/linux/Documentation/scsi/ |
H A D | wd719x.rst | 18 wget http://support.wdc.com/download/archive/pciscsi.exe 19 lha xi pciscsi.exe pci-scsi.exe 20 lha xi pci-scsi.exe nt/wd7296a.sys 21 rm pci-scsi.exe
|
/linux/security/landlock/ |
H A D | domain.c | 47 const char *exe; in get_current_exe() local 61 exe = d_path(&file->f_path, buffer, buffer_size); in get_current_exe() 62 if (WARN_ON_ONCE(IS_ERR(exe))) in get_current_exe() 64 return ERR_CAST(exe); in get_current_exe() 66 size = buffer + buffer_size - exe; in get_current_exe() 71 *exe_str = exe; in get_current_exe()
|
/linux/Documentation/admin-guide/ |
H A D | mono.rst | 5 (in the form of .exe files) without the need to use the mono CLR 61 4) Check that ``.exe`` binaries can be ran without the need of a 62 wrapper script, simply by launching the ``.exe`` file directly 65 /usr/bin/xsd.exe 70 that the ``.exe`` file has execute permissions.
|
H A D | binfmt-misc.rst | 12 aka ``.com`` or ``.exe``.
|
/linux/tools/testing/selftests/landlock/ |
H A D | audit.h | 36 char exe[PATH_MAX]; member 168 memcpy(msg.rule.buf, filter->exe, filter->exe_len); in audit_filter_exe() 308 " exe=\"[^\"]\\+\" comm=\".*_test\"$"; in matches_log_domain_allocated() 406 int ret = readlink("/proc/self/exe", filter->exe, in audit_init_filter_exe() 407 sizeof(filter->exe) - 1); in audit_init_filter_exe() 421 if (filter->exe_len > sizeof(filter->exe)) in audit_init_filter_exe() 424 memcpy(filter->exe, absolute_path, filter->exe_len); in audit_init_filter_exe()
|
/linux/kernel/ |
H A D | auditfilter.c | 586 if (entry->rule.exe || f_val > PATH_MAX) in audit_data_to_entry() 600 entry->rule.exe = audit_mark; in audit_data_to_entry() 617 if (entry->rule.exe) in audit_data_to_entry() 618 audit_remove_mark(entry->rule.exe); /* that's the template one */ in audit_data_to_entry() 685 audit_pack_string(&bufp, audit_mark_path(krule->exe)); in audit_krule_to_data() 753 if (strcmp(audit_mark_path(a->exe), in audit_compare_rule() 754 audit_mark_path(b->exe))) in audit_compare_rule() 884 if (new->exe) in audit_dupe_rule() 885 audit_remove_mark(new->exe); in audit_dupe_rule() 1055 if (e->rule.exe) in audit_del_rule() [all...] |
H A D | audit_watch.c | 303 if (oentry->rule.exe) in audit_update_watch() 304 audit_remove_mark(oentry->rule.exe); in audit_update_watch() 333 if (e->rule.exe) in audit_remove_parent_watches() 334 audit_remove_mark(e->rule.exe); in audit_remove_parent_watches() 514 pathname = kstrdup(audit_mark_path(old->exe), GFP_KERNEL); in audit_dupe_exe() 523 new->exe = audit_mark; in audit_dupe_exe() 534 /* only do exe filtering if we are recording @current events/records */ in audit_exe_compare()
|
H A D | audit_fsnotify.c | 141 struct audit_fsnotify_mark *mark = krule->exe; in audit_remove_mark_rule()
|
H A D | audit_tree.c | 554 if (entry->rule.exe) in kill_rules() 555 audit_remove_mark(entry->rule.exe); in kill_rules()
|
H A D | auditsc.c | 500 result = audit_exe_compare(tsk, rule->exe); in audit_filter_rules()
|
/linux/tools/testing/selftests/ublk/ |
H A D | kublk.c | 1467 static void __cmd_create_help(char *exe, bool recovery) in __cmd_create_help() argument 1472 exe, recovery ? "recover" : "add"); in __cmd_create_help() 1488 static void cmd_add_help(char *exe) in cmd_add_help() argument 1490 __cmd_create_help(exe, false); in cmd_add_help() 1494 static void cmd_recover_help(char *exe) in cmd_recover_help() argument 1496 __cmd_create_help(exe, true); in cmd_recover_help() 1501 static int cmd_dev_help(char *exe) in cmd_dev_help() argument 1503 cmd_add_help(exe); in cmd_dev_help() 1504 cmd_recover_help(exe); in cmd_dev_help() 1506 printf("%s del [-n dev_id] -a \n", exe); in cmd_dev_help() [all...] |
/linux/tools/perf/tests/shell/ |
H A D | buildid.sh | 41 ex_pe=$(dirname $0)/../pe-file.exe 51 *.exe) 83 # in case of pe-file.exe file 84 echo $1 | grep ".exe"
|
/linux/Documentation/admin-guide/LSM/ |
H A D | landlock.rst | 54 - the domain creator's executable path (``exe``) 59 domain=195ba459b status=allocated mode=enforcing pid=300 uid=0 exe="/root/sandboxer" comm="sandboxer" 115 type=LANDLOCK_DOMAIN msg=audit(1729738800.268:30): domain=1a6fdc66f status=allocated mode=enforcing pid=286 uid=0 exe="/root/sandboxer" comm="sandboxer" 128 type=LANDLOCK_DOMAIN msg=audit(1729738800.221:33): domain=1a6fdc679 status=allocated mode=enforcing pid=289 uid=0 exe="/root/sandboxer" comm="sandboxer"
|
H A D | ipe.rst | 338 type=1300 audit(1653364370.067:61): SYSCALL arch=c000003e syscall=9 success=no exit=-13 a0=7f1105a28000 a1=195000 a2=5 a3=812 items=0 ppid=2219 pid=2241 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=2 comm="ld-linux.so" exe="/tmp/ipe-test/lib/ld-linux.so" subj=unconfined key=(null) 342 type=1300 audit(1653364735.161:64): SYSCALL arch=c000003e syscall=9 success=no exit=-13 a0=0 a1=1000 a2=4 a3=21 items=0 ppid=2219 pid=2472 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=2 comm="mmap_test" exe="/root/overlake_test/upstream_test/vol_fsverity/bin/mmap_test" subj=unconfined key=(null) 383 type=1300 audit(1653425583.136:54): SYSCALL arch=c000003e syscall=1 success=yes exit=2 a0=3 a1=5596fcae1fb0 a2=2 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="python3" exe="/usr/bin/python3.10" key=(null) 427 type=1300 audit(1653425529.927:53): arch=c000003e syscall=1 success=yes exit=2567 a0=3 a1=5596fcae1fb0 a2=a07 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="python3" exe="/usr/bin/python3.10" key=(null)
|
/linux/security/tomoyo/ |
H A D | condition.c | 239 struct tomoyo_path_info exe; in tomoyo_scan_exec_realpath() local 243 exe.name = tomoyo_realpath_from_path(&file->f_path); in tomoyo_scan_exec_realpath() 244 if (!exe.name) in tomoyo_scan_exec_realpath() 246 tomoyo_fill_path_info(&exe); in tomoyo_scan_exec_realpath() 247 result = tomoyo_compare_name_union(&exe, ptr); in tomoyo_scan_exec_realpath() 248 kfree(exe.name); in tomoyo_scan_exec_realpath()
|
/linux/scripts/lib/abi/ |
H A D | system_symbols.py | 320 with executor(max_workers=max_workers) as exe: 324 f_list.append(exe.submit(self.check_file, refs, found))
|
/linux/tools/perf/util/ |
H A D | symbol.h | 194 int file__read_maps(int fd, bool exe, mapfn_t mapfn, void *data,
|
H A D | symbol-minimal.c | 332 int file__read_maps(int fd __maybe_unused, bool exe __maybe_unused, in file__read_maps()
|
H A D | symbol-elf.c | 1879 static int elf_read_maps(Elf *elf, bool exe, mapfn_t mapfn, void *data) in elf_read_maps() argument 1894 if (exe) { in elf_read_maps() 1911 int file__read_maps(int fd, bool exe, mapfn_t mapfn, void *data, in file__read_maps() argument 1924 err = elf_read_maps(elf, exe, mapfn, data); in file__read_maps()
|
/linux/Documentation/filesystems/spufs/ |
H A D | spu_run.rst | 32 not return while the SPU is still running. If there is a need to exe-
|
/linux/Documentation/networking/device_drivers/ethernet/3com/ |
H A D | vortex.rst | 317 ftp://ftp.3com.com/pub/nic/3c90x/3c90xx2.exe
|
/linux/tools/perf/ |
H A D | Makefile.perf | 1135 $(INSTALL) tests/pe-file.exe* '$(DESTDIR_SQ)$(perfexec_instdir_SQ)/tests'; \
|
/linux/Documentation/admin-guide/media/ |
H A D | bttv.rst | 56 called ``pvr45xxx.exe``. Just placing it at the ``/etc/firmware``
|
/linux/Documentation/filesystems/ |
H A D | proc.rst | 159 exe Link to the executable of this process
|