Searched refs:section (Results 1 – 15 of 15) sorted by relevance
| /scripts/ |
| D | check_extable.sh | 55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | … 62 find_alt_replacement_target ${section} ${section_offset} 72 objdump -hwj ${section} ${obj} | grep -q CODE 78 if is_executable_section ${section}; then 83 echo "Warning: found a reference to section \"${section}\" in __ex_table:" 84 addr2line -fip -j ${section} -e ${obj} ${section_offset} | awk '{print "\t" $0}' 89 …echo "Error: found a reference to non-executable section \"${section}\" in __ex_table at offset ${… 96 case "${section}" in 98 handle_alt_replacement_reloc ${section} ${section_offset} 101 handle_suspicious_generic_reloc ${section} ${section_offset} [all …]
|
| D | kernel-doc | 289 my $section = $section_default; 570 my ($parameter, $section); 616 foreach $section (@{$args{'sectionlist'}}) { 617 print ".SH \"", uc $section, "\"\n"; 618 output_highlight($args{'sections'}{$section}); 626 my ($parameter, $section); 656 foreach $section (@{$args{'sectionlist'}}) { 657 print ".SH \"$section\"\n"; 658 output_highlight($args{'sections'}{$section}); 666 my ($parameter, $section); [all …]
|
| D | generate_initcall_order.pl | 250 my $section; 253 $section = '.con_initcall.init'; 255 $section = ".initcall${level}.init"; 258 print "\t${section} : {\n"; 261 print "\t\t*(${section}..${secname}) ;\n";
|
| D | head-object-list.txt | 7 # A counter approach is to control the section placement by the linker script. 8 # The code marked as __HEAD goes into the ".head.text" section, which is placed 9 # before the normal ".text" section.
|
| D | link-vmlinux.sh | 126 ${OBJCOPY} --only-section=.BTF --set-section-flags .BTF=alloc,readonly \
|
| D | Makefile.dtbs | 37 builtin-dtb-section = $(if $(filter arch/$(SRCARCH)/boot/dts%, $(obj)),.dtb.init.rodata,.rodata)
|
| D | faddr2line | 110 local out=$(${READELF} --file-header --section-headers --symbols --wide $objfile)
|
| D | spelling.txt | 1389 secion||section
|
| /scripts/gcc-plugins/ |
| D | stackleak_plugin.c | 451 tree section; in stackleak_gate() local 453 section = lookup_attribute("section", in stackleak_gate() 455 if (section && TREE_VALUE(section)) { in stackleak_gate() 456 section = TREE_VALUE(TREE_VALUE(section)); in stackleak_gate() 458 if (STRING_EQUAL(section, ".init.text")) in stackleak_gate() 460 if (STRING_EQUAL(section, ".devinit.text")) in stackleak_gate() 462 if (STRING_EQUAL(section, ".cpuinit.text")) in stackleak_gate() 464 if (STRING_EQUAL(section, ".meminit.text")) in stackleak_gate() 466 if (STRING_EQUAL(section, ".noinstr.text")) in stackleak_gate() 468 if (STRING_EQUAL(section, ".entry.text")) in stackleak_gate() [all …]
|
| /scripts/gendwarfksyms/ |
| D | symbols.c | 17 return hash_32(addr->section ^ addr_hash(addr->address)); in symbol_addr_hash() 32 if (match->addr.section == sym->addr.section && in __for_each_addr() 76 if (match->addr.section != SHN_UNDEF) in for_each() 151 sym->addr.section = SHN_UNDEF; in symbol_read_exports() 288 if (sym->addr.section == SHN_UNDEF) { in set_symbol_addr() 293 debug("%s -> { %u, %lx }", sym->name, sym->addr.section, in set_symbol_addr() 295 } else if (sym->addr.section != addr->section || in set_symbol_addr() 304 struct symbol_addr addr = { .section = xndx, .address = sym->st_value }; in elf_set_symbol_addr() 307 if (addr.section != SHN_UNDEF) in elf_set_symbol_addr()
|
| D | gendwarfksyms.h | 108 uint32_t section; member
|
| /scripts/gendwarfksyms/examples/ |
| D | symbolptr.c | 17 #define __section(section) __attribute__((__section__(section))) argument
|
| D | kabi.h | 29 #define __section(section) __attribute__((__section__(section))) argument
|
| /scripts/gdb/linux/ |
| D | page_owner.py | 81 section = self.p_ops.pfn_to_section(pfn) 82 page_ext = section["page_ext"]
|
| /scripts/coccinelle/misc/ |
| D | uninitialized_var.cocci | 17 /// uninitialized_var") removed this section because all initializations of
|