Home
last modified time | relevance | path

Searched refs:execve (Results 1 – 17 of 17) sorted by relevance

/linux-4.4.14/Documentation/prctl/
Dno_new_privs.txt1 The execve system call can grant a newly-started program privileges that
19 execution environment in a manner that persists across execve. Any task
21 clone, and execve and cannot be unset. With no_new_privs set, execve
23 been done without the execve call. For example, the setuid and setgid
26 execve.
36 involve execve. An appropriately privileged task can still call
42 execve and can change the behavior of newly-executed programs.
Dseccomp_filter.txt65 If fork/clone and execve are allowed by @prog, any child
/linux-4.4.14/tools/perf/trace/strace/groups/
Dfile4 execve
/linux-4.4.14/arch/x86/entry/syscalls/
Dsyscall_64.tbl68 59 64 execve stub_execve
348 520 x32 execve stub_x32_execve
Dsyscall_32.tbl20 11 i386 execve sys_execve compat_sys_execve
/linux-4.4.14/Documentation/security/
Dcredentials.txt188 execve().
191 execve(), especially when a binary is executed that will execute as UID 0.
197 execve(). They aren't used directly as objective or subjective
268 operations allowed or disallowed as a result. In the case of execve(), the
472 the ptrace state may alter the outcome, particularly in the case of execve().
Dkeys-request-key.txt126 /sbin/request-key at the appropriate places because (a) execve will discard two
Dkeys.txt156 clone, fork, vfork or execve occurs. A new keyring is created only when
161 shared. execve also discards the process's process keyring and creates a
165 execve, even when the latter executes a set-UID or set-GID binary. A
/linux-4.4.14/kernel/
Daudit.h200 } execve; member
Dauditsc.c1147 audit_log_format(*ab, "argc=%d", context->execve.argc); in audit_log_execve_info()
1161 for (i = 0; i < context->execve.argc; i++) { in audit_log_execve_info()
2157 context->execve.argc = bprm->argc; in __audit_bprm()
/linux-4.4.14/arch/parisc/kernel/
Dsyscall_table.S69 ENTRY_COMP(execve)
/linux-4.4.14/arch/powerpc/include/asm/
Dsystbl.h17 COMPAT_SYS(execve)
/linux-4.4.14/Documentation/
Dnommu-mmap.txt8 call and the execve() system call. From the kernel's point of view, execve()
Dadding-syscalls.txt111 unexpected fork() and execve() in another thread could leak a descriptor to
388 or even architecture (execve/execveat) of the program.
435 file open (open/openat), program execution (execve/exeveat) or socket
Dunshare.txt281 about 10 threads. Have a couple of threads execute execve,
/linux-4.4.14/fs/
Dexec.c1710 SYSCALL_DEFINE3(execve, in SYSCALL_DEFINE3() argument
1732 COMPAT_SYSCALL_DEFINE3(execve, const char __user *, filename, in COMPAT_SYSCALL_DEFINE3() argument
/linux-4.4.14/arch/frv/kernel/
Dentry.S923 # rebuild saved psr - execve will change it for init/main.c