Home
last modified time | relevance | path

Searched full:executable (Results 1 – 25 of 374) sorted by relevance

12345678910>>...15

/Linux-v6.1/tools/scripts/
Dutilities.mak139 # Usage: absolute-executable-path-or-empty = $(call lookup,path)
147 # is-executable
149 # Usage: bool-value = $(call is-executable,path)
154 is-executable = $(call _is-executable-helper,$(shell-sq))
155 _is-executable-helper = $(shell sh -c $(_is-executable-sh))
156 _is-executable-sh = $(call shell-sq,test -f $(1) -a -x $(1) && echo y)
158 # get-executable
160 # Usage: absolute-executable-path-or-empty = $(call get-executable,path)
162 # The goal is to get an absolute path for an executable;
168 get-executable = $(if $(1),$(if $(is-absolute),$(_ge-abspath),$(lookup)))
[all …]
/Linux-v6.1/scripts/kconfig/tests/
Dconftest.py41 """Run text-based Kconfig executable and save the result.
49 returncode: exit status of the Kconfig executable
125 returncode: exit status of the Kconfig executable
135 returncode: exit status of the Kconfig executable
144 returncode: exit status of the Kconfig executable
152 returncode: exit status of the Kconfig executable
170 returncode: exit status of the Kconfig executable
178 returncode: exit status of the Kconfig executable
186 returncode: exit status of the Kconfig executable
194 returncode: exit status of the Kconfig executable
[all …]
/Linux-v6.1/scripts/
DMakefile.host30 # Will compile bin2hex.c and create an executable named bin2hex
34 # Will compile lxdialog.c and checklist.c, and then link the executable
41 # They are linked as C++ code to the executable qconf
105 # Create executable from a single .c file
106 # host-csingle -> Executable
113 # Link an executable based on list of .o files, all plain c
114 # host-cmulti -> executable
130 # Link an executable based on list of .o files, a mixture of .c and .cc
131 # host-cxxmulti -> executable
147 # Create executable from a single Rust crate (which may consist of
[all …]
/Linux-v6.1/drivers/misc/
Dsram-exec.c47 * sram_exec_copy - copy data to a protected executable region of sram
59 * read-only and executable except when copying data to them, at which point
60 * they are set to read-write non-executable, to make sure no memory is
61 * writeable and executable at the same time. This region must be page-aligned
66 * NOTE: This function uses the fncpy macro to move code to the executable
68 * executable code, so fncpy is a macro that must be defined by any arch
/Linux-v6.1/samples/bpf/
DMakefile.target10 # Will compile xsk_example.c and create an executable named xsk_example
14 # Will compile xdpsock_1.c and xdpsock_2.c, and then link the executable
52 # Create executable from a single .c file
53 # tprog-csingle -> Executable
60 # Link an executable based on list of .o files, all plain c
61 # tprog-cmulti -> executable
/Linux-v6.1/Documentation/admin-guide/hw-vuln/
Dmultihit.rst108 non-executable pages. This forces all iTLB entries to be 4K, and removes
112 as non-executable. If the guest attempts to execute in one of those pages,
113 the page is broken down into 4K pages, which are then marked executable.
120 non-executable in all shadow paging modes.
126 non-executable can be controlled with a module parameter "nx_huge_pages=".
134 non-executable huge pages in Linux kernel KVM module. All huge
135 pages in the EPT are marked as non-executable.
137 broken down into 4K pages, which are then marked executable.
/Linux-v6.1/arch/arm/kernel/
Delf.c14 /* Make sure it's an ARM executable */ in elf_check_arch()
81 * An executable for which elf_read_implies_exec() returns TRUE will
93 * exec-all : all PROT_READ user mappings are executable, except when
95 * exec-none : only PROT_EXEC user mappings are executable.
96 * exec-stack: only the stack and PROT_EXEC user mappings are executable.
/Linux-v6.1/include/linux/
Dbinfmts.h46 struct file *executable; /* Executable to pass to the interpreter */ member
59 int execfd; /* File descriptor of the executable */
118 #define EXSTACK_DISABLE_X 1 /* Disable executable stacks */
119 #define EXSTACK_ENABLE_X 2 /* Enable executable stacks */
Delf-fdpic.h34 #define ELF_FDPIC_FLAG_EXEC_STACK 0x00000010 /* T if stack to be executable */
35 #define ELF_FDPIC_FLAG_NOEXEC_STACK 0x00000020 /* T if stack not to be executable */
36 #define ELF_FDPIC_FLAG_EXECUTABLE 0x00000040 /* T if this object is the executable */
Dhidden.h5 * building a dynamic object (either a shared library or an executable) that
11 * executable image is loaded at an offset which is different from its link
/Linux-v6.1/LICENSES/dual/
DCDDL-1.032 1.4. "Executable" means the Covered Software in any form other than
48 1.9. "Modifications" means the Source Code and Executable form of
61 1.10. "Original Software" means the Source Code and Executable form
161 available in Executable form must also be made available in Source
166 of any such Covered Software in Executable form as to how they can
204 3.5. Distribution of Executable Versions.
206 You may distribute the Executable form of the Covered Software
210 and that the license for the Executable form does not attempt to
213 Software in Executable form under a different license, You must
DMPL-1.139 1.5. "Executable" means Covered Code in any form other than Source
77 compilation and installation of an Executable, or source code
174 either on the same media as an Executable version or via an accepted
176 Executable version available; and if made available via Electronic
191 Executable version or related documentation in which You describe the
243 3.6. Distribution of Executable Versions.
244 You may distribute Covered Code in Executable form only if the
250 in any notice in an Executable version, related documentation or
252 Covered Code. You may distribute the Executable version of Covered
256 Executable version does not attempt to limit or alter the recipient's
[all …]
/Linux-v6.1/tools/perf/scripts/perl/Perf-Trace-Util/
DREADME11 executable; scripts wishing to do that should 'use Context.pm'.
15 perf executable, you add desciptions of the new functions here.
16 scripting_context is a pointer to the perf data in the perf executable
/Linux-v6.1/include/uapi/linux/
Dsecurebits.h14 inheritance of root-permissions and suid-root executable under
16 *of the executable file* if the effective uid of the new process is
18 executable file. */
/Linux-v6.1/arch/um/kernel/
Dphysmem.c62 * i.e start address of the executable image.
69 * it on the last executable image address (uml_reserved).
72 * (len + highmem) includes the size of the memory used be the executable image,
73 * but the mapped-to address is the last address of the executable image
74 * (uml_reserved == end address of executable image).
/Linux-v6.1/arch/um/os-Linux/
Dexecvp.c93 up finding no executable we can use, we want to diagnose in execvp_noalloc()
100 /* Those errors indicate the file is missing or not executable in execvp_noalloc()
110 * if it is not executable - the Linux in execvp_noalloc()
116 /* Some other error means we found an executable file, but in execvp_noalloc()
/Linux-v6.1/LICENSES/preferred/
DLGPL-2.088 a textual and legal sense, the linked executable is a combined work, a
225 it, under Section 2) in object code or executable form under the terms
244 an executable that is a derivative of the Library (because it contains
246 library". The executable is therefore covered by this License. Section 6
285 and, if the work is an executable linked with the Library, with the
288 then relink to produce a modified executable containing the modified
305 For an executable, the required form of the "work that uses the Library"
307 executable from it. However, as a special exception, the source code
310 kernel, and so on) of the operating system on which the executable runs,
311 unless that component itself accompanies the executable.
[all …]
DLGPL-2.1237 it, under Section 2) in object code or executable form under the terms
256 an executable that is a derivative of the Library (because it contains
258 library". The executable is therefore covered by this License. Section 6
297 and, if the work is an executable linked with the Library, with the
300 then relink to produce a modified executable containing the modified
308 than copying library functions into the executable, and (2) will
325 For an executable, the required form of the "work that uses the Library"
327 executable from it. However, as a special exception, the materials to be
330 kernel, and so on) of the operating system on which the executable runs,
331 unless that component itself accompanies the executable.
[all …]
/Linux-v6.1/arch/m68k/lib/
Dmulsi3.S25 compiled with GCC to produce an executable, this does not cause
26 the resulting executable to be covered by the GNU General Public License.
28 the executable file might be covered by the GNU General Public License. */
Ddivsi3.S25 compiled with GCC to produce an executable, this does not cause
26 the resulting executable to be covered by the GNU General Public License.
28 the executable file might be covered by the GNU General Public License. */
Dmodsi3.S25 compiled with GCC to produce an executable, this does not cause
26 the resulting executable to be covered by the GNU General Public License.
28 the executable file might be covered by the GNU General Public License. */
Dumodsi3.S25 compiled with GCC to produce an executable, this does not cause
26 the resulting executable to be covered by the GNU General Public License.
28 the executable file might be covered by the GNU General Public License. */
/Linux-v6.1/tools/power/cpupower/
DTODO20 -> Run test executable in a forked process.
24 tested executable.
/Linux-v6.1/arch/arm64/include/asm/
Dimage.h32 * @code0: Executable code, or
34 * @code1: Executable code
/Linux-v6.1/tools/testing/selftests/powerpc/mm/
Dexec_prot.c88 * Jump to the executable region. in check_exec_fault()
135 /* Setup executable region */ in test()
154 * Later, to jump to the executable region, we use a branch in test()
161 * Pick the first instruction's address from the executable in test()

12345678910>>...15