/Linux-v5.15/tools/scripts/ |
D | utilities.mak | 139 # Usage: absolute-executable-path-or-empty = $(call lookup,path) 147 # is-executable 149 # Usage: bool-value = $(call is-executable,path) 154 is-executable = $(call _is-executable-helper,$(shell-sq)) 155 _is-executable-helper = $(shell sh -c $(_is-executable-sh)) 156 _is-executable-sh = $(call shell-sq,test -f $(1) -a -x $(1) && echo y) 158 # get-executable 160 # Usage: absolute-executable-path-or-empty = $(call get-executable,path) 162 # The goal is to get an absolute path for an executable; 168 get-executable = $(if $(1),$(if $(is-absolute),$(_ge-abspath),$(lookup))) [all …]
|
/Linux-v5.15/Documentation/admin-guide/hw-vuln/ |
D | multihit.rst | 108 non-executable pages. This forces all iTLB entries to be 4K, and removes 112 as non-executable. If the guest attempts to execute in one of those pages, 113 the page is broken down into 4K pages, which are then marked executable. 120 non-executable in all shadow paging modes. 126 non-executable can be controlled with a module parameter "nx_huge_pages=". 134 non-executable huge pages in Linux kernel KVM module. All huge 135 pages in the EPT are marked as non-executable. 137 broken down into 4K pages, which are then marked executable.
|
/Linux-v5.15/tools/power/cpupower/ |
D | ToDo | 20 -> Run test executable in a forked process. 24 tested executable.
|
/Linux-v5.15/tools/perf/scripts/perl/Perf-Trace-Util/ |
D | README | 11 executable; scripts wishing to do that should 'use Context.pm'. 15 perf executable, you add desciptions of the new functions here. 16 scripting_context is a pointer to the perf data in the perf executable
|
/Linux-v5.15/tools/lib/traceevent/Documentation/ |
D | Makefile | 48 _tmp_tool_path := $(call get-executable,$(ASCIIDOC)) 54 _tmp_tool_path := $(call get-executable,$(XMLTO))
|
/Linux-v5.15/tools/testing/selftests/kvm/lib/x86_64/ |
D | vmx.c | 26 uint64_t executable:1; member 432 pml4e[index[3]].executable = true; in nested_pg_map() 442 pdpe[index[2]].executable = true; in nested_pg_map() 452 pde[index[1]].executable = true; in nested_pg_map() 461 pte[index[0]].executable = true; in nested_pg_map()
|
/Linux-v5.15/tools/kvm/kvm_stat/ |
D | Makefile | 11 a2x_path := $(call get-executable,$(A2X))
|
/Linux-v5.15/tools/testing/selftests/arm64/signal/ |
D | README | 14 - Each signal testcase is compiled into its own executable: a separate 15 executable is used for each test since many tests complete successfully
|
/Linux-v5.15/tools/testing/selftests/bpf/ |
D | test_bpftool_build.sh | 45 find $dir -type f -executable -name bpftool -print -exec false {} + && \
|
/Linux-v5.15/fs/ |
D | exec.c | 1282 would_dump(bprm, bprm->executable); in begin_new_exec() 1396 fd_install(retval, bprm->executable); in begin_new_exec() 1397 bprm->executable = NULL; in begin_new_exec() 1494 if (bprm->executable) in free_bprm() 1495 fput(bprm->executable); in free_bprm() 1638 struct file *file = bprm->execfd_creds ? bprm->executable : bprm->file; in bprm_creds_from_file() 1778 if (bprm->executable) { in exec_binprm() 1782 bprm->executable = exec; in exec_binprm()
|
/Linux-v5.15/Documentation/admin-guide/ |
D | perf-security.rst | 112 group to Perf tool executable and limit access to the executable for 127 2. Assign the required capabilities to the Perf tool executable file and 162 configured Perf tool executable that, when executes, passes perf_events 165 In case Perf tool executable can't be assigned required capabilities (e.g. 305 executable with CAP_IPC_LOCK capability.
|
/Linux-v5.15/include/linux/ |
D | binfmts.h | 48 struct file *executable; /* Executable to pass to the interpreter */ member
|
/Linux-v5.15/tools/perf/ |
D | Makefile.config | 196 ifeq ($(call get-executable,$(FLEX)),) 200 ifeq ($(call get-executable,$(BISON)),) 241 PYTHON_AUTO := $(if $(call get-executable,python3),python3,$(PYTHON_AUTO)) 242 PYTHON_AUTO := $(if $(call get-executable,python),python,$(PYTHON_AUTO)) 243 PYTHON_AUTO := $(if $(call get-executable,python2),python2,$(PYTHON_AUTO)) 244 override PYTHON := $(call get-executable-or-default,PYTHON,$(PYTHON_AUTO)) 246 $(if $(call get-executable,$(PYTHON)-config),$(PYTHON)-config,python-config) 248 $(call get-executable-or-default,PYTHON_CONFIG,$(PYTHON_AUTO_CONFIG)) 858 …msg := $(warning Old version of libbfd/binutils things like PE executable profiling will not be av…
|
/Linux-v5.15/LICENSES/preferred/ |
D | LGPL-2.1 | 235 it, under Section 2) in object code or executable form under the terms 254 an executable that is a derivative of the Library (because it contains 256 library". The executable is therefore covered by this License. Section 6 295 and, if the work is an executable linked with the Library, with the 298 then relink to produce a modified executable containing the modified 306 than copying library functions into the executable, and (2) will 323 For an executable, the required form of the "work that uses the Library" 325 executable from it. However, as a special exception, the materials to be 328 kernel, and so on) of the operating system on which the executable runs, 329 unless that component itself accompanies the executable. [all …]
|
D | LGPL-2.0 | 88 a textual and legal sense, the linked executable is a combined work, a 225 it, under Section 2) in object code or executable form under the terms 244 an executable that is a derivative of the Library (because it contains 246 library". The executable is therefore covered by this License. Section 6 285 and, if the work is an executable linked with the Library, with the 288 then relink to produce a modified executable containing the modified 305 For an executable, the required form of the "work that uses the Library" 307 executable from it. However, as a special exception, the source code 310 kernel, and so on) of the operating system on which the executable runs, 311 unless that component itself accompanies the executable. [all …]
|
D | GPL-2.0 | 154 under Section 2) in object code or executable form under the terms of 171 received the program in object code or executable form with such 175 making modifications to it. For an executable work, complete source 178 control compilation and installation of the executable. However, as a 182 operating system on which the executable runs, unless that component 183 itself accompanies the executable. 185 If distribution of executable or object code is made by offering
|
/Linux-v5.15/Documentation/ABI/obsolete/ |
D | sysfs-selinux-checkreqprot | 12 1, it weakens security by allowing mappings to be made executable
|
/Linux-v5.15/tools/perf/Documentation/ |
D | Makefile | 78 _tmp_tool_path := $(call get-executable,$(ASCIIDOC)) 84 _tmp_tool_path := $(call get-executable,$(XMLTO))
|
/Linux-v5.15/scripts/dtc/ |
D | dtx_diff | 306 is not executable. 323 Fallback '${__DTC}' was also not in \${PATH} or is not executable.
|
/Linux-v5.15/Documentation/devicetree/bindings/mtd/partitions/ |
D | brcm,trx.txt | 14 device executable binary (e.g. a kernel) as it's what the CFE bootloader starts
|
/Linux-v5.15/tools/usb/usbip/ |
D | COPYING | 135 under Section 2) in object code or executable form under the terms of 152 received the program in object code or executable form with such 156 making modifications to it. For an executable work, complete source 159 control compilation and installation of the executable. However, as a 163 operating system on which the executable runs, unless that component 164 itself accompanies the executable. 166 If distribution of executable or object code is made by offering
|
/Linux-v5.15/tools/testing/selftests/resctrl/ |
D | README | 18 Run "make" to build executable file "resctrl_tests".
|
/Linux-v5.15/arch/arm/boot/compressed/ |
D | efi-header.S | 16 @ ARM/Linux boot protocol expects an executable instruction
|
/Linux-v5.15/Documentation/filesystems/ |
D | romfs.rst | 113 the file; while bit 4 shows if the file is executable or not. The 115 and world executable if it is; except the character and block devices, 139 using the executable bits for special purposes on the socket and fifo
|
/Linux-v5.15/arch/parisc/ |
D | Kconfig | 210 as modules, the kernel executable may become too big, so that the 264 bool "Build kernel as self-extracting executable" 268 self-extracting executable.
|