Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.149.238.207
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
cmake-3.16 /
Help /
policy /
[ HOME SHELL ]
Name
Size
Permission
Action
CMP0000.rst
1.4
KB
-rw-r--r--
CMP0001.rst
857
B
-rw-r--r--
CMP0002.rst
1.13
KB
-rw-r--r--
CMP0003.rst
3.44
KB
-rw-r--r--
CMP0004.rst
910
B
-rw-r--r--
CMP0005.rst
1.22
KB
-rw-r--r--
CMP0006.rst
1.13
KB
-rw-r--r--
CMP0007.rst
693
B
-rw-r--r--
CMP0008.rst
1.52
KB
-rw-r--r--
CMP0009.rst
923
B
-rw-r--r--
CMP0010.rst
817
B
-rw-r--r--
CMP0011.rst
1.24
KB
-rw-r--r--
CMP0012.rst
1.32
KB
-rw-r--r--
CMP0013.rst
943
B
-rw-r--r--
CMP0014.rst
748
B
-rw-r--r--
CMP0015.rst
919
B
-rw-r--r--
CMP0016.rst
583
B
-rw-r--r--
CMP0017.rst
1021
B
-rw-r--r--
CMP0018.rst
1.59
KB
-rw-r--r--
CMP0019.rst
920
B
-rw-r--r--
CMP0020.rst
1.29
KB
-rw-r--r--
CMP0021.rst
882
B
-rw-r--r--
CMP0022.rst
2.09
KB
-rw-r--r--
CMP0023.rst
1.49
KB
-rw-r--r--
CMP0024.rst
1.08
KB
-rw-r--r--
CMP0025.rst
1.34
KB
-rw-r--r--
CMP0026.rst
1.3
KB
-rw-r--r--
CMP0027.rst
1.27
KB
-rw-r--r--
CMP0028.rst
1.2
KB
-rw-r--r--
CMP0029.rst
309
B
-rw-r--r--
CMP0030.rst
335
B
-rw-r--r--
CMP0031.rst
474
B
-rw-r--r--
CMP0032.rst
528
B
-rw-r--r--
CMP0033.rst
580
B
-rw-r--r--
CMP0034.rst
392
B
-rw-r--r--
CMP0035.rst
322
B
-rw-r--r--
CMP0036.rst
437
B
-rw-r--r--
CMP0037.rst
1.55
KB
-rw-r--r--
CMP0038.rst
690
B
-rw-r--r--
CMP0039.rst
727
B
-rw-r--r--
CMP0040.rst
857
B
-rw-r--r--
CMP0041.rst
1.13
KB
-rw-r--r--
CMP0042.rst
856
B
-rw-r--r--
CMP0043.rst
1.82
KB
-rw-r--r--
CMP0044.rst
916
B
-rw-r--r--
CMP0045.rst
758
B
-rw-r--r--
CMP0046.rst
667
B
-rw-r--r--
CMP0047.rst
1.34
KB
-rw-r--r--
CMP0048.rst
1.08
KB
-rw-r--r--
CMP0049.rst
777
B
-rw-r--r--
CMP0050.rst
751
B
-rw-r--r--
CMP0051.rst
1.04
KB
-rw-r--r--
CMP0052.rst
1.08
KB
-rw-r--r--
CMP0053.rst
2.09
KB
-rw-r--r--
CMP0054.rst
1.29
KB
-rw-r--r--
CMP0055.rst
715
B
-rw-r--r--
CMP0056.rst
1.58
KB
-rw-r--r--
CMP0057.rst
495
B
-rw-r--r--
CMP0058.rst
4.9
KB
-rw-r--r--
CMP0059.rst
735
B
-rw-r--r--
CMP0060.rst
3.52
KB
-rw-r--r--
CMP0061.rst
1022
B
-rw-r--r--
CMP0062.rst
1.21
KB
-rw-r--r--
CMP0063.rst
1.3
KB
-rw-r--r--
CMP0064.rst
610
B
-rw-r--r--
CMP0065.rst
1.15
KB
-rw-r--r--
CMP0066.rst
1.28
KB
-rw-r--r--
CMP0067.rst
1.52
KB
-rw-r--r--
CMP0068.rst
1.43
KB
-rw-r--r--
CMP0069.rst
2.91
KB
-rw-r--r--
CMP0070.rst
1.09
KB
-rw-r--r--
CMP0071.rst
1.5
KB
-rw-r--r--
CMP0072.rst
1.14
KB
-rw-r--r--
CMP0073.rst
1.08
KB
-rw-r--r--
CMP0074.rst
1019
B
-rw-r--r--
CMP0075.rst
1.01
KB
-rw-r--r--
CMP0076.rst
1.02
KB
-rw-r--r--
CMP0077.rst
2.39
KB
-rw-r--r--
CMP0078.rst
868
B
-rw-r--r--
CMP0079.rst
2.03
KB
-rw-r--r--
CMP0080.rst
1.02
KB
-rw-r--r--
CMP0081.rst
974
B
-rw-r--r--
CMP0082.rst
1.11
KB
-rw-r--r--
CMP0083.rst
2.16
KB
-rw-r--r--
CMP0084.rst
1.12
KB
-rw-r--r--
CMP0085.rst
885
B
-rw-r--r--
CMP0086.rst
763
B
-rw-r--r--
CMP0087.rst
1.25
KB
-rw-r--r--
CMP0088.rst
1.25
KB
-rw-r--r--
CMP0089.rst
1.41
KB
-rw-r--r--
CMP0090.rst
1.29
KB
-rw-r--r--
CMP0091.rst
2.4
KB
-rw-r--r--
CMP0092.rst
1.65
KB
-rw-r--r--
CMP0093.rst
1.06
KB
-rw-r--r--
CMP0094.rst
905
B
-rw-r--r--
CMP0095.rst
1.54
KB
-rw-r--r--
CMP0096.rst
1.17
KB
-rw-r--r--
CMP0097.rst
979
B
-rw-r--r--
DEPRECATED.txt
156
B
-rw-r--r--
DISALLOWED_COMMAND.txt
478
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : CMP0083.rst
CMP0083 ------- To control generation of Position Independent Executable (``PIE``) or not, some flags are required at link time. CMake 3.13 and lower did not add these link flags when :prop_tgt:`POSITION_INDEPENDENT_CODE` is set. The ``OLD`` behavior for this policy is to not manage ``PIE`` link flags. The ``NEW`` behavior is to add link flags if :prop_tgt:`POSITION_INDEPENDENT_CODE` is set: * Set to ``TRUE``: flags to produce a position independent executable are passed to the linker step. For example ``-pie`` for ``GCC``. * Set to ``FALSE``: flags not to produce a position independent executable are passed to the linker step. For example ``-no-pie`` for ``GCC``. * Not set: no flags are passed to the linker step. Since a given linker may not support ``PIE`` flags in all environments in which it is used, it is the project's responsibility to use the :module:`CheckPIESupported` module to check for support to ensure that the :prop_tgt:`POSITION_INDEPENDENT_CODE` target property for executables will be honored at link time. This policy was introduced in CMake version 3.14. Use the :command:`cmake_policy` command to set it to ``OLD`` or ``NEW`` explicitly. Unlike most policies, CMake version |release| does not warn when this policy is not set and simply uses ``OLD`` behavior. .. Note:: Android platform has a special handling of ``PIE`` so it is not required to use the :module:`CheckPIESupported` module to ensure flags are passed to the linker. .. include:: DEPRECATED.txt Examples ^^^^^^^^ Behave like CMake 3.13 and do not apply any ``PIE`` flags at link stage. .. code-block:: cmake cmake_minimum_required(VERSION 3.13) project(foo) # ... add_executable(foo ...) set_property(TARGET foo PROPERTY POSITION_INDEPENDENT_CODE TRUE) Use the :module:`CheckPIESupported` module to detect whether ``PIE`` is supported by the current linker and environment. Apply ``PIE`` flags only if the linker supports them. .. code-block:: cmake cmake_minimum_required(VERSION 3.14) # CMP0083 NEW project(foo) include(CheckPIESupported) check_pie_supported() # ... add_executable(foo ...) set_property(TARGET foo PROPERTY POSITION_INDEPENDENT_CODE TRUE)
Close