Home
last modified time | relevance | path

Searched refs:section (Results 1 – 15 of 15) sorted by relevance

/scripts/
Dcheck_extable.sh55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | …
62 find_alt_replacement_target ${section} ${section_offset}
72 objdump -hwj ${section} ${obj} | grep -q CODE
78 if is_executable_section ${section}; then
83 echo "Warning: found a reference to section \"${section}\" in __ex_table:"
84 addr2line -fip -j ${section} -e ${obj} ${section_offset} | awk '{print "\t" $0}'
89 …echo "Error: found a reference to non-executable section \"${section}\" in __ex_table at offset ${…
96 case "${section}" in
98 handle_alt_replacement_reloc ${section} ${section_offset}
101 handle_suspicious_generic_reloc ${section} ${section_offset}
[all …]
Dkernel-doc289 my $section = $section_default;
570 my ($parameter, $section);
616 foreach $section (@{$args{'sectionlist'}}) {
617 print ".SH \"", uc $section, "\"\n";
618 output_highlight($args{'sections'}{$section});
626 my ($parameter, $section);
656 foreach $section (@{$args{'sectionlist'}}) {
657 print ".SH \"$section\"\n";
658 output_highlight($args{'sections'}{$section});
666 my ($parameter, $section);
[all …]
Dgenerate_initcall_order.pl250 my $section;
253 $section = '.con_initcall.init';
255 $section = ".initcall${level}.init";
258 print "\t${section} : {\n";
261 print "\t\t*(${section}..${secname}) ;\n";
Dhead-object-list.txt7 # A counter approach is to control the section placement by the linker script.
8 # The code marked as __HEAD goes into the ".head.text" section, which is placed
9 # before the normal ".text" section.
Dlink-vmlinux.sh126 ${OBJCOPY} --only-section=.BTF --set-section-flags .BTF=alloc,readonly \
DMakefile.dtbs37 builtin-dtb-section = $(if $(filter arch/$(SRCARCH)/boot/dts%, $(obj)),.dtb.init.rodata,.rodata)
Dfaddr2line110 local out=$(${READELF} --file-header --section-headers --symbols --wide $objfile)
Dspelling.txt1389 secion||section
/scripts/gcc-plugins/
Dstackleak_plugin.c451 tree section; in stackleak_gate() local
453 section = lookup_attribute("section", in stackleak_gate()
455 if (section && TREE_VALUE(section)) { in stackleak_gate()
456 section = TREE_VALUE(TREE_VALUE(section)); in stackleak_gate()
458 if (STRING_EQUAL(section, ".init.text")) in stackleak_gate()
460 if (STRING_EQUAL(section, ".devinit.text")) in stackleak_gate()
462 if (STRING_EQUAL(section, ".cpuinit.text")) in stackleak_gate()
464 if (STRING_EQUAL(section, ".meminit.text")) in stackleak_gate()
466 if (STRING_EQUAL(section, ".noinstr.text")) in stackleak_gate()
468 if (STRING_EQUAL(section, ".entry.text")) in stackleak_gate()
[all …]
/scripts/gendwarfksyms/
Dsymbols.c17 return hash_32(addr->section ^ addr_hash(addr->address)); in symbol_addr_hash()
32 if (match->addr.section == sym->addr.section && in __for_each_addr()
76 if (match->addr.section != SHN_UNDEF) in for_each()
151 sym->addr.section = SHN_UNDEF; in symbol_read_exports()
288 if (sym->addr.section == SHN_UNDEF) { in set_symbol_addr()
293 debug("%s -> { %u, %lx }", sym->name, sym->addr.section, in set_symbol_addr()
295 } else if (sym->addr.section != addr->section || in set_symbol_addr()
304 struct symbol_addr addr = { .section = xndx, .address = sym->st_value }; in elf_set_symbol_addr()
307 if (addr.section != SHN_UNDEF) in elf_set_symbol_addr()
Dgendwarfksyms.h108 uint32_t section; member
/scripts/gendwarfksyms/examples/
Dsymbolptr.c17 #define __section(section) __attribute__((__section__(section))) argument
Dkabi.h29 #define __section(section) __attribute__((__section__(section))) argument
/scripts/gdb/linux/
Dpage_owner.py81 section = self.p_ops.pfn_to_section(pfn)
82 page_ext = section["page_ext"]
/scripts/coccinelle/misc/
Duninitialized_var.cocci17 /// uninitialized_var") removed this section because all initializations of