/linux/Documentation/admin-guide/ |
H A D | binfmt-misc.rst | 8 To achieve this you must tell binfmt_misc which interpreter has to be invoked 19 ``:name:type:offset:magic:mask:interpreter:flags`` (where you can choose the 49 - ``interpreter`` 54 of the interpreter. It is a string of capital letters, each controls a 69 of the binary to the interpreter as an argument. When this flag is 72 the interpreter to execute non-readable binaries. This feature 73 should be used with care - the interpreter has to be trusted not to 78 the interpreter. When this flag is included, these attributes are 80 This feature should be used with care as the interpreter 98 - the interpreter string may not exceed 127 characters [all …]
|
H A D | init.rst | 31 you should make sure that the script specifies an interpreter in its
|
/linux/Documentation/userspace-api/ |
H A D | ELF.rst | 20 interpreter. Other PT_INTERP headers are ignored (since Linux 2.4.11). 31 ELF interpreter's last PT_GNU_PROPERTY program header is used (since 32 Linux 5.8). If interpreter doesn't have one, then the last PT_GNU_PROPERTY
|
H A D | check_exec.rst | 14 Whether an interpreter should check these securebits or not depends on the 38 allowed, ignoring the file format and then the related interpreter dependencies 43 interpreter instead. All files that contain executable code, from the point of 44 view of the interpreter, should be checked. However the result of this check 102 Here is the expected behavior for a script interpreter according to combination 112 script interpreter. Indeed, this check is still important to enable systems
|
/linux/fs/ |
H A D | binfmt_elf.c | 638 struct file *interpreter, in load_elf_interp() argument 656 if (!interpreter->f_op->mmap) in load_elf_interp() 681 map_addr = elf_load(interpreter, load_addr + vaddr, in load_elf_interp() 827 struct file *interpreter = NULL; /* to shut gcc up */ in load_elf_binary() local 899 interpreter = open_exec(elf_interpreter); in load_elf_binary() 901 retval = PTR_ERR(interpreter); in load_elf_binary() 902 if (IS_ERR(interpreter)) in load_elf_binary() 909 would_dump(bprm, interpreter); in load_elf_binary() 918 retval = elf_read(interpreter, interp_elf_ex, in load_elf_binary() 950 if (interpreter) { in load_elf_binary() [all …]
|
H A D | binfmt_misc.c | 56 const char *interpreter; /* filename of interpreter */ member 240 retval = copy_string_kernel(fmt->interpreter, bprm); in load_misc_binary() 246 retval = bprm_change_interp(fmt->interpreter, bprm); in load_misc_binary() 255 interp_file = open_exec(fmt->interpreter); in load_misc_binary() 261 bprm->interpreter = interp_file; in load_misc_binary() 521 e->interpreter = p; in create_entry() 526 if (!e->interpreter[0]) in create_entry() 528 pr_debug("register: interpreter: {%s}\n", e->interpreter); in create_entry() 590 dp += sprintf(dp, "%s\ninterpreter %s\n", status, e->interpreter); in entry_status() 833 f = open_exec(e->interpreter); in bm_register_write() [all …]
|
H A D | binfmt_elf_fdpic.c | 194 struct file *interpreter = NULL; /* to shut gcc up */ in load_elf_fdpic_binary() local 262 interpreter = open_exec(interpreter_name); in load_elf_fdpic_binary() 263 retval = PTR_ERR(interpreter); in load_elf_fdpic_binary() 264 if (IS_ERR(interpreter)) { in load_elf_fdpic_binary() 265 interpreter = NULL; in load_elf_fdpic_binary() 274 would_dump(bprm, interpreter); in load_elf_fdpic_binary() 277 retval = kernel_read(interpreter, bprm->buf, in load_elf_fdpic_binary() 304 if (!is_elf(&interp_params.hdr, interpreter)) in load_elf_fdpic_binary() 310 retval = elf_fdpic_fetch_phdrs(&interp_params, interpreter); in load_elf_fdpic_binary() 390 retval = elf_fdpic_map_file(&interp_params, interpreter, in load_elf_fdpic_binary() [all …]
|
H A D | Kconfig.binfmt | 104 #! followed by the path to an interpreter. 150 programs that need an interpreter to run like Java, Python, .NET or 156 will automatically feed it to the correct interpreter.
|
H A D | binfmt_script.c | 136 bprm->interpreter = file; in load_script()
|
/linux/kernel/bpf/ |
H A D | Kconfig | 3 # BPF interpreter that, for example, classic socket filters depend on. 48 BPF programs are normally handled by a BPF interpreter. This option 59 bool "Permanently enable BPF JIT and remove BPF interpreter" 62 Enables BPF JIT and removes BPF interpreter to avoid speculative 63 execution of BPF instructions by the interpreter.
|
/linux/include/linux/ |
H A D | elf.h | 31 #define ARCH_SETUP_ADDITIONAL_PAGES(bprm, ex, interpreter) \ argument 32 arch_setup_additional_pages(bprm, interpreter)
|
H A D | binfmts.h | 54 struct file *interpreter; member
|
/linux/tools/testing/selftests/kselftest/ |
H A D | runner.sh | 123 interpreter=$(head -n 1 "$TEST" | cut -c 3-) 124 cmd="$stdbuf $interpreter ./$BASENAME_TEST"
|
/linux/Documentation/firmware-guide/acpi/ |
H A D | debug.rst | 29 specific part of the ACPI interpreter. To build the debug_layer bitmask, look 63 The ACPI interpreter uses several different levels, but the Linux
|
H A D | osi.rst | 9 AML code includes _OSI("XYZ"), the kernel's AML interpreter 71 interpreter in the kernel would return to it a string identifying the OS: 153 supported by the OS and the OS AML interpreter.
|
H A D | method-tracing.rst | 81 the "trace points" the AML interpreter starts/stops to execute a control
|
/linux/arch/x86/include/asm/ |
H A D | elf.h | 376 #define COMPAT_ARCH_SETUP_ADDITIONAL_PAGES(bprm, ex, interpreter) \ argument 377 compat_arch_setup_additional_pages(bprm, interpreter, \
|
/linux/Documentation/bpf/ |
H A D | bpf_licensing.rst | 35 The reference implementations of the eBPF interpreter and various just-in-time 43 There are also implementations of eBPF runtime (interpreter, JITs, helper
|
H A D | classic_vs_extended.rst | 43 32-bit architectures run 64-bit eBPF programs via interpreter. 66 convention, then the interpreter will take them from registers and pass 104 returns will be seamless. Without JIT, __bpf_prog_run() interpreter needs to 188 interpreter. R0-R5 are scratch registers, so eBPF program needs to preserve 206 The input context pointer for invoking the interpreter function is generic,
|
H A D | linux-notes.rst | 52 filters running in the eBPF interpreter.
|
H A D | bpf_design_QA.rst | 226 and both interpreter and most JITed code consume necessary amount. 232 Q: Does classic BPF interpreter still exist?
|
/linux/drivers/scsi/libsas/ |
H A D | Kconfig | 32 option builds an SMP interpreter into libsas. Say
|
/linux/Documentation/networking/ |
H A D | filter.rst | 622 Internally, for the kernel interpreter, a different instruction set 642 in the eBPF interpreter. For in-kernel handlers, this all works transparently 645 bpf_prog_run(filter, ctx) transparently invokes eBPF interpreter or JITed 661 the BPF interpreter and JIT compiler. It can be found in lib/test_bpf.c and
|
/linux/tools/perf/Documentation/ |
H A D | perf-script-perl.txt | 17 built-in Perl interpreter. It reads and processes the input file and
|
/linux/drivers/acpi/ |
H A D | Kconfig | 590 set of binary executables that can be called from the AML interpreter 593 Say Y to enable the AML interpreter to execute the PRM code.
|