Searched refs:OBJ (Results 1 – 12 of 12) sorted by relevance
| /linux/arch/powerpc/kernel/ |
| H A D | prom_init_check.sh | 37 OBJ="$2" 53 for UNDEF in $($NM -u "$OBJ" | awk '{print $2}') 90 check_section "$OBJ" .data 91 check_section "$OBJ" .bss 92 check_section "$OBJ" .init.data
|
| /linux/arch/x86/boot/ |
| H A D | mtools.conf.in | 11 file="@OBJ@/fdimage" cylinders=80 heads=2 sectors=18 filter 15 file="@OBJ@/fdimage" cylinders=80 heads=2 sectors=36 filter 19 file="@OBJ@/hdimage" offset=32768 mformat_only 21 file="@OBJ@/hdimage" partition=1 mformat_only
|
| /linux/tools/tracing/rtla/ |
| H A D | Makefile.standalone | 13 OBJ := $(SRC:.c=.o) 16 rtla: $(OBJ) 17 $(CC) -o rtla $(LDFLAGS) $(OBJ) $(LIBS) $(EXTLIBS) 26 @rm -rf *~ $(OBJ) *.tar.$(CEXT)
|
| /linux/scripts/livepatch/ |
| H A D | klp-build | 39 OBJ="$(pwd)" 41 CONFIG="$OBJ/.config" 42 TMP_DIR="$OBJ/klp-tmp" 426 [[ ! "$OBJ" -ef "$SCRIPT_DIR/../.." ]] && die "please run from the kernel root directory" 558 find "$OBJ" \( -path "$TMP_DIR" -o -path "$OBJ/.git" -o -regex "$OBJ/[^/][^/]*\.ko" \) -prune -o \ 560 \( -name "*.ko" -o -path "$OBJ/vmlinux.o" \) \ 576 local file="$OBJ/$rel_file" 609 local file="$OBJ/$rel_file"
|
| /linux/tools/bpf/bpftool/Documentation/ |
| H A D | bpftool-struct_ops.rst | 29 | **bpftool** **struct_ops register** *OBJ* [*LINK_DIR*] 34 | *OBJ* := /a/file/of/bpf_struct_ops.o 54 bpftool struct_ops register *OBJ* [*LINK_DIR*] 55 Register bpf struct_ops from *OBJ*. All struct_ops under the ELF section
|
| H A D | bpftool-iter.rst | 26 | **bpftool** **iter pin** *OBJ* *PATH* [**map** *MAP*] 29 | *OBJ* := /a/file/of/bpf_iter_target.o 34 bpftool iter pin *OBJ* *PATH* [map *MAP*] 40 The *pin* command creates a bpf iterator from *OBJ*, and pin it to *PATH*.
|
| H A D | bpftool-prog.rst | 34 | **bpftool** **prog** { **load** | **loadall** } *OBJ* *PATH* [**type** *TYPE*] [**map** { **idx** *IDX* | **name** *NAME* } *MAP*] [{ **offload_dev** | **xdpmeta_dev** } *NAME*] [**pinmaps** *MAP_DIR*] [**autoattach**] [**kernel_btf** *BTF_FILE*] 131 bpftool prog { load | loadall } *OBJ* *PATH* [type *TYPE*] [map { idx *IDX* | name *NAME* } *MAP*] [{ offload_dev | xdpmeta_dev } *NAME*] [pinmaps *MAP_DIR*] [autoattach] [kernel_btf *BTF_FILE*] 132 Load bpf program(s) from binary *OBJ* and pin as *PATH*. **bpftool prog 133 load** pins only the first program from the *OBJ* as *PATH*. **bpftool prog 134 loadall** pins all programs from the *OBJ* under *PATH* directory. **type**
|
| /linux/scripts/ |
| H A D | objdump-func | 22 OBJ=$1; shift 25 ${OBJDUMP} -wdr $OBJ | gawk -M -v _funcs="${FUNCS[*]}" '
|
| /linux/security/apparmor/include/ |
| H A D | lib.h | 84 #define aa_in_scope(SUBJ, OBJ) \ argument 85 aa_ns_visible(SUBJ, OBJ, false) 87 #define aa_in_view(SUBJ, OBJ) \ argument 88 aa_ns_visible(SUBJ, OBJ, true)
|
| /linux/tools/lib/bpf/ |
| H A D | Makefile | 66 OBJ = $@ macro
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | Makefile | 666 $$(call msg,TEST-OBJ,$(TRUNNER_BINARY),$$@) 696 $$(call msg,EXT-OBJ,$(TRUNNER_BINARY),$$@) 700 $$(call msg,LIB-OBJ,$(TRUNNER_BINARY),$$@)
|
| /linux/net/core/ |
| H A D | filter.c | 10580 #define SOCK_OPS_GET_FIELD(BPF_FIELD, OBJ_FIELD, OBJ) \ in sock_ops_convert_ctx_access() argument 10583 BUILD_BUG_ON(sizeof_field(OBJ, OBJ_FIELD) > \ in sock_ops_convert_ctx_access() 10611 *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(OBJ, \ in sock_ops_convert_ctx_access() 10614 offsetof(OBJ, OBJ_FIELD)); \ in sock_ops_convert_ctx_access() 10674 #define SOCK_OPS_SET_FIELD(BPF_FIELD, OBJ_FIELD, OBJ) \ in sock_ops_convert_ctx_access() argument 10677 BUILD_BUG_ON(sizeof_field(OBJ, OBJ_FIELD) > \ in sock_ops_convert_ctx_access() 10697 *insn++ = BPF_RAW_INSN(BPF_FIELD_SIZEOF(OBJ, OBJ_FIELD) | \ in sock_ops_convert_ctx_access() 10700 offsetof(OBJ, OBJ_FIELD), \ in sock_ops_convert_ctx_access() 10707 #define SOCK_OPS_GET_OR_SET_FIELD(BPF_FIELD, OBJ_FIELD, OBJ, TYPE) \ in sock_ops_convert_ctx_access() argument 10710 SOCK_OPS_SET_FIELD(BPF_FIELD, OBJ_FIELD, OBJ); \ in sock_ops_convert_ctx_access() [all …]
|