| /kernel/linux/linux-6.6/scripts/ |
| D | check_extable.sh | 2 # SPDX-License-Identifier: GPL-2.0 7 file ${obj} | grep -q ELF || (echo "${obj} is not an ELF file." 1>&2 ; exit 0) 9 # Bail out early if there isn't an __ex_table section in this object file. 10 objdump -hj __ex_table ${obj} 2> /dev/null > /dev/null 11 [ $? -ne 0 ] && exit 0 15 suspicious_relocs=$(objdump -rj __ex_table ${obj} | tail -n +6 | 16 grep -v $(eval echo -e{${white_list}}) | awk '{print $3}') 19 [ -z "${suspicious_relocs}" ] && exit 0 24 # white listed. If you're adding a new section in the Linux kernel, and 25 # you're expecting this section to contain code which can fault (i.e. the [all …]
|
| /kernel/linux/linux-5.10/scripts/ |
| D | check_extable.sh | 2 # SPDX-License-Identifier: GPL-2.0 7 file ${obj} | grep -q ELF || (echo "${obj} is not and ELF file." 1>&2 ; exit 0) 9 # Bail out early if there isn't an __ex_table section in this object file. 10 objdump -hj __ex_table ${obj} 2> /dev/null > /dev/null 11 [ $? -ne 0 ] && exit 0 15 suspicious_relocs=$(objdump -rj __ex_table ${obj} | tail -n +6 | 16 grep -v $(eval echo -e{${white_list}}) | awk '{print $3}') 19 [ -z "${suspicious_relocs}" ] && exit 0 24 # white listed. If you're adding a new section in the Linux kernel, and 25 # you're expecting this section to contain code which can fault (i.e. the [all …]
|
| /kernel/linux/linux-6.6/arch/powerpc/include/asm/ |
| D | head-64.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 9 * We can't do CPP stringification and concatination directly into the section 13 .section ".head.text.\name\()","ax",@progbits 16 .section ".head.data.\name\()","a",@progbits 19 .section ".head.text.\name\()","ax",@progbits 24 * fixed section entries into them before closing them. Multiple fixed sections 27 * Each fixed section created in a .S file must have corresponding linkage 30 * For each fixed section, code is generated into it in the order which it 31 * appears in the source. Fixed section entries can be placed at a fixed 32 * location within the section using _LOCATION postifx variants. These must [all …]
|
| /kernel/linux/linux-5.10/arch/powerpc/include/asm/ |
| D | head-64.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 9 * We can't do CPP stringification and concatination directly into the section 13 .section ".head.text.\name\()","ax",@progbits 16 .section ".head.data.\name\()","a",@progbits 19 .section ".head.text.\name\()" 24 * fixed section entries into them before closing them. Multiple fixed sections 27 * Each fixed section created in a .S file must have corresponding linkage 30 * For each fixed section, code is generated into it in the order which it 31 * appears in the source. Fixed section entries can be placed at a fixed 32 * location within the section using _LOCATION postifx variants. These must [all …]
|
| /kernel/linux/linux-5.10/drivers/usb/chipidea/ |
| D | otg_fsm.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 11 #include <linux/usb/otg-fsm.h> 14 * A-DEVICE timing constants 18 #define TA_WAIT_VRISE (100) /* a_wait_vrise: section 7.1.2 19 * a_wait_vrise_tmr: section 7.4.5.1 20 * TA_VBUS_RISE <= 100ms, section 4.4 21 * Table 4-1: Electrical Characteristics 22 * ->DC Electrical Timing 25 #define TA_WAIT_VFALL (1000) /* a_wait_vfall: section 7.1.7 26 * a_wait_vfall_tmr: section: 7.4.5.2 [all …]
|
| /kernel/linux/linux-6.6/drivers/usb/chipidea/ |
| D | otg_fsm.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 11 #include <linux/usb/otg-fsm.h> 14 * A-DEVICE timing constants 18 #define TA_WAIT_VRISE (100) /* a_wait_vrise: section 7.1.2 19 * a_wait_vrise_tmr: section 7.4.5.1 20 * TA_VBUS_RISE <= 100ms, section 4.4 21 * Table 4-1: Electrical Characteristics 22 * ->DC Electrical Timing 25 #define TA_WAIT_VFALL (1000) /* a_wait_vfall: section 7.1.7 26 * a_wait_vfall_tmr: section: 7.4.5.2 [all …]
|
| /kernel/liteos_m/components/backtrace/ |
| D | los_backtrace.h | 2 * Copyright (c) 2013-2019 Huawei Technologies Co., Ltd. All rights reserved. 3 * Copyright (c) 2020-2021 Huawei Device Co., Ltd. All rights reserved. 48 /* The default name of the code section and CSTACK section are given below, 51 /* The default code section name is .text */ 53 /* The default C stack section name is CSTACK */ 55 #pragma section = CODE_SECTION_NAME 56 #pragma section = CSTACK_SECTION_NAME 58 /* Default only one code section. In fact, there may be more than one. 66 /* The default code section name is ER_IROM1 */ 68 /* The default C stack section name is STACK */ [all …]
|
| /kernel/linux/linux-5.10/Documentation/livepatch/ |
| D | module-elf-format.rst | 13 3.1 Livepatch relocation section format 17 5. Symbol table and Elf section access 22 Formerly, livepatch required separate architecture-specific code to write 23 relocations. However, arch-specific code to write relocations already 25 code. So, instead of duplicating code and re-implementing what the module 27 loader to perform the all the arch-specific relocation work. Specifically, 32 of arch-specific code required to port livepatch to a particular 35 Since apply_relocate_add() requires access to a module's section header 36 table, symbol table, and relocation section indices, Elf information is 37 preserved for livepatch modules (see section 5). Livepatch manages its own [all …]
|
| /kernel/linux/linux-5.10/tools/objtool/ |
| D | elf.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 28 struct section { struct 36 struct section *base, *reloc; argument 51 struct section *sec; argument 74 struct section *sec; 101 #define OFFSET_STRIDE_MASK (~(OFFSET_STRIDE - 1)) 109 static inline u32 sec_offset_hash(struct section *sec, unsigned long offset) in sec_offset_hash() 111 u32 ol, oh, idx = sec->idx; in sec_offset_hash() 125 return sec_offset_hash(reloc->sec, reloc->offset); in reloc_hash() 129 struct section *elf_create_section(struct elf *elf, const char *name, unsigned int sh_flags, size_t… [all …]
|
| /kernel/linux/linux-6.6/tools/objtool/include/objtool/ |
| D | elf.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 33 struct section { struct 40 struct section *base, *rsec; argument 55 struct section *sec; argument 76 struct section *sec; 103 struct section *section_data; 109 struct section *elf_create_section(struct elf *elf, const char *name, 111 struct section *elf_create_section_pair(struct elf *elf, const char *name, 117 struct reloc *elf_init_reloc_text_sym(struct elf *elf, struct section *sec, 120 struct section *insn_sec, [all …]
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | seqlock.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 6 * seqcount_t / seqlock_t - a reader-writer consistency mechanism with 7 * lockless readers (read-only retry loops), and no writer starvation. 12 * - Based on x86_64 vsyscall gettimeofday: Keith Owens, Andrea Arcangeli 13 * - Sequence counters with associated locks, (C) 2020 Linutronix GmbH 17 #include <linux/kcsan-checks.h> 32 * As a consequence, we take the following best-effort approach for raw usage 33 * via seqcount_t under KCSAN: upon beginning a seq-reader critical section, 46 * Write side critical sections must be serialized and non-preemptible. 50 * entering the write section. [all …]
|
| /kernel/linux/linux-6.6/Documentation/livepatch/ |
| D | module-elf-format.rst | 16 Formerly, livepatch required separate architecture-specific code to write 17 relocations. However, arch-specific code to write relocations already 19 code. So, instead of duplicating code and re-implementing what the module 21 loader to perform the all the arch-specific relocation work. Specifically, 26 of arch-specific code required to port livepatch to a particular 29 Since apply_relocate_add() requires access to a module's section header 30 table, symbol table, and relocation section indices, ELF information is 31 preserved for livepatch modules (see section 5). Livepatch manages its own 34 selected from OS-specific ranges according to the definitions from glibc. 37 ----------------------------------------------------- [all …]
|
| /kernel/linux/linux-5.10/Documentation/arm64/ |
| D | acpi_object_usage.rst | 8 If a section number is used, it refers to a section number in the ACPI 12 outside of the UEFI Forum (see Section 5.2.6 of the specification). 16 - Required: DSDT, FADT, GTDT, MADT, MCFG, RSDP, SPCR, XSDT 18 - Recommended: BERT, EINJ, ERST, HEST, PCCT, SSDT 20 - Optional: BGRT, CPEP, CSRT, DBG2, DRTM, ECDT, FACS, FPDT, IORT, 24 - Not supported: BOOT, DBGP, DMAR, ETDT, HPET, IBFT, IVRS, LPIT, 30 BERT Section 18.3 (signature == "BERT") 43 BGRT Section 5.2.22 (signature == "BGRT") 47 Optional, not currently supported, with no real use-case for an 50 CPEP Section 5.2.18 (signature == "CPEP") [all …]
|
| /kernel/liteos_a/kernel/extended/dynload/include/ |
| D | los_ld_elf_pri.h | 2 * Copyright (c) 2013-2019 Huawei Technologies Co., Ltd. All rights reserved. 3 * Copyright (c) 2020-2021 Huawei Device Co., Ltd. All rights reserved. 53 UINT32 elfShoff; /* Section header table file offset */ 54 UINT32 elfFlags; /* Processor-specific flags */ 58 UINT16 elfShEntSize; /* Section header table entry size */ 59 UINT16 elfShNum; /* Section header table entry count */ 60 UINT16 elfShStrIndex; /* Section header string table index */ 70 UINT64 elfShoff; /* Section header table file offset */ 71 UINT32 elfFlags; /* Processor-specific flags */ 75 UINT16 elfShEntSize; /* Section header table entry size */ [all …]
|
| /kernel/linux/linux-6.6/include/linux/ |
| D | seqlock.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 6 * seqcount_t / seqlock_t - a reader-writer consistency mechanism with 7 * lockless readers (read-only retry loops), and no writer starvation. 12 * - Based on x86_64 vsyscall gettimeofday: Keith Owens, Andrea Arcangeli 13 * - Sequence counters with associated locks, (C) 2020 Linutronix GmbH 17 #include <linux/kcsan-checks.h> 31 * As a consequence, we take the following best-effort approach for raw usage 32 * via seqcount_t under KCSAN: upon beginning a seq-reader critical section, 45 * Write side critical sections must be serialized and non-preemptible. 49 * entering the write section. [all …]
|
| /kernel/linux/linux-6.6/Documentation/arch/arm64/ |
| D | acpi_object_usage.rst | 8 If a section number is used, it refers to a section number in the ACPI 12 outside of the UEFI Forum (see Section 5.2.6 of the specification). 16 - Required: DSDT, FADT, GTDT, MADT, MCFG, RSDP, SPCR, XSDT 18 - Recommended: BERT, EINJ, ERST, HEST, PCCT, SSDT 20 - Optional: AGDI, BGRT, CEDT, CPEP, CSRT, DBG2, DRTM, ECDT, FACS, FPDT, 24 - Not supported: AEST, APMT, BOOT, DBGP, DMAR, ETDT, HPET, IVRS, LPIT, 41 This table describes a non-maskable event, that is used by the platform 51 BERT Section 18.3 (signature == "BERT") 64 BGRT Section 5.2.22 (signature == "BGRT") 68 Optional, not currently supported, with no real use-case for an [all …]
|
| /kernel/linux/linux-5.10/drivers/edac/ |
| D | amd64_edac_inj.c | 1 // SPDX-License-Identifier: GPL-2.0 9 struct amd64_pvt *pvt = mci->pvt_info; in amd64_inject_section_show() 10 return sprintf(buf, "0x%x\n", pvt->injection.section); in amd64_inject_section_show() 14 * store error injection section value which refers to one of 4 16-byte sections 15 * within a 64-byte cacheline 24 struct amd64_pvt *pvt = mci->pvt_info; in amd64_inject_section_store() 33 amd64_warn("%s: invalid section 0x%lx\n", __func__, value); in amd64_inject_section_store() 34 return -EINVAL; in amd64_inject_section_store() 37 pvt->injection.section = (u32) value; in amd64_inject_section_store() 46 struct amd64_pvt *pvt = mci->pvt_info; in amd64_inject_word_show() [all …]
|
| /kernel/linux/linux-5.10/mm/ |
| D | sparse.c | 1 // SPDX-License-Identifier: GPL-2.0 23 * 1) mem_section - memory sections, mem_map's for valid memory 64 struct mem_section *section = NULL; in sparse_index_alloc() local 69 section = kzalloc_node(array_size, GFP_KERNEL, nid); in sparse_index_alloc() 71 section = memblock_alloc_node(array_size, SMP_CACHE_BYTES, in sparse_index_alloc() 73 if (!section) in sparse_index_alloc() 78 return section; in sparse_index_alloc() 84 struct mem_section *section; in sparse_index_init() local 87 * An existing section is possible in the sub-section hotplug in sparse_index_init() 88 * case. First hot-add instantiates, follow-on hot-add reuses in sparse_index_init() [all …]
|
| /kernel/linux/linux-6.6/mm/ |
| D | sparse.c | 1 // SPDX-License-Identifier: GPL-2.0 24 * 1) mem_section - memory sections, mem_map's for valid memory 65 struct mem_section *section = NULL; in sparse_index_alloc() local 70 section = kzalloc_node(array_size, GFP_KERNEL, nid); in sparse_index_alloc() 72 section = memblock_alloc_node(array_size, SMP_CACHE_BYTES, in sparse_index_alloc() 74 if (!section) in sparse_index_alloc() 79 return section; in sparse_index_alloc() 85 struct mem_section *section; in sparse_index_init() local 88 * An existing section is possible in the sub-section hotplug in sparse_index_init() 89 * case. First hot-add instantiates, follow-on hot-add reuses in sparse_index_init() [all …]
|
| /kernel/linux/linux-6.6/Documentation/locking/ |
| D | seqlock.rst | 8 Sequence counters are a reader-writer consistency mechanism with 9 lockless readers (read-only retry loops), and no writer starvation. They 15 read side critical section is even and the same sequence count value is 16 read again at the end of the critical section. The data in the set must 17 be copied out inside the read side critical section. If the sequence 18 count has changed between the start and the end of the critical section, 22 critical section. After starting the critical section the sequence count 24 the end of the write side critical section the sequence count becomes 27 A sequence counter write side critical section must never be preempted 30 interrupted writer. If that reader belongs to a real-time scheduling [all …]
|
| /kernel/linux/linux-5.10/Documentation/locking/ |
| D | seqlock.rst | 8 Sequence counters are a reader-writer consistency mechanism with 9 lockless readers (read-only retry loops), and no writer starvation. They 15 read side critical section is even and the same sequence count value is 16 read again at the end of the critical section. The data in the set must 17 be copied out inside the read side critical section. If the sequence 18 count has changed between the start and the end of the critical section, 22 critical section. After starting the critical section the sequence count 24 the end of the write side critical section the sequence count becomes 27 A sequence counter write side critical section must never be preempted 30 interrupted writer. If that reader belongs to a real-time scheduling [all …]
|
| /kernel/linux/linux-6.6/arch/m68k/ifpsp060/ |
| D | TEST.DOC | 3 M68000 Hi-Performance Microprocessor Division 5 Production Release P1.00 -- October 10, 1994 30 ----------------------------------------------------- 36 -------------------- 56 ----------------------- 59 ----------------- 60 | | - 128 byte-sized section 61 (1) | Call-Out | - 4 bytes per entry (user fills these in) 63 ----------------- 64 | | - 8 bytes per entry [all …]
|
| /kernel/linux/linux-5.10/arch/m68k/ifpsp060/ |
| D | TEST.DOC | 3 M68000 Hi-Performance Microprocessor Division 5 Production Release P1.00 -- October 10, 1994 30 ----------------------------------------------------- 36 -------------------- 56 ----------------------- 59 ----------------- 60 | | - 128 byte-sized section 61 (1) | Call-Out | - 4 bytes per entry (user fills these in) 63 ----------------- 64 | | - 8 bytes per entry [all …]
|
| /kernel/linux/linux-5.10/tools/perf/util/ |
| D | config.c | 1 // SPDX-License-Identifier: GPL-2.0 16 #include <subcmd/exec-cmd.h> 19 #include "util/llvm-utils.h" /* perf_llvm_config */ 21 #include "build-id.h" 82 if (len >= sizeof(value) - 1) in parse_value() 132 quote = 1-quote; in parse_value() 141 return isalnum(c) || c == '-' || c == '_'; in iskeychar() 158 return -1; in get_value() 167 return -1; in get_value() 170 return -1; in get_value() [all …]
|
| /kernel/linux/linux-5.10/arch/ia64/include/asm/ |
| D | asmmacro.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 6 * Copyright (C) 2000-2001, 2003-2004 Hewlett-Packard Co 7 * David Mosberger-Tang <davidm@hpl.hp.com> 42 * When adding any new .section/.previous entries here, make sure to 43 * also add it to the DISCARD section in arch/ia64/kernel/gate.lds.S or 47 .section "__ex_table", "a" // declare section & section attributes 51 .xdata4 "__ex_table", 99f-., y-.; \ 54 .xdata4 "__ex_table", 99f-., y-.+4; \ 61 .section "__mca_table", "a" // declare section & section attributes 65 .xdata4 "__mca_table", y-., 99f-.; \ [all …]
|