Lines Matching full:executable
312 // gdb already knows about the linker and the main executable.
949 * a symbol search with the executable file, the dynamic linker starts from the shared
951 * dynamic linker then searches the executable file and other shared objects as usual."
1311 // of the main executable we need to search not only in the executable and its
1314 // Since RTLD_GLOBAL is always set for the main executable and all dt_needed shared
1956 // This group consists of the main executable, LD_PRELOADs
2838 // not executable. We need to restore elf flags before resolving
2900 // not executable. We need to restore elf flags for this
3020 * R_AARCH64_COPY may only appear in executable objects where e_type is
3077 * R_ARM_COPY may only appear in executable objects where e_type is
3921 // the main executable and linker; they do not need to have dt_soname
4228 // the executable could be unlinked by this point and it should
4244 // Register the main executable and the linker upfront to have
4288 __libc_fatal("CANNOT LINK EXECUTABLE \"%s\": %s", args.argv[0], linker_get_error_buffer());
4319 __libc_fatal("CANNOT LINK EXECUTABLE \"%s\": %s", args.argv[0], linker_get_error_buffer());
4322 __libc_fatal("CANNOT LINK EXECUTABLE \"%s\": %s", args.argv[0], linker_get_error_buffer());
4388 /* Compute the load-bias of an existing executable. This shall only
4389 * be used to compute the load bias of an executable or shared library
4413 __libc_fatal("CANNOT LINK EXECUTABLE \"%s\": %s", args.argv[0], linker_get_error_buffer());
4436 // _start. Which means that the linker is running as an executable and