/linux/Documentation/userspace-api/ |
H A D | spec_ctrl.rst | 16 :manpage:`prctl(2)`. 18 There are two prctl options which are related to this: 28 which is selected with arg2 of prctl(2). The return value uses bits 0-3 with 41 subsequent prctl(..., PR_SPEC_ENABLE) will fail. 49 available. If not set, prctl(PR_SET_SPECULATION_CTRL) for the speculation 58 is selected by arg2 of :manpage:`prctl(2)` per task. arg3 is used to hand 67 EINVAL The prctl is not implemented by the architecture or unused 68 prctl(2) arguments are not 0. 95 * prctl(PR_GET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, 0, 0, 0); 96 * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, PR_SPEC_ENABLE, 0, 0); [all …]
|
/linux/tools/testing/selftests/syscall_user_dispatch/ |
H A D | sud_test.c | 68 ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 0, 0, &sel); in TEST_SIGNAL() 89 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0, 0, &sel); in TEST() 96 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x1, 0x0, 0); in TEST() 100 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0xff, 0); in TEST() 104 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x0, &sel); in TEST() 109 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x0, 0x0); in TEST() 116 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x1, 0x0, &sel); in TEST() 118 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, -1L, 0x0, &sel); in TEST() 122 prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x1, (void *) -1); in TEST() 128 prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 1, -1L, &sel); in TEST() [all …]
|
/linux/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 347 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST() 358 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST_SIGNAL() 374 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST() 385 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, NULL, 0, 0); in TEST() 389 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, NULL, NULL, NULL); in TEST() 409 ret = prctl(PR_GET_NO_NEW_PRIVS, 0, NULL, 0, 0); in TEST() 414 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() 444 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST() 451 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() 458 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST() [all …]
|
H A D | seccomp_benchmark.c | 19 #include <sys/prctl.h> 220 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in main() 224 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main() 231 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main() 238 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog); in main() 245 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main()
|
/linux/tools/testing/selftests/mm/ |
H A D | mdwe_test.c | 8 #include <linux/prctl.h> 13 #include <sys/prctl.h> 25 EXPECT_LT(prctl(PR_SET_MDWE, PR_MDWE_NO_INHERIT, 0L, 0L, 7L), 0); in TEST() 28 EXPECT_LT(prctl(PR_SET_MDWE, 7L, 0L, 0L, 0L), 0); in TEST() 30 EXPECT_LT(prctl(PR_SET_MDWE, 0L, 7L, 0L, 0L), 0); in TEST() 32 EXPECT_LT(prctl(PR_SET_MDWE, 0L, 0L, 7L, 0L), 0); in TEST() 34 EXPECT_LT(prctl(PR_SET_MDWE, 0L, 0L, 0L, 7L), 0); in TEST() 37 EXPECT_LT(prctl(PR_GET_MDWE, 7L, 0L, 0L, 0L), 0); in TEST() 39 EXPECT_LT(prctl(PR_GET_MDWE, 0L, 7L, 0L, 0L), 0); in TEST() 41 EXPECT_LT(prctl(PR_GET_MDW in TEST() [all...] |
H A D | ksm_functional_tests.c | 200 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in __mmap_and_merge_range() 442 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in test_prctl() 451 ret = prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0); in test_prctl() 460 ret = prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0); in test_prctl() 466 ret = prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0); in test_prctl() 484 if (prctl(PR_GET_MEMORY_MERGE, 0, 0, 0, 0) != 1) in test_child_ksm() 516 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in test_prctl_fork() 544 if (prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0)) { in test_prctl_fork() 559 ret = prctl(PR_SET_MEMORY_MERGE, 1, 0, 0, 0); in test_prctl_fork_exec() 596 if (prctl(PR_SET_MEMORY_MERGE, 0, 0, 0, 0)) { in test_prctl_fork_exec() [all …]
|
/linux/tools/testing/selftests/powerpc/dexcr/ |
H A D | dexcr.h | 35 unsigned long prctl; /* 'which' value for get/set prctl */ member 44 .prctl = PR_PPC_DEXCR_SBHE, 51 .prctl = PR_PPC_DEXCR_IBRTPD, 58 .prctl = PR_PPC_DEXCR_SRAPD, 65 .prctl = PR_PPC_DEXCR_NPHIE, 72 .prctl = -1,
|
H A D | chdexcr.c | 38 if (aspect->prctl == -1) in help() 48 if (aspects[i].prctl != -1 && !strcmp(aspects[i].opt, opt)) in opt_to_aspect() 84 err = pr_set_dexcr(aspect->prctl, ctrl); in apply_option()
|
H A D | dexcr.c | 65 return prctl(PR_PPC_GET_DEXCR, which, 0UL, 0UL, 0UL); in pr_get_dexcr() 70 return prctl(PR_PPC_SET_DEXCR, which, ctrl, 0UL, 0UL); in pr_set_dexcr()
|
/linux/tools/testing/selftests/riscv/vector/ |
H A D | vstate_prctl.c | 18 rc = prctl(PR_RISCV_V_SET_CONTROL, provided); in test_and_compare_child() 42 rc = prctl(PR_RISCV_V_GET_CONTROL); in TEST() 56 rc = prctl(PR_RISCV_V_SET_CONTROL, PR_RISCV_V_VSTATE_CTRL_ON); in TEST() 72 rc = prctl(PR_RISCV_V_SET_CONTROL, flag); in TEST() 85 rc = prctl(PR_RISCV_V_SET_CONTROL, flag); in TEST() 215 rc = prctl(PR_RISCV_V_SET_CONTROL, 0xff0); in TEST() 228 rc = prctl(PR_RISCV_V_SET_CONTROL, 0x3); in TEST() 241 rc = prctl(PR_RISCV_V_SET_CONTROL, 0xc); in TEST()
|
/linux/tools/testing/selftests/prctl/ |
H A D | disable-tsc-test.c | 49 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in sigsegv_cb() 55 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in sigsegv_cb() 71 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in main() 79 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in main() 86 if ( prctl(PR_SET_TSC, PR_TSC_SIGSEGV) == -1) in main()
|
H A D | set-process-name.c | 21 res = prctl(PR_SET_NAME, name, NULL, NULL, NULL); in set_name() 33 res = prctl(PR_GET_NAME, name, NULL, NULL, NULL); in check_is_name_correct() 46 res = prctl(PR_GET_NAME, name, NULL, NULL, NULL); in check_null_pointer() 72 int res = prctl(PR_GET_NAME, name, NULL, NULL, NULL); in check_name()
|
H A D | disable-tsc-on-off-stress-test.c | 50 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in sigsegv_cb() 72 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in task()
|
H A D | disable-tsc-ctxt-sw-stress-test.c | 46 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in segvtask() 67 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in rdtsctask()
|
/linux/tools/testing/selftests/capabilities/ |
H A D | test_execve.c | 93 if (prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0) != 0) in create_and_enter_ns() 279 …if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != -1 || errno != E… in do_tests() 296 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_RAW, 0, 0, 0) != -1 || errno != EPERM) { in do_tests() 307 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 314 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 1) { in do_tests() 319 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_CLEAR_ALL, 0, 0, 0, 0) != 0) in do_tests() 323 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 329 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests() 337 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests() 357 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests()
|
/linux/tools/testing/selftests/arm64/fp/ |
H A D | vec-syscfg.c | 316 ret = prctl(data->prctl_get); in prctl_get() 341 ret = prctl(data->prctl_set, cur_vl); in prctl_set_same() 365 ret = prctl(data->prctl_set, data->min_vl); in prctl_set() 386 ret = prctl(data->prctl_set, data->max_vl); in prctl_set() 401 ret = prctl(data->prctl_get); in prctl_set() 428 ret = prctl(data->prctl_set, data->min_vl); in prctl_set_no_child() 466 ret = prctl(data->prctl_set, data->min_vl | PR_SVE_VL_INHERIT); in prctl_set_for_child() 475 ret = prctl(data->prctl_get); in prctl_set_for_child() 522 ret = prctl(data->prctl_set, data->max_vl); in prctl_set_onexec() 531 ret = prctl(data->prctl_set, data->min_vl | PR_SVE_SET_VL_ONEXEC); in prctl_set_onexec() [all …]
|
/linux/Documentation/arch/powerpc/ |
H A D | dexcr.rst | 39 prctl section in Configuration 44 :manpage:`prctl(2)` commands. These calls have the form:: 46 prctl(PR_PPC_GET_DEXCR, unsigned long which, 0, 0, 0); 47 prctl(PR_PPC_SET_DEXCR, unsigned long which, unsigned long ctrl, 0, 0); 56 * - ``prctl()`` which 80 * - ``prctl()`` ctrl 107 ``PR_PPC_SET_DEXCR`` prctl. 112 prctl(PR_PPC_SET_DEXCR, PR_PPC_DEXCR_IBRTPD, PR_PPC_DEXCR_CTRL_SET, 0, 0); 124 :manpage:`execve(2)`. The PR_PPC_SET_DEXCR prctl() can control both of these 165 - This aspect cannot be modified with prctl() (check for the
|
/linux/Documentation/translations/zh_CN/userspace-api/ |
H A D | seccomp_filter.rst | 45 添加了一个额外的seccomp模式,它可以使用和严格seccomp相同的 prctl(2) 调用来启用。 55 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, prog); 63 在调用之前,进程必须调用 ``prctl(PR_SET_NO_NEW_PRIVS, 1)`` 或者在它的 68 另外,如果 ``prctl(2)`` 被安装的过滤器所允许,就可以叠加额外的过滤器。这会增
|
/linux/tools/perf/trace/beauty/ |
H A D | prctl_option.sh | 8 grep -E $regex ${beauty_uapi_linux_dir}/prctl.h | grep -v PR_SET_PTRACER | \ 15 grep -E $regex ${beauty_uapi_linux_dir}/prctl.h | \
|
/linux/Documentation/admin-guide/LSM/ |
H A D | Yama.rst | 30 For a solution, some applications use ``prctl(PR_SET_DUMPABLE, ...)`` to 39 ``prctl(PR_SET_PTRACER, pid, ...)`` can be used. An inferior can declare which 45 restrictions, it can call ``prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, ...)`` 55 ``prctl(PR_SET_DUMPABLE...)`` already). Similarly, ``PTRACE_TRACEME`` is 63 inferior can call ``prctl(PR_SET_PTRACER, debugger, ...)`` to declare
|
/linux/tools/testing/selftests/riscv/abi/ |
H A D | pointer_masking.c | 47 ret = prctl(PR_SET_TAGGED_ADDR_CTRL, request << PR_PMLEN_SHIFT, 0, 0, 0); in test_pmlen() 51 ret = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0); in test_pmlen() 83 ret = prctl(PR_SET_TAGGED_ADDR_CTRL, arg, 0, 0, 0); in set_tagged_addr_ctrl() 85 ret = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0); in set_tagged_addr_ctrl()
|
/linux/samples/check-exec/ |
H A D | set-exec.c | 36 secbits_cur = prctl(PR_GET_SECUREBITS); in main() 71 prctl(PR_SET_SECUREBITS, secbits_new)) { in main()
|
/linux/samples/seccomp/ |
H A D | dropper.c | 49 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { in install_filter() 53 if (prctl(PR_SET_SECCOMP, 2, &prog)) { in install_filter()
|
/linux/tools/testing/selftests/powerpc/pmu/ |
H A D | per_event_excludes.c | 74 prctl(PR_TASK_PERF_EVENTS_ENABLE); in per_event_excludes() 80 prctl(PR_TASK_PERF_EVENTS_DISABLE); in per_event_excludes()
|
/linux/Documentation/arch/arm64/ |
H A D | memory-tagging-extension.rst | 83 ``prctl(PR_SET_TAGGED_ADDR_CTRL, flags, 0, 0, 0)`` system call where ``flags`` 98 ``prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0)`` system call. If 125 in the randomly generated set using the ``prctl(PR_SET_TAGGED_ADDR_CTRL, 129 **Note**: The hardware uses an exclude mask but the ``prctl()`` 151 bits in the ``flags`` argument to the ``prctl(PR_SET_TAGGED_ADDR_CTRL, 223 ``prctl()`` options described in 267 #include <sys/prctl.h> 280 * From include/uapi/linux/prctl.h 324 if (prctl(PR_SET_TAGGED_ADDR_CTRL, 328 perror("prctl() failed");
|