| /linux/arch/arc/mm/ |
| H A D | tlb.c | 95 /* setup the other half of TLB entry (pfn, rwx..) */ in tlb_entry_insert() 397 unsigned int asid_or_sasid, rwx; in create_tlb() local 449 rwx = pte_val(*ptep) & PTE_BITS_RWX; in create_tlb() 452 rwx <<= 3; /* r w x => Kr Kw Kx 0 0 0 */ in create_tlb() 454 rwx |= (rwx << 3); /* r w x => Kr Kw Kx Ur Uw Ux */ in create_tlb() 456 pd1 = rwx | (pte_val(*ptep) & PTE_BITS_NON_RWX_IN_PD1); in create_tlb()
|
| H A D | tlbex.S | 329 ; Linux PTE [RWX] bits are semantically overloaded:
|
| /linux/Documentation/filesystems/ |
| H A D | adfs.rst | 67 These are then masked by ownmask, eg 700 -> -rwx------ 68 Possible owner mode permissions -> -rwx------
|
| /linux/tools/perf/bench/ |
| H A D | mem-memset-x86-64-asm.S | 13 * the ELF stack should not be restricted at all and set it RWX.
|
| H A D | mem-memcpy-x86-64-asm.S | 18 * the ELF stack should not be restricted at all and set it RWX.
|
| /linux/arch/mips/boot/compressed/ |
| H A D | ld.script | 12 text PT_LOAD FLAGS(7); /* RWX */
|
| /linux/Documentation/userspace-api/ |
| H A D | mseal.rst | 103 protection bits (RWX) of the mapping. 188 attributes, such as protection bits (RWX). Sealed mappings doesn't mean the
|
| /linux/arch/x86/kvm/mmu/ |
| H A D | spte.c | 198 * For the EPT case, shadow_present_mask has no RWX bits set if in make_spte() 459 * never collide as MMIO must set some RWX bits, and frozen SPTEs must in kvm_mmu_set_mmio_spte_mask() 460 * not set any RWX bits. in kvm_mmu_set_mmio_spte_mask()
|
| /linux/arch/powerpc/kernel/ |
| H A D | vmlinux.lds.S | 37 text PT_LOAD FLAGS(7); /* RWX */ 248 * Various code relies on __init_begin being at the strict RWX boundary.
|
| /linux/arch/riscv/kernel/ |
| H A D | efi.c | 42 /* RWX */ in efimem_to_pgprot_map()
|
| /linux/tools/perf/arch/x86/tests/ |
| H A D | regs_load.S | 97 * the ELF stack should not be restricted at all and set it RWX.
|
| /linux/arch/arm/kernel/ |
| H A D | elf.c | 90 * PT_GNU_STACK == RWX | exec-all | exec-stack |
|
| /linux/arch/loongarch/kernel/ |
| H A D | vmlinux.lds.S | 35 text PT_LOAD FLAGS(7); /* RWX */
|
| /linux/arch/um/ |
| H A D | Makefile | 137 LDFLAGS_EXECSTACK += $(call ld-option,--no-warn-rwx-segments)
|
| /linux/arch/mips/kernel/ |
| H A D | vmlinux.lds.S | 27 text PT_LOAD FLAGS(7); /* RWX */
|
| /linux/arch/powerpc/boot/ |
| H A D | wrapper | 233 if "${CROSS}ld" -v --no-warn-rwx-segments >/dev/null 2>&1; then 234 nowarn="$nowarn --no-warn-rwx-segments"
|
| /linux/tools/testing/selftests/powerpc/mm/ |
| H A D | exec_prot.c | 218 printf("Testing exec on rwx, should succeed..."); in test()
|
| /linux/arch/x86/boot/compressed/ |
| H A D | Makefile | 63 LDFLAGS_vmlinux += $(call ld-option,--no-warn-rwx-segments)
|
| /linux/tools/perf/util/ |
| H A D | parse-events.l | 230 modifier_bp [rwx]{1,3}
|
| /linux/tools/testing/selftests/mm/ |
| H A D | merge.c | 491 * forked RW RWX in TEST_F() 507 * Now mprotect forked region to RWX so it becomes the source for the in TEST_F() 510 * forked RWX RWX in TEST_F()
|
| /linux/Documentation/admin-guide/ |
| H A D | perf-security.rst | 123 # chmod o-rwx perf
|
| /linux/arch/x86/kernel/ |
| H A D | vmlinux.lds.S | 54 * However, kernel identity mappings will have different RWX permissions
|
| /linux/arch/parisc/kernel/ |
| H A D | head.S | 149 /* Now initialize the PTEs themselves. We use RWX for
|
| /linux/Documentation/virt/kvm/ |
| H A D | locking.rst | 225 by clearing the RWX bits in the PTE and storing the original R & X bits in more
|
| /linux/fs/smb/server/ |
| H A D | smbacl.c | 179 * is this but we have cleared all the bits sans RWX for in mode_to_access_flags() 428 * reset rwx permissions for user/group/other. in parse_dacl()
|