT_EXEC) 181 * mprotect(PROT_EXEC) 185 * mprotect(PROT_EXEC) 189 * d) mmap(PROT_READ | PROT_EXEC) 190 * mmap(PROT_READ | PROT_EXEC | PROT_BTI)
|
/linux-master/arch/sparc/include/asm/ |
H A D | mman.h | 52 if (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM | PROT_ADI))
|
/linux-master/drivers/misc/lkdtm/ |
H A D | usercopy.c | 82 PROT_READ | PROT_WRITE | PROT_EXEC, 150 PROT_READ | PROT_WRITE | PROT_EXEC, 226 PROT_READ | PROT_WRITE | PROT_EXEC, 316 PROT_READ | PROT_WRITE | PROT_EXEC,
|
/linux-master/arch/alpha/include/uapi/asm/ |
H A D | mman.h | 7 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
/linux-master/arch/xtensa/include/uapi/asm/ |
H A D | mman.h | 20 * implementation does not necessarily support PROT_EXEC or PROT_WRITE 28 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
/linux-master/arch/parisc/include/uapi/asm/ |
H A D | mman.h | 7 #define PROT_EXEC 0x4 /* page can be executed */ macro
|
/linux-master/arch/mips/include/uapi/asm/ |
H A D | mman.h | 14 * implementation does not necessarily support PROT_EXEC or PROT_WRITE 21 #define PROT_EXEC 0x04 /* page can be executed */ macro
|
/linux-master/mm/kasan/ |
H A D | kasan_test_module.c | 30 PROT_READ | PROT_WRITE | PROT_EXEC,
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | test_lsm.c | 33 PROT_READ | PROT_WRITE | PROT_EXEC);
|
/linux-master/tools/testing/selftests/powerpc/signal/ |
H A D | sigreturn_vdso.c | 114 mprotect((void *)low, size, PROT_READ|PROT_WRITE|PROT_EXEC);
|
/linux-master/arch/x86/um/ |
H A D | user-offsets.c | 83 DEFINE(UM_PROT_EXEC, PROT_EXEC);
|
/linux-master/arch/x86/mm/ |
H A D | pkeys.c | 91 if (prot == PROT_EXEC) { 97 * Protections are *not* PROT_EXEC, but the mapping 99 * PROT_EXEC and will no longer be. Move back to
|
/linux-master/arch/um/os-Linux/ |
H A D | process.c | 145 (x ? PROT_EXEC : 0); 157 (x ? PROT_EXEC : 0));
|