e354a5
commit ca52c56abf50b89a95dc2a4a5504c0d7d3862961
e354a5
Author: Florian Weimer <fweimer@redhat.com>
e354a5
Date:   Thu Oct 8 15:33:00 2020 +0200
e354a5
e354a5
    elf: Use the term "program interpreter" in the ld.so help message
e354a5
    
e354a5
    This is the term that the ELF standard itself uses.
e354a5
    
e354a5
    Reviewed-by: Adhemerval Zanella  <adhemerval.zanella@linaro.org>
e354a5
e354a5
diff --git a/elf/dl-usage.c b/elf/dl-usage.c
e354a5
index f3c5ac76d37f9c03..8c24c13770500df9 100644
e354a5
--- a/elf/dl-usage.c
e354a5
+++ b/elf/dl-usage.c
e354a5
@@ -51,17 +51,17 @@ _dl_help (const char *argv0, struct dl_main_state *state)
e354a5
 {
e354a5
   _dl_printf ("\
e354a5
 Usage: %s [OPTION]... EXECUTABLE-FILE [ARGS-FOR-PROGRAM...]\n\
e354a5
-You have invoked `ld.so', the helper program for shared library executables.\n\
e354a5
-This program usually lives in the file `/lib/ld.so', and special directives\n\
e354a5
-in executable files using ELF shared libraries tell the system's program\n\
e354a5
-loader to load the helper program from this file.  This helper program loads\n\
e354a5
-the shared libraries needed by the program executable, prepares the program\n\
e354a5
-to run, and runs it.  You may invoke this helper program directly from the\n\
e354a5
-command line to load and run an ELF executable file; this is like executing\n\
e354a5
-that file itself, but always uses this helper program from the file you\n\
e354a5
-specified, instead of the helper program file specified in the executable\n\
e354a5
-file you run.  This is mostly of use for maintainers to test new versions\n\
e354a5
-of this helper program; chances are you did not intend to run this program.\n\
e354a5
+You have invoked 'ld.so', the program interpreter for dynamically-linked\n\
e354a5
+ELF programs.  Usually, the program interpreter is invoked automatically\n\
e354a5
+when a dynamically-linked executable is started.\n\
e354a5
+\n\
e354a5
+You may invoke the program interpreter program directly from the command\n\
e354a5
+line to load and run an ELF executable file; this is like executing that\n\
e354a5
+file itself, but always uses the program interpreter you invoked,\n\
e354a5
+instead of the program interpreter specified in the executable file you\n\
e354a5
+run.  Invoking the program interpreter directly provides access to\n\
e354a5
+additional diagnostics, and changing the dynamic linker behavior without\n\
e354a5
+setting environment variables (which would be inherited by subprocesses).\n\
e354a5
 \n\
e354a5
   --list                list all dependencies and how they are resolved\n\
e354a5
   --verify              verify that given object really is a dynamically linked\n\