Home
last modified time | relevance | path

Searched full:rwx (Results 1 – 25 of 36) sorted by relevance

12

/linux/arch/arc/mm/
H A Dtlb.c95 /* setup the other half of TLB entry (pfn, rwx..) */ in tlb_entry_insert()
397 unsigned int asid_or_sasid, rwx; in create_tlb() local
449 rwx = pte_val(*ptep) & PTE_BITS_RWX; in create_tlb()
452 rwx <<= 3; /* r w x => Kr Kw Kx 0 0 0 */ in create_tlb()
454 rwx |= (rwx << 3); /* r w x => Kr Kw Kx Ur Uw Ux */ in create_tlb()
456 pd1 = rwx | (pte_val(*ptep) & PTE_BITS_NON_RWX_IN_PD1); in create_tlb()
H A Dtlbex.S329 ; Linux PTE [RWX] bits are semantically overloaded:
/linux/Documentation/filesystems/
H A Dadfs.rst67 These are then masked by ownmask, eg 700 -> -rwx------
68 Possible owner mode permissions -> -rwx------
/linux/tools/perf/bench/
H A Dmem-memset-x86-64-asm.S13 * the ELF stack should not be restricted at all and set it RWX.
H A Dmem-memcpy-x86-64-asm.S18 * the ELF stack should not be restricted at all and set it RWX.
/linux/arch/mips/boot/compressed/
H A Dld.script12 text PT_LOAD FLAGS(7); /* RWX */
/linux/Documentation/userspace-api/
H A Dmseal.rst103 protection bits (RWX) of the mapping.
188 attributes, such as protection bits (RWX). Sealed mappings doesn't mean the
/linux/arch/x86/kvm/mmu/
H A Dspte.c198 * For the EPT case, shadow_present_mask has no RWX bits set if in make_spte()
459 * never collide as MMIO must set some RWX bits, and frozen SPTEs must in kvm_mmu_set_mmio_spte_mask()
460 * not set any RWX bits. in kvm_mmu_set_mmio_spte_mask()
/linux/arch/powerpc/kernel/
H A Dvmlinux.lds.S37 text PT_LOAD FLAGS(7); /* RWX */
248 * Various code relies on __init_begin being at the strict RWX boundary.
/linux/arch/riscv/kernel/
H A Defi.c42 /* RWX */ in efimem_to_pgprot_map()
/linux/tools/perf/arch/x86/tests/
H A Dregs_load.S97 * the ELF stack should not be restricted at all and set it RWX.
/linux/arch/arm/kernel/
H A Delf.c90 * PT_GNU_STACK == RWX  | exec-all   | exec-stack |
/linux/arch/loongarch/kernel/
H A Dvmlinux.lds.S35 text PT_LOAD FLAGS(7); /* RWX */
/linux/arch/um/
H A DMakefile137 LDFLAGS_EXECSTACK += $(call ld-option,--no-warn-rwx-segments)
/linux/arch/mips/kernel/
H A Dvmlinux.lds.S27 text PT_LOAD FLAGS(7); /* RWX */
/linux/arch/powerpc/boot/
H A Dwrapper233 if "${CROSS}ld" -v --no-warn-rwx-segments >/dev/null 2>&1; then
234 nowarn="$nowarn --no-warn-rwx-segments"
/linux/tools/testing/selftests/powerpc/mm/
H A Dexec_prot.c218 printf("Testing exec on rwx, should succeed..."); in test()
/linux/arch/x86/boot/compressed/
H A DMakefile63 LDFLAGS_vmlinux += $(call ld-option,--no-warn-rwx-segments)
/linux/tools/perf/util/
H A Dparse-events.l230 modifier_bp [rwx]{1,3}
/linux/tools/testing/selftests/mm/
H A Dmerge.c491 * forked RW RWX in TEST_F()
507 * Now mprotect forked region to RWX so it becomes the source for the in TEST_F()
510 * forked RWX RWX in TEST_F()
/linux/Documentation/admin-guide/
H A Dperf-security.rst123 # chmod o-rwx perf
/linux/arch/x86/kernel/
H A Dvmlinux.lds.S54 * However, kernel identity mappings will have different RWX permissions
/linux/arch/parisc/kernel/
H A Dhead.S149 /* Now initialize the PTEs themselves. We use RWX for
/linux/Documentation/virt/kvm/
H A Dlocking.rst225 by clearing the RWX bits in the PTE and storing the original R & X bits in more
/linux/fs/smb/server/
H A Dsmbacl.c179 * is this but we have cleared all the bits sans RWX for in mode_to_access_flags()
428 * reset rwx permissions for user/group/other. in parse_dacl()

12