/kernel/linux/linux-6.6/tools/testing/selftests/powerpc/mm/ |
H A D | exec_prot.c | 73 if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) { in segv_handler() 95 if (!(rights & PROT_EXEC)) in check_exec_fault() 102 if (!(rights & PROT_EXEC)) in check_exec_fault() 173 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); in test() 185 FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); in test() 207 FAIL_IF(check_exec_fault(PROT_EXEC)); in test() 211 FAIL_IF(check_exec_fault(PROT_READ | PROT_EXEC)); in test() 215 FAIL_IF(check_exec_fault(PROT_WRITE | PROT_EXEC)); in test() 219 FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE | PROT_EXEC)); in test()
|
H A D | pkey_exec_prot.c | 84 if (mprotect(insns, pgsize, PROT_EXEC)) { in segv_handler() 173 * This should not generate a fault as having PROT_EXEC in test() 179 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 191 * PROT_EXEC also restricts writes. The pkey currently in test() 196 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 213 * as having PROT_EXEC implicitly allows reads. in test() 216 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 230 * PROT_EXEC does not allow writes. in test() 233 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 270 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pke in test() [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/mm/ |
H A D | mdwe_test.c | 109 self->p = mmap(NULL, self->size, PROT_READ | PROT_EXEC, self->flags, 0, 0); in TEST_F() 115 self->p = mmap(NULL, self->size, PROT_WRITE | PROT_EXEC, self->flags, 0, 0); in TEST_F() 127 self->p = mmap(NULL, self->size, PROT_READ | PROT_EXEC, self->flags, 0, 0); in TEST_F() 130 ret = mprotect(self->p, self->size, PROT_READ | PROT_EXEC); in TEST_F() 141 ret = mprotect(self->p, self->size, PROT_READ | PROT_EXEC); in TEST_F() 156 ret = mprotect(self->p, self->size, PROT_WRITE | PROT_EXEC); in TEST_F() 172 p = mmap(self->p, self->size, PROT_READ | PROT_EXEC, in TEST_F() 186 self->p = mmap(NULL, self->size, PROT_EXEC, self->flags, 0, 0); in TEST_F() 189 ret = mprotect(self->p, self->size, PROT_EXEC | PROT_BTI); in TEST_F()
|
/kernel/linux/linux-5.10/tools/testing/selftests/powerpc/mm/ |
H A D | pkey_exec_prot.c | 84 if (mprotect(insns, pgsize, PROT_EXEC)) { in segv_handler() 173 * This should not generate a fault as having PROT_EXEC in test() 179 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 191 * PROT_EXEC also restricts writes. The pkey currently in test() 196 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 213 * as having PROT_EXEC implicitly allows reads. in test() 216 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 230 * PROT_EXEC does not allow writes. in test() 233 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0); in test() 270 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pke in test() [all...] |
/kernel/linux/linux-5.10/drivers/misc/lkdtm/ |
H A D | usercopy.c | 81 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_stack() 149 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_heap_size() 223 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_heap_whitelist() 311 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_USERCOPY_KERNEL()
|
H A D | perms.c | 162 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_EXEC_USERSPACE() 183 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_ACCESS_USERSPACE()
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | mman.h | 106 return (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM)) == 0; in arch_validate_prot() 143 _calc_vm_trans(prot, PROT_EXEC, VM_EXEC) | in calc_vm_prot_bits()
|
/kernel/linux/common_modules/xpm/core/ |
H A D | xpm_security_hooks.c | 258 is_exec = !xpm_is_anonymous_vma(vma) && (prot & PROT_EXEC); in xpm_check_signature() 312 if (is_anon || (prot & PROT_EXEC)) { in xpm_check_prot() 323 if (is_anon && (prot & PROT_EXEC)) { in xpm_check_prot() 334 if (!is_anon && (prot & PROT_WRITE) && (prot & PROT_EXEC)) { in xpm_check_prot()
|
/kernel/linux/linux-6.6/drivers/misc/lkdtm/ |
H A D | usercopy.c | 82 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_stack() 150 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_slab_size() 226 PROT_READ | PROT_WRITE | PROT_EXEC, in do_usercopy_slab_whitelist() 316 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_USERCOPY_KERNEL()
|
H A D | perms.c | 205 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_EXEC_USERSPACE() 226 PROT_READ | PROT_WRITE | PROT_EXEC, in lkdtm_ACCESS_USERSPACE()
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | mman.h | 109 return (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM)) == 0; in arch_validate_prot() 146 _calc_vm_trans(prot, PROT_EXEC, VM_EXEC) | in calc_vm_prot_bits() 170 * a) mmap(PROT_WRITE | PROT_EXEC) 173 * mprotect(PROT_EXEC) 177 * mprotect(PROT_EXEC) 181 * d) mmap(PROT_READ | PROT_EXEC) 182 * mmap(PROT_READ | PROT_EXEC | PROT_BTI)
|
/kernel/linux/linux-5.10/fs/ |
H A D | binfmt_aout.c | 224 PROT_READ | PROT_EXEC, in load_aout_binary() 232 PROT_READ | PROT_WRITE | PROT_EXEC, in load_aout_binary() 311 PROT_READ | PROT_WRITE | PROT_EXEC, in load_aout_library()
|
/kernel/linux/linux-5.10/arch/c6x/include/asm/ |
H A D | cacheflush.h | 30 if ((vma)->vm_flags & PROT_EXEC) \
|
/kernel/linux/linux-6.6/arch/powerpc/include/asm/ |
H A D | mman.h | 30 if (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM | PROT_SAO)) in arch_validate_prot()
|
/kernel/linux/linux-5.10/tools/arch/alpha/include/uapi/asm/ |
H A D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/kernel/linux/linux-5.10/tools/arch/xtensa/include/uapi/asm/ |
H A D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/kernel/linux/linux-5.10/tools/arch/mips/include/uapi/asm/ |
H A D | mman.h | 32 #define PROT_EXEC 0x04 macro
|
/kernel/linux/linux-5.10/tools/arch/parisc/include/uapi/asm/ |
H A D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/kernel/linux/linux-6.6/tools/arch/alpha/include/uapi/asm/ |
H A D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/kernel/linux/linux-6.6/tools/arch/mips/include/uapi/asm/ |
H A D | mman.h | 32 #define PROT_EXEC 0x04 macro
|
/kernel/linux/linux-6.6/tools/arch/parisc/include/uapi/asm/ |
H A D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/kernel/liteos_a/testsuites/unittest/basic/mem/vm/smoke/ |
H A D | mmap_test_010.cpp | 37 /* Test PROT_WRITE and PROT_EXEC flag only */ 50 ptr = (int *)mmap(0, MMAP_SIZE, PROT_EXEC, MAP_ANON | MAP_PRIVATE, -1, 0); in Testcase()
|
/kernel/linux/linux-6.6/tools/arch/xtensa/include/uapi/asm/ |
H A D | mman.h | 31 #define PROT_EXEC 0x4 macro
|
/kernel/linux/linux-5.10/arch/powerpc/include/asm/ |
H A D | mman.h | 41 if (prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC | PROT_SEM | PROT_SAO)) in arch_validate_prot()
|
/kernel/linux/linux-5.10/arch/parisc/include/uapi/asm/ |
H A D | mman.h | 7 #define PROT_EXEC 0x4 /* page can be executed */ macro
|