| /kernel/linux/linux-6.6/scripts/ |
| D | check_extable.sh | 9 # Bail out early if there isn't an __ex_table section in this object file. 24 # white listed. If you're adding a new section in the Linux kernel, and 25 # you're expecting this section to contain code which can fault (i.e. the 26 # __ex_table relocation to your new section is expected), simply add your 27 # new section to the white_list variable above. If not, you're probably 33 …eval $(objdump -t ${obj} | grep ${1} | sed 's/\([0-9a-f]\+\) .\{7\} \([^ \t]\+\).*/section="\2"; s… 44 # When the relocation points to the begining of a symbol or section, it 55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | … 62 find_alt_replacement_target ${section} ${section_offset} 72 objdump -hwj ${section} ${obj} | grep -q CODE [all …]
|
| /kernel/linux/linux-5.10/scripts/ |
| D | check_extable.sh | 9 # Bail out early if there isn't an __ex_table section in this object file. 24 # white listed. If you're adding a new section in the Linux kernel, and 25 # you're expecting this section to contain code which can fault (i.e. the 26 # __ex_table relocation to your new section is expected), simply add your 27 # new section to the white_list variable above. If not, you're probably 33 …eval $(objdump -t ${obj} | grep ${1} | sed 's/\([0-9a-f]\+\) .\{7\} \([^ \t]\+\).*/section="\2"; s… 44 # When the relocation points to the begining of a symbol or section, it 55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | … 62 find_alt_replacement_target ${section} ${section_offset} 72 objdump -hwj ${section} ${obj} | grep -q CODE [all …]
|
| /kernel/liteos_m/components/backtrace/ |
| D | los_backtrace.h | 48 /* The default name of the code section and CSTACK section are given below, 51 /* The default code section name is .text */ 53 /* The default C stack section name is CSTACK */ 55 #pragma section = CODE_SECTION_NAME 56 #pragma section = CSTACK_SECTION_NAME 58 /* Default only one code section. In fact, there may be more than one. 66 /* The default code section name is ER_IROM1 */ 68 /* The default C stack section name is STACK */ 86 /* Default only one code section. In fact, there may be more than one. 94 /* The default code section start address */ [all …]
|
| /kernel/linux/linux-5.10/arch/powerpc/include/asm/ |
| D | head-64.h | 9 * We can't do CPP stringification and concatination directly into the section 13 .section ".head.text.\name\()","ax",@progbits 16 .section ".head.data.\name\()","a",@progbits 19 .section ".head.text.\name\()" 24 * fixed section entries into them before closing them. Multiple fixed sections 27 * Each fixed section created in a .S file must have corresponding linkage 30 * For each fixed section, code is generated into it in the order which it 31 * appears in the source. Fixed section entries can be placed at a fixed 32 * location within the section using _LOCATION postifx variants. These must 33 * be ordered according to their relative placements within the section. [all …]
|
| /kernel/linux/linux-6.6/arch/powerpc/include/asm/ |
| D | head-64.h | 9 * We can't do CPP stringification and concatination directly into the section 13 .section ".head.text.\name\()","ax",@progbits 16 .section ".head.data.\name\()","a",@progbits 19 .section ".head.text.\name\()","ax",@progbits 24 * fixed section entries into them before closing them. Multiple fixed sections 27 * Each fixed section created in a .S file must have corresponding linkage 30 * For each fixed section, code is generated into it in the order which it 31 * appears in the source. Fixed section entries can be placed at a fixed 32 * location within the section using _LOCATION postifx variants. These must 33 * be ordered according to their relative placements within the section. [all …]
|
| /kernel/linux/linux-6.6/drivers/usb/chipidea/ |
| D | otg_fsm.h | 18 #define TA_WAIT_VRISE (100) /* a_wait_vrise: section 7.1.2 19 * a_wait_vrise_tmr: section 7.4.5.1 20 * TA_VBUS_RISE <= 100ms, section 4.4 25 #define TA_WAIT_VFALL (1000) /* a_wait_vfall: section 7.1.7 26 * a_wait_vfall_tmr: section: 7.4.5.2 29 #define TA_WAIT_BCON (10000) /* a_wait_bcon: section 7.1.3 31 * and 30000 ms, section 5.5, Table 5-1 34 #define TA_AIDL_BDIS (5000) /* a_suspend min 200 ms, section 5.2.1 35 * TA_AIDL_BDIS: section 5.5, Table 5-1 38 #define TA_BIDL_ADIS (500) /* TA_BIDL_ADIS: section 5.2.1 [all …]
|
| /kernel/linux/linux-5.10/drivers/usb/chipidea/ |
| D | otg_fsm.h | 18 #define TA_WAIT_VRISE (100) /* a_wait_vrise: section 7.1.2 19 * a_wait_vrise_tmr: section 7.4.5.1 20 * TA_VBUS_RISE <= 100ms, section 4.4 25 #define TA_WAIT_VFALL (1000) /* a_wait_vfall: section 7.1.7 26 * a_wait_vfall_tmr: section: 7.4.5.2 29 #define TA_WAIT_BCON (10000) /* a_wait_bcon: section 7.1.3 31 * and 30000 ms, section 5.5, Table 5-1 34 #define TA_AIDL_BDIS (5000) /* a_suspend min 200 ms, section 5.2.1 35 * TA_AIDL_BDIS: section 5.5, Table 5-1 38 #define TA_BIDL_ADIS (500) /* TA_BIDL_ADIS: section 5.2.1 [all …]
|
| /kernel/linux/linux-5.10/Documentation/livepatch/ |
| D | module-elf-format.rst | 13 3.1 Livepatch relocation section format 17 5. Symbol table and Elf section access 35 Since apply_relocate_add() requires access to a module's section header 36 table, symbol table, and relocation section indices, Elf information is 37 preserved for livepatch modules (see section 5). Livepatch manages its own 58 relas reference are special livepatch symbols (see section 2 and 3). The 93 relocation section(s) to the driver once it loads. 98 between a livepatch relocation section and the target section (usually the 99 text section of a function) to which the relocation(s) apply. It is 104 Since Elf information is preserved for livepatch modules (see Section 5), a [all …]
|
| /kernel/linux/linux-5.10/tools/objtool/ |
| D | elf.h | 28 struct section { struct 36 struct section *base, *reloc; argument 51 struct section *sec; argument 74 struct section *sec; 109 static inline u32 sec_offset_hash(struct section *sec, unsigned long offset) in sec_offset_hash() 129 struct section *elf_create_section(struct elf *elf, const char *name, unsigned int sh_flags, size_t… 131 int elf_add_reloc(struct elf *elf, struct section *sec, unsigned long offset, 133 int elf_add_reloc_to_insn(struct elf *elf, struct section *sec, 135 struct section *insn_sec, unsigned long insn_off); 137 int elf_write_insn(struct elf *elf, struct section *sec, [all …]
|
| /kernel/linux/linux-6.6/tools/objtool/include/objtool/ |
| D | elf.h | 33 struct section { struct 40 struct section *base, *rsec; argument 55 struct section *sec; argument 76 struct section *sec; 103 struct section *section_data; 109 struct section *elf_create_section(struct elf *elf, const char *name, 111 struct section *elf_create_section_pair(struct elf *elf, const char *name, 117 struct reloc *elf_init_reloc_text_sym(struct elf *elf, struct section *sec, 120 struct section *insn_sec, 123 struct reloc *elf_init_reloc_data_sym(struct elf *elf, struct section *sec, [all …]
|
| /kernel/liteos_a/kernel/extended/dynload/include/ |
| D | los_ld_elf_pri.h | 53 UINT32 elfShoff; /* Section header table file offset */ 58 UINT16 elfShEntSize; /* Section header table entry size */ 59 UINT16 elfShNum; /* Section header table entry count */ 60 UINT16 elfShStrIndex; /* Section header string table index */ 70 UINT64 elfShoff; /* Section header table file offset */ 75 UINT16 elfShEntSize; /* Section header table entry size */ 76 UINT16 elfShNum; /* Section header table entry count */ 77 UINT16 elfShStrIndex; /* Section header string table index */ 211 /* Special section indexes */ 221 /* Section header */ [all …]
|
| /kernel/linux/linux-6.6/include/linux/ |
| D | seqlock.h | 32 * via seqcount_t under KCSAN: upon beginning a seq-reader critical section, 49 * entering the write section. 124 * that the write side critical section is properly serialized. 145 * until the end of its writer serialization lock critical section. 164 * that the write side critical section is properly serialized. 312 * __read_seqcount_begin() - begin a seqcount_t read section w/o barrier 318 * protected in this critical section. 337 * raw_read_seqcount_begin() - begin a seqcount_t read section w/o lockdep 351 * read_seqcount_begin() - begin a seqcount_t read critical section 366 * raw_read_seqcount opens a read critical section of the given [all …]
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | seqlock.h | 33 * via seqcount_t under KCSAN: upon beginning a seq-reader critical section, 50 * entering the write section. 125 * that the write side critical section is properly serialized. 146 * until the end of its writer serialization lock critical section. 165 * that the write side critical section is properly serialized. 316 * __read_seqcount_begin() - begin a seqcount_t read section w/o barrier 322 * protected in this critical section. 341 * raw_read_seqcount_begin() - begin a seqcount_t read section w/o lockdep 355 * read_seqcount_begin() - begin a seqcount_t read critical section 370 * raw_read_seqcount opens a read critical section of the given [all …]
|
| /kernel/linux/linux-6.6/Documentation/livepatch/ |
| D | module-elf-format.rst | 29 Since apply_relocate_add() requires access to a module's section header 30 table, symbol table, and relocation section indices, ELF information is 31 preserved for livepatch modules (see section 5). Livepatch manages its own 52 relas reference are special livepatch symbols (see section 2 and 3). The 87 relocation section(s) to the driver once it loads. 92 between a livepatch relocation section and the target section (usually the 93 text section of a function) to which the relocation(s) apply. It is 98 Since ELF information is preserved for livepatch modules (see Section 5), a 99 livepatch relocation section can be applied simply by passing in the 100 appropriate section index to apply_relocate_add(), which then uses it to [all …]
|
| /kernel/linux/linux-5.10/Documentation/arm64/ |
| D | acpi_object_usage.rst | 8 If a section number is used, it refers to a section number in the ACPI 12 outside of the UEFI Forum (see Section 5.2.6 of the specification). 30 BERT Section 18.3 (signature == "BERT") 43 BGRT Section 5.2.22 (signature == "BGRT") 50 CPEP Section 5.2.18 (signature == "CPEP") 77 DSDT Section 5.2.11.1 (signature == "DSDT") 99 ECDT Section 5.2.16 (signature == "ECDT") 108 EINJ Section 18.6 (signature == "EINJ") 118 ERST Section 18.5 (signature == "ERST") 133 FACS Section 5.2.10 (signature == "FACS") [all …]
|
| /kernel/linux/linux-6.6/Documentation/arch/arm64/ |
| D | acpi_object_usage.rst | 8 If a section number is used, it refers to a section number in the ACPI 12 outside of the UEFI Forum (see Section 5.2.6 of the specification). 51 BERT Section 18.3 (signature == "BERT") 64 BGRT Section 5.2.22 (signature == "BGRT") 78 CPEP Section 5.2.18 (signature == "CPEP") 105 DSDT Section 5.2.11.1 (signature == "DSDT") 127 ECDT Section 5.2.16 (signature == "ECDT") 136 EINJ Section 18.6 (signature == "EINJ") 146 ERST Section 18.5 (signature == "ERST") 161 FACS Section 5.2.10 (signature == "FACS") [all …]
|
| /kernel/linux/linux-5.10/drivers/edac/ |
| D | amd64_edac_inj.c | 10 return sprintf(buf, "0x%x\n", pvt->injection.section); in amd64_inject_section_show() 14 * store error injection section value which refers to one of 4 16-byte sections 33 amd64_warn("%s: invalid section 0x%lx\n", __func__, value); in amd64_inject_section_store() 37 pvt->injection.section = (u32) value; in amd64_inject_section_store() 52 * 16-byte (128-bit + ECC bits) section 125 u32 section, word_bits; in amd64_inject_read_store() local 132 /* Form value to choose 16-byte section of cacheline */ in amd64_inject_read_store() 133 section = F10_NB_ARRAY_DRAM | SET_NB_ARRAY_ADDR(pvt->injection.section); in amd64_inject_read_store() 135 amd64_write_pci_cfg(pvt->F3, F10_NB_ARRAY_ADDR, section); in amd64_inject_read_store() 142 edac_dbg(0, "section=0x%x word_bits=0x%x\n", section, word_bits); in amd64_inject_read_store() [all …]
|
| /kernel/uniproton/src/arch/cpu/armv8/common/ |
| D | os_attr_armv8_external.h | 22 #define OS_SEC_L0_TEXT __attribute__((section(".os.text"))) 26 #define OS_SEC_LX0_TEXT __attribute__((section(".os.text"))) 31 #define OS_SEC_TEXT __attribute__((section(".os.text"))) 35 #define OS_SEC_L2_TEXT __attribute__((section(".os.minor.text"))) 39 #define OS_SEC_L4_TEXT __attribute__((section(".os.init.text"))) 43 #define OS_SEC_LX_TEXT __attribute__((section(".os.init.text"))) 47 #define OS_SEC_DATA __attribute__((section(".os.data"))) 51 #define OS_SEC_L4_DATA __attribute__((section(".os.data"))) 55 #define OS_SEC_BSS __attribute__((section(".os.bss"))) 59 #define OS_SEC_L4_BSS __attribute__((section(".os.bss"))) [all …]
|
| /kernel/linux/linux-6.6/mm/ |
| D | sparse.c | 65 struct mem_section *section = NULL; in sparse_index_alloc() local 70 section = kzalloc_node(array_size, GFP_KERNEL, nid); in sparse_index_alloc() 72 section = memblock_alloc_node(array_size, SMP_CACHE_BYTES, in sparse_index_alloc() 74 if (!section) in sparse_index_alloc() 79 return section; in sparse_index_alloc() 85 struct mem_section *section; in sparse_index_init() local 88 * An existing section is possible in the sub-section hotplug in sparse_index_init() 90 * the existing section. in sparse_index_init() 97 section = sparse_index_alloc(nid); in sparse_index_init() 98 if (!section) in sparse_index_init() [all …]
|
| /kernel/linux/linux-5.10/mm/ |
| D | sparse.c | 64 struct mem_section *section = NULL; in sparse_index_alloc() local 69 section = kzalloc_node(array_size, GFP_KERNEL, nid); in sparse_index_alloc() 71 section = memblock_alloc_node(array_size, SMP_CACHE_BYTES, in sparse_index_alloc() 73 if (!section) in sparse_index_alloc() 78 return section; in sparse_index_alloc() 84 struct mem_section *section; in sparse_index_init() local 87 * An existing section is possible in the sub-section hotplug in sparse_index_init() 89 * the existing section. in sparse_index_init() 96 section = sparse_index_alloc(nid); in sparse_index_init() 97 if (!section) in sparse_index_init() [all …]
|
| /kernel/linux/linux-6.6/Documentation/locking/ |
| D | seqlock.rst | 15 read side critical section is even and the same sequence count value is 16 read again at the end of the critical section. The data in the set must 17 be copied out inside the read side critical section. If the sequence 18 count has changed between the start and the end of the critical section, 22 critical section. After starting the critical section the sequence count 24 the end of the write side critical section the sequence count becomes 27 A sequence counter write side critical section must never be preempted 48 write side section. If the read section can be invoked from hardirq or 50 disabled before entering the write section. 76 /* ... [[write-side critical section]] ... */ [all …]
|
| /kernel/linux/linux-5.10/Documentation/locking/ |
| D | seqlock.rst | 15 read side critical section is even and the same sequence count value is 16 read again at the end of the critical section. The data in the set must 17 be copied out inside the read side critical section. If the sequence 18 count has changed between the start and the end of the critical section, 22 critical section. After starting the critical section the sequence count 24 the end of the write side critical section the sequence count becomes 27 A sequence counter write side critical section must never be preempted 48 write side section. If the read section can be invoked from hardirq or 50 disabled before entering the write section. 76 /* ... [[write-side critical section]] ... */ [all …]
|
| /kernel/linux/linux-6.6/arch/m68k/ifpsp060/ |
| D | TEST.DOC | 60 | | - 128 byte-sized section 68 | | - code section 74 The first section of this module is the "Call-out" section. This section 75 is NOT INCLUDED in {i,f}test.sa (an example "Call-out" section is provided at 76 the end of this file). The purpose of this section is to allow the test 78 by the host operating system. This section MUST be exactly 128 bytes in 83 the starting address of the "call-out" section. The "Call-out" section must 87 The second section, the "Entry-point" section, is used by external routines 89 no symbol names, this section contains function entry points that are fixed 91 are listed in section "68060{ISP,FPSP}-TEST entry points" below. A calling [all …]
|
| /kernel/linux/linux-5.10/arch/m68k/ifpsp060/ |
| D | TEST.DOC | 60 | | - 128 byte-sized section 68 | | - code section 74 The first section of this module is the "Call-out" section. This section 75 is NOT INCLUDED in {i,f}test.sa (an example "Call-out" section is provided at 76 the end of this file). The purpose of this section is to allow the test 78 by the host operating system. This section MUST be exactly 128 bytes in 83 the starting address of the "call-out" section. The "Call-out" section must 87 The second section, the "Entry-point" section, is used by external routines 89 no symbol names, this section contains function entry points that are fixed 91 are listed in section "68060{ISP,FPSP}-TEST entry points" below. A calling [all …]
|
| /kernel/linux/linux-5.10/tools/perf/util/ |
| D | config.c | 537 struct perf_config_section *section; in find_section() local 539 list_for_each_entry(section, sections, node) in find_section() 540 if (!strcmp(section->name, section_name)) in find_section() 541 return section; in find_section() 547 struct perf_config_section *section) in find_config_item() argument 551 list_for_each_entry(item, §ion->items, node) in find_config_item() 561 struct perf_config_section *section = zalloc(sizeof(*section)); in add_section() local 563 if (!section) in add_section() 566 INIT_LIST_HEAD(§ion->items); in add_section() 567 section->name = strdup(section_name); in add_section() [all …]
|