/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/keyutils/files/ |
H A D | 0001-tests-toolbox.inc.sh-update-regex-for-getting-endian.patch | 7 /proc/777/exe: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpr… 24 -if expr "$endian" : '.* MSB \+\(pie executable\|executable\|shared object\).*' >&/dev/null 25 +if expr "$endian" : '.* MSB .*\(pie executable\|executable\|shared object\).*' >&/dev/null 28 -elif expr "$endian" : '.* LSB \+\(pie executable\|executable\|shared object\).*' >&/dev/null 29 +elif expr "$endian" : '.* LSB .*\(pie executable\|executable\|shared object\).*' >&/dev/null
|
/openbmc/sdbusplus/example/ |
H A D | meson.build | 1 executable('list-users', 'list-users.cpp', dependencies: sdbusplus_dep) 18 executable( 32 executable( 38 executable('register-property', 'register-property.cpp', dependencies: asio_dep) 40 executable( 49 executable( 58 executable( 67 executable(
|
/openbmc/linux/tools/scripts/ |
H A D | utilities.mak | 139 # Usage: absolute-executable-path-or-empty = $(call lookup,path) 147 # is-executable 149 # Usage: bool-value = $(call is-executable,path) 154 is-executable = $(call _is-executable-helper,$(shell-sq)) 155 _is-executable-helper = $(shell sh -c $(_is-executable-sh)) 156 _is-executable-sh = $(call shell-sq,test -f $(1) -a -x $(1) && echo y) 158 # get-executable 160 # Usage: absolute-executable-path-or-empty = $(call get-executable,path) 162 # The goal is to get an absolute path for an executable; 168 get-executable = $(if $(1),$(if $(is-absolute),$(_ge-abspath),$(lookup))) [all …]
|
/openbmc/phosphor-state-manager/ |
H A D | meson.build | 119 executable( 138 executable( 153 executable( 171 executable( 180 executable( 196 executable( 206 executable( 225 executable( 235 executable( 243 executable( [all …]
|
/openbmc/qemu/tests/bench/ |
H A D | meson.build | 2 qht_bench = executable('qht-bench', 6 executable('qtree-bench', 10 executable('atomic_add-bench', 15 executable('atomic64-bench', 33 exe = executable(bench_name, bench_name + '.c',
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/ufw/ufw/ |
H A D | 0003-only-make-one-reference-to-env.patch | 6 If sys.executable happens to be '/usr/bin/env python' or something 9 quick sanity check on sys.executable before doing the substitution. 25 condition is removed so the shebang line is substituted with the sys.executable 27 of sys.executable and replaces it with "#! /usr/bin/env python3". 64 + # Distutils searches for the string of sys.executable and replaces it 66 print("Updating staging/ufw to use %s" % (sys.executable)) 69 - "1s%^#.*python.*%#! /usr/bin/env " + sys.executable + "%g", 70 + "1s%/.*python.*%" + sys.executable + "%g",
|
/openbmc/openbmc/poky/meta/recipes-devtools/python/python3-installer/ |
H A D | interpreter.patch | 31 + default=sys.executable, 32 + help=f"interpreter (defaults to {sys.executable})", 41 - interpreter=sys.executable, 50 @@ -59,20 +59,7 @@ def _build_shebang(executable: str, forlauncher: bool) -> bytes: 53 executable_bytes = executable.encode("utf-8") 59 - # Shebang support for an executable with a space in it is under-specified 65 - quoted = shlex.quote(executable).encode("utf-8")
|
/openbmc/phosphor-host-ipmid/test/ |
H A D | meson.build | 27 executable( 46 # executable( 58 executable( 82 executable( 95 executable(
|
/openbmc/sdbusplus/test/ |
H A D | meson.build | 46 executable( 61 executable( 70 executable( 101 executable( 110 executable(
|
/openbmc/dbus-sensors/src/tests/ |
H A D | meson.build | 29 executable( 41 executable( 56 executable( 69 executable(
|
/openbmc/qemu/docs/interop/ |
H A D | firmware.json | 51 # @flash: The firmware executable and its accompanying NVRAM file are to 268 # @split: the executable file contains code while the NVRAM 269 # template provides variable storage. The executable 274 # @combined: the executable file contains both code and 275 # variable storage. The executable must be cloned 279 # @stateless: the executable file contains code and variable 280 # storage is not persisted. The executable must 293 # Describes loading and mapping properties for the firmware executable 300 # @executable: Identifies the firmware executable. The @mode 304 … -drive if=none,id=pflash0,readonly=on,file=@executable.@filename,format=@executable.@… [all …]
|
/openbmc/phosphor-dbus-monitor/src/test/ |
H A D | meson.build | 52 executable( 92 executable( 135 executable( 175 executable( 217 executable( 256 executable( 288 executable( 327 executable(
|
/openbmc/libmctp/utils/ |
H A D | meson.build | 12 demux = executable( 21 pipe = executable( 29 mctp_in = executable(
|
/openbmc/slpd-lite/ |
H A D | meson.build | 11 executable( 28 executable( 40 executable(
|
/openbmc/entity-manager/src/ |
H A D | meson.build | 5 executable( 33 executable( 57 executable(
|
/openbmc/qemu/tests/docker/ |
H A D | docker.py | 114 def _get_so_libs(executable): argument 123 ldd_output = subprocess.check_output(["ldd", executable]).decode('utf-8') 132 print("%s had no associated libraries (static build?)" % (executable)) 163 def _check_binfmt_misc(executable): argument 175 binary = os.path.basename(executable) 191 if interp and interp != executable: 193 (binary, executable, interp)) 543 if args.executable: 547 ff, enabled = _check_binfmt_misc(args.executable) 554 tmp_tar.add(args.executable, arcname=ff) [all …]
|
/openbmc/phosphor-health-monitor/test/ |
H A D | meson.build | 24 executable( 42 executable( 62 executable(
|
/openbmc/phosphor-certificate-manager/test/ |
H A D | meson.build | 24 executable( 34 executable( 47 executable(
|
/openbmc/phosphor-hwmon/tools/ |
H A D | meson.build | 1 executable('find_hwmon', 'find_hwmon.cpp', dependencies: sysfs_dep) 3 executable('find_callout_path', 'find_callout_path.cpp', dependencies: sysfs_dep)
|
/openbmc/phosphor-fan-presence/monitor/test/ |
H A D | meson.build | 15 executable( 26 executable(
|
/openbmc/linux/Documentation/admin-guide/hw-vuln/ |
H A D | multihit.rst | 108 non-executable pages. This forces all iTLB entries to be 4K, and removes 112 as non-executable. If the guest attempts to execute in one of those pages, 113 the page is broken down into 4K pages, which are then marked executable. 120 non-executable in all shadow paging modes. 126 non-executable can be controlled with a module parameter "nx_huge_pages=". 134 non-executable huge pages in Linux kernel KVM module. All huge 135 pages in the EPT are marked as non-executable. 137 broken down into 4K pages, which are then marked executable.
|
/openbmc/phosphor-debug-collector/ |
H A D | meson.build | 367 foreach executable : executables 368 binary = executable( 369 executable[0], 370 executable[1], 371 dependencies: executable[2], 372 install: executable[3], 373 include_directories: executable[4],
|
/openbmc/qemu/scripts/ |
H A D | mtest2make.py | 43 executable = test['cmd'][0] 45 executable = os.path.relpath(executable)
|
/openbmc/phosphor-host-postd/ |
H A D | meson.build | 52 executable( 64 executable( 85 executable(
|
/openbmc/pldm/utilities/ |
H A D | meson.build | 3 executable( 14 executable(
|