kernel-aes67/Documentation/arch/powerpc
Vegard Nossum c48a7c44a1 docs: kernel_feat.py: fix potential command injection
The kernel-feat directive passes its argument straight to the shell.
This is unfortunate and unnecessary.

Let's always use paths relative to $srctree/Documentation/ and use
subprocess.check_call() instead of subprocess.Popen(shell=True).

This also makes the code shorter.

This is analogous to commit 3231dd5862 ("docs: kernel_abi.py: fix
command injection") where we did exactly the same thing for
kernel_abi.py, somehow I completely missed this one.

Link: https://fosstodon.org/@jani/111676532203641247
Reported-by: Jani Nikula <jani.nikula@intel.com>
Signed-off-by: Vegard Nossum <vegard.nossum@oracle.com>
Cc: stable@vger.kernel.org
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Link: https://lore.kernel.org/r/20240110174758.3680506-1-vegard.nossum@oracle.com
2024-01-11 09:21:01 -07:00
..
associativity.rst
booting.rst
bootwrapper.rst
cpu_families.rst
cpu_features.rst
cxl.rst
cxlflash.rst
dawr-power9.rst
dexcr.rst
dscr.rst
eeh-pci-error-recovery.rst
elf_hwcaps.rst
elfnote.rst
features.rst
firmware-assisted-dump.rst
hvcs.rst
imc.rst
index.rst
isa-versions.rst
kasan.txt
kaslr-booke32.rst
kvm-nested.rst
mpc52xx.rst
papr_hcalls.rst
pci_iov_resource_on_powernv.rst
pmu-ebb.rst
ptrace.rst
qe_firmware.rst
syscall64-abi.rst
transactional_memory.rst
ultravisor.rst
vas-api.rst
vcpudispatch_stats.rst
vmemmap_dedup.rst