/linux-4.1.27/arch/x86/kernel/ |
H A D | test_nx.c | 23 * 1) Check if the stack is not executable 24 * 2) Check if kmalloc memory is not executable 25 * 3) Check if the .rodata section is not executable 26 * 4) Check if the .data section of a module is not executable 74 * returns 0 for not-executable, negative for executable 120 /* Test 1: check if the stack is not executable */ test_NX() 122 printk(KERN_ERR "test_nx: stack was executable\n"); test_NX() 127 /* Test 2: Check if the heap is executable */ test_NX() 134 printk(KERN_ERR "test_nx: heap was executable\n"); test_NX() 146 /* Test 3: Check if the .rodata section is executable */ test_NX() 151 printk(KERN_ERR "test_nx: .rodata section is executable\n"); test_NX() 157 /* Test 4: Check if the .data section of a module is executable */ test_NX() 159 printk(KERN_ERR "test_nx: .data section is executable\n"); test_NX()
|
H A D | machine_kexec_32.c | 152 * - Make control page executable.
|
H A D | uprobes.c | 208 * Why? They are all user-executable.
|
/linux-4.1.27/tools/perf/config/ |
H A D | utilities.mak | 139 # Usage: absolute-executable-path-or-empty = $(call lookup,path) 147 # is-executable 149 # Usage: bool-value = $(call is-executable,path) 154 is-executable = $(call _is-executable-helper,$(shell-sq)) 155 _is-executable-helper = $(shell sh -c $(_is-executable-sh)) 156 _is-executable-sh = $(call shell-sq,test -f $(1) -a -x $(1) && echo y) 158 # get-executable 160 # Usage: absolute-executable-path-or-empty = $(call get-executable,path) 162 # The goal is to get an absolute path for an executable; 168 get-executable = $(if $(1),$(if $(is-absolute),$(_ge-abspath),$(lookup))) 169 _ge-abspath = $(if $(is-executable),$(1)) 171 # get-supplied-or-default-executable 173 # Usage: absolute-executable-path-or-empty = $(call get-executable-or-default,variable,default) 175 define get-executable-or-default 178 _ge_attempt = $(if $(get-executable),$(get-executable),$(call _gea_err,$(2)))
|
H A D | Makefile | 114 ifeq ($(call get-executable,$(FLEX)),) 118 ifeq ($(call get-executable,$(BISON)),) 148 PYTHON2 := $(if $(call get-executable,python2),python2,python) 149 override PYTHON := $(call get-executable-or-default,PYTHON,$(PYTHON2)) 151 $(if $(call get-executable,$(PYTHON)-config),$(PYTHON)-config,python-config) 153 $(call get-executable-or-default,PYTHON_CONFIG,$(PYTHON2_CONFIG)) 173 # Enforce a non-executable stack, as we may regress (again) in the future by 622 # runtime figures out where they are based on the path to the executable.
|
/linux-4.1.27/tools/perf/bench/ |
H A D | mem-memcpy-x86-64-asm.S | 7 * NOT executable stack. Otherwise the final linking will assume that
|
H A D | mem-memset-x86-64-asm.S | 8 * NOT executable stack. Otherwise the final linking will assume that
|
/linux-4.1.27/arch/x86/kernel/cpu/ |
H A D | powerflags.c | 4 * This file must not contain any executable code.
|
/linux-4.1.27/arch/sh/include/uapi/asm/ |
H A D | ptrace.h | 16 #define PTRACE_GETFDPIC_EXEC 0 /* [addr] request the executable loadmap */
|
/linux-4.1.27/include/uapi/linux/ |
H A D | securebits.h | 13 inheritance of root-permissions and suid-root executable under 15 *of the executable file* if the effective uid of the new process is 17 executable file. */
|
H A D | a.out.h | 62 /* Code indicating object file or impure executable. */ 64 /* Code indicating pure executable. */ 66 /* Code indicating demand-paged executable. */ 68 /* This indicates a demand-paged executable with the header in the text.
|
H A D | flat.h | 30 unsigned long entry; /* Offset of first executable instruction
|
H A D | elfcore.h | 89 char pr_fname[16]; /* filename of executable */
|
H A D | coff.h | 70 * F_EXEC file is executable (i.e. no unresolved external
|
/linux-4.1.27/include/linux/ |
H A D | elf-fdpic.h | 38 #define ELF_FDPIC_FLAG_EXEC_STACK 0x00000010 /* T if stack to be executable */ 39 #define ELF_FDPIC_FLAG_NOEXEC_STACK 0x00000020 /* T if stack not to be executable */ 40 #define ELF_FDPIC_FLAG_EXECUTABLE 0x00000040 /* T if this object is the executable */
|
H A D | binfmts.h | 109 #define EXSTACK_DISABLE_X 1 /* Disable executable stacks */ 110 #define EXSTACK_ENABLE_X 2 /* Enable executable stacks */
|
H A D | vmw_vmci_defs.h | 330 * Compatibility goes both ways (old driver with new executable 331 * as well as new driver with old executable).
|
H A D | mm_types.h | 245 * library, the executable area etc).
|
H A D | module.h | 287 /* The size of the executable code in each section. */
|
/linux-4.1.27/arch/unicore32/kernel/ |
H A D | elf.c | 20 /* Make sure it's an UniCore executable */ elf_check_arch()
|
H A D | hibernate.c | 100 * NOTE: We can mark everything as executable here resume_physical_mapping_init()
|
/linux-4.1.27/include/uapi/asm-generic/ |
H A D | mman.h | 8 #define MAP_EXECUTABLE 0x1000 /* mark it as an executable */
|
/linux-4.1.27/arch/arm/kernel/ |
H A D | elf.c | 12 /* Make sure it's an ARM executable */ elf_check_arch() 80 * - the binary requires an executable stack
|
/linux-4.1.27/arch/m68k/lib/ |
H A D | mulsi3.S | 25 compiled with GCC to produce an executable, this does not cause 26 the resulting executable to be covered by the GNU General Public License. 28 the executable file might be covered by the GNU General Public License. */
|
H A D | divsi3.S | 25 compiled with GCC to produce an executable, this does not cause 26 the resulting executable to be covered by the GNU General Public License. 28 the executable file might be covered by the GNU General Public License. */
|
H A D | modsi3.S | 25 compiled with GCC to produce an executable, this does not cause 26 the resulting executable to be covered by the GNU General Public License. 28 the executable file might be covered by the GNU General Public License. */
|
H A D | umodsi3.S | 25 compiled with GCC to produce an executable, this does not cause 26 the resulting executable to be covered by the GNU General Public License. 28 the executable file might be covered by the GNU General Public License. */
|
H A D | udivsi3.S | 25 compiled with GCC to produce an executable, this does not cause 26 the resulting executable to be covered by the GNU General Public License. 28 the executable file might be covered by the GNU General Public License. */
|
/linux-4.1.27/arch/x86/mm/ |
H A D | setup_nx.c | 13 * Control non-executable mappings for processes.
|
H A D | init_64.c | 146 * Control non executable heap for 32bit processes. 1124 * should also be not-executable. mark_rodata_ro() 1129 * of the PMD will remain mapped executable. mark_rodata_ro()
|
H A D | init.c | 674 * writeable and non-executable first. free_init_pages()
|
H A D | pageattr.c | 258 * The BIOS area between 640k and 1Mb needs to be executable for static_protections() 267 * The kernel text needs to be executable for obvious reasons static_protections()
|
/linux-4.1.27/arch/sparc/include/uapi/asm/ |
H A D | mman.h | 16 #define MAP_EXECUTABLE 0x1000 /* mark it as an executable */
|
/linux-4.1.27/arch/um/os-Linux/ |
H A D | execvp.c | 93 up finding no executable we can use, we want to diagnose execvp_noalloc() 99 /* Those errors indicate the file is missing or not executable execvp_noalloc() 109 * if it is not executable - the Linux execvp_noalloc() 115 /* Some other error means we found an executable file, but execvp_noalloc()
|
/linux-4.1.27/arch/powerpc/include/uapi/asm/ |
H A D | mman.h | 21 #define MAP_EXECUTABLE 0x1000 /* mark it as an executable */
|
/linux-4.1.27/arch/arc/include/uapi/asm/ |
H A D | signal.h | 20 * -TLB Flush (after making the stack page executable)
|
/linux-4.1.27/arch/um/kernel/ |
H A D | physmem.c | 63 * i.e start address of the executable image. 70 * it on the last executable image address (uml_reserved). 73 * (len + highmem) includes the size of the memory used be the executable image, 74 * but the mapped-to address is the last address of the executable image 75 * (uml_reserved == end address of executable image).
|
H A D | uml.lds.S | 15 * beginning of the executable, and if there are unmapped pages after this,
|
/linux-4.1.27/arch/alpha/boot/tools/ |
H A D | objstrip.c | 4 * Strip the object file headers/trailers from an executable (ELF or ECOFF). 152 fprintf(stderr, "%s: %s is not an ELF executable\n", main() 200 fprintf(stderr, "%s: %s is not in executable format\n", main()
|
/linux-4.1.27/scripts/ |
H A D | check_extable.sh | 86 # to a non-executable section, there's no way this would ever be 88 echo "Error: found a reference to non-executable section \"${section}\" in __ex_table at offset ${section_offset}" 127 # section we do not know but has executable bit set, or error out.
|
/linux-4.1.27/arch/tile/kernel/ |
H A D | tlb.c | 29 * so that when we are unmapping an executable page, we also flush it. 97 * executable pgprot_t's. Using EVICT_L1I means that dataplane cpus
|
H A D | single_step.c | 361 /* allocate a page of writable, executable memory */ single_step_once() 368 /* allocate a cache line of writable, executable memory */ single_step_once()
|
H A D | kprobes.c | 97 /* insn: must be on special executable page on tile. */ arch_prepare_kprobe()
|
/linux-4.1.27/arch/frv/mm/ |
H A D | elf-fdpic.c | 30 /* if the only executable is a shared object, assume that it is an interpreter rather than elf_fdpic_arch_lay_out_mm() 31 * a true executable, and map it such that "ld.so --list" comes out right elf_fdpic_arch_lay_out_mm()
|
/linux-4.1.27/arch/tile/include/uapi/asm/ |
H A D | mman.h | 30 #define MAP_EXECUTABLE 0x1000 /* mark it as an executable */
|
/linux-4.1.27/arch/powerpc/platforms/cell/spufs/ |
H A D | Makefile | 48 # create C code from ELF executable
|
H A D | switch.c | 1143 * NOTE: Rather than modifying the SPU executable, we setup_spu_status_part1() 1226 * NOTE: Rather than modifying the SPU executable, we setup_spu_status_part2()
|
/linux-4.1.27/arch/cris/include/arch-v32/arch/ |
H A D | elf.h | 30 * An executable for which elf_read_implies_exec() returns TRUE will
|
/linux-4.1.27/arch/frv/include/uapi/asm/ |
H A D | ptrace.h | 57 #define PTRACE_GETFDPIC_EXEC 0 /* [addr] request the executable loadmap */
|
/linux-4.1.27/tools/testing/selftests/exec/ |
H A D | execveat.c | 199 * "If the command name is found, but it is not an executable utility, check_execveat_pathmax() 248 /* Normal executable file: */ run_tests() 264 /* Mess with executable file that's already open: */ run_tests() 272 /* Mess with executable file that's already open with O_PATH */ run_tests() 281 /* Symlink to executable file: */ run_tests() 302 /* Shell script wrapping executable file: */ run_tests() 345 /* Attempt to execute non-executable => EACCES */ run_tests()
|
/linux-4.1.27/drivers/ide/ |
H A D | cs5520.c | 29 * forms part of the process of creating an executable the information 30 * including keys needed to generate an equivalently functional executable
|
H A D | ide-pci-generic.c | 17 * forms part of the process of creating an executable the information 18 * including keys needed to generate an equivalently functional executable
|
H A D | ide-io.c | 21 * forms part of the process of creating an executable the information 22 * including keys needed to generate an equivalently functional executable
|
/linux-4.1.27/drivers/scsi/ |
H A D | qlogicfas.c | 11 * forms part of the process of creating an executable the information 12 * including keys needed to generate an equivalently functional executable
|
H A D | qlogicfas408.c | 36 forms part of the process of creating an executable the information 37 including keys needed to generate an equivalently functional executable
|
H A D | aha1740.c | 35 * forms part of the process of creating an executable the information 36 * including keys needed to generate an equivalently functional executable
|
H A D | eata_pio.c | 40 * the process of creating an executable the information * 42 * functional executable are deemed to be part of the *
|
H A D | in2000.c | 21 * forms part of the process of creating an executable the information 22 * including keys needed to generate an equivalently functional executable
|
/linux-4.1.27/arch/tile/include/asm/ |
H A D | tlbflush.h | 33 * entries, we're likely to have lost at least the executable page 41 /* Pass as vma pointer for non-executable mapping, if no vma available. */
|
H A D | cacheflush.h | 58 * An update to an executable user page requires icache flushing.
|
H A D | pgtable.h | 136 * We could tighten these up, but for now writable or executable 337 /* Clear a non-executable kernel PTE and flush it from the TLB. */
|
/linux-4.1.27/arch/nios2/kernel/ |
H A D | head.S | 59 * First executable code - detected and jumped to by the ROM bootstrap 61 * the potential executable image).
|
/linux-4.1.27/arch/powerpc/include/asm/ |
H A D | elf.h | 103 * An executable for which elf_read_implies_exec() returns TRUE will 107 * even if we have an executable stack.
|
H A D | page_64.h | 171 * program header entry. The PPC64 ELF ABI has a non executable stack
|
H A D | page.h | 227 * and needs to be executable. This means the whole heap ends 228 * up being executable.
|
H A D | pgtable-ppc32.h | 161 * that an executable user mapping was modified, which is needed
|
/linux-4.1.27/arch/mips/boot/ |
H A D | Makefile | 11 # Some DECstations need all possible sections of an ECOFF executable
|
H A D | elf2ecoff.c | 31 This program converts an elf executable to an ECOFF executable. 288 "usage: elf2ecoff <elf executable> <ecoff executable> [-a]\n"); main()
|
/linux-4.1.27/arch/mn10300/lib/ |
H A D | negdi2.c | 20 executable.)
|
/linux-4.1.27/arch/hexagon/kernel/ |
H A D | vdso.c | 31 * We want this for a non-executable stack.
|
/linux-4.1.27/arch/arm/lib/ |
H A D | ashldi3.S | 16 executable.)
|
H A D | ashrdi3.S | 16 executable.)
|
H A D | lshrdi3.S | 16 executable.)
|
H A D | lib1funcs.S | 23 executable.)
|
/linux-4.1.27/fs/ |
H A D | binfmt_em86.c | 32 /* Make sure this is a Linux/Intel ELF executable... */ load_em86()
|
H A D | binfmt_aout.c | 238 /* Flush all traces of the currently running executable */ load_aout_binary() 289 printk(KERN_NOTICE "executable not page aligned\n"); load_aout_binary()
|
H A D | exec.c | 12 * the header into memory. The inode of the executable is put into 13 * "current->executable", and page faults do the actual loading. Clean. 19 * current->executable is only used by the procfs. This allows a dispatch 103 * Note that a shared library must be both readable and executable due to 1063 * These functions flushes out all traces of the currently running executable 1213 * install the new credentials for this executable
|
H A D | binfmt_elf_fdpic.c | 314 /* flush all traces of the currently running executable */ load_elf_fdpic_binary() 350 /* load the executable and interpreter into memory */ load_elf_fdpic_binary() 352 "executable"); load_elf_fdpic_binary() 721 * load the appropriate binary image (executable or interpreter) into memory 725 * - we assume R/O executable segments are shareable
|
H A D | coredump.c | 245 /* executable */ format_corename()
|
H A D | binfmt_elf.c | 835 /* Flush all traces of the currently running executable */ load_elf_binary() 1270 * If this looks like the beginning of a DSO or executable mapping, vma_dump_size()
|
H A D | binfmt_flat.c | 518 /* Flush all traces of the currently running executable */ load_flat_file()
|
/linux-4.1.27/tools/perf/arch/x86/tests/ |
H A D | regs_load.S | 95 * NOT executable stack. Otherwise the final linking will assume that
|
/linux-4.1.27/drivers/acpi/acpica/ |
H A D | utxfinit.c | 272 * initialized, even if they contain executable AML (see the call to ACPI_EXPORT_SYMBOL_INIT() 295 * contain this type of code. Each block of detected executable AML code ACPI_EXPORT_SYMBOL_INIT() 304 * executable AML that may be part of the declaration of these objects: ACPI_EXPORT_SYMBOL_INIT()
|
H A D | psloop.c | 151 * Handle executable code at "module-level". This refers to acpi_ps_get_arguments() 152 * executable opcodes that appear outside of any control method. acpi_ps_get_arguments() 199 * Check for an unsupported executable opcode at module acpi_ps_get_arguments() 214 "Unsupported module-level executable opcode " acpi_ps_get_arguments() 307 * aml_length - Length of executable AML
|
H A D | utmisc.c | 85 * RETURN: TRUE if table contains executable AML; FALSE otherwise 96 /* These are the only tables that contain executable AML */ acpi_ut_is_aml_table()
|
H A D | nseval.c | 382 "Executed %u blocks of module-level executable AML code", acpi_ns_exec_module_code_list() 401 * executable AML code. The control method is temporarily
|
H A D | dsargs.c | 67 * aml_length - Length of executable AML
|
H A D | exutils.c | 51 * Exactly one module of any executable should #define DEFINE_GLOBALS
|
H A D | nsinit.c | 310 * Each of these types can contain executable AML code within the acpi_ns_init_one_object()
|
H A D | psopcode.c | 148 Opcodes that contain executable AML as part of the definition that
|
H A D | dsmethod.c | 734 * 1) This method is a module-level executable code method, in which acpi_ds_terminate_control_method()
|
/linux-4.1.27/arch/powerpc/boot/ |
H A D | crtsavres.S | 34 * compiled with GCC to produce an executable, this does not cause 35 * the resulting executable to be covered by the GNU General Public License. 37 * the executable file might be covered by the GNU General Public License.
|
/linux-4.1.27/security/integrity/ima/ |
H A D | ima_main.c | 263 * Measure files being mmapped executable based on the ima_must_measure() 280 * The OS protects against an executable file, already open for write, 281 * from being executed in deny_write_access() and an executable file,
|
/linux-4.1.27/arch/x86/include/asm/ |
H A D | setup.h | 93 * executable.)
|
H A D | efi.h | 92 extern void __init efi_set_executable(efi_memory_desc_t *md, bool executable);
|
H A D | elf.h | 271 * An executable for which elf_read_implies_exec() returns TRUE will
|
/linux-4.1.27/arch/x86/power/ |
H A D | hibernate_32.c | 107 * NOTE: We can mark everything as executable here resume_physical_mapping_init()
|
/linux-4.1.27/arch/x86/realmode/ |
H A D | init.c | 97 * need to mark it executable at do_pre_smp_initcalls() at least,
|
/linux-4.1.27/arch/sh/lib/ |
H A D | ashiftrt.S | 17 executable.)
|
H A D | udiv_qrnnd.S | 17 executable.)
|
H A D | udivsi3.S | 17 executable.)
|
H A D | ashlsi3.S | 17 executable.)
|
H A D | ashrsi3.S | 17 executable.)
|
H A D | lshrsi3.S | 17 executable.)
|
H A D | udivsi3_i4i-Os.S | 15 executable.)
|
H A D | movmem.S | 17 executable.)
|
H A D | udivsi3_i4i.S | 17 executable.)
|
/linux-4.1.27/arch/mips/boot/compressed/ |
H A D | Makefile | 90 # Some DECstations need all possible sections of an ECOFF executable
|
/linux-4.1.27/include/rdma/ |
H A D | ib.h | 94 * traditional suid executable error message writes, but also various kernel
|
/linux-4.1.27/arch/mips/kernel/ |
H A D | binfmt_elfn32.c | 90 char pr_fname[16]; /* filename of executable */
|
H A D | binfmt_elfo32.c | 111 char pr_fname[16]; /* filename of executable */
|
H A D | vpe.c | 186 /* NOTE: all executable code must be the first section layout_sections() 845 executable will be along shortly. */ vpe_release()
|
H A D | kprobes.c | 164 /* insn: must be on special executable page on mips. */ arch_prepare_kprobe()
|
/linux-4.1.27/arch/mn10300/include/asm/ |
H A D | pgtable.h | 322 * All present user pages are user-executable: 330 * All present pages are kernel-executable: 455 * Make a given kernel text page executable/non-executable.
|
/linux-4.1.27/arch/parisc/include/uapi/asm/ |
H A D | mman.h | 19 #define MAP_EXECUTABLE 0x1000 /* mark it as an executable */
|
H A D | errno.h | 77 #define ENOSYM 215 /* symbol does not exist in executable */
|
/linux-4.1.27/arch/parisc/kernel/ |
H A D | binfmt_elf32.c | 74 char pr_fname[16]; /* filename of executable */
|
H A D | syscall.S | 126 * entry from narrow executable.
|
/linux-4.1.27/arch/arm64/mm/ |
H A D | flush.c | 92 * it as dirty for later flushing when mapped in user space (if executable,
|
H A D | mmu.c | 306 * Set up the executable regions using the existing section mappings __map_memblock()
|
/linux-4.1.27/arch/blackfin/include/uapi/asm/ |
H A D | ptrace.h | 95 #define PTRACE_GETFDPIC_EXEC 0 /* [addr] request the executable loadmap */
|
/linux-4.1.27/arch/ia64/hp/sim/boot/ |
H A D | bootloader.c | 119 cons_write("not an ELF executable\n"); start_bootloader()
|
/linux-4.1.27/arch/alpha/include/uapi/asm/ |
H A D | mman.h | 26 #define MAP_EXECUTABLE 0x04000 /* mark it as an executable */
|
/linux-4.1.27/security/apparmor/include/ |
H A D | file.h | 53 * - exec type - which determines how the executable name and index are used 61 #define AA_X_NAME 0x0400 /* use executable name px */
|
/linux-4.1.27/arch/x86/platform/efi/ |
H A D | efi_64.c | 61 static void __init early_code_mapping_set_exec(int executable) early_code_mapping_set_exec() argument 69 /* Make EFI service code area executable */ early_code_mapping_set_exec() 74 efi_set_executable(md, executable); early_code_mapping_set_exec()
|
H A D | quirks.c | 138 * EFI init and make sure it stays executable. Then, after SetVirtualAddressMap(), it
|
H A D | efi.c | 511 void __init efi_set_executable(efi_memory_desc_t *md, bool executable) efi_set_executable() argument 520 if (executable) efi_set_executable() 531 /* Make EFI runtime service code area executable */ runtime_code_page_mkexec()
|
/linux-4.1.27/arch/tile/include/uapi/arch/ |
H A D | sim_def.h | 125 * each character in the executable name, plus a final NUL. 133 * hex load address starting with "0x", and "PATH" is the executable name. 141 * address starting with "0x", and "PATH" is the executable name.
|
/linux-4.1.27/arch/powerpc/lib/ |
H A D | crtsavres.S | 35 * compiled with GCC to produce an executable, this does not cause 36 * the resulting executable to be covered by the GNU General Public License. 38 * the executable file might be covered by the GNU General Public License.
|
/linux-4.1.27/tools/perf/ |
H A D | builtin-probe.c | 103 * to an executable / library or kernel module. set_target() 388 OPT_CALLBACK('x', "exec", NULL, "executable|path", __cmd_probe() 389 "target executable name or path", opt_set_target), __cmd_probe()
|
/linux-4.1.27/arch/xtensa/include/uapi/asm/ |
H A D | mman.h | 52 #define MAP_EXECUTABLE 0x4000 /* mark it as an executable */
|
/linux-4.1.27/arch/sparc/kernel/ |
H A D | sys_sparc_32.c | 32 * XXX a binary. Every Sparc executable calls this very early on.
|
/linux-4.1.27/arch/mips/include/uapi/asm/ |
H A D | mman.h | 45 #define MAP_EXECUTABLE 0x4000 /* mark it as an executable */
|
/linux-4.1.27/arch/parisc/ |
H A D | Makefile | 70 # link a too big vmlinux executable). Not enabled for building modules.
|
/linux-4.1.27/arch/c6x/include/uapi/asm/ |
H A D | ptrace.h | 102 #define PTRACE_GETFDPIC_EXEC 0 /* [addr] request the executable loadmap */
|
/linux-4.1.27/arch/hexagon/include/asm/ |
H A D | page.h | 108 /* Default vm area behavior is non-executable. */
|
H A D | pgtable.h | 376 /* pte_mkexec - mark PTE as executable */ pte_mkexec() 396 /* pte_exec - "is PTE marked as executable?" */ pte_exec()
|
/linux-4.1.27/tools/testing/selftests/powerpc/pmu/ |
H A D | lib.c | 192 /* This skips line with no executable which is what we want */ parse_proc_maps()
|
/linux-4.1.27/tools/perf/Documentation/ |
H A D | Makefile | 71 _tmp_tool_path := $(call get-executable,$(ASCIIDOC)) 76 _tmp_tool_path := $(call get-executable,$(XMLTO))
|
/linux-4.1.27/arch/xtensa/include/asm/ |
H A D | pgtable.h | 108 * x page is executable (hw) 127 #define _PAGE_HW_EXEC (1<<0) /* hardware: page is executable */
|
/linux-4.1.27/arch/x86/ia32/ |
H A D | ia32_aout.c | 288 /* Flush all traces of the currently running executable */ load_aout_binary() 337 printk(KERN_NOTICE "executable not page aligned\n"); load_aout_binary()
|
/linux-4.1.27/arch/sh/include/asm/ |
H A D | pgtable_32.h | 63 #define _PAGE_EXT_USER_EXEC 0x0100 /* EPR0-bit: User space executable */ 67 #define _PAGE_EXT_KERN_EXEC 0x0800 /* EPR3-bit: Kernel space executable */
|
/linux-4.1.27/arch/powerpc/mm/ |
H A D | mem.c | 454 * were not marked executable. copy_user_page() 457 * not marked executable. copy_user_page()
|
H A D | hash_utils_64.c | 209 /* Make kernel text executable */ htab_bolt_mapping() 213 /* Make kvm guest trampolines executable */ htab_bolt_mapping() 221 * address 0. Mark that region as executable. This is htab_bolt_mapping() 225 * mode the vector region need to be marked as executable. htab_bolt_mapping()
|
/linux-4.1.27/arch/xtensa/mm/ |
H A D | cache.c | 281 * data and instruction caches for executable pages. copy_to_user_page()
|
/linux-4.1.27/arch/mips/include/asm/ |
H A D | pgtable-bits.h | 30 * certain sequence occurs in the last 3 instructions of an executable
|
H A D | sgiarcs.h | 188 LONG load; /* Load an executable image. */
|
/linux-4.1.27/arch/powerpc/kernel/ |
H A D | setup_32.c | 57 * for each elf executable being started.
|
H A D | kprobes.c | 58 /* insn must be on a special executable page on ppc64. This is arch_prepare_kprobe()
|
H A D | setup_64.c | 95 * for each elf executable being started.
|
/linux-4.1.27/arch/arm64/kernel/ |
H A D | efi.c | 255 * executable, everything else can be mapped with the XN bits efi_virtmap_init()
|
/linux-4.1.27/arch/avr32/kernel/ |
H A D | signal.c | 154 * Note: This will blow up since we're using a non-executable setup_rt_frame()
|
/linux-4.1.27/arch/arm/mm/ |
H A D | cache-v4wb.S | 113 tst r2, #VM_EXEC @ executable region?
|
/linux-4.1.27/mm/ |
H A D | nommu.c | 418 * vmalloc_exec - allocate virtually contiguous, executable memory 423 * executable kernel virtual space. 1070 /* handle executable mappings and implied executable validate_mmap_request() 1085 /* backing file is not executable, try to copy */ validate_mmap_request() 1461 /* we flush the region from the icache only when the first executable do_mmap_pgoff()
|
H A D | vmalloc.c | 1831 * vmalloc_exec - allocate virtually contiguous, executable memory 1836 * executable kernel virtual space.
|
H A D | gup.c | 337 * executable, without corrupting the file (yet only check_vma_flags()
|
/linux-4.1.27/drivers/staging/i2o/ |
H A D | i2o_scsi.c | 14 * forms part of the process of creating an executable the information 15 * including keys needed to generate an equivalently functional executable
|
/linux-4.1.27/arch/ia64/include/asm/ |
H A D | pgtable.h | 317 * sync icache and dcache when we insert *new* executable page. 331 /* page is present && page is user && page is executable set_pte()
|
H A D | elf.h | 32 #define EF_IA_64_LINUX_EXECUTABLE_STACK 0x1 /* is stack (& heap) executable by default? */
|
/linux-4.1.27/kernel/ |
H A D | kmod.c | 480 * @path: path to usermode executable 587 * @path: path to usermode executable
|
H A D | fork.c | 710 * set_mm_exe_file - change a reference to the mm's executable file 712 * This changes mm's executable file (shown as symlink /proc/[pid]/exe). 739 * get_mm_exe_file - acquire a reference to the mm's executable file 741 * Returns %NULL if mm has no associated executable file.
|
H A D | kprobes.c | 144 * __get_insn_slot() - Find a slot on an executable page for an instruction. 145 * We allocate an executable page if there's no room on existing ones.
|
H A D | sys.c | 1666 * Because the original mm->exe_file points to executable file, make prctl_set_mm_exe_file() 1667 * sure that this one is executable as well, to avoid breaking an prctl_set_mm_exe_file()
|
H A D | module.c | 2059 /* NOTE: all executable code must be the first section layout_sections() 2087 case 0: /* executable */ layout_sections() 2117 case 0: /* executable */ layout_sections() 2436 /* Scan all writable sections that's not executable */ kmemleak_load_module()
|
/linux-4.1.27/drivers/firmware/efi/libstub/ |
H A D | arm-stub.c | 364 * introduced in UEFI 2.5, which may split PE/COFF executable images efi_get_virtmap()
|
/linux-4.1.27/arch/tile/mm/ |
H A D | highmem.c | 207 /* Avoid icache flushes by disallowing atomic executable mappings. */ kmap_atomic_prot()
|
H A D | fault.c | 523 pr_crit("kernel tried to execute non-executable page - exploit attempt? (uid: %d)\n", handle_page_fault()
|
/linux-4.1.27/arch/x86/boot/tools/ |
H A D | build.c | 218 * Address of entry point for PE/COFF executable update_pecoff_text()
|
/linux-4.1.27/security/selinux/ss/ |
H A D | policydb.h | 89 u32 type; /* program executable type, or new object type */
|
/linux-4.1.27/drivers/oprofile/ |
H A D | buffer_sync.c | 81 * do, and if it's an executable region, process the samples first, so
|
/linux-4.1.27/arch/sh/kernel/ |
H A D | process_64.c | 320 * previously running executable. */ flush_thread()
|
H A D | traps_64.c | 665 /* SHmedia : check for defect. This requires executable vmas do_reserved_inst()
|
/linux-4.1.27/arch/sparc/mm/ |
H A D | fault_64.c | 412 /* If we took a ITLB miss on a non-executable page, catch do_sparc64_fault()
|
/linux-4.1.27/arch/x86/boot/compressed/ |
H A D | head_64.S | 239 * The entry point for the PE/COFF executable is efi_pe_entry, so
|
/linux-4.1.27/include/acpi/ |
H A D | acoutput.h | 429 * leaving no executable debug code!
|
/linux-4.1.27/arch/openrisc/include/asm/ |
H A D | pgtable.h | 137 #define _PAGE_EXEC 0x400 /* software: page is executable */
|
/linux-4.1.27/arch/m32r/mm/ |
H A D | fault.c | 187 * For instruction access exception, check if the area is executable do_page_fault()
|
/linux-4.1.27/arch/x86/tools/ |
H A D | relocs.c | 343 die("Not a %d bit executable\n", ELF_BITS); read_ehdr() 346 die("Not a LSB ELF executable\n"); read_ehdr()
|
/linux-4.1.27/security/ |
H A D | commoncap.c | 379 * Extract the on-exec-apply capability sets for an executable file. 436 * Attempt to get the on-exec apply capability sets for an executable file from
|
/linux-4.1.27/kernel/events/ |
H A D | uprobes.c | 99 * Execute out of line area: anonymous executable mapping installed 122 * valid_vma: Verify if the specified vma is an executable vma 127 * executable vma.
|
/linux-4.1.27/arch/sh/mm/ |
H A D | cache-sh5.c | 595 * make them executable.
|
/linux-4.1.27/arch/parisc/include/asm/ |
H A D | pgtable.h | 226 /* Others seem to make this executable, I don't know if that's correct
|
/linux-4.1.27/arch/parisc/mm/ |
H A D | init.c | 542 * pages are no-longer executable */ free_initmem()
|
/linux-4.1.27/arch/powerpc/oprofile/cell/ |
H A D | spu_task_sync.c | 314 * in the executable application or another file (i.e., shared lib).
|
/linux-4.1.27/arch/ia64/mm/ |
H A D | init.c | 72 * flush them when they get mapped into an executable vm-area.
|
/linux-4.1.27/security/apparmor/ |
H A D | domain.c | 169 * @name: the executable name to match against (NOT NULL)
|
H A D | lsm.c | 387 * implicit read and executable mmap which are required to apparmor_file_open()
|
/linux-4.1.27/arch/microblaze/kernel/ |
H A D | hw_exception_handler.S | 664 ori r4, r4, _PAGE_HWEXEC /* make it executable */ 877 ori r4, r4, _PAGE_HWEXEC /* make it executable */
|
/linux-4.1.27/scripts/mod/ |
H A D | modpost.c | 1647 "section \"%s\" which is not executable, IOW\n" extable_mismatch_handler() 1654 "section \"%s\" which is not executable, IOW\n" extable_mismatch_handler()
|
/linux-4.1.27/arch/x86/kernel/kprobes/ |
H A D | core.c | 437 /* insn: must be on special executable page on x86. */ arch_prepare_kprobe()
|
/linux-4.1.27/arch/x86/kvm/ |
H A D | paging_tmpl.h | 696 * writable, or not executable
|
/linux-4.1.27/fs/nfsd/ |
H A D | nfs4recover.c | 1219 dprintk("NFSD: %s was not found or isn't executable (%d). " nfsd4_umh_cltrack_upcall()
|
/linux-4.1.27/sound/pci/pcxhr/ |
H A D | pcxhr_core.c | 331 * send an executable file to the DSP
|
/linux-4.1.27/fs/proc/ |
H A D | base.c | 104 * in /proc for a task before it execs a suid executable. 1543 * made this apply to all per process world readable and executable
|
/linux-4.1.27/fs/isofs/ |
H A D | inode.c | 1311 * anything could be a valid executable. isofs_read_inode()
|
/linux-4.1.27/arch/openrisc/kernel/ |
H A D | head.S | 1150 * we should not just blindly set executable flags,
|
/linux-4.1.27/arch/tile/include/hv/ |
H A D | hypervisor.h | 2012 #define HV_PTE_INDEX_EXECUTABLE 34 /**< Page is executable */ 2287 /** Is this an executable mapping? 2347 _HV_BIT(executable, EXECUTABLE)
|
/linux-4.1.27/arch/x86/lguest/ |
H A D | boot.c | 482 * PAE systems can mark pages as non-executable. Linux calls this the lguest_cpuid()
|
/linux-4.1.27/drivers/video/fbdev/ |
H A D | uvesafb.c | 204 "helper is installed and executable\n"); uvesafb_exec()
|
/linux-4.1.27/arch/ia64/hp/common/ |
H A D | sba_iommu.c | 813 * flush them when they get mapped into an executable vm-area.
|