Home
last modified time | relevance | path

Searched refs:execve (Results 1 – 25 of 46) sorted by relevance

12

/kernel/linux/build/test/kernel_ltp/syscalls/execve/
DBUILD.gn19 sources = [ "//third_party/ltp/testcases/kernel/syscalls/execve/execve01.c" ]
25 [ "//third_party/ltp/testcases/kernel/syscalls/execve/execve01_child.c" ]
30 sources = [ "//third_party/ltp/testcases/kernel/syscalls/execve/execve02.c" ]
35 sources = [ "//third_party/ltp/testcases/kernel/syscalls/execve/execve03.c" ]
40 sources = [ "//third_party/ltp/testcases/kernel/syscalls/execve/execve04.c" ]
45 sources = [ "//third_party/ltp/testcases/kernel/syscalls/execve/execve05.c" ]
51 [ "//third_party/ltp/testcases/kernel/syscalls/execve/execve_child.c" ]
/kernel/linux/linux-5.10/Documentation/userspace-api/
Dno_new_privs.rst5 The execve system call can grant a newly-started program privileges that
23 execution environment in a manner that persists across execve. Any task
25 clone, and execve and cannot be unset. With ``no_new_privs`` set, ``execve()``
27 been done without the execve call. For example, the setuid and setgid
30 execve.
42 involve ``execve()``. An appropriately privileged task can still call
48 execve and can change the behavior of newly-executed programs.
Dspec_ctrl.rst43 cleared on :manpage:`execve(2)`.
/kernel/linux/build/test/kernel_ltp/syscalls/
DBUILD.gn163 "execve:execve01",
164 "execve:execve01_child",
165 "execve:execve02",
166 "execve:execve03",
167 "execve:execve04",
168 "execve:execve05",
/kernel/liteos_a/apps/init/src/
Dinit.c63 (void)execve(samplePath, NULL, NULL); in main()
89 (void)execve(shellPath, NULL, NULL); in main()
/kernel/linux/linux-5.10/tools/perf/trace/strace/groups/
Dfile4 execve
Dstring10 execve
/kernel/linux/linux-5.10/Documentation/arm64/
Dsve.rst112 exceptions for execve() described in section 6.
191 Inherit the current vector length across execve(). Otherwise, the
192 vector length is reset to the system default at execve(). (See
197 Defer the requested vector length change until the next execve()
201 call immediately after the next execve() (if any) by the thread:
221 to be applied at the next execve() by the thread (dependent on whether
234 vector length that will be applied at the next execve() by the calling
252 Vector length will be inherited across execve().
256 fork() or vfork() and the corresponding execve() in typical use).
393 * At every execve() call, the new vector length of the new process is set to
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/exec/
Drecursion-depth.c61 int rv = execve(FILENAME, NULL, NULL); in main()
/kernel/linux/linux-5.10/tools/testing/selftests/timens/
Dexec.c80 execve("/proc/self/exe", cargv, cenv); in main()
/kernel/liteos_a/apps/perf/src/
Dperf_stat.c141 (void)execve(cmd.path, cmd.params, NULL); in PerfStat()
Dperf_record.c183 (void)execve(cmd.path, cmd.params, NULL); in PerfRecord()
/kernel/linux/linux-5.10/tools/testing/selftests/powerpc/benchmarks/
Dfork.c79 if (execve("./exec_target", argv, NULL) == -1) { in run_exec()
/kernel/linux/linux-5.10/Documentation/security/
Dcredentials.rst167 ``execve()``.
170 ``execve()``, especially when a binary is executed that will execute as
177 execve(). They aren't used directly as objective or subjective
242 operations allowed or disallowed as a result. In the case of execve(), the
446 ``execve()``.
/kernel/linux/linux-5.10/kernel/
Daudit.h190 } execve; member
/kernel/linux/linux-5.10/tools/perf/arch/x86/entry/syscalls/
Dsyscall_64.tbl70 59 64 execve sys_execve
380 520 x32 execve compat_sys_execve
/kernel/linux/linux-5.10/arch/x86/entry/syscalls/
Dsyscall_64.tbl70 59 64 execve sys_execve
380 520 x32 execve compat_sys_execve
/kernel/linux/linux-5.10/arch/sparc/kernel/syscalls/
Dsyscall.tbl82 59 32 execve sys_execve sys32_execve
83 59 64 execve sys64_execve
/kernel/linux/linux-5.10/Documentation/admin-guide/mm/
Dnommu-mmap.rst8 call and the execve() system call. From the kernel's point of view, execve()
/kernel/liteos_a/apps/shell/src/
Dshmsg.c378 ret = execve(cmdName, paramArray, NULL); in ChildExec()
/kernel/linux/linux-5.10/arch/mips/kernel/syscalls/
Dsyscall_n64.tbl67 57 n64 execve sys_execve
Dsyscall_n32.tbl67 57 n32 execve compat_sys_execve
/kernel/linux/linux-5.10/arch/ia64/kernel/syscalls/
Dsyscall.tbl21 9 common execve ia64_execve
/kernel/linux/linux-5.10/Documentation/process/
Dadding-syscalls.rst119 ``execve()`` in another thread could leak a descriptor to
400 (``fork``/``vfork``/``clone``) or even architecture (``execve``/``execveat``)
448 file open (``open``/``openat``), program execution (``execve``/``exeveat``) or
/kernel/linux/linux-5.10/Documentation/security/keys/
Drequest-key.rst128 /sbin/request-key at the appropriate places because (a) execve will discard two

12