Home
last modified time | relevance | path

Searched refs:exe (Results 1 – 24 of 24) sorted by relevance

/linux/Documentation/scsi/
H A Dwd719x.rst18 wget http://support.wdc.com/download/archive/pciscsi.exe
19 lha xi pciscsi.exe pci-scsi.exe
20 lha xi pci-scsi.exe nt/wd7296a.sys
21 rm pci-scsi.exe
/linux/security/landlock/
H A Ddomain.c47 const char *exe; in get_current_exe() local
61 exe = d_path(&file->f_path, buffer, buffer_size); in get_current_exe()
62 if (WARN_ON_ONCE(IS_ERR(exe))) in get_current_exe()
64 return ERR_CAST(exe); in get_current_exe()
66 size = buffer + buffer_size - exe; in get_current_exe()
71 *exe_str = exe; in get_current_exe()
/linux/Documentation/admin-guide/
H A Dmono.rst5 (in the form of .exe files) without the need to use the mono CLR
61 4) Check that ``.exe`` binaries can be ran without the need of a
62 wrapper script, simply by launching the ``.exe`` file directly
65 /usr/bin/xsd.exe
70 that the ``.exe`` file has execute permissions.
H A Dbinfmt-misc.rst12 aka ``.com`` or ``.exe``.
/linux/tools/testing/selftests/landlock/
H A Daudit.h36 char exe[PATH_MAX]; member
168 memcpy(msg.rule.buf, filter->exe, filter->exe_len); in audit_filter_exe()
308 " exe=\"[^\"]\\+\" comm=\".*_test\"$"; in matches_log_domain_allocated()
406 int ret = readlink("/proc/self/exe", filter->exe, in audit_init_filter_exe()
407 sizeof(filter->exe) - 1); in audit_init_filter_exe()
421 if (filter->exe_len > sizeof(filter->exe)) in audit_init_filter_exe()
424 memcpy(filter->exe, absolute_path, filter->exe_len); in audit_init_filter_exe()
/linux/kernel/
H A Dauditfilter.c586 if (entry->rule.exe || f_val > PATH_MAX) in audit_data_to_entry()
600 entry->rule.exe = audit_mark; in audit_data_to_entry()
617 if (entry->rule.exe) in audit_data_to_entry()
618 audit_remove_mark(entry->rule.exe); /* that's the template one */ in audit_data_to_entry()
685 audit_pack_string(&bufp, audit_mark_path(krule->exe)); in audit_krule_to_data()
753 if (strcmp(audit_mark_path(a->exe), in audit_compare_rule()
754 audit_mark_path(b->exe))) in audit_compare_rule()
884 if (new->exe) in audit_dupe_rule()
885 audit_remove_mark(new->exe); in audit_dupe_rule()
1055 if (e->rule.exe) in audit_del_rule()
[all...]
H A Daudit_watch.c303 if (oentry->rule.exe) in audit_update_watch()
304 audit_remove_mark(oentry->rule.exe); in audit_update_watch()
333 if (e->rule.exe) in audit_remove_parent_watches()
334 audit_remove_mark(e->rule.exe); in audit_remove_parent_watches()
514 pathname = kstrdup(audit_mark_path(old->exe), GFP_KERNEL); in audit_dupe_exe()
523 new->exe = audit_mark; in audit_dupe_exe()
534 /* only do exe filtering if we are recording @current events/records */ in audit_exe_compare()
H A Daudit_fsnotify.c141 struct audit_fsnotify_mark *mark = krule->exe; in audit_remove_mark_rule()
H A Daudit_tree.c554 if (entry->rule.exe) in kill_rules()
555 audit_remove_mark(entry->rule.exe); in kill_rules()
H A Dauditsc.c500 result = audit_exe_compare(tsk, rule->exe); in audit_filter_rules()
/linux/tools/testing/selftests/ublk/
H A Dkublk.c1467 static void __cmd_create_help(char *exe, bool recovery) in __cmd_create_help() argument
1472 exe, recovery ? "recover" : "add"); in __cmd_create_help()
1488 static void cmd_add_help(char *exe) in cmd_add_help() argument
1490 __cmd_create_help(exe, false); in cmd_add_help()
1494 static void cmd_recover_help(char *exe) in cmd_recover_help() argument
1496 __cmd_create_help(exe, true); in cmd_recover_help()
1501 static int cmd_dev_help(char *exe) in cmd_dev_help() argument
1503 cmd_add_help(exe); in cmd_dev_help()
1504 cmd_recover_help(exe); in cmd_dev_help()
1506 printf("%s del [-n dev_id] -a \n", exe); in cmd_dev_help()
[all...]
/linux/tools/perf/tests/shell/
H A Dbuildid.sh41 ex_pe=$(dirname $0)/../pe-file.exe
51 *.exe)
83 # in case of pe-file.exe file
84 echo $1 | grep ".exe"
/linux/Documentation/admin-guide/LSM/
H A Dlandlock.rst54 - the domain creator's executable path (``exe``)
59 domain=195ba459b status=allocated mode=enforcing pid=300 uid=0 exe="/root/sandboxer" comm="sandboxer"
115 type=LANDLOCK_DOMAIN msg=audit(1729738800.268:30): domain=1a6fdc66f status=allocated mode=enforcing pid=286 uid=0 exe="/root/sandboxer" comm="sandboxer"
128 type=LANDLOCK_DOMAIN msg=audit(1729738800.221:33): domain=1a6fdc679 status=allocated mode=enforcing pid=289 uid=0 exe="/root/sandboxer" comm="sandboxer"
H A Dipe.rst338 type=1300 audit(1653364370.067:61): SYSCALL arch=c000003e syscall=9 success=no exit=-13 a0=7f1105a28000 a1=195000 a2=5 a3=812 items=0 ppid=2219 pid=2241 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=2 comm="ld-linux.so" exe="/tmp/ipe-test/lib/ld-linux.so" subj=unconfined key=(null)
342 type=1300 audit(1653364735.161:64): SYSCALL arch=c000003e syscall=9 success=no exit=-13 a0=0 a1=1000 a2=4 a3=21 items=0 ppid=2219 pid=2472 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=2 comm="mmap_test" exe="/root/overlake_test/upstream_test/vol_fsverity/bin/mmap_test" subj=unconfined key=(null)
383 type=1300 audit(1653425583.136:54): SYSCALL arch=c000003e syscall=1 success=yes exit=2 a0=3 a1=5596fcae1fb0 a2=2 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="python3" exe="/usr/bin/python3.10" key=(null)
427 type=1300 audit(1653425529.927:53): arch=c000003e syscall=1 success=yes exit=2567 a0=3 a1=5596fcae1fb0 a2=a07 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="python3" exe="/usr/bin/python3.10" key=(null)
/linux/security/tomoyo/
H A Dcondition.c239 struct tomoyo_path_info exe; in tomoyo_scan_exec_realpath() local
243 exe.name = tomoyo_realpath_from_path(&file->f_path); in tomoyo_scan_exec_realpath()
244 if (!exe.name) in tomoyo_scan_exec_realpath()
246 tomoyo_fill_path_info(&exe); in tomoyo_scan_exec_realpath()
247 result = tomoyo_compare_name_union(&exe, ptr); in tomoyo_scan_exec_realpath()
248 kfree(exe.name); in tomoyo_scan_exec_realpath()
/linux/scripts/lib/abi/
H A Dsystem_symbols.py320 with executor(max_workers=max_workers) as exe:
324 f_list.append(exe.submit(self.check_file, refs, found))
/linux/tools/perf/util/
H A Dsymbol.h194 int file__read_maps(int fd, bool exe, mapfn_t mapfn, void *data,
H A Dsymbol-minimal.c332 int file__read_maps(int fd __maybe_unused, bool exe __maybe_unused, in file__read_maps()
H A Dsymbol-elf.c1879 static int elf_read_maps(Elf *elf, bool exe, mapfn_t mapfn, void *data) in elf_read_maps() argument
1894 if (exe) { in elf_read_maps()
1911 int file__read_maps(int fd, bool exe, mapfn_t mapfn, void *data, in file__read_maps() argument
1924 err = elf_read_maps(elf, exe, mapfn, data); in file__read_maps()
/linux/Documentation/filesystems/spufs/
H A Dspu_run.rst32 not return while the SPU is still running. If there is a need to exe-
/linux/Documentation/networking/device_drivers/ethernet/3com/
H A Dvortex.rst317 ftp://ftp.3com.com/pub/nic/3c90x/3c90xx2.exe
/linux/tools/perf/
H A DMakefile.perf1135 $(INSTALL) tests/pe-file.exe* '$(DESTDIR_SQ)$(perfexec_instdir_SQ)/tests'; \
/linux/Documentation/admin-guide/media/
H A Dbttv.rst56 called ``pvr45xxx.exe``. Just placing it at the ``/etc/firmware``
/linux/Documentation/filesystems/
H A Dproc.rst159 exe Link to the executable of this process