| /linux-6.15/Documentation/admin-guide/ |
| H A D | binfmt-misc.rst | 8 To achieve this you must tell binfmt_misc which interpreter has to be invoked 19 ``:name:type:offset:magic:mask:interpreter:flags`` (where you can choose the 49 - ``interpreter`` 54 of the interpreter. It is a string of capital letters, each controls a 69 of the binary to the interpreter as an argument. When this flag is 72 the interpreter to execute non-readable binaries. This feature 78 the interpreter. When this flag is included, these attributes are 80 This feature should be used with care as the interpreter 98 - the interpreter string may not exceed 127 characters 142 If you want to pass special arguments to your interpreter, you can [all …]
|
| H A D | init.rst | 31 you should make sure that the script specifies an interpreter in its
|
| /linux-6.15/Documentation/userspace-api/ |
| H A D | ELF.rst | 20 interpreter. Other PT_INTERP headers are ignored (since Linux 2.4.11). 31 ELF interpreter's last PT_GNU_PROPERTY program header is used (since 32 Linux 5.8). If interpreter doesn't have one, then the last PT_GNU_PROPERTY
|
| H A D | check_exec.rst | 14 Whether an interpreter should check these securebits or not depends on the 38 allowed, ignoring the file format and then the related interpreter dependencies 43 interpreter instead. All files that contain executable code, from the point of 44 view of the interpreter, should be checked. However the result of this check 102 Here is the expected behavior for a script interpreter according to combination 112 script interpreter. Indeed, this check is still important to enable systems
|
| /linux-6.15/kernel/bpf/ |
| H A D | Kconfig | 3 # BPF interpreter that, for example, classic socket filters depend on. 48 BPF programs are normally handled by a BPF interpreter. This option 59 bool "Permanently enable BPF JIT and remove BPF interpreter" 62 Enables BPF JIT and removes BPF interpreter to avoid speculative 63 execution of BPF instructions by the interpreter.
|
| /linux-6.15/fs/ |
| H A D | binfmt_elf.c | 638 struct file *interpreter, in load_elf_interp() argument 656 if (!interpreter->f_op->mmap) in load_elf_interp() 902 if (IS_ERR(interpreter)) in load_elf_binary() 950 if (interpreter) { in load_elf_binary() 962 interpreter); in load_elf_binary() 1130 if (interpreter) { in load_elf_binary() 1245 if (interpreter) { in load_elf_binary() 1247 interpreter, in load_elf_binary() 1266 fput(interpreter); in load_elf_binary() 1380 if (interpreter) in load_elf_binary() [all …]
|
| H A D | binfmt_misc.c | 56 const char *interpreter; /* filename of interpreter */ member 240 retval = copy_string_kernel(fmt->interpreter, bprm); in load_misc_binary() 246 retval = bprm_change_interp(fmt->interpreter, bprm); in load_misc_binary() 255 interp_file = open_exec(fmt->interpreter); in load_misc_binary() 261 bprm->interpreter = interp_file; in load_misc_binary() 521 e->interpreter = p; in create_entry() 526 if (!e->interpreter[0]) in create_entry() 528 pr_debug("register: interpreter: {%s}\n", e->interpreter); in create_entry() 590 dp += sprintf(dp, "%s\ninterpreter %s\n", status, e->interpreter); in entry_status() 833 f = open_exec(e->interpreter); in bm_register_write() [all …]
|
| H A D | binfmt_elf_fdpic.c | 262 interpreter = open_exec(interpreter_name); in load_elf_fdpic_binary() 263 retval = PTR_ERR(interpreter); in load_elf_fdpic_binary() 264 if (IS_ERR(interpreter)) { in load_elf_fdpic_binary() 265 interpreter = NULL; in load_elf_fdpic_binary() 274 would_dump(bprm, interpreter); in load_elf_fdpic_binary() 397 exe_file_allow_write_access(interpreter); in load_elf_fdpic_binary() 398 fput(interpreter); in load_elf_fdpic_binary() 399 interpreter = NULL; in load_elf_fdpic_binary() 469 if (interpreter) { in load_elf_fdpic_binary() 470 exe_file_allow_write_access(interpreter); in load_elf_fdpic_binary() [all …]
|
| H A D | compat_binfmt_elf.c | 124 #define COMPAT_ARCH_SETUP_ADDITIONAL_PAGES(bprm, ex, interpreter) \ argument 125 compat_arch_setup_additional_pages(bprm, interpreter)
|
| H A D | binfmt_script.c | 136 bprm->interpreter = file; in load_script()
|
| H A D | Kconfig.binfmt | 104 #! followed by the path to an interpreter. 150 programs that need an interpreter to run like Java, Python, .NET or 156 will automatically feed it to the correct interpreter.
|
| H A D | exec.c | 1813 if (!bprm->interpreter) in exec_binprm() 1817 bprm->file = bprm->interpreter; in exec_binprm() 1818 bprm->interpreter = NULL; in exec_binprm()
|
| /linux-6.15/include/linux/ |
| H A D | elf.h | 31 #define ARCH_SETUP_ADDITIONAL_PAGES(bprm, ex, interpreter) \ argument 32 arch_setup_additional_pages(bprm, interpreter)
|
| H A D | binfmts.h | 54 struct file *interpreter; member
|
| /linux-6.15/tools/testing/selftests/kselftest/ |
| H A D | runner.sh | 123 interpreter=$(head -n 1 "$TEST" | cut -c 3-) 124 cmd="$stdbuf $interpreter ./$BASENAME_TEST"
|
| /linux-6.15/Documentation/firmware-guide/acpi/ |
| H A D | debug.rst | 29 specific part of the ACPI interpreter. To build the debug_layer bitmask, look 63 The ACPI interpreter uses several different levels, but the Linux
|
| H A D | osi.rst | 9 AML code includes _OSI("XYZ"), the kernel's AML interpreter 71 interpreter in the kernel would return to it a string identifying the OS: 153 supported by the OS and the OS AML interpreter.
|
| H A D | method-tracing.rst | 81 the "trace points" the AML interpreter starts/stops to execute a control
|
| /linux-6.15/arch/x86/include/asm/ |
| H A D | elf.h | 377 #define COMPAT_ARCH_SETUP_ADDITIONAL_PAGES(bprm, ex, interpreter) \ argument 378 compat_arch_setup_additional_pages(bprm, interpreter, \
|
| /linux-6.15/drivers/scsi/libsas/ |
| H A D | Kconfig | 32 option builds an SMP interpreter into libsas. Say
|
| /linux-6.15/Documentation/bpf/ |
| H A D | bpf_licensing.rst | 35 The reference implementations of the eBPF interpreter and various just-in-time 43 There are also implementations of eBPF runtime (interpreter, JITs, helper
|
| H A D | classic_vs_extended.rst | 43 32-bit architectures run 64-bit eBPF programs via interpreter. 66 convention, then the interpreter will take them from registers and pass 104 returns will be seamless. Without JIT, __bpf_prog_run() interpreter needs to 188 interpreter. R0-R5 are scratch registers, so eBPF program needs to preserve 206 The input context pointer for invoking the interpreter function is generic,
|
| H A D | linux-notes.rst | 52 filters running in the eBPF interpreter.
|
| /linux-6.15/Documentation/networking/ |
| H A D | filter.rst | 622 Internally, for the kernel interpreter, a different instruction set 642 in the eBPF interpreter. For in-kernel handlers, this all works transparently 645 bpf_prog_run(filter, ctx) transparently invokes eBPF interpreter or JITed 661 the BPF interpreter and JIT compiler. It can be found in lib/test_bpf.c and
|
| /linux-6.15/tools/perf/Documentation/ |
| H A D | perf-script-perl.txt | 17 built-in Perl interpreter. It reads and processes the input file and
|