Home
last modified time | relevance | path

Searched refs:executable (Results 1 – 25 of 101) sorted by relevance

12345

/linux-6.14.4/tools/scripts/
Dutilities.mak139 # Usage: absolute-executable-path-or-empty = $(call lookup,path)
147 # is-executable
149 # Usage: bool-value = $(call is-executable,path)
154 is-executable = $(call _is-executable-helper,$(shell-sq))
155 _is-executable-helper = $(shell sh -c $(_is-executable-sh))
156 _is-executable-sh = $(call shell-sq,test -f $(1) -a -x $(1) && echo y)
158 # get-executable
160 # Usage: absolute-executable-path-or-empty = $(call get-executable,path)
162 # The goal is to get an absolute path for an executable;
168 get-executable = $(if $(1),$(if $(is-absolute),$(_ge-abspath),$(lookup)))
[all …]
/linux-6.14.4/Documentation/userspace-api/
Dmfd_noexec.rst4 Introduction of non-executable mfd
19 boot), this executable nature of memfd opens a door for NoExec bypass
25 On the other hand, executable memfd has its legit use: runc uses memfd’s
26 seal and executable feature to copy the contents of the binary then
28 use of executable memfds and an attacker's [3].
34 migrating and enforcing non-executable MFD.
72 doesn't set the executable bit; for example, a container with
73 vm.memfd_noexec=1 means the old software will create non-executable memfd
74 by default while new software can create executable memfd by setting
Dcheck_exec.rst43 interpreter instead. All files that contain executable code, from the point of
54 In a secure environment, libraries and any executable dependencies should also
58 be executable, which also requires integrity guarantees.
77 Indeed, the use case for these securebits is to only trust executable code
85 executions, but only from vetted executable programs, which is OK. For this to
118 Deny script interpretation if they are not executable, but allow
136 Deny script interpretation if they are not executable, and also deny
DELF.rst33 program header of an executable is used. Other PT_GNU_PROPERTY headers
/linux-6.14.4/Documentation/admin-guide/hw-vuln/
Dmultihit.rst108 non-executable pages. This forces all iTLB entries to be 4K, and removes
112 as non-executable. If the guest attempts to execute in one of those pages,
113 the page is broken down into 4K pages, which are then marked executable.
120 non-executable in all shadow paging modes.
126 non-executable can be controlled with a module parameter "nx_huge_pages=".
134 non-executable huge pages in Linux kernel KVM module. All huge
135 pages in the EPT are marked as non-executable.
137 broken down into 4K pages, which are then marked executable.
/linux-6.14.4/tools/perf/scripts/perl/Perf-Trace-Util/
DREADME11 executable; scripts wishing to do that should 'use Context.pm'.
15 perf executable, you add desciptions of the new functions here.
16 scripting_context is a pointer to the perf data in the perf executable
/linux-6.14.4/tools/power/cpupower/
DTODO20 -> Run test executable in a forked process.
24 tested executable.
/linux-6.14.4/tools/perf/
DMakefile.config202 ifeq ($(call get-executable,$(PKG_CONFIG)),)
213 ifeq ($(call get-executable,$(FLEX)),)
217 ifeq ($(call get-executable,$(BISON)),)
268 PYTHON_AUTO := $(if $(call get-executable,python2-config),python2-config,$(PYTHON_AUTO))
269 PYTHON_AUTO := $(if $(call get-executable,python-config),python-config,$(PYTHON_AUTO))
270 PYTHON_AUTO := $(if $(call get-executable,python3-config),python3-config,$(PYTHON_AUTO))
276 PYTHON_CONFIG_AUTO := $(call get-executable,$(PYTHON)-config)
285 override PYTHON_CONFIG := $(call get-executable-or-default,PYTHON_CONFIG,$(PYTHON_AUTO))
286 override PYTHON := $(call get-executable-or-default,PYTHON,$(subst -config,,$(PYTHON_CONFIG)))
688 else ifeq ($(call get-executable,$(CLANG)),)
/linux-6.14.4/tools/testing/selftests/resctrl/
DREADME23 Build executable file "resctrl_tests" from top level directory of the kernel source:
44 Build executable file "resctrl_tests" from this directory(tools/testing/selftests/resctrl/):
/linux-6.14.4/tools/kvm/kvm_stat/
DMakefile11 a2x_path := $(call get-executable,$(A2X))
/linux-6.14.4/tools/testing/selftests/arm64/signal/
DREADME14 - Each signal testcase is compiled into its own executable: a separate
15 executable is used for each test since many tests complete successfully
/linux-6.14.4/tools/testing/selftests/bpf/
Dtest_bpftool_build.sh45 find $dir -type f -executable -name bpftool -print -exec false {} + && \
/linux-6.14.4/fs/
Dexec.c1260 would_dump(bprm, bprm->executable); in begin_new_exec()
1396 fd_install(retval, bprm->executable); in begin_new_exec()
1397 bprm->executable = NULL; in begin_new_exec()
1505 if (bprm->executable) in free_bprm()
1506 fput(bprm->executable); in free_bprm()
1702 struct file *file = bprm->execfd_creds ? bprm->executable : bprm->file; in bprm_creds_from_file()
1824 if (bprm->executable) { in exec_binprm()
1828 bprm->executable = exec; in exec_binprm()
/linux-6.14.4/Documentation/admin-guide/
Dperf-security.rst112 group to Perf tool executable and limit access to the executable for
127 2. Assign the required capabilities to the Perf tool executable file and
162 configured Perf tool executable that, when executes, passes perf_events
165 In case Perf tool executable can't be assigned required capabilities (e.g.
305 executable with CAP_IPC_LOCK capability.
/linux-6.14.4/include/linux/
Dbinfmts.h53 struct file *executable; /* Executable to pass to the interpreter */ member
/linux-6.14.4/LICENSES/preferred/
DLGPL-2.1237 it, under Section 2) in object code or executable form under the terms
256 an executable that is a derivative of the Library (because it contains
258 library". The executable is therefore covered by this License. Section 6
297 and, if the work is an executable linked with the Library, with the
300 then relink to produce a modified executable containing the modified
308 than copying library functions into the executable, and (2) will
325 For an executable, the required form of the "work that uses the Library"
327 executable from it. However, as a special exception, the materials to be
330 kernel, and so on) of the operating system on which the executable runs,
331 unless that component itself accompanies the executable.
[all …]
DLGPL-2.088 a textual and legal sense, the linked executable is a combined work, a
225 it, under Section 2) in object code or executable form under the terms
244 an executable that is a derivative of the Library (because it contains
246 library". The executable is therefore covered by this License. Section 6
285 and, if the work is an executable linked with the Library, with the
288 then relink to produce a modified executable containing the modified
305 For an executable, the required form of the "work that uses the Library"
307 executable from it. However, as a special exception, the source code
310 kernel, and so on) of the operating system on which the executable runs,
311 unless that component itself accompanies the executable.
[all …]
DGPL-2.0154 under Section 2) in object code or executable form under the terms of
171 received the program in object code or executable form with such
175 making modifications to it. For an executable work, complete source
178 control compilation and installation of the executable. However, as a
182 operating system on which the executable runs, unless that component
183 itself accompanies the executable.
185 If distribution of executable or object code is made by offering
/linux-6.14.4/tools/perf/tests/shell/
Dtest_intel_pt.sh382 /* Get a memory page to store executable code */
392 /* Copy executable code to executable memory page */
/linux-6.14.4/scripts/dtc/
Ddtx_diff302 is not executable.
319 Fallback '${__DTC}' was also not in \${PATH} or is not executable.
/linux-6.14.4/tools/perf/Documentation/
DMakefile78 _tmp_tool_path := $(call get-executable,$(ASCIIDOC))
84 _tmp_tool_path := $(call get-executable,$(XMLTO))
/linux-6.14.4/Documentation/ABI/removed/
Dsysfs-selinux-checkreqprot15 1, it weakens security by allowing mappings to be made executable
/linux-6.14.4/tools/testing/selftests/net/rds/
Drun.sh212 gcovr -s --html-details --gcov-executable "$GCOV_CMD" --gcov-ignore-parse-errors \
/linux-6.14.4/tools/usb/usbip/
DCOPYING135 under Section 2) in object code or executable form under the terms of
152 received the program in object code or executable form with such
156 making modifications to it. For an executable work, complete source
159 control compilation and installation of the executable. However, as a
163 operating system on which the executable runs, unless that component
164 itself accompanies the executable.
166 If distribution of executable or object code is made by offering
/linux-6.14.4/Documentation/devicetree/bindings/mtd/partitions/
Dbrcm,trx.txt14 device executable binary (e.g. a kernel) as it's what the CFE bootloader starts

12345