Home
last modified time | relevance | path

Searched refs:section (Results 1 – 25 of 993) sorted by relevance

12345678910>>...40

/linux/tools/objtool/include/objtool/
H A Delf.h42 struct section {
49 struct section *base, *rsec;
57 struct section *twin;
67 struct section *sec;
94 struct section *group_sec;
101 struct section *sec;
129 struct section *section_data;
136 struct section *elf_create_section(struct elf *elf, const char *name,
140 struct section *elf_create_section_pair(struct elf *elf, const char *name,
144 struct section *elf_create_rela_sectio
33 struct section { global() struct
40 rsecsection global() argument
55 relocssection global() argument
[all...]
H A Dorc.h9 int write_orc_entry(struct elf *elf, struct section *orc_sec,
10 struct section *ip_sec, unsigned int idx,
11 struct section *insn_sec, unsigned long insn_off,
/linux/scripts/
H A Dcheck_extable.sh55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | …
62 find_alt_replacement_target ${section} ${section_offset}
72 objdump -hwj ${section} ${obj} | grep -q CODE
78 if is_executable_section ${section}; then
83 echo "Warning: found a reference to section \"${section}\" in __ex_table:"
84 addr2line -fip -j ${section} -e ${obj} ${section_offset} | awk '{print "\t" $0}'
89 …echo "Error: found a reference to non-executable section \"${section}\" in __ex_table at offset ${…
96 case "${section}" in
98 handle_alt_replacement_reloc ${section} ${section_offset}
101 handle_suspicious_generic_reloc ${section} ${section_offset}
[all …]
H A DMakefile.vmlinux24 echo '.section .dtb.init.rodata,"a"'; \
84 remove-section-y := .modinfo
85 remove-section-$(CONFIG_ARCH_VMLINUX_NEEDS_RELOCS) += '.rel*' '!.rel*.dyn'
88 remove-section-$(CONFIG_ARCH_VMLINUX_NEEDS_RELOCS) += '.rel.*'
95 cmd_strip_relocs = $(OBJCOPY) $(patsubst %,--set-section-flags %=noload,$(remove-section-y)) $< $@; \
96 $(OBJCOPY) $(addprefix --remove-section=,$(remove-section-y)) $(remove-symbols) $@
H A Dgenerate_initcall_order.pl250 my $section;
253 $section = '.con_initcall.init';
255 $section = ".initcall${level}.init";
258 print "\t${section} : {\n";
261 print "\t\t*(${section}..${secname}) ;\n";
/linux/tools/perf/util/
H A Dconfig.c625 struct perf_config_section *section; in find_section() local
627 list_for_each_entry(section, sections, node) in find_section()
628 if (!strcmp(section->name, section_name)) in find_section()
629 return section; in find_section()
635 struct perf_config_section *section) in find_config_item() argument
639 list_for_each_entry(item, &section->items, node) in find_config_item()
649 struct perf_config_section *section = zalloc(sizeof(*section)); in add_section() local
651 if (!section) in add_section()
654 INIT_LIST_HEAD(&section->items); in add_section()
655 section->name = strdup(section_name); in add_section()
[all …]
H A Dlibbfd.c122 static void find_address_in_section(bfd *abfd, asection *section, void *data) in find_address_in_section() argument
133 flags = bfd_get_section_flags(abfd, section); in find_address_in_section()
135 flags = bfd_section_flags(section); in find_address_in_section()
142 vma = bfd_get_section_vma(abfd, section); in find_address_in_section()
144 vma = bfd_section_vma(section); in find_address_in_section()
147 size = bfd_get_section_size(section); in find_address_in_section()
149 size = bfd_section_size(section); in find_address_in_section()
155 a2l->found = bfd_find_nearest_line(abfd, section, a2l->syms, pc - vma, in find_address_in_section()
319 asection *section; in dso__load_bfd_symbols() local
356 section = bfd_get_section_by_name(abfd, ".text"); in dso__load_bfd_symbols()
[all …]
/linux/Documentation/firmware-guide/acpi/apei/
H A Doutput_format.rst13 section: <integer>, severity: <integer>, <severity string>
15 <section flags strings>
18 section_type: <section type string>
19 <section data>
23 <section flags strings># :=
27 <section type string> := generic processor error | memory error | \
30 <section data> :=
31 <generic processor section data> | <memory section data> | \
32 <pcie section data> | <null>
34 <generic processor section data> :=
[all …]
/linux/drivers/mtd/nand/raw/
H A Dsm_common.c12 static int oob_sm_ooblayout_ecc(struct mtd_info *mtd, int section, in oob_sm_ooblayout_ecc() argument
15 if (section > 1) in oob_sm_ooblayout_ecc()
19 oobregion->offset = ((section + 1) * 8) - 3; in oob_sm_ooblayout_ecc()
24 static int oob_sm_ooblayout_free(struct mtd_info *mtd, int section, in oob_sm_ooblayout_free() argument
27 switch (section) { in oob_sm_ooblayout_free()
61 static int oob_sm_small_ooblayout_ecc(struct mtd_info *mtd, int section, in oob_sm_small_ooblayout_ecc() argument
64 if (section) in oob_sm_small_ooblayout_ecc()
73 static int oob_sm_small_ooblayout_free(struct mtd_info *mtd, int section, in oob_sm_small_ooblayout_free() argument
76 switch (section) { in oob_sm_small_ooblayout_free()
/linux/tools/testing/selftests/x86/bugs/
H A Dcommon.py108 section = elffile.get_section_by_name(section_name)
109 if section is None:
114 return section['sh_addr'], section['sh_offset'], section['sh_size']
131 def get_instruction_from_vmlinux(elffile, section, virtual_address, target_address): argument
133 section_start = section['sh_addr']
134 section_end = section_start + section['sh_size']
140 code = section.data()[offset:offset + 16]
/linux/arch/m68k/ifpsp060/
H A DTEST.DOC60 | | - 128 byte-sized section
68 | | - code section
74 The first section of this module is the "Call-out" section. This section
75 is NOT INCLUDED in {i,f}test.sa (an example "Call-out" section is provided at
76 the end of this file). The purpose of this section is to allow the test
78 by the host operating system. This section MUST be exactly 128 bytes in
83 the starting address of the "call-out" section. The "Call-out" section must
87 The second section, the "Entry-point" section, is used by external routines
89 no symbol names, this section contains function entry points that are fixed
91 are listed in section "68060{ISP,FPSP}-TEST entry points" below. A calling
[all …]
H A Dfpsp.doc66 | | - 128 byte-sized section
74 | | - code section
80 The first section of this module is the "Call-out" section. This section
81 is NOT INCLUDED in fpsp.sa (an example "Call-out" section is provided at
82 the end of the file fskeleton.s). The purpose of this section is to allow
84 by the host operating system. This section MUST be exactly 128 bytes in
89 of the "call-out" section. The "Call-out" section must sit adjacent to the
92 The second section, the "Entry-point" section, is used by external routines
94 no symbol names, this section contains function entry points that are fixed
96 are listed in section "68060 FPSP entry points" below. A calling routine
[all …]
H A Disp.doc74 | | - 128 byte-sized section
82 | | - code section
88 The first section of this module is the "Call-out" section. This section
89 is NOT INCLUDED in isp.sa (an example "Call-out" section is provided at
90 the end of the file iskeleton.s). The purpose of this section is to allow
92 by the host operating system. This section MUST be exactly 128 bytes in
97 of the "call-out" section. The "Call-out" section must sit adjacent to the
100 The second section, the "Entry-point" section, is used by external routines
102 no symbol names, this section contains function entry points that are fixed
104 are listed in section "68060 ISP entry points" below. A calling routine
[all …]
/linux/scripts/gcc-plugins/
H A Dstackleak_plugin.c451 tree section; in stackleak_gate() local
453 section = lookup_attribute("section", in stackleak_gate()
455 if (section && TREE_VALUE(section)) { in stackleak_gate()
456 section = TREE_VALUE(TREE_VALUE(section)); in stackleak_gate()
458 if (STRING_EQUAL(section, ".init.text")) in stackleak_gate()
460 if (STRING_EQUAL(section, ".devinit.text")) in stackleak_gate()
462 if (STRING_EQUAL(section, ".cpuinit.text")) in stackleak_gate()
464 if (STRING_EQUAL(section, ".meminit.text")) in stackleak_gate()
466 if (STRING_EQUAL(section, ".noinstr.text")) in stackleak_gate()
468 if (STRING_EQUAL(section, ".entry.text")) in stackleak_gate()
[all …]
/linux/Documentation/livepatch/
H A Dmodule-elf-format.rst29 Since apply_relocate_add() requires access to a module's section header
30 table, symbol table, and relocation section indices, ELF information is
31 preserved for livepatch modules (see section 5). Livepatch manages its own
52 relas reference are special livepatch symbols (see section 2 and 3). The
87 relocation section(s) to the driver once it loads.
92 between a livepatch relocation section and the target section (usually the
93 text section of a function) to which the relocation(s) apply. It is
99 livepatch relocation section can be applied simply by passing in the
100 appropriate section index to apply_relocate_add(), which then uses it to
101 access the relocation section and apply the relocations.
[all …]
/linux/tools/objtool/
H A Delf.c134 struct section *find_section_by_name(const struct elf *elf, const char *name) in find_section_by_name()
136 struct section *sec; in find_section_by_name()
146 static struct section *find_section_by_index(struct elf *elf, in find_section_by_index()
149 struct section *sec; in find_section_by_index()
151 elf_hash_for_each_possible(section, sec, hash, idx) { in find_section_by_index()
171 struct symbol *find_symbol_by_offset(struct section *sec, unsigned long offset) in find_symbol_by_offset()
184 struct symbol *find_func_by_offset(struct section *sec, unsigned long offset) in find_func_by_offset()
197 struct symbol *find_symbol_containing(const struct section *sec, unsigned long offset) in find_symbol_containing()
228 int find_symbol_hole_containing(const struct section *sec, unsigned long offset) in find_symbol_hole_containing()
265 struct symbol *find_func_containing(struct section *sec, unsigned long offset) in find_func_containing()
[all …]
/linux/arch/powerpc/include/asm/
H A Dhead-64.h13 .section ".head.text.\name\()","ax",@progbits
16 .section ".head.data.\name\()","a",@progbits
19 .section ".head.text.\name\()","ax",@progbits
77 .section ".linker_stub_catch","ax",@progbits; \
81 .section ".text","ax",@progbits; \
87 .section ".text","ax",@progbits; \
/linux/scripts/gendwarfksyms/
H A Dsymbols.c18 return hash_32(addr->section ^ addr_hash(addr->address)); in symbol_addr_hash()
33 if (match->addr.section == sym->addr.section && in __for_each_addr()
77 if (match->addr.section != SHN_UNDEF) in for_each()
152 sym->addr.section = SHN_UNDEF; in symbol_read_exports()
291 if (sym->addr.section == SHN_UNDEF) { in set_symbol_addr()
296 debug("%s -> { %u, %" PRIx64 " }", sym->name, sym->addr.section, in set_symbol_addr()
298 } else if (sym->addr.section != addr->section || in set_symbol_addr()
307 struct symbol_addr addr = { .section in elf_set_symbol_addr()
[all...]
/linux/arch/powerpc/kernel/
H A Dprom_init_check.sh44 section=$2
45 size=$(objdump -h -j "$section" "$file" 2>/dev/null | awk "\$2 == \"$section\" {print \$3}")
49 echo "Error: Section $section not empty in prom_init.c" >&2
/linux/Documentation/arch/x86/
H A Dexception-tables.rst85 ".section .fixup,\"ax\"\n"
89 ".section __ex_table,\"a\"\n"
99 ".section .fixup,\"ax\"\n"
103 ".section __ex_table,\"a\"\n"
113 ".section .fixup,\"ax\"\n"
117 ".section __ex_table,\"a\"\n"
146 > .section .fixup,"ax"
150 > .section __ex_table,"a"
161 memory. But what does the .section stuff do?????
165 > objdump --section-headers vmlinux
[all …]
/linux/Documentation/bpf/
H A Dllvm_reloc.rst17 Elf64_Addr r_offset; // Offset from the beginning of section.
23 int g1 __attribute__((section("sec")));
24 int g2 __attribute__((section("sec")));
25 static volatile int l1 __attribute__((section("sec")));
26 static volatile int l2 __attribute__((section("sec")));
55 Relocation section '.rel.text' at offset 0x190 contains 4 entries:
85 section where the initial value of the global variable ``g2`` is stored.
88 and ``l2``. From the ``.rel.text`` section above, it is not clear
91 and represents a section. So for a static variable or function,
92 the section offset is written to the original insn
[all …]
/linux/arch/mips/boot/tools/
H A Drelocs.c24 struct section { struct
26 struct section *link; argument
32 static struct section *secs; argument
109 static struct section *sec_lookup(const char *secname) in sec_lookup()
266 secs = calloc(ehdr.e_shnum, sizeof(struct section)); in read_shdrs()
274 struct section *sec = &secs[i]; in read_shdrs()
300 struct section *sec = &secs[i]; in read_strtabs()
325 struct section *sec = &secs[i]; in read_symtabs()
359 struct section *sec = sec_lookup(".text"); in read_relocs()
368 struct section *sec = &secs[i]; in read_relocs()
[all …]
/linux/arch/arc/include/asm/
H A Dlinkage.h38 .section .data.arcfp
40 .section .data
48 .section .text.arcfp, "ax",@progbits
50 .section .text, "ax",@progbits
/linux/tools/testing/selftests/tc-testing/
H A Daction.c12 __attribute__((section("action-ok"),used)) int action_ok(struct __sk_buff *s) in action_ok()
17 __attribute__((section("action-ko"),used)) int action_ko(struct __sk_buff *s) in action_ko()
23 char _license[] __attribute__((section("license"),used)) = "GPL";
/linux/arch/sparc/lib/
H A Dhweight.S13 .section .popc_3insn_patch, "ax"
26 .section .popc_3insn_patch, "ax"
39 .section .popc_3insn_patch, "ax"
52 .section .popc_3insn_patch, "ax"

12345678910>>...40