/Linux-v6.1/tools/scripts/ |
D | utilities.mak | 139 # Usage: absolute-executable-path-or-empty = $(call lookup,path) 147 # is-executable 149 # Usage: bool-value = $(call is-executable,path) 154 is-executable = $(call _is-executable-helper,$(shell-sq)) 155 _is-executable-helper = $(shell sh -c $(_is-executable-sh)) 156 _is-executable-sh = $(call shell-sq,test -f $(1) -a -x $(1) && echo y) 158 # get-executable 160 # Usage: absolute-executable-path-or-empty = $(call get-executable,path) 162 # The goal is to get an absolute path for an executable; 168 get-executable = $(if $(1),$(if $(is-absolute),$(_ge-abspath),$(lookup))) [all …]
|
/Linux-v6.1/scripts/kconfig/tests/ |
D | conftest.py | 41 """Run text-based Kconfig executable and save the result. 49 returncode: exit status of the Kconfig executable 125 returncode: exit status of the Kconfig executable 135 returncode: exit status of the Kconfig executable 144 returncode: exit status of the Kconfig executable 152 returncode: exit status of the Kconfig executable 170 returncode: exit status of the Kconfig executable 178 returncode: exit status of the Kconfig executable 186 returncode: exit status of the Kconfig executable 194 returncode: exit status of the Kconfig executable [all …]
|
/Linux-v6.1/scripts/ |
D | Makefile.host | 30 # Will compile bin2hex.c and create an executable named bin2hex 34 # Will compile lxdialog.c and checklist.c, and then link the executable 41 # They are linked as C++ code to the executable qconf 105 # Create executable from a single .c file 106 # host-csingle -> Executable 113 # Link an executable based on list of .o files, all plain c 114 # host-cmulti -> executable 130 # Link an executable based on list of .o files, a mixture of .c and .cc 131 # host-cxxmulti -> executable 147 # Create executable from a single Rust crate (which may consist of [all …]
|
/Linux-v6.1/drivers/misc/ |
D | sram-exec.c | 47 * sram_exec_copy - copy data to a protected executable region of sram 59 * read-only and executable except when copying data to them, at which point 60 * they are set to read-write non-executable, to make sure no memory is 61 * writeable and executable at the same time. This region must be page-aligned 66 * NOTE: This function uses the fncpy macro to move code to the executable 68 * executable code, so fncpy is a macro that must be defined by any arch
|
/Linux-v6.1/samples/bpf/ |
D | Makefile.target | 10 # Will compile xsk_example.c and create an executable named xsk_example 14 # Will compile xdpsock_1.c and xdpsock_2.c, and then link the executable 52 # Create executable from a single .c file 53 # tprog-csingle -> Executable 60 # Link an executable based on list of .o files, all plain c 61 # tprog-cmulti -> executable
|
/Linux-v6.1/Documentation/admin-guide/hw-vuln/ |
D | multihit.rst | 108 non-executable pages. This forces all iTLB entries to be 4K, and removes 112 as non-executable. If the guest attempts to execute in one of those pages, 113 the page is broken down into 4K pages, which are then marked executable. 120 non-executable in all shadow paging modes. 126 non-executable can be controlled with a module parameter "nx_huge_pages=". 134 non-executable huge pages in Linux kernel KVM module. All huge 135 pages in the EPT are marked as non-executable. 137 broken down into 4K pages, which are then marked executable.
|
/Linux-v6.1/arch/arm/kernel/ |
D | elf.c | 14 /* Make sure it's an ARM executable */ in elf_check_arch() 81 * An executable for which elf_read_implies_exec() returns TRUE will 93 * exec-all : all PROT_READ user mappings are executable, except when 95 * exec-none : only PROT_EXEC user mappings are executable. 96 * exec-stack: only the stack and PROT_EXEC user mappings are executable.
|
/Linux-v6.1/include/linux/ |
D | binfmts.h | 46 struct file *executable; /* Executable to pass to the interpreter */ member 59 int execfd; /* File descriptor of the executable */ 118 #define EXSTACK_DISABLE_X 1 /* Disable executable stacks */ 119 #define EXSTACK_ENABLE_X 2 /* Enable executable stacks */
|
D | elf-fdpic.h | 34 #define ELF_FDPIC_FLAG_EXEC_STACK 0x00000010 /* T if stack to be executable */ 35 #define ELF_FDPIC_FLAG_NOEXEC_STACK 0x00000020 /* T if stack not to be executable */ 36 #define ELF_FDPIC_FLAG_EXECUTABLE 0x00000040 /* T if this object is the executable */
|
D | hidden.h | 5 * building a dynamic object (either a shared library or an executable) that 11 * executable image is loaded at an offset which is different from its link
|
/Linux-v6.1/LICENSES/dual/ |
D | CDDL-1.0 | 32 1.4. "Executable" means the Covered Software in any form other than 48 1.9. "Modifications" means the Source Code and Executable form of 61 1.10. "Original Software" means the Source Code and Executable form 161 available in Executable form must also be made available in Source 166 of any such Covered Software in Executable form as to how they can 204 3.5. Distribution of Executable Versions. 206 You may distribute the Executable form of the Covered Software 210 and that the license for the Executable form does not attempt to 213 Software in Executable form under a different license, You must
|
D | MPL-1.1 | 39 1.5. "Executable" means Covered Code in any form other than Source 77 compilation and installation of an Executable, or source code 174 either on the same media as an Executable version or via an accepted 176 Executable version available; and if made available via Electronic 191 Executable version or related documentation in which You describe the 243 3.6. Distribution of Executable Versions. 244 You may distribute Covered Code in Executable form only if the 250 in any notice in an Executable version, related documentation or 252 Covered Code. You may distribute the Executable version of Covered 256 Executable version does not attempt to limit or alter the recipient's [all …]
|
/Linux-v6.1/tools/perf/scripts/perl/Perf-Trace-Util/ |
D | README | 11 executable; scripts wishing to do that should 'use Context.pm'. 15 perf executable, you add desciptions of the new functions here. 16 scripting_context is a pointer to the perf data in the perf executable
|
/Linux-v6.1/include/uapi/linux/ |
D | securebits.h | 14 inheritance of root-permissions and suid-root executable under 16 *of the executable file* if the effective uid of the new process is 18 executable file. */
|
/Linux-v6.1/arch/um/kernel/ |
D | physmem.c | 62 * i.e start address of the executable image. 69 * it on the last executable image address (uml_reserved). 72 * (len + highmem) includes the size of the memory used be the executable image, 73 * but the mapped-to address is the last address of the executable image 74 * (uml_reserved == end address of executable image).
|
/Linux-v6.1/arch/um/os-Linux/ |
D | execvp.c | 93 up finding no executable we can use, we want to diagnose in execvp_noalloc() 100 /* Those errors indicate the file is missing or not executable in execvp_noalloc() 110 * if it is not executable - the Linux in execvp_noalloc() 116 /* Some other error means we found an executable file, but in execvp_noalloc()
|
/Linux-v6.1/LICENSES/preferred/ |
D | LGPL-2.0 | 88 a textual and legal sense, the linked executable is a combined work, a 225 it, under Section 2) in object code or executable form under the terms 244 an executable that is a derivative of the Library (because it contains 246 library". The executable is therefore covered by this License. Section 6 285 and, if the work is an executable linked with the Library, with the 288 then relink to produce a modified executable containing the modified 305 For an executable, the required form of the "work that uses the Library" 307 executable from it. However, as a special exception, the source code 310 kernel, and so on) of the operating system on which the executable runs, 311 unless that component itself accompanies the executable. [all …]
|
D | LGPL-2.1 | 237 it, under Section 2) in object code or executable form under the terms 256 an executable that is a derivative of the Library (because it contains 258 library". The executable is therefore covered by this License. Section 6 297 and, if the work is an executable linked with the Library, with the 300 then relink to produce a modified executable containing the modified 308 than copying library functions into the executable, and (2) will 325 For an executable, the required form of the "work that uses the Library" 327 executable from it. However, as a special exception, the materials to be 330 kernel, and so on) of the operating system on which the executable runs, 331 unless that component itself accompanies the executable. [all …]
|
/Linux-v6.1/arch/m68k/lib/ |
D | mulsi3.S | 25 compiled with GCC to produce an executable, this does not cause 26 the resulting executable to be covered by the GNU General Public License. 28 the executable file might be covered by the GNU General Public License. */
|
D | divsi3.S | 25 compiled with GCC to produce an executable, this does not cause 26 the resulting executable to be covered by the GNU General Public License. 28 the executable file might be covered by the GNU General Public License. */
|
D | modsi3.S | 25 compiled with GCC to produce an executable, this does not cause 26 the resulting executable to be covered by the GNU General Public License. 28 the executable file might be covered by the GNU General Public License. */
|
D | umodsi3.S | 25 compiled with GCC to produce an executable, this does not cause 26 the resulting executable to be covered by the GNU General Public License. 28 the executable file might be covered by the GNU General Public License. */
|
/Linux-v6.1/tools/power/cpupower/ |
D | TODO | 20 -> Run test executable in a forked process. 24 tested executable.
|
/Linux-v6.1/arch/arm64/include/asm/ |
D | image.h | 32 * @code0: Executable code, or 34 * @code1: Executable code
|
/Linux-v6.1/tools/testing/selftests/powerpc/mm/ |
D | exec_prot.c | 88 * Jump to the executable region. in check_exec_fault() 135 /* Setup executable region */ in test() 154 * Later, to jump to the executable region, we use a branch in test() 161 * Pick the first instruction's address from the executable in test()
|