| /linux/tools/testing/selftests/mm/ |
| H A D | merge.c | 73 ASSERT_EQ(mprotect(ptr, 5 * page_size, PROT_READ), 0); in TEST_F() 93 ASSERT_EQ(mprotect(&ptr[5 * page_size], 5 * page_size, PROT_READ), 0); in TEST_F() 124 ASSERT_EQ(mprotect(&ptr[5 * page_size], 5 * page_size, PROT_READ), 0); in TEST_F() 143 ASSERT_EQ(mprotect(ptr, 5 * page_size, PROT_READ), 0); in TEST_F() 174 ASSERT_EQ(mprotect(ptr, 3 * page_size, PROT_READ), 0); in TEST_F() 175 ASSERT_EQ(mprotect(&ptr[6 * page_size], 3 * page_size, PROT_READ), 0); in TEST_F() 194 ASSERT_EQ(mprotect(&ptr[3 * page_size], 3 * page_size, PROT_READ), 0); in TEST_F() 225 ASSERT_EQ(mprotect(&ptr[6 * page_size], 3 * page_size, PROT_READ), 0); in TEST_F() 244 ASSERT_EQ(mprotect(ptr, 3 * page_size, PROT_READ), 0); in TEST_F() 253 ASSERT_EQ(mprotect(&ptr[3 * page_size], 3 * page_size, PROT_READ), 0); in TEST_F() [all …]
|
| H A D | mkdirty.c | 173 if (mprotect(mem, pagesize, PROT_READ)) { in test_page_migration() 206 if (mprotect(mem, thpsize, PROT_READ)) { in test_page_migration_thp() 245 if (mprotect(mem, thpsize, PROT_READ)) { in test_pte_mapped_thp() 257 if (mprotect(mem + thpsize - pagesize, pagesize, in test_pte_mapped_thp()
|
| H A D | mdwe_test.c | 240 ret = mprotect(self->p, self->size, PROT_READ | PROT_EXEC); in TEST_F() 251 ret = mprotect(self->p, self->size, PROT_READ | PROT_EXEC); in TEST_F() 266 ret = mprotect(self->p, self->size, PROT_WRITE | PROT_EXEC); in TEST_F() 299 ret = mprotect(self->p, self->size, PROT_EXEC | PROT_BTI); in TEST_F()
|
| H A D | soft-dirty.c | 168 mprotect(map, pagesize, PROT_READ); in test_mprotect() 172 mprotect(map, pagesize, PROT_READ|PROT_WRITE); in test_mprotect() 298 if (mprotect(map, pagesize, PROT_READ | PROT_WRITE | PROT_EXEC)) in test_merge()
|
| H A D | pagemap_ioctl.c | 199 mprotect(mem, mem_size/8, PROT_READ|PROT_WRITE); in userfaultfd_tests() 200 mprotect(mem + 1 * mem_size/8, mem_size/8, PROT_READ); in userfaultfd_tests() 201 mprotect(mem + 2 * mem_size/8, mem_size/8, PROT_READ|PROT_WRITE); in userfaultfd_tests() 202 mprotect(mem + 3 * mem_size/8, mem_size/8, PROT_READ); in userfaultfd_tests() 203 mprotect(mem + 4 * mem_size/8, mem_size/8, PROT_READ|PROT_WRITE); in userfaultfd_tests() 204 mprotect(mem + 5 * mem_size/8, mem_size/8, PROT_NONE); in userfaultfd_tests() 205 mprotect(mem + 6 * mem_size/8, mem_size/8, PROT_READ|PROT_WRITE); in userfaultfd_tests() 206 mprotect(mem + 7 * mem_size/8, mem_size/8, PROT_READ); in userfaultfd_tests() 1270 mprotect(mem, page_size, PROT_NONE); in mprotect_tests() 1271 mprotect(mem, 2 * page_size, PROT_READ); in mprotect_tests() [all …]
|
| H A D | cow.c | 204 ret = mprotect(mem, size, PROT_READ); in do_test_cow_in_parent() 213 ret = mprotect(mem, size, PROT_READ|PROT_WRITE); in do_test_cow_in_parent() 484 ret = mprotect(mem, size, PROT_READ); in do_test_iouring() 492 ret = mprotect(mem, size, PROT_READ | PROT_WRITE); in do_test_iouring() 663 ret = mprotect(mem, size, PROT_READ); in do_test_ro_pin() 665 ret |= mprotect(mem, size, PROT_READ | PROT_WRITE); in do_test_ro_pin() 880 ret = mprotect(mem + pagesize, pagesize, PROT_READ); in do_run_with_thp() 886 ret = mprotect(mem + pagesize, pagesize, PROT_READ | PROT_WRITE); in do_run_with_thp() 1281 ret = mprotect(mem + pagesize, pagesize, PROT_READ); in do_test_anon_thp_collapse() 1287 ret = mprotect(mem + pagesize, pagesize, PROT_READ | PROT_WRITE); in do_test_anon_thp_collapse()
|
| H A D | hmm-tests.c | 334 ret = mprotect(buffer->ptr, size, PROT_READ); in TEST_F() 397 ret = mprotect(buffer->ptr, size, PROT_NONE); in TEST_F() 405 ret = mprotect(buffer->ptr, size, PROT_READ); in TEST_F() 514 ret = mprotect(buffer->ptr, size, PROT_WRITE | PROT_READ); in TEST_F() 1227 ret = mprotect(buffer->ptr + 2 * self->page_size, self->page_size, in TEST_F() 1235 ret = mprotect(buffer->ptr + 3 * self->page_size, self->page_size, in TEST_F() 1240 ret = mprotect(buffer->ptr + 3 * self->page_size, self->page_size, in TEST_F() 1245 ret = mprotect(buffer->ptr + 4 * self->page_size, 2 * self->page_size, in TEST_F() 1537 ret = mprotect(buffer->ptr + 2 * self->page_size, self->page_size, in TEST_F() 1545 ret = mprotect(buffer->ptr + 3 * self->page_size, self->page_size, in TEST_F() [all …]
|
| H A D | guard-regions.c | 702 TEST_F(guard_regions, mprotect) in TEST_F() argument 721 ASSERT_EQ(mprotect(&ptr[5 * page_size], 2 * page_size, PROT_READ), 0); in TEST_F() 828 ASSERT_EQ(mprotect(ptr, 3 * page_size, PROT_READ), 0); in TEST_F() 829 ASSERT_EQ(mprotect(&ptr[7 * page_size], 3 * page_size, PROT_READ), 0); in TEST_F() 839 ASSERT_EQ(mprotect(ptr, 3 * page_size, PROT_READ | PROT_WRITE), 0); in TEST_F() 840 ASSERT_EQ(mprotect(&ptr[7 * page_size], 3 * page_size, in TEST_F() 851 ASSERT_EQ(mprotect(ptr, 3 * page_size, PROT_READ), 0); in TEST_F() 852 ASSERT_EQ(mprotect(&ptr[7 * page_size], 3 * page_size, PROT_READ), 0); in TEST_F() 865 ASSERT_EQ(mprotect(ptr, 3 * page_size, PROT_READ | PROT_WRITE), 0); in TEST_F() 866 ASSERT_EQ(mprotect(&ptr[7 * page_size], 3 * page_size, in TEST_F()
|
| /linux/tools/testing/selftests/powerpc/mm/ |
| H A D | exec_prot.c | 73 if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) { in segv_handler() 98 FAIL_IF(mprotect(insns, pgsize, rights) != 0); in check_exec_fault() 173 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); in test() 185 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); in test()
|
| /linux/tools/testing/selftests/futex/functional/ |
| H A D | futex_numa_mpol.c | 146 mprotect(futex_ptr + mem_size, mem_size, PROT_NONE); in TEST() 166 mprotect(futex_ptr, mem_size, PROT_READ); in TEST() 170 mprotect(futex_ptr, mem_size, PROT_NONE); in TEST() 174 mprotect(futex_ptr, mem_size, PROT_READ | PROT_WRITE); in TEST()
|
| /linux/Documentation/translations/zh_CN/core-api/ |
| H A D | protection-keys.rst | 78 内核试图使保护密钥与普通的mprotect()的行为一致。例如,如果你这样做:: 80 mprotect(ptr, size, PROT_NONE); 99 将被设置为SEGV_PKERR,而当违反普通的mprotect()权限时,则是SEGV_ACCERR。
|
| /linux/tools/testing/selftests/powerpc/primitives/ |
| H A D | load_unaligned_zeropad.c | 43 if (mprotect(mem_region + page_size, page_size, PROT_NONE)) { in protect_region() 53 if (mprotect(mem_region + page_size, page_size, PROT_READ|PROT_WRITE)) { in unprotect_region()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | ringbuf.c | 171 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_cons_pos_protect"); in ringbuf_subtest() 195 ASSERT_ERR(mprotect(mmap_ptr, 4 * page_size, PROT_WRITE), "write_protect"); in ringbuf_subtest() 196 ASSERT_ERR(mprotect(mmap_ptr, 4 * page_size, PROT_EXEC), "exec_protect"); in ringbuf_subtest() 205 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_WRITE), "write_protect"); in ringbuf_subtest() 206 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_protect"); in ringbuf_subtest()
|
| H A D | mmap.c | 135 err = mprotect(map_mmaped, map_sz, PROT_READ); in test_mmap() 152 err = mprotect(map_mmaped, map_sz, PROT_WRITE); in test_mmap() 155 err = mprotect(map_mmaped, map_sz, PROT_EXEC); in test_mmap()
|
| H A D | user_ringbuf.c | 113 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_WRITE), "write_cons_pos_protect"); in test_user_ringbuf_mappings() 114 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_cons_pos_protect"); in test_user_ringbuf_mappings() 124 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_prod_pos_protect"); in test_user_ringbuf_mappings() 133 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_data_protect"); in test_user_ringbuf_mappings()
|
| H A D | test_lsm.c | 33 ret = mprotect(GET_PAGE_ADDR(buf, sz), sz, in stack_mprotect()
|
| /linux/Documentation/core-api/ |
| H A D | protection-keys.rst | 93 behavior of a plain mprotect(). For instance if you do this:: 95 mprotect(ptr, size, PROT_NONE); 116 the plain mprotect() permissions are violated. 120 userspace's value of the register or mprotect().
|
| /linux/Documentation/arch/sparc/ |
| H A D | adi.rst | 39 ADI is enabled on a set of pages using mprotect() with PROT_ADI flag. 83 range, enable ADI on the range using mprotect() and set version tags 84 for the entire range. mprotect() ensures range is aligned to page size 226 if (mprotect(shmaddr, BUFFER_SIZE, PROT_READ|PROT_WRITE|PROT_ADI)) { 227 perror("mprotect failed"); 270 if (mprotect(shmaddr, BUFFER_SIZE, PROT_READ|PROT_WRITE)) { 271 perror("mprotect failed");
|
| /linux/Documentation/ABI/removed/ |
| H A D | sysfs-selinux-checkreqprot | 11 to check the protection requested by userspace for mmap/mprotect 23 check the actual protections being applied upon mmap/mprotect calls.
|
| /linux/Documentation/userspace-api/ |
| H A D | mseal.rst | 93 - mprotect and pkey_mprotect 102 mprotect and pkey_mprotect are blocked because they changes the 120 - mprotect, pkey_mprotect, madvise: partial update might happen, e.g. 121 when mprotect over multiple VMAs, mprotect might update the beginning
|
| /linux/tools/testing/selftests/powerpc/signal/ |
| H A D | sigreturn_vdso.c | 114 mprotect((void *)low, size, PROT_READ|PROT_WRITE|PROT_EXEC); in test_sigreturn_vdso()
|
| /linux/tools/testing/selftests/powerpc/copyloops/ |
| H A D | exc_validate.c | 98 if (mprotect(p + page_size, page_size, PROT_NONE)) { in test_copy_exception()
|
| /linux/tools/testing/selftests/kvm/ |
| H A D | mmu_stress_test.c | 385 mprotect(mem, slot_size, PROT_READ); in main() 390 mprotect(mem, slot_size, PROT_READ | PROT_WRITE); in main()
|
| /linux/tools/testing/selftests/x86/ |
| H A D | test_shadow_stack.c | 412 if (mprotect(shstk_ptr, SS_SIZE, PROT_READ) < 0) { in test_mprotect() 427 if (mprotect(shstk_ptr, SS_SIZE, PROT_READ) < 0) { in test_mprotect() 433 if (mprotect(shstk_ptr, SS_SIZE, PROT_WRITE | PROT_READ) < 0) { in test_mprotect()
|
| /linux/arch/um/os-Linux/ |
| H A D | util.c | 23 if (mprotect((void *) address, UM_THREAD_SIZE, PROT_READ | PROT_WRITE) < 0) in stack_protections()
|