/linux-5.19.10/Documentation/admin-guide/ |
D | binfmt-misc.rst | 8 To achieve this you must tell binfmt_misc which interpreter has to be invoked 19 ``:name:type:offset:magic:mask:interpreter:flags`` (where you can choose the 49 - ``interpreter`` 54 of the interpreter. It is a string of capital letters, each controls a 69 of the binary to the interpreter as an argument. When this flag is 72 the interpreter to execute non-readable binaries. This feature 73 should be used with care - the interpreter has to be trusted not to 78 the interpreter. When this flag is included, these attributes are 80 This feature should be used with care as the interpreter 98 - the interpreter string may not exceed 127 characters [all …]
|
D | init.rst | 31 you should make sure that the script specifies an interpreter in its
|
/linux-5.19.10/fs/ |
D | binfmt_misc.c | 59 const char *interpreter; /* filename of interpreter */ member 174 retval = copy_string_kernel(fmt->interpreter, bprm); in load_misc_binary() 180 retval = bprm_change_interp(fmt->interpreter, bprm); in load_misc_binary() 189 interp_file = open_exec(fmt->interpreter); in load_misc_binary() 195 bprm->interpreter = interp_file; in load_misc_binary() 446 e->interpreter = p; in create_entry() 451 if (!e->interpreter[0]) in create_entry() 453 pr_debug("register: interpreter: {%s}\n", e->interpreter); in create_entry() 515 dp += sprintf(dp, "%s\ninterpreter %s\n", status, e->interpreter); in entry_status() 660 f = open_exec(e->interpreter); in bm_register_write() [all …]
|
D | binfmt_elf.c | 593 struct file *interpreter, in load_elf_interp() argument 613 if (!interpreter->f_op->mmap) in load_elf_interp() 638 map_addr = elf_map(interpreter, load_addr + vaddr, in load_elf_interp() 826 struct file *interpreter = NULL; /* to shut gcc up */ in load_elf_binary() local 899 interpreter = open_exec(elf_interpreter); in load_elf_binary() 901 retval = PTR_ERR(interpreter); in load_elf_binary() 902 if (IS_ERR(interpreter)) in load_elf_binary() 909 would_dump(bprm, interpreter); in load_elf_binary() 918 retval = elf_read(interpreter, interp_elf_ex, in load_elf_binary() 950 if (interpreter) { in load_elf_binary() [all …]
|
D | compat_binfmt_elf.c | 114 #define COMPAT_ARCH_SETUP_ADDITIONAL_PAGES(bprm, ex, interpreter) \ argument 115 compat_arch_setup_additional_pages(bprm, interpreter)
|
D | binfmt_elf_fdpic.c | 194 struct file *interpreter = NULL; /* to shut gcc up */ in load_elf_fdpic_binary() local 262 interpreter = open_exec(interpreter_name); in load_elf_fdpic_binary() 263 retval = PTR_ERR(interpreter); in load_elf_fdpic_binary() 264 if (IS_ERR(interpreter)) { in load_elf_fdpic_binary() 265 interpreter = NULL; in load_elf_fdpic_binary() 274 would_dump(bprm, interpreter); in load_elf_fdpic_binary() 277 retval = kernel_read(interpreter, bprm->buf, in load_elf_fdpic_binary() 304 if (!is_elf(&interp_params.hdr, interpreter)) in load_elf_fdpic_binary() 310 retval = elf_fdpic_fetch_phdrs(&interp_params, interpreter); in load_elf_fdpic_binary() 391 retval = elf_fdpic_map_file(&interp_params, interpreter, in load_elf_fdpic_binary() [all …]
|
D | binfmt_script.c | 136 bprm->interpreter = file; in load_script()
|
D | Kconfig.binfmt | 104 #! followed by the path to an interpreter. 183 programs that need an interpreter to run like Java, Python, .NET or 189 will automatically feed it to the correct interpreter.
|
D | exec.c | 1775 if (!bprm->interpreter) in exec_binprm() 1779 bprm->file = bprm->interpreter; in exec_binprm() 1780 bprm->interpreter = NULL; in exec_binprm()
|
/linux-5.19.10/kernel/bpf/ |
D | Kconfig | 3 # BPF interpreter that, for example, classic socket filters depend on. 46 BPF programs are normally handled by a BPF interpreter. This option 57 bool "Permanently enable BPF JIT and remove BPF interpreter" 60 Enables BPF JIT and removes BPF interpreter to avoid speculative 61 execution of BPF instructions by the interpreter.
|
/linux-5.19.10/include/linux/ |
D | elf.h | 31 #define ARCH_SETUP_ADDITIONAL_PAGES(bprm, ex, interpreter) \ argument 32 arch_setup_additional_pages(bprm, interpreter)
|
D | binfmts.h | 50 struct file *interpreter; member
|
/linux-5.19.10/tools/testing/selftests/kselftest/ |
D | runner.sh | 106 interpreter=$(head -n 1 "$TEST" | cut -c 3-) 107 cmd="$interpreter ./$BASENAME_TEST"
|
/linux-5.19.10/arch/alpha/kernel/ |
D | binfmt_loader.c | 32 bprm->interpreter = file; in load_binary()
|
/linux-5.19.10/net/bpfilter/ |
D | Kconfig | 22 the elf interpreter.
|
/linux-5.19.10/arch/x86/include/asm/ |
D | elf.h | 380 #define COMPAT_ARCH_SETUP_ADDITIONAL_PAGES(bprm, ex, interpreter) \ argument 381 compat_arch_setup_additional_pages(bprm, interpreter, \
|
/linux-5.19.10/Documentation/firmware-guide/acpi/ |
D | debug.rst | 29 specific part of the ACPI interpreter. To build the debug_layer bitmask, look 63 The ACPI interpreter uses several different levels, but the Linux
|
D | osi.rst | 9 AML code includes _OSI("XYZ"), the kernel's AML interpreter 74 interpreter in the kernel would return to it a string identifying the OS: 156 supported by the OS and the OS AML interpreter.
|
D | method-tracing.rst | 81 the "trace points" the AML interpreter starts/stops to execute a control
|
/linux-5.19.10/drivers/scsi/libsas/ |
D | Kconfig | 32 option builds an SMP interpreter into libsas. Say
|
/linux-5.19.10/Documentation/bpf/ |
D | bpf_licensing.rst | 35 The reference implementations of the eBPF interpreter and various just-in-time 43 There are also implementations of eBPF runtime (interpreter, JITs, helper
|
D | classic_vs_extended.rst | 43 32-bit architectures run 64-bit eBPF programs via interpreter. 66 convention, then the interpreter will take them from registers and pass 104 returns will be seamless. Without JIT, __bpf_prog_run() interpreter needs to 188 interpreter. R0-R5 are scratch registers, so eBPF program needs to preserve 206 The input context pointer for invoking the interpreter function is generic,
|
D | bpf_design_QA.rst | 221 and both interpreter and most JITed code consume necessary amount. 227 Q: Does classic BPF interpreter still exist?
|
/linux-5.19.10/Documentation/networking/ |
D | filter.rst | 622 Internally, for the kernel interpreter, a different instruction set 642 in the eBPF interpreter. For in-kernel handlers, this all works transparently 645 bpf_prog_run(filter, ctx) transparently invokes eBPF interpreter or JITed 661 the BPF interpreter and JIT compiler. It can be found in lib/test_bpf.c and
|
/linux-5.19.10/tools/perf/Documentation/ |
D | perf-script-perl.txt | 17 built-in Perl interpreter. It reads and processes the input file and
|