Home
last modified time | relevance | path

Searched refs:interpreter (Results 1 – 24 of 24) sorted by relevance

/Linux-v5.4/Documentation/admin-guide/
Dbinfmt-misc.rst8 To achieve this you must tell binfmt_misc which interpreter has to be invoked
19 ``:name:type:offset:magic:mask:interpreter:flags`` (where you can choose the
49 - ``interpreter``
54 of the interpreter. It is a string of capital letters, each controls a
69 of the binary to the interpreter as an argument. When this flag is
72 the interpreter to execute non-readable binaries. This feature
73 should be used with care - the interpreter has to be trusted not to
78 the interpreter. When this flag is included, these attributes are
80 This feature should be used with care as the interpreter
98 - the interpreter string may not exceed 127 characters
[all …]
Dinit.rst34 you should make sure that the script specifies an interpreter in its shebang
Dkernel-parameters.txt42 root cause of an AML interpreter issue when the issue
/Linux-v5.4/fs/
Dbinfmt_misc.c59 const char *interpreter; /* filename of interpreter */ member
199 retval = copy_strings_kernel(1, &fmt->interpreter, bprm); in load_misc_binary()
205 retval = bprm_change_interp(fmt->interpreter, bprm); in load_misc_binary()
214 interp_file = open_exec(fmt->interpreter); in load_misc_binary()
493 e->interpreter = p; in create_entry()
498 if (!e->interpreter[0]) in create_entry()
500 pr_debug("register: interpreter: {%s}\n", e->interpreter); in create_entry()
562 dp += sprintf(dp, "%s\ninterpreter %s\n", status, e->interpreter); in entry_status()
731 f = open_exec(e->interpreter); in bm_register_write()
734 pr_notice("register: failed to install interpreter file %s\n", e->interpreter); in bm_register_write()
Dbinfmt_elf.c547 struct file *interpreter, unsigned long *interp_map_addr, in load_elf_interp() argument
566 if (!interpreter->f_op->mmap) in load_elf_interp()
590 map_addr = elf_map(interpreter, load_addr + vaddr, in load_elf_interp()
675 struct file *interpreter = NULL; /* to shut gcc up */ in load_elf_binary() local
756 interpreter = open_exec(elf_interpreter); in load_elf_binary()
758 retval = PTR_ERR(interpreter); in load_elf_binary()
759 if (IS_ERR(interpreter)) in load_elf_binary()
766 would_dump(bprm, interpreter); in load_elf_binary()
770 retval = kernel_read(interpreter, &loc->interp_elf_ex, in load_elf_binary()
805 if (interpreter) { in load_elf_binary()
[all …]
Dbinfmt_elf_fdpic.c194 struct file *interpreter = NULL; /* to shut gcc up */ in load_elf_fdpic_binary() local
262 interpreter = open_exec(interpreter_name); in load_elf_fdpic_binary()
263 retval = PTR_ERR(interpreter); in load_elf_fdpic_binary()
264 if (IS_ERR(interpreter)) { in load_elf_fdpic_binary()
265 interpreter = NULL; in load_elf_fdpic_binary()
274 would_dump(bprm, interpreter); in load_elf_fdpic_binary()
277 retval = kernel_read(interpreter, bprm->buf, in load_elf_fdpic_binary()
304 if (!is_elf(&interp_params.hdr, interpreter)) in load_elf_fdpic_binary()
310 retval = elf_fdpic_fetch_phdrs(&interp_params, interpreter); in load_elf_fdpic_binary()
391 retval = elf_fdpic_map_file(&interp_params, interpreter, in load_elf_fdpic_binary()
[all …]
DKconfig.binfmt85 #! followed by the path to an interpreter.
182 programs that need an interpreter to run like Java, Python, .NET or
188 will automatically feed it to the correct interpreter.
/Linux-v5.4/drivers/scsi/libsas/
DKconfig32 option builds an SMP interpreter into libsas. Say
/Linux-v5.4/Documentation/firmware-guide/acpi/
Ddebug.rst30 specific driver or part of the ACPI interpreter. To build the debug_layer
78 The ACPI interpreter uses several different levels, but the Linux
Dosi.rst9 AML code includes _OSI("XYZ"), the kernel's AML interpreter
74 interpreter in the kernel would return to it a string identifying the OS:
156 supported by the OS and the OS AML interpreter.
Dmethod-tracing.rst81 the "trace points" the AML interpreter starts/stops to execute a control
/Linux-v5.4/Documentation/networking/
Dfilter.txt574 Internally, for the kernel interpreter, a different instruction set
598 in the eBPF interpreter. For in-kernel handlers, this all works transparently
601 BPF_PROG_RUN(filter, ctx) transparently invokes eBPF interpreter or JITed
652 32-bit architectures run 64-bit internal BPF programs via interpreter.
675 convention, then the interpreter will take them from registers and pass
713 returns will be seamless. Without JIT, __bpf_prog_run() interpreter needs to
795 interpreter. R0-R5 are scratch registers, so eBPF program needs to preserve
813 The input context pointer for invoking the interpreter function is generic,
981 socket filters running in eBPF interpreter. These instructions can only
982 be used when interpreter context is a pointer to 'struct sk_buff' and
[all …]
/Linux-v5.4/Documentation/bpf/
Dbpf_design_QA.rst215 and both interpreter and most JITed code consume necessary amount.
221 Q: Does classic BPF interpreter still exist?
Dbpf_devel_QA.rst343 interpreter in case the in-kernel BPF JIT is enabled.
/Linux-v5.4/tools/perf/Documentation/
Dperf-script-perl.txt17 built-in Perl interpreter. It reads and processes the input file and
Dperf-script-python.txt17 built-in Python interpreter. It reads and processes the input file and
/Linux-v5.4/Documentation/x86/x86_64/
Dboot-options.rst194 Use ACPI boot table parsing, but don't enable ACPI interpreter
/Linux-v5.4/net/
DKconfig295 by an interpreter. This option allows kernel to generate a native
/Linux-v5.4/drivers/auxdisplay/
DKconfig237 The driver includes an interpreter for escape codes starting with
/Linux-v5.4/init/
DKconfig1320 # interpreter that classic socket filters depend on
1640 bool "Permanently enable BPF JIT and remove BPF interpreter"
1643 Enables BPF JIT and removes BPF interpreter to avoid
1644 speculative execution of BPF instructions by the interpreter
/Linux-v5.4/tools/perf/
DMakefile.config724 …$(call disable-python,No python interpreter was found: disables Python support - please install py…
/Linux-v5.4/Documentation/filesystems/
Dmount_api.txt704 This is the main interpreter of parameters. It uses the parameter
/Linux-v5.4/lib/
DKconfig.debug1904 against the BPF interpreter or BPF JIT compiler depending on the
1907 the interpreter code. It also enables test stubs for eBPF maps and
/Linux-v5.4/Documentation/power/
Dpci.rst153 them as needed using an AML interpreter that translates the AML byte code into