Home
last modified time | relevance | path

Searched full:executable (Results 1 – 25 of 414) sorted by relevance

12345678910>>...17

/linux-6.14.4/tools/testing/selftests/exec/
Dcheck-exec-tests.sh66 # Executing stdin must be allowed if the related file is executable.
85 # A pipe is not executable.
127 ktap_print_msg "By default, executable scripts are allowed to be interpreted and executed."
131 ktap_print_msg "By default, executable stdin is allowed to be interpreted."
134 ktap_print_msg "By default, non-executable scripts are allowed to be interpreted, but not directly …
139 ktap_print_msg "By default, non-executable stdin is allowed to be interpreted."
147 ktap_print_msg "With -f, executable scripts are allowed to be interpreted and executed."
151 ktap_print_msg "With -f, executable stdin is allowed to be interpreted."
154 ktap_print_msg "With -f, non-executable scripts are not allowed to be executed nor interpreted."
155 # Direct execution of non-executable script is alwayse denied by the kernel.
[all …]
/linux-6.14.4/include/linux/
Dexecmem.h17 * enum execmem_type - types of executable memory ranges
19 * There are several subsystems that allocate executable memory.
23 * Types in this enum identify subsystems that allocate executable memory
47 * enum execmem_range_flags - options for executable memory allocations
95 * parameters for executable memory allocations. The ranges that are not
104 * execmem_arch_setup - define parameters for allocations of executable memory
107 * executable memory. These parameters should be filled into the
114 * for allocations of executable memory
119 * execmem_alloc - allocate executable memory
123 * Allocates memory that will contain executable code, either generated or
[all …]
Dmman.h175 * Denies creating a writable executable mapping or gaining executable permissions.
207 /* If the new VMA is not executable, we have nothing to deny. */ in map_deny_write_exec()
211 /* Under MDWE we do not accept newly writably executable VMAs... */ in map_deny_write_exec()
215 /* ...nor previously non-executable VMAs becoming executable. */ in map_deny_write_exec()
Dbinfmts.h53 struct file *executable; /* Executable to pass to the interpreter */ member
66 int execfd; /* File descriptor of the executable */
135 #define EXSTACK_DISABLE_X 1 /* Disable executable stacks */
136 #define EXSTACK_ENABLE_X 2 /* Enable executable stacks */
Delf-fdpic.h46 #define ELF_FDPIC_FLAG_EXEC_STACK 0x00000010 /* T if stack to be executable */
47 #define ELF_FDPIC_FLAG_NOEXEC_STACK 0x00000020 /* T if stack not to be executable */
48 #define ELF_FDPIC_FLAG_EXECUTABLE 0x00000040 /* T if this object is the executable */
/linux-6.14.4/tools/scripts/
Dutilities.mak139 # Usage: absolute-executable-path-or-empty = $(call lookup,path)
147 # is-executable
149 # Usage: bool-value = $(call is-executable,path)
154 is-executable = $(call _is-executable-helper,$(shell-sq))
155 _is-executable-helper = $(shell sh -c $(_is-executable-sh))
156 _is-executable-sh = $(call shell-sq,test -f $(1) -a -x $(1) && echo y)
158 # get-executable
160 # Usage: absolute-executable-path-or-empty = $(call get-executable,path)
162 # The goal is to get an absolute path for an executable;
168 get-executable = $(if $(1),$(if $(is-absolute),$(_ge-abspath),$(lookup)))
[all …]
/linux-6.14.4/Documentation/userspace-api/
Dmfd_noexec.rst4 Introduction of non-executable mfd
19 boot), this executable nature of memfd opens a door for NoExec bypass
25 On the other hand, executable memfd has its legit use: runc uses memfd’s
26 seal and executable feature to copy the contents of the binary then
28 use of executable memfds and an attacker's [3].
34 migrating and enforcing non-executable MFD.
72 doesn't set the executable bit; for example, a container with
73 vm.memfd_noexec=1 means the old software will create non-executable memfd
74 by default while new software can create executable memfd by setting
Dcheck_exec.rst43 interpreter instead. All files that contain executable code, from the point of
54 In a secure environment, libraries and any executable dependencies should also
58 be executable, which also requires integrity guarantees.
77 Indeed, the use case for these securebits is to only trust executable code
85 executions, but only from vetted executable programs, which is OK. For this to
118 Deny script interpretation if they are not executable, but allow
136 Deny script interpretation if they are not executable, and also deny
/linux-6.14.4/scripts/kconfig/tests/
Dconftest.py41 """Run text-based Kconfig executable and save the result.
49 returncode: exit status of the Kconfig executable
125 returncode: exit status of the Kconfig executable
135 returncode: exit status of the Kconfig executable
144 returncode: exit status of the Kconfig executable
152 returncode: exit status of the Kconfig executable
168 returncode: exit status of the Kconfig executable
176 returncode: exit status of the Kconfig executable
184 returncode: exit status of the Kconfig executable
192 returncode: exit status of the Kconfig executable
[all …]
/linux-6.14.4/scripts/
DMakefile.host30 # Will compile bin2hex.c and create an executable named bin2hex
34 # Will compile lxdialog.c and checklist.c, and then link the executable
41 # They are linked as C++ code to the executable qconf
108 # Create executable from a single .c file
109 # host-csingle -> Executable
116 # Link an executable based on list of .o files, all plain c
117 # host-cmulti -> executable
133 # Link an executable based on list of .o files, a mixture of .c and .cc
134 # host-cxxmulti -> executable
150 # Create executable from a single Rust crate (which may consist of
[all …]
/linux-6.14.4/drivers/misc/
Dsram-exec.c47 * sram_exec_copy - copy data to a protected executable region of sram
59 * read-only and executable except when copying data to them, at which point
60 * they are set to read-write non-executable, to make sure no memory is
61 * writeable and executable at the same time. This region must be page-aligned
66 * NOTE: This function uses the fncpy macro to move code to the executable
68 * executable code, so fncpy is a macro that must be defined by any arch
/linux-6.14.4/samples/bpf/
DMakefile.target10 # Will compile xsk_example.c and create an executable named xsk_example
14 # Will compile xdpsock_1.c and xdpsock_2.c, and then link the executable
52 # Create executable from a single .c file
53 # tprog-csingle -> Executable
60 # Link an executable based on list of .o files, all plain c
61 # tprog-cmulti -> executable
/linux-6.14.4/samples/hid/
DMakefile.target10 # Will compile xsk_example.c and create an executable named xsk_example
14 # Will compile xdpsock_1.c and xdpsock_2.c, and then link the executable
52 # Create executable from a single .c file
53 # tprog-csingle -> Executable
60 # Link an executable based on list of .o files, all plain c
61 # tprog-cmulti -> executable
/linux-6.14.4/Documentation/admin-guide/hw-vuln/
Dmultihit.rst108 non-executable pages. This forces all iTLB entries to be 4K, and removes
112 as non-executable. If the guest attempts to execute in one of those pages,
113 the page is broken down into 4K pages, which are then marked executable.
120 non-executable in all shadow paging modes.
126 non-executable can be controlled with a module parameter "nx_huge_pages=".
134 non-executable huge pages in Linux kernel KVM module. All huge
135 pages in the EPT are marked as non-executable.
137 broken down into 4K pages, which are then marked executable.
/linux-6.14.4/arch/arm/kernel/
Delf.c14 /* Make sure it's an ARM executable */ in elf_check_arch()
81 * An executable for which elf_read_implies_exec() returns TRUE will
93 * exec-all : all PROT_READ user mappings are executable, except when
95 * exec-none : only PROT_EXEC user mappings are executable.
96 * exec-stack: only the stack and PROT_EXEC user mappings are executable.
/linux-6.14.4/tools/include/uapi/linux/
Dmemfd.h11 /* not executable and sealed to prevent changing to executable. */
13 /* executable */
/linux-6.14.4/include/uapi/linux/
Dmemfd.h11 /* not executable and sealed to prevent changing to executable. */
13 /* executable */
Dsecurebits.h14 inheritance of root-permissions and suid-root executable under
16 *of the executable file* if the effective uid of the new process is
18 executable file. */
/linux-6.14.4/LICENSES/dual/
DCDDL-1.032 1.4. "Executable" means the Covered Software in any form other than
48 1.9. "Modifications" means the Source Code and Executable form of
61 1.10. "Original Software" means the Source Code and Executable form
161 available in Executable form must also be made available in Source
166 of any such Covered Software in Executable form as to how they can
204 3.5. Distribution of Executable Versions.
206 You may distribute the Executable form of the Covered Software
210 and that the license for the Executable form does not attempt to
213 Software in Executable form under a different license, You must
DMPL-1.139 1.5. "Executable" means Covered Code in any form other than Source
77 compilation and installation of an Executable, or source code
174 either on the same media as an Executable version or via an accepted
176 Executable version available; and if made available via Electronic
191 Executable version or related documentation in which You describe the
243 3.6. Distribution of Executable Versions.
244 You may distribute Covered Code in Executable form only if the
250 in any notice in an Executable version, related documentation or
252 Covered Code. You may distribute the Executable version of Covered
256 Executable version does not attempt to limit or alter the recipient's
[all …]
/linux-6.14.4/arch/um/kernel/
Dphysmem.c58 * i.e start address of the executable image.
64 * it on the last executable image address (uml_reserved).
67 * (len) includes the size of the memory used be the executable image,
68 * but the mapped-to address is the last address of the executable image
69 * (uml_reserved == end address of executable image).
/linux-6.14.4/tools/perf/scripts/perl/Perf-Trace-Util/
DREADME11 executable; scripts wishing to do that should 'use Context.pm'.
15 perf executable, you add desciptions of the new functions here.
16 scripting_context is a pointer to the perf data in the perf executable
/linux-6.14.4/arch/um/os-Linux/
Dexecvp.c93 up finding no executable we can use, we want to diagnose in execvp_noalloc()
100 /* Those errors indicate the file is missing or not executable in execvp_noalloc()
110 * if it is not executable - the Linux in execvp_noalloc()
116 /* Some other error means we found an executable file, but in execvp_noalloc()
/linux-6.14.4/LICENSES/preferred/
DLGPL-2.1237 it, under Section 2) in object code or executable form under the terms
256 an executable that is a derivative of the Library (because it contains
258 library". The executable is therefore covered by this License. Section 6
297 and, if the work is an executable linked with the Library, with the
300 then relink to produce a modified executable containing the modified
308 than copying library functions into the executable, and (2) will
325 For an executable, the required form of the "work that uses the Library"
327 executable from it. However, as a special exception, the materials to be
330 kernel, and so on) of the operating system on which the executable runs,
331 unless that component itself accompanies the executable.
[all …]
DLGPL-2.088 a textual and legal sense, the linked executable is a combined work, a
225 it, under Section 2) in object code or executable form under the terms
244 an executable that is a derivative of the Library (because it contains
246 library". The executable is therefore covered by this License. Section 6
285 and, if the work is an executable linked with the Library, with the
288 then relink to produce a modified executable containing the modified
305 For an executable, the required form of the "work that uses the Library"
307 executable from it. However, as a special exception, the source code
310 kernel, and so on) of the operating system on which the executable runs,
311 unless that component itself accompanies the executable.
[all …]

12345678910>>...17