/linux-6.14.4/tools/scripts/ |
D | utilities.mak | 139 # Usage: absolute-executable-path-or-empty = $(call lookup,path) 147 # is-executable 149 # Usage: bool-value = $(call is-executable,path) 154 is-executable = $(call _is-executable-helper,$(shell-sq)) 155 _is-executable-helper = $(shell sh -c $(_is-executable-sh)) 156 _is-executable-sh = $(call shell-sq,test -f $(1) -a -x $(1) && echo y) 158 # get-executable 160 # Usage: absolute-executable-path-or-empty = $(call get-executable,path) 162 # The goal is to get an absolute path for an executable; 168 get-executable = $(if $(1),$(if $(is-absolute),$(_ge-abspath),$(lookup))) [all …]
|
/linux-6.14.4/Documentation/userspace-api/ |
D | mfd_noexec.rst | 4 Introduction of non-executable mfd 19 boot), this executable nature of memfd opens a door for NoExec bypass 25 On the other hand, executable memfd has its legit use: runc uses memfd’s 26 seal and executable feature to copy the contents of the binary then 28 use of executable memfds and an attacker's [3]. 34 migrating and enforcing non-executable MFD. 72 doesn't set the executable bit; for example, a container with 73 vm.memfd_noexec=1 means the old software will create non-executable memfd 74 by default while new software can create executable memfd by setting
|
D | check_exec.rst | 43 interpreter instead. All files that contain executable code, from the point of 54 In a secure environment, libraries and any executable dependencies should also 58 be executable, which also requires integrity guarantees. 77 Indeed, the use case for these securebits is to only trust executable code 85 executions, but only from vetted executable programs, which is OK. For this to 118 Deny script interpretation if they are not executable, but allow 136 Deny script interpretation if they are not executable, and also deny
|
D | ELF.rst | 33 program header of an executable is used. Other PT_GNU_PROPERTY headers
|
/linux-6.14.4/Documentation/admin-guide/hw-vuln/ |
D | multihit.rst | 108 non-executable pages. This forces all iTLB entries to be 4K, and removes 112 as non-executable. If the guest attempts to execute in one of those pages, 113 the page is broken down into 4K pages, which are then marked executable. 120 non-executable in all shadow paging modes. 126 non-executable can be controlled with a module parameter "nx_huge_pages=". 134 non-executable huge pages in Linux kernel KVM module. All huge 135 pages in the EPT are marked as non-executable. 137 broken down into 4K pages, which are then marked executable.
|
/linux-6.14.4/tools/perf/scripts/perl/Perf-Trace-Util/ |
D | README | 11 executable; scripts wishing to do that should 'use Context.pm'. 15 perf executable, you add desciptions of the new functions here. 16 scripting_context is a pointer to the perf data in the perf executable
|
/linux-6.14.4/tools/power/cpupower/ |
D | TODO | 20 -> Run test executable in a forked process. 24 tested executable.
|
/linux-6.14.4/tools/perf/ |
D | Makefile.config | 202 ifeq ($(call get-executable,$(PKG_CONFIG)),) 213 ifeq ($(call get-executable,$(FLEX)),) 217 ifeq ($(call get-executable,$(BISON)),) 268 PYTHON_AUTO := $(if $(call get-executable,python2-config),python2-config,$(PYTHON_AUTO)) 269 PYTHON_AUTO := $(if $(call get-executable,python-config),python-config,$(PYTHON_AUTO)) 270 PYTHON_AUTO := $(if $(call get-executable,python3-config),python3-config,$(PYTHON_AUTO)) 276 PYTHON_CONFIG_AUTO := $(call get-executable,$(PYTHON)-config) 285 override PYTHON_CONFIG := $(call get-executable-or-default,PYTHON_CONFIG,$(PYTHON_AUTO)) 286 override PYTHON := $(call get-executable-or-default,PYTHON,$(subst -config,,$(PYTHON_CONFIG))) 688 else ifeq ($(call get-executable,$(CLANG)),)
|
/linux-6.14.4/tools/testing/selftests/resctrl/ |
D | README | 23 Build executable file "resctrl_tests" from top level directory of the kernel source: 44 Build executable file "resctrl_tests" from this directory(tools/testing/selftests/resctrl/):
|
/linux-6.14.4/tools/kvm/kvm_stat/ |
D | Makefile | 11 a2x_path := $(call get-executable,$(A2X))
|
/linux-6.14.4/tools/testing/selftests/arm64/signal/ |
D | README | 14 - Each signal testcase is compiled into its own executable: a separate 15 executable is used for each test since many tests complete successfully
|
/linux-6.14.4/tools/testing/selftests/bpf/ |
D | test_bpftool_build.sh | 45 find $dir -type f -executable -name bpftool -print -exec false {} + && \
|
/linux-6.14.4/fs/ |
D | exec.c | 1260 would_dump(bprm, bprm->executable); in begin_new_exec() 1396 fd_install(retval, bprm->executable); in begin_new_exec() 1397 bprm->executable = NULL; in begin_new_exec() 1505 if (bprm->executable) in free_bprm() 1506 fput(bprm->executable); in free_bprm() 1702 struct file *file = bprm->execfd_creds ? bprm->executable : bprm->file; in bprm_creds_from_file() 1824 if (bprm->executable) { in exec_binprm() 1828 bprm->executable = exec; in exec_binprm()
|
/linux-6.14.4/Documentation/admin-guide/ |
D | perf-security.rst | 112 group to Perf tool executable and limit access to the executable for 127 2. Assign the required capabilities to the Perf tool executable file and 162 configured Perf tool executable that, when executes, passes perf_events 165 In case Perf tool executable can't be assigned required capabilities (e.g. 305 executable with CAP_IPC_LOCK capability.
|
/linux-6.14.4/include/linux/ |
D | binfmts.h | 53 struct file *executable; /* Executable to pass to the interpreter */ member
|
/linux-6.14.4/LICENSES/preferred/ |
D | LGPL-2.1 | 237 it, under Section 2) in object code or executable form under the terms 256 an executable that is a derivative of the Library (because it contains 258 library". The executable is therefore covered by this License. Section 6 297 and, if the work is an executable linked with the Library, with the 300 then relink to produce a modified executable containing the modified 308 than copying library functions into the executable, and (2) will 325 For an executable, the required form of the "work that uses the Library" 327 executable from it. However, as a special exception, the materials to be 330 kernel, and so on) of the operating system on which the executable runs, 331 unless that component itself accompanies the executable. [all …]
|
D | LGPL-2.0 | 88 a textual and legal sense, the linked executable is a combined work, a 225 it, under Section 2) in object code or executable form under the terms 244 an executable that is a derivative of the Library (because it contains 246 library". The executable is therefore covered by this License. Section 6 285 and, if the work is an executable linked with the Library, with the 288 then relink to produce a modified executable containing the modified 305 For an executable, the required form of the "work that uses the Library" 307 executable from it. However, as a special exception, the source code 310 kernel, and so on) of the operating system on which the executable runs, 311 unless that component itself accompanies the executable. [all …]
|
D | GPL-2.0 | 154 under Section 2) in object code or executable form under the terms of 171 received the program in object code or executable form with such 175 making modifications to it. For an executable work, complete source 178 control compilation and installation of the executable. However, as a 182 operating system on which the executable runs, unless that component 183 itself accompanies the executable. 185 If distribution of executable or object code is made by offering
|
/linux-6.14.4/tools/perf/tests/shell/ |
D | test_intel_pt.sh | 382 /* Get a memory page to store executable code */ 392 /* Copy executable code to executable memory page */
|
/linux-6.14.4/scripts/dtc/ |
D | dtx_diff | 302 is not executable. 319 Fallback '${__DTC}' was also not in \${PATH} or is not executable.
|
/linux-6.14.4/tools/perf/Documentation/ |
D | Makefile | 78 _tmp_tool_path := $(call get-executable,$(ASCIIDOC)) 84 _tmp_tool_path := $(call get-executable,$(XMLTO))
|
/linux-6.14.4/Documentation/ABI/removed/ |
D | sysfs-selinux-checkreqprot | 15 1, it weakens security by allowing mappings to be made executable
|
/linux-6.14.4/tools/testing/selftests/net/rds/ |
D | run.sh | 212 gcovr -s --html-details --gcov-executable "$GCOV_CMD" --gcov-ignore-parse-errors \
|
/linux-6.14.4/tools/usb/usbip/ |
D | COPYING | 135 under Section 2) in object code or executable form under the terms of 152 received the program in object code or executable form with such 156 making modifications to it. For an executable work, complete source 159 control compilation and installation of the executable. However, as a 163 operating system on which the executable runs, unless that component 164 itself accompanies the executable. 166 If distribution of executable or object code is made by offering
|
/linux-6.14.4/Documentation/devicetree/bindings/mtd/partitions/ |
D | brcm,trx.txt | 14 device executable binary (e.g. a kernel) as it's what the CFE bootloader starts
|