ELF is an acronym for Executable and Linkable Format
This commit is contained in:
kelowerirql 2023-04-06 20:26:51 +03:00 коммит произвёл GitHub
Родитель d22a2d8616
Коммит 3fd495af79
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23
1 изменённых файлов: 2 добавлений и 2 удалений

Просмотреть файл

@ -17,7 +17,7 @@ This document covers generating signed PE files from eBPF programs in an automat
eBPF programs start in a higher level language (like C) that is then compiled using the LLVM tool chain into an ELF
file containing the definition for zero or more maps and one or more code segments containing eBPF byte code. eBPF For
Windows uses the [PREVAIL verifier](https://github.com/vbpf/ebpf-verifier) to perform safety analysis of eBPF programs.
The verifier accepts an eBPF program compiled into an Executable Linux Format (ELF) file and then returns a yes/no
The verifier accepts an eBPF program compiled into an Executable and Linkable Format (ELF) file and then returns a yes/no
response depending on whether it can prove the program is safe. The verified ELF file can then be used to generate a PE
image that can be loaded and used as an eBPF program.
@ -218,4 +218,4 @@ differ for each person regenerating them.
These paths therefore need to be canonicalized to make them portable and this is done by running the following command
from the ```ebpf-for-windows``` project root directory:
``` .\scripts\generate_expected_bpf2c_output.ps1 .\x64\Debug\```
``` .\scripts\generate_expected_bpf2c_output.ps1 .\x64\Debug\```