Home
last modified time | relevance | path

Searched refs:section (Results 1 – 9 of 9) sorted by relevance

/scripts/
Dcheck_extable.sh55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | …
62 find_alt_replacement_target ${section} ${section_offset}
72 objdump -hwj ${section} ${obj} | grep -q CODE
78 if is_executable_section ${section}; then
83 echo "Warning: found a reference to section \"${section}\" in __ex_table:"
84 addr2line -fip -j ${section} -e ${obj} ${section_offset} | awk '{print "\t" $0}'
89 …echo "Error: found a reference to non-executable section \"${section}\" in __ex_table at offset ${…
96 case "${section}" in
98 handle_alt_replacement_reloc ${section} ${section_offset}
101 handle_suspicious_generic_reloc ${section} ${section_offset}
[all …]
Dkernel-doc427 my $section = $section_default;
677 my ($parameter, $section);
718 foreach $section (@{$args{'sectionlist'}}) {
719 print ".SH \"", uc $section, "\"\n";
720 output_highlight($args{'sections'}{$section});
728 my ($parameter, $section);
759 foreach $section (@{$args{'sectionlist'}}) {
760 print ".SH \"$section\"\n";
761 output_highlight($args{'sections'}{$section});
769 my ($parameter, $section);
[all …]
Dgenerate_initcall_order.pl250 my $section;
253 $section = '.con_initcall.init';
255 $section = ".initcall${level}.init";
258 print "\t${section} : {\n";
261 print "\t\t*(${section}..${secname}) ;\n";
Dgcc-ld19 -rpath-link|--sort-section|--section-start|-Tbss|-Tdata|-Ttext|\
Dfaddr2line132 sec_size=$(${READELF} --section-headers --wide $objfile |
143 sec_name=$(${READELF} --section-headers --wide $objfile |
Dlink-vmlinux.sh236 ${OBJCOPY} --only-section=.BTF --set-section-flags .BTF=alloc,readonly \
Dspelling.txt1302 secion||section
/scripts/gcc-plugins/
Dstackleak_plugin.c451 tree section; in stackleak_gate() local
453 section = lookup_attribute("section", in stackleak_gate()
455 if (section && TREE_VALUE(section)) { in stackleak_gate()
456 section = TREE_VALUE(TREE_VALUE(section)); in stackleak_gate()
458 if (STRING_EQUAL(section, ".init.text")) in stackleak_gate()
460 if (STRING_EQUAL(section, ".devinit.text")) in stackleak_gate()
462 if (STRING_EQUAL(section, ".cpuinit.text")) in stackleak_gate()
464 if (STRING_EQUAL(section, ".meminit.text")) in stackleak_gate()
/scripts/coccinelle/misc/
Duninitialized_var.cocci17 /// uninitialized_var") removed this section because all initializations of