Home
last modified time | relevance | path

Searched refs:execve (Results 1 – 23 of 23) sorted by relevance

/Linux-v4.19/Documentation/userspace-api/
Dno_new_privs.rst5 The execve system call can grant a newly-started program privileges that
23 execution environment in a manner that persists across execve. Any task
25 clone, and execve and cannot be unset. With ``no_new_privs`` set, ``execve()``
27 been done without the execve call. For example, the setuid and setgid
30 execve.
42 involve ``execve()``. An appropriately privileged task can still call
48 execve and can change the behavior of newly-executed programs.
Dseccomp_filter.rst67 If ``fork``/``clone`` and ``execve`` are allowed by @prog, any child
Dunshare.rst317 about 10 threads. Have a couple of threads execute execve,
/Linux-v4.19/tools/perf/trace/strace/groups/
Dfile4 execve
/Linux-v4.19/Documentation/arm64/
Dsve.txt81 exceptions for execve() described in section 6.
156 Inherit the current vector length across execve(). Otherwise, the
157 vector length is reset to the system default at execve(). (See
162 Defer the requested vector length change until the next execve()
166 call immediately after the next execve() (if any) by the thread:
186 to be applied at the next execve() by the thread (dependent on whether
199 vector length that will be applied at the next execve() by the calling
217 Vector length will be inherited across execve().
221 fork() or vfork() and the corresponding execve() in typical use).
358 * At every execve() call, the new vector length of the new process is set to
[all …]
/Linux-v4.19/tools/testing/selftests/powerpc/benchmarks/
Dfork.c79 if (execve("./exec_target", argv, NULL) == -1) { in run_exec()
/Linux-v4.19/arch/x86/entry/syscalls/
Dsyscall_64.tbl70 59 64 execve __x64_sys_execve/ptregs
361 520 x32 execve __x32_compat_sys_execve/ptregs
Dsyscall_32.tbl25 11 i386 execve sys_execve __ia32_compat_sys_execve
/Linux-v4.19/tools/perf/arch/x86/entry/syscalls/
Dsyscall_64.tbl70 59 64 execve __x64_sys_execve/ptregs
361 520 x32 execve __x32_compat_sys_execve/ptregs
/Linux-v4.19/Documentation/security/
Dcredentials.rst167 ``execve()``.
170 ``execve()``, especially when a binary is executed that will execute as
177 execve(). They aren't used directly as objective or subjective
242 operations allowed or disallowed as a result. In the case of execve(), the
447 ``execve()``.
/Linux-v4.19/kernel/
Daudit.h202 } execve; member
Dauditsc.c1046 audit_log_format(*ab, "argc=%d", context->execve.argc); in audit_log_execve_info()
1175 } while (arg < context->execve.argc); in audit_log_execve_info()
2208 context->execve.argc = bprm->argc; in __audit_bprm()
/Linux-v4.19/arch/powerpc/include/asm/
Dsystbl.h18 COMPAT_SYS(execve)
/Linux-v4.19/arch/parisc/kernel/
Dsyscall_table.S69 ENTRY_COMP(execve)
/Linux-v4.19/Documentation/
Dnommu-mmap.txt8 call and the execve() system call. From the kernel's point of view, execve()
Dlsm.txt182 :c:func:`execve()` and :c:func:`set\*uid()`, checking
/Linux-v4.19/Documentation/security/keys/
Drequest-key.rst125 /sbin/request-key at the appropriate places because (a) execve will discard two
Dcore.rst144 clone, fork, vfork or execve occurs. A new keyring is created only when
149 shared. execve also discards the process's process keyring and creates a
153 execve, even when the latter executes a set-UID or set-GID binary. A
/Linux-v4.19/Documentation/process/
Dadding-syscalls.rst116 ``execve()`` in another thread could leak a descriptor to
397 (``fork``/``vfork``/``clone``) or even architecture (``execve``/``execveat``)
445 file open (``open``/``openat``), program execution (``execve``/``exeveat``) or
/Linux-v4.19/arch/arm/tools/
Dsyscall.tbl25 11 common execve sys_execve
/Linux-v4.19/fs/
Dexec.c1959 SYSCALL_DEFINE3(execve, in SYSCALL_DEFINE3() argument
1981 COMPAT_SYSCALL_DEFINE3(execve, const char __user *, filename, in COMPAT_SYSCALL_DEFINE3() argument
/Linux-v4.19/tools/perf/arch/s390/entry/syscalls/
Dsyscall.tbl21 11 common execve sys_execve compat_sys_execve
/Linux-v4.19/arch/s390/kernel/syscalls/
Dsyscall.tbl21 11 common execve sys_execve compat_sys_execve