Home
last modified time | relevance | path

Searched refs:execve (Results 1 – 25 of 47) sorted by relevance

12

/linux/Documentation/userspace-api/
A Dno_new_privs.rst5 The execve system call can grant a newly-started program privileges that
23 execution environment in a manner that persists across execve. Any task
25 clone, and execve and cannot be unset. With ``no_new_privs`` set, ``execve()``
27 been done without the execve call. For example, the setuid and setgid
30 execve.
42 involve ``execve()``. An appropriately privileged task can still call
48 execve and can change the behavior of newly-executed programs.
A Dspec_ctrl.rst43 cleared on :manpage:`execve(2)`.
/linux/Documentation/arm64/
A Dasymmetric-32bit.rst19 ``execve(2)`` of 32-bit ELF binaries, with the latter returning
65 ``execve(2)``
69 ``execve(2)``. This is not always possible on an asymmetric system,
77 preserved across ``execve(2)`` of 32-bit programs.
90 A subsequent ``execve(2)`` of a 64-bit program by the 32-bit task will
94 policy or cpuset hierarchy, in which case the ``execve(2)`` continues
100 ``execve(2)`` is invalidated.
110 ``execve(2)`` of a 32-bit program from a 64-bit deadline task will
114 `execve(2)`_, in which case step (1) is skipped and a warning is
136 (2) of the process described in `execve(2)`_ and the cpuset hierarchy is
A Dsve.rst112 exceptions for execve() described in section 6.
191 Inherit the current vector length across execve(). Otherwise, the
192 vector length is reset to the system default at execve(). (See
197 Defer the requested vector length change until the next execve()
201 call immediately after the next execve() (if any) by the thread:
221 to be applied at the next execve() by the thread (dependent on whether
234 vector length that will be applied at the next execve() by the calling
252 Vector length will be inherited across execve().
256 fork() or vfork() and the corresponding execve() in typical use).
393 * At every execve() call, the new vector length of the new process is set to
[all …]
/linux/tools/perf/trace/strace/groups/
A Dfile4 execve
A Dstring10 execve
/linux/tools/testing/selftests/exec/
A Drecursion-depth.c61 int rv = execve(FILENAME, NULL, NULL); in main()
/linux/tools/testing/selftests/timens/
A Dexec.c80 execve("/proc/self/exe", cargv, cenv); in main()
/linux/tools/testing/selftests/rlimits/
A Drlimits-per-userns.c81 execve(service_prog, argv, envp); in fork_child()
/linux/tools/testing/selftests/powerpc/benchmarks/
A Dfork.c79 if (execve("./exec_target", argv, NULL) == -1) { in run_exec()
/linux/Documentation/security/
A Dcredentials.rst167 ``execve()``.
170 ``execve()``, especially when a binary is executed that will execute as
177 execve(). They aren't used directly as objective or subjective
242 operations allowed or disallowed as a result. In the case of execve(), the
446 ``execve()``.
/linux/arch/x86/entry/syscalls/
A Dsyscall_64.tbl70 59 64 execve sys_execve
389 520 x32 execve compat_sys_execve
/linux/tools/perf/arch/x86/entry/syscalls/
A Dsyscall_64.tbl70 59 64 execve sys_execve
389 520 x32 execve compat_sys_execve
/linux/kernel/
A Daudit.h200 } execve; member
/linux/arch/sparc/kernel/syscalls/
A Dsyscall.tbl82 59 32 execve sys_execve sys32_execve
83 59 64 execve sys64_execve
/linux/Documentation/admin-guide/mm/
A Dnommu-mmap.rst8 call and the execve() system call. From the kernel's point of view, execve()
/linux/tools/perf/arch/mips/entry/syscalls/
A Dsyscall_n64.tbl67 57 n64 execve sys_execve
/linux/arch/ia64/kernel/syscalls/
A Dsyscall.tbl21 9 common execve ia64_execve
/linux/arch/mips/kernel/syscalls/
A Dsyscall_n64.tbl67 57 n64 execve sys_execve
A Dsyscall_n32.tbl67 57 n32 execve compat_sys_execve
/linux/Documentation/process/
A Dadding-syscalls.rst119 ``execve()`` in another thread could leak a descriptor to
400 (``fork``/``vfork``/``clone``) or even architecture (``execve``/``execveat``)
448 file open (``open``/``openat``), program execution (``execve``/``exeveat``) or
/linux/fs/
A Dexec.c2061 SYSCALL_DEFINE3(execve, in SYSCALL_DEFINE3() argument
2081 COMPAT_SYSCALL_DEFINE3(execve, const char __user *, filename, in COMPAT_SYSCALL_DEFINE3() argument
/linux/arch/xtensa/kernel/syscalls/
A Dsyscall.tbl131 117 common execve sys_execve
/linux/Documentation/security/keys/
A Drequest-key.rst128 /sbin/request-key at the appropriate places because (a) execve will discard two
/linux/Documentation/translations/it_IT/process/
A Dadding-syscalls.rst132 ``fork()`` o ``execve()`` potrebbe trasferire il descrittore al programma
448 l'architettura del programma (``execve``/``execveat``).
503 (``open``/``openat``), esecuzione dei programmi (``execve``/``exeveat``)

Completed in 23 milliseconds

12