Home
last modified time | relevance | path

Searched full:executable (Results 1 – 25 of 57) sorted by relevance

123

/Documentation/userspace-api/
Dmfd_noexec.rst4 Introduction of non-executable mfd
19 boot), this executable nature of memfd opens a door for NoExec bypass
25 On the other hand, executable memfd has its legit use: runc uses memfd’s
26 seal and executable feature to copy the contents of the binary then
28 use of executable memfds and an attacker's [3].
34 migrating and enforcing non-executable MFD.
72 doesn't set the executable bit; for example, a container with
73 vm.memfd_noexec=1 means the old software will create non-executable memfd
74 by default while new software can create executable memfd by setting
DELF.rst33 program header of an executable is used. Other PT_GNU_PROPERTY headers
/Documentation/admin-guide/hw-vuln/
Dmultihit.rst108 non-executable pages. This forces all iTLB entries to be 4K, and removes
112 as non-executable. If the guest attempts to execute in one of those pages,
113 the page is broken down into 4K pages, which are then marked executable.
120 non-executable in all shadow paging modes.
126 non-executable can be controlled with a module parameter "nx_huge_pages=".
134 non-executable huge pages in Linux kernel KVM module. All huge
135 pages in the EPT are marked as non-executable.
137 broken down into 4K pages, which are then marked executable.
/Documentation/translations/zh_CN/arch/riscv/
Dboot-image-header.rst25 u32 code0; /* Executable code */
26 u32 code1; /* Executable code */
/Documentation/arch/riscv/
Dboot-image-header.rst12 u32 code0; /* Executable code */
13 u32 code1; /* Executable code */
/Documentation/admin-guide/
Dperf-security.rst112 group to Perf tool executable and limit access to the executable for
127 2. Assign the required capabilities to the Perf tool executable file and
162 configured Perf tool executable that, when executes, passes perf_events
165 In case Perf tool executable can't be assigned required capabilities (e.g.
305 executable with CAP_IPC_LOCK capability.
Djava.rst35 support for executable Jar files::
399 Set the executable permissions of the binary file, with::
423 added executable Jar file support by Kurt Huwig <kurt@iku-netz.de>
Dinitrd.rst35 5) /sbin/init is executed (this can be any valid executable, including
119 needed to execute programs from initrd (e.g. executable format and file
240 executable, shared libraries, standard input/output/error, and its
Defi-stub.rst7 it as an EFI executable. The code that modifies the bzImage header,
/Documentation/ABI/removed/
Dsysfs-selinux-checkreqprot15 1, it weakens security by allowing mappings to be made executable
/Documentation/devicetree/bindings/mtd/partitions/
Dbrcm,trx.txt14 device executable binary (e.g. a kernel) as it's what the CFE bootloader starts
/Documentation/security/
Dself-protection.rst47 Executable code and read-only data must not be writable
50 Any areas of the kernel with executable memory must not be writable.
61 writable, data is not executable, and read-only data is neither writable
62 nor executable.
212 Blinding literal values for things like JITs, where the executable
/Documentation/filesystems/
Dromfs.rst113 the file; while bit 4 shows if the file is executable or not. The
115 and world executable if it is; except the character and block devices,
139 using the executable bits for special purposes on the socket and fifo
Dhfs.rst57 * You can't modify the set-uid, set-gid, sticky or executable bits or the uid
/Documentation/kbuild/
Dmakefiles.rst714 Two steps are required in order to use a host executable.
719 The second step is to add an explicit dependency to the executable.
747 $(<executable>-objs) lists all objects used to link the final
748 executable.
760 Finally, the two .o files are linked to the executable, lxdialog.
761 Note: The syntax <executable>-y is not permitted for host-programs.
776 In the example above the executable is composed of the C++ file
909 $(<executable>-objs) lists all objects used to link the final
910 executable.
922 Finally, the two .o files are linked to the executable, bpf-fancy.
[all …]
/Documentation/trace/
Duprobetracer.rst37 PATH : Path to an executable or a library.
88 as below (sets a uprobe at an offset of 0x4245c0 in the executable /bin/bash)::
/Documentation/fb/
Duvesafb.rst129 v86d:path Set path to the v86d executable. This option is only available as
157 Path to the v86d executable. v86d is started by uvesafb
/Documentation/bpf/
Dbpf_licensing.rst92 separate executable processes. This applies to both cBPF and eBPF programs.
/Documentation/scsi/
Dqlogicfas.rst70 large executable or archive). It should be at least 5 megabytes, but
/Documentation/arch/arm/
Duefi.rst34 PE/COFF executable, including a loader application that makes it possible to
/Documentation/arch/x86/
Dexception-tables.rst59 to executable code. This code is hidden inside the user access macros.
190 final kernel executable::
208 of the executable file::
/Documentation/staging/
Dxz.rst13 for executable code. CRC32 is supported for integrity checking.
/Documentation/admin-guide/mm/
Dnommu-mmap.rst213 assumed to be readable and writable, not executable, and only shareable
242 controlling the device. Remember especially: private executable
/Documentation/ABI/testing/
Dima_policy122 all files mmapped executable in file_mmap, and all files
/Documentation/core-api/
Dcachetlb.rst80 executable (and thus could be in the 'instruction TLB' in
186 executable (and thus could be in the 'instruction cache' in

123