Searched refs:section (Results 1 – 9 of 9) sorted by relevance
/scripts/ |
D | check_extable.sh | 55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | … 62 find_alt_replacement_target ${section} ${section_offset} 72 objdump -hwj ${section} ${obj} | grep -q CODE 78 if is_executable_section ${section}; then 83 echo "Warning: found a reference to section \"${section}\" in __ex_table:" 84 addr2line -fip -j ${section} -e ${obj} ${section_offset} | awk '{print "\t" $0}' 89 …echo "Error: found a reference to non-executable section \"${section}\" in __ex_table at offset ${… 96 case "${section}" in 98 handle_alt_replacement_reloc ${section} ${section_offset} 101 handle_suspicious_generic_reloc ${section} ${section_offset} [all …]
|
D | kernel-doc | 389 my $section = $section_default; 576 my ($parameter, $section); 617 foreach $section (@{$args{'sectionlist'}}) { 618 print ".SH \"", uc $section, "\"\n"; 619 output_highlight($args{'sections'}{$section}); 627 my ($parameter, $section); 658 foreach $section (@{$args{'sectionlist'}}) { 659 print ".SH \"$section\"\n"; 660 output_highlight($args{'sections'}{$section}); 668 my ($parameter, $section); [all …]
|
D | generate_initcall_order.pl | 231 my $section; 234 $section = '.con_initcall.init'; 236 $section = '.security_initcall.init'; 238 $section = ".initcall${level}.init"; 241 print "\t${section} : {\n"; 244 print "\t\t*(${section}..${fsname}) ;\n"
|
D | module-lto.lds | 10 * -fno-asynchronous-unwind-tables. Discard the section. 33 * .text section, and that the section is aligned to 4k.
|
D | gcc-ld | 19 -rpath-link|--sort-section|--section-start|-Tbss|-Tdata|-Ttext|\
|
D | faddr2line | 132 sec_size=$(${READELF} --section-headers --wide $objfile | 143 sec_name=$(${READELF} --section-headers --wide $objfile |
|
D | link-vmlinux.sh | 194 ${OBJCOPY} --only-section=.BTF --set-section-flags .BTF=alloc,readonly \
|
/scripts/gcc-plugins/ |
D | stackleak_plugin.c | 284 tree section; in stackleak_gate() local 286 section = lookup_attribute("section", in stackleak_gate() 288 if (section && TREE_VALUE(section)) { in stackleak_gate() 289 section = TREE_VALUE(TREE_VALUE(section)); in stackleak_gate() 291 if (STRING_EQUAL(section, ".init.text")) in stackleak_gate() 293 if (STRING_EQUAL(section, ".devinit.text")) in stackleak_gate() 295 if (STRING_EQUAL(section, ".cpuinit.text")) in stackleak_gate() 297 if (STRING_EQUAL(section, ".meminit.text")) in stackleak_gate()
|
/scripts/mod/ |
D | modpost.c | 1776 int section = sechdr->sh_info; in reloc_location() local 1778 return (void *)elf->hdr + sechdrs[section].sh_offset + in reloc_location()
|