/linux-4.4.14/Documentation/ |
D | binfmt_misc.txt | 8 To achieve this you must tell binfmt_misc which interpreter has to be invoked 18 :name:type:offset:magic:mask:interpreter:flags (where you can choose the ':' 41 - 'interpreter' is the program that should be invoked with the binary as first 44 of the interpreter. It is a string of capital letters, each controls a 56 of the binary to the interpreter as an argument. When this flag is 59 the interpreter to execute non-readable binaries. This feature 60 should be used with care - the interpreter has to be trusted not to 64 the interpreter. When this flag is included, these attributes are 66 This feature should be used with care as the interpreter 75 - the interpreter string may not exceed 127 characters [all …]
|
D | init.txt | 32 you should make sure that the script specifies an interpreter in its shebang
|
D | kernel-parameters.txt | 201 root cause of an AML interpreter issue when the issue
|
/linux-4.4.14/fs/ |
D | binfmt_elf_fdpic.c | 197 struct file *interpreter = NULL; /* to shut gcc up */ in load_elf_fdpic_binary() local 265 interpreter = open_exec(interpreter_name); in load_elf_fdpic_binary() 266 retval = PTR_ERR(interpreter); in load_elf_fdpic_binary() 267 if (IS_ERR(interpreter)) { in load_elf_fdpic_binary() 268 interpreter = NULL; in load_elf_fdpic_binary() 277 would_dump(bprm, interpreter); in load_elf_fdpic_binary() 279 retval = kernel_read(interpreter, 0, bprm->buf, in load_elf_fdpic_binary() 306 if (!is_elf(&interp_params.hdr, interpreter)) in load_elf_fdpic_binary() 312 retval = elf_fdpic_fetch_phdrs(&interp_params, interpreter); in load_elf_fdpic_binary() 388 retval = elf_fdpic_map_file(&interp_params, interpreter, in load_elf_fdpic_binary() [all …]
|
D | binfmt_misc.c | 54 char *interpreter; /* filename of interpreter */ member 143 strlcpy(iname, fmt->interpreter, BINPRM_BUF_SIZE); in load_misc_binary() 467 e->interpreter = p; in create_entry() 472 if (!e->interpreter[0]) in create_entry() 474 pr_debug("register: interpreter: {%s}\n", e->interpreter); in create_entry() 536 dp += sprintf(dp, "%s\ninterpreter %s\n", status, e->interpreter); in entry_status()
|
D | binfmt_elf.c | 519 struct file *interpreter, unsigned long *interp_map_addr, in load_elf_interp() argument 536 if (!interpreter->f_op->mmap) in load_elf_interp() 566 map_addr = elf_map(interpreter, load_addr + vaddr, in load_elf_interp() 667 struct file *interpreter = NULL; /* to shut gcc up */ in load_elf_binary() local 751 interpreter = open_exec(elf_interpreter); in load_elf_binary() 752 retval = PTR_ERR(interpreter); in load_elf_binary() 753 if (IS_ERR(interpreter)) in load_elf_binary() 761 would_dump(bprm, interpreter); in load_elf_binary() 764 retval = kernel_read(interpreter, 0, in load_elf_binary() 809 interpreter); in load_elf_binary() [all …]
|
D | Kconfig.binfmt | 73 #! followed by the path to an interpreter. 154 programs that need an interpreter to run like Java, Python, .NET or 160 will automatically feed it to the correct interpreter.
|
/linux-4.4.14/Documentation/acpi/ |
D | debug.txt | 27 specific driver or part of the ACPI interpreter. To build the debug_layer 75 The ACPI interpreter uses several different levels, but the Linux
|
D | method-tracing.txt | 64 the "trace points" the AML interpreter starts/stops to execute a control
|
/linux-4.4.14/drivers/scsi/libsas/ |
D | Kconfig | 47 option builds an SMP interpreter into libsas. Say
|
/linux-4.4.14/Documentation/networking/ |
D | filter.txt | 565 Internally, for the kernel interpreter, a different instruction set 589 in the eBPF interpreter. For in-kernel handlers, this all works transparently 592 BPF_PROG_RUN(filter, ctx) transparently invokes eBPF interpreter or JITed 643 32-bit architectures run 64-bit internal BPF programs via interpreter. 666 convention, then the interpreter will take them from registers and pass 704 returns will be seamless. Without JIT, __bpf_prog_run() interpreter needs to 786 interpreter. R0-R5 are scratch registers, so eBPF program needs to preserve 804 The input context pointer for invoking the interpreter function is generic, 967 socket filters running in eBPF interpreter. These instructions can only 968 be used when interpreter context is a pointer to 'struct sk_buff' and [all …]
|
/linux-4.4.14/tools/perf/Documentation/ |
D | perf-script-perl.txt | 17 built-in Perl interpreter. It reads and processes the input file and
|
D | perf-script-python.txt | 17 built-in Python interpreter. It reads and processes the input file and
|
/linux-4.4.14/drivers/staging/panel/ |
D | Kconfig | 71 The driver includes an interpreter for escape codes starting with
|
/linux-4.4.14/Documentation/frv/ |
D | features.txt | 47 FDPIC ELF supports shared library and program interpreter facilities.
|
/linux-4.4.14/tools/perf/config/ |
D | Makefile | 474 …$(call disable-python,No python interpreter was found: disables Python support - please install py…
|
/linux-4.4.14/Documentation/x86/x86_64/ |
D | boot-options.txt | 160 interpreter
|
/linux-4.4.14/net/ |
D | Kconfig | 283 by an interpreter. This option allows kernel to generate a native
|
/linux-4.4.14/drivers/staging/lustre/lustre/ptlrpc/ |
D | client.c | 2178 int (*interpreter)(struct ptlrpc_request_set *set, void *, int) = in ptlrpc_set_wait() local 2180 rc = interpreter(set, set->set_arg, rc); in ptlrpc_set_wait()
|
/linux-4.4.14/lib/ |
D | Kconfig.debug | 1801 against the BPF interpreter or BPF JIT compiler depending on the 1804 the interpreter code. It also enables test stubs for eBPF maps and
|
/linux-4.4.14/Documentation/power/ |
D | pci.txt | 148 them as needed using an AML interpreter that translates the AML byte code into
|
/linux-4.4.14/init/ |
D | Kconfig | 1351 # interpreter that classic socket filters depend on
|