Home
last modified time | relevance | path

Searched refs:execve (Results 1 – 25 of 39) sorted by relevance

12

/Linux-v5.4/Documentation/userspace-api/
Dno_new_privs.rst5 The execve system call can grant a newly-started program privileges that
23 execution environment in a manner that persists across execve. Any task
25 clone, and execve and cannot be unset. With ``no_new_privs`` set, ``execve()``
27 been done without the execve call. For example, the setuid and setgid
30 execve.
42 involve ``execve()``. An appropriately privileged task can still call
48 execve and can change the behavior of newly-executed programs.
Dspec_ctrl.rst43 cleared on :manpage:`execve(2)`.
/Linux-v5.4/tools/perf/trace/strace/groups/
Dfile4 execve
Dstring10 execve
/Linux-v5.4/Documentation/arm64/
Dsve.rst112 exceptions for execve() described in section 6.
191 Inherit the current vector length across execve(). Otherwise, the
192 vector length is reset to the system default at execve(). (See
197 Defer the requested vector length change until the next execve()
201 call immediately after the next execve() (if any) by the thread:
221 to be applied at the next execve() by the thread (dependent on whether
234 vector length that will be applied at the next execve() by the calling
252 Vector length will be inherited across execve().
256 fork() or vfork() and the corresponding execve() in typical use).
393 * At every execve() call, the new vector length of the new process is set to
[all …]
/Linux-v5.4/tools/testing/selftests/exec/
Drecursion-depth.c61 int rv = execve(FILENAME, NULL, NULL); in main()
/Linux-v5.4/tools/testing/selftests/powerpc/benchmarks/
Dfork.c79 if (execve("./exec_target", argv, NULL) == -1) { in run_exec()
/Linux-v5.4/Documentation/security/
Dcredentials.rst167 ``execve()``.
170 ``execve()``, especially when a binary is executed that will execute as
177 execve(). They aren't used directly as objective or subjective
242 operations allowed or disallowed as a result. In the case of execve(), the
447 ``execve()``.
/Linux-v5.4/kernel/
Daudit.h190 } execve; member
Dauditsc.c1024 audit_log_format(*ab, "argc=%d", context->execve.argc); in audit_log_execve_info()
1153 } while (arg < context->execve.argc); in audit_log_execve_info()
2309 context->execve.argc = bprm->argc; in __audit_bprm()
/Linux-v5.4/tools/perf/arch/x86/entry/syscalls/
Dsyscall_64.tbl70 59 64 execve __x64_sys_execve/ptregs
375 520 x32 execve __x32_compat_sys_execve/ptregs
/Linux-v5.4/arch/x86/entry/syscalls/
Dsyscall_64.tbl70 59 64 execve __x64_sys_execve/ptregs
375 520 x32 execve __x32_compat_sys_execve/ptregs
/Linux-v5.4/arch/sparc/kernel/syscalls/
Dsyscall.tbl82 59 32 execve sys_execve sys32_execve
83 59 64 execve sys64_execve
/Linux-v5.4/Documentation/
Dnommu-mmap.txt8 call and the execve() system call. From the kernel's point of view, execve()
/Linux-v5.4/arch/mips/kernel/syscalls/
Dsyscall_n32.tbl67 57 n32 execve compat_sys_execve
Dsyscall_n64.tbl67 57 n64 execve sys_execve
/Linux-v5.4/arch/ia64/kernel/syscalls/
Dsyscall.tbl21 9 common execve ia64_execve
/Linux-v5.4/Documentation/process/
Dadding-syscalls.rst119 ``execve()`` in another thread could leak a descriptor to
400 (``fork``/``vfork``/``clone``) or even architecture (``execve``/``execveat``)
448 file open (``open``/``openat``), program execution (``execve``/``exeveat``) or
/Linux-v5.4/arch/xtensa/kernel/syscalls/
Dsyscall.tbl131 117 common execve sys_execve
/Linux-v5.4/Documentation/security/keys/
Drequest-key.rst128 /sbin/request-key at the appropriate places because (a) execve will discard two
/Linux-v5.4/arch/m68k/kernel/syscalls/
Dsyscall.tbl21 11 common execve sys_execve
/Linux-v5.4/fs/
Dexec.c1956 SYSCALL_DEFINE3(execve, in SYSCALL_DEFINE3() argument
1978 COMPAT_SYSCALL_DEFINE3(execve, const char __user *, filename, in COMPAT_SYSCALL_DEFINE3() argument
/Linux-v5.4/Documentation/translations/it_IT/process/
Dadding-syscalls.rst132 ``fork()`` o ``execve()`` potrebbe trasferire il descrittore al programma
448 l'architettura del programma (``execve``/``execveat``).
503 (``open``/``openat``), esecuzione dei programmi (``execve``/``exeveat``)
/Linux-v5.4/arch/sh/kernel/syscalls/
Dsyscall.tbl21 11 common execve sys_execve
/Linux-v5.4/tools/perf/arch/s390/entry/syscalls/
Dsyscall.tbl21 11 common execve sys_execve compat_sys_execve

12