Home
last modified time | relevance | path

Searched refs:executable (Results 1 – 25 of 85) sorted by relevance

1234

/linux/tools/scripts/
H A Dutilities.mak139 # Usage: absolute-executable-path-or-empty = $(call lookup,path)
147 # is-executable
149 # Usage: bool-value = $(call is-executable,path)
154 is-executable = $(call _is-executable-helper,$(shell-sq))
155 _is-executable-helper = $(shell sh -c $(_is-executable-sh))
156 _is-executable-sh = $(call shell-sq,test -f $(1) -a -x $(1) && echo y)
158 # get-executable
160 # Usage: absolute-executable-path-or-empty = $(call get-executable,path)
162 # The goal is to get an absolute path for an executable;
168 get-executable = $(if $(1),$(if $(is-absolute),$(_ge-abspath),$(lookup)))
[all …]
/linux/Documentation/admin-guide/hw-vuln/
H A Dmultihit.rst108 non-executable pages. This forces all iTLB entries to be 4K, and removes
112 as non-executable. If the guest attempts to execute in one of those pages,
113 the page is broken down into 4K pages, which are then marked executable.
120 non-executable in all shadow paging modes.
126 non-executable can be controlled with a module parameter "nx_huge_pages=".
134 non-executable huge pages in Linux kernel KVM module. All huge
135 pages in the EPT are marked as non-executable.
137 broken down into 4K pages, which are then marked executable.
/linux/Documentation/userspace-api/
H A Dcheck_exec.rst43 interpreter instead. All files that contain executable code, from the point of
54 In a secure environment, libraries and any executable dependencies should also
58 be executable, which also requires integrity guarantees.
77 Indeed, the use case for these securebits is to only trust executable code
85 executions, but only from vetted executable programs, which is OK. For this to
118 Deny script interpretation if they are not executable, but allow
136 Deny script interpretation if they are not executable, and also deny
H A DELF.rst33 program header of an executable is used. Other PT_GNU_PROPERTY headers
/linux/tools/perf/scripts/perl/Perf-Trace-Util/
H A DREADME11 executable; scripts wishing to do that should 'use Context.pm'.
15 perf executable, you add desciptions of the new functions here.
16 scripting_context is a pointer to the perf data in the perf executable
/linux/tools/power/cpupower/
H A DTODO20 -> Run test executable in a forked process.
24 tested executable.
/linux/tools/perf/
H A DMakefile.config205 ifeq ($(call get-executable,$(PKG_CONFIG)),)
216 ifeq ($(call get-executable,$(FLEX)),)
220 ifeq ($(call get-executable,$(BISON)),)
271 PYTHON_AUTO := $(if $(call get-executable,python2-config),python2-config,$(PYTHON_AUTO))
272 PYTHON_AUTO := $(if $(call get-executable,python-config),python-config,$(PYTHON_AUTO))
273 PYTHON_AUTO := $(if $(call get-executable,python3-config),python3-config,$(PYTHON_AUTO))
279 PYTHON_CONFIG_AUTO := $(call get-executable,$(PYTHON)-config)
288 override PYTHON_CONFIG := $(call get-executable-or-default,PYTHON_CONFIG,$(PYTHON_AUTO))
289 override PYTHON := $(call get-executable-or-default,PYTHON,$(subst -config,,$(PYTHON_CONFIG)))
703 else ifeq ($(call get-executable,$(CLANG)),)
/linux/tools/testing/selftests/resctrl/
H A DREADME23 Build executable file "resctrl_tests" from top level directory of the kernel source:
44 Build executable file "resctrl_tests" from this directory(tools/testing/selftests/resctrl/):
/linux/rust/kernel/mm/
H A Dvirt.rs363 pub fn executable(&self) -> bool { in executable() method
376 if self.executable() { in try_clear_mayexec()
/linux/tools/testing/selftests/arm64/signal/
H A DREADME14 - Each signal testcase is compiled into its own executable: a separate
15 executable is used for each test since many tests complete successfully
/linux/tools/kvm/kvm_stat/
H A DMakefile11 a2x_path := $(call get-executable,$(A2X))
/linux/fs/
H A Dexec.c1150 would_dump(bprm, bprm->executable); in begin_new_exec()
1286 fd_install(retval, bprm->executable); in begin_new_exec()
1287 bprm->executable = NULL; in begin_new_exec()
1395 if (bprm->executable) in free_bprm()
1396 fput(bprm->executable); in free_bprm()
1592 struct file *file = bprm->execfd_creds ? bprm->executable : bprm->file; in bprm_creds_from_file()
1714 if (bprm->executable) { in exec_binprm()
1718 bprm->executable = exec; in exec_binprm()
/linux/tools/tracing/latency/
H A DMakefile.config8 ifeq ($(call get-executable,$(PKG_CONFIG)),)
/linux/Documentation/admin-guide/
H A Dperf-security.rst112 group to Perf tool executable and limit access to the executable for
127 2. Assign the required capabilities to the Perf tool executable file and
162 configured Perf tool executable that, when executes, passes perf_events
165 In case Perf tool executable can't be assigned required capabilities (e.g.
305 executable with CAP_IPC_LOCK capability.
/linux/tools/testing/selftests/bpf/
H A Dtest_bpftool_build.sh45 find $dir -type f -executable -name bpftool -print -exec false {} + && \
/linux/LICENSES/preferred/
H A DLGPL-2.088 a textual and legal sense, the linked executable is a combined work, a
225 it, under Section 2) in object code or executable form under the terms
244 an executable that is a derivative of the Library (because it contains
246 library". The executable is therefore covered by this License. Section 6
285 and, if the work is an executable linked with the Library, with the
288 then relink to produce a modified executable containing the modified
305 For an executable, the required form of the "work that uses the Library"
307 executable from it. However, as a special exception, the source code
310 kernel, and so on) of the operating system on which the executable runs,
311 unless that component itself accompanies the executable.
[all …]
H A DLGPL-2.1237 it, under Section 2) in object code or executable form under the terms
256 an executable that is a derivative of the Library (because it contains
258 library". The executable is therefore covered by this License. Section 6
297 and, if the work is an executable linked with the Library, with the
300 then relink to produce a modified executable containing the modified
308 than copying library functions into the executable, and (2) will
325 For an executable, the required form of the "work that uses the Library"
327 executable from it. However, as a special exception, the materials to be
330 kernel, and so on) of the operating system on which the executable runs,
331 unless that component itself accompanies the executable.
[all …]
H A DGPL-2.0154 under Section 2) in object code or executable form under the terms of
171 received the program in object code or executable form with such
175 making modifications to it. For an executable work, complete source
178 control compilation and installation of the executable. However, as a
182 operating system on which the executable runs, unless that component
183 itself accompanies the executable.
185 If distribution of executable or object code is made by offering
/linux/tools/perf/tests/shell/
H A Dtest_intel_pt.sh387 /* Get a memory page to store executable code */
397 /* Copy executable code to executable memory page */
/linux/scripts/dtc/
H A Ddtx_diff302 is not executable.
319 Fallback '${__DTC}' was also not in \${PATH} or is not executable.
/linux/tools/perf/Documentation/
H A DMakefile78 _tmp_tool_path := $(call get-executable,$(ASCIIDOC))
84 _tmp_tool_path := $(call get-executable,$(XMLTO))
/linux/tools/usb/usbip/
H A DCOPYING135 under Section 2) in object code or executable form under the terms of
152 received the program in object code or executable form with such
156 making modifications to it. For an executable work, complete source
159 control compilation and installation of the executable. However, as a
163 operating system on which the executable runs, unless that component
164 itself accompanies the executable.
166 If distribution of executable or object code is made by offering
/linux/Documentation/ABI/removed/
H A Dsysfs-selinux-checkreqprot15 1, it weakens security by allowing mappings to be made executable
/linux/tools/testing/selftests/net/rds/
H A Drun.sh212 gcovr -s --html-details --gcov-executable "$GCOV_CMD" --gcov-ignore-parse-errors \
/linux/Documentation/devicetree/bindings/mtd/partitions/
H A Dbrcm,trx.txt14 device executable binary (e.g. a kernel) as it's what the CFE bootloader starts

1234