Home
last modified time | relevance | path

Searched refs:section (Results 1 – 25 of 1027) sorted by relevance

12345678910>>...42

/linux/tools/objtool/include/objtool/
H A Delf.h42 struct section {
49 struct section *base, *rsec;
57 struct section *twin;
67 struct section *sec;
94 struct section *group_sec;
101 struct section *sec;
129 struct section *section_data;
136 struct section *elf_create_section(struct elf *elf, const char *name,
140 struct section *elf_create_section_pair(struct elf *elf, const char *name,
144 struct section *elf_create_rela_sectio
33 struct section { global() struct
40 rsecsection global() argument
55 relocssection global() argument
[all...]
/linux/tools/perf/util/
H A Dconfig.c629 struct perf_config_section *section; in find_section() local
631 list_for_each_entry(section, sections, node) in find_section()
632 if (!strcmp(section->name, section_name)) in find_section()
633 return section; in find_section()
639 struct perf_config_section *section) in find_config_item() argument
643 list_for_each_entry(item, &section->items, node) in find_config_item()
653 struct perf_config_section *section = zalloc(sizeof(*section)); in add_section() local
655 if (!section) in add_section()
658 INIT_LIST_HEAD(&section->items); in add_section()
659 section->name = strdup(section_name); in add_section()
[all …]
H A Dlibbfd.c122 static void find_address_in_section(bfd *abfd, asection *section, void *data) in find_address_in_section() argument
133 flags = bfd_get_section_flags(abfd, section); in find_address_in_section()
135 flags = bfd_section_flags(section); in find_address_in_section()
142 vma = bfd_get_section_vma(abfd, section); in find_address_in_section()
144 vma = bfd_section_vma(section); in find_address_in_section()
147 size = bfd_get_section_size(section); in find_address_in_section()
149 size = bfd_section_size(section); in find_address_in_section()
155 a2l->found = bfd_find_nearest_line(abfd, section, a2l->syms, pc - vma, in find_address_in_section()
319 asection *section; in dso__load_bfd_symbols() local
356 section = bfd_get_section_by_name(abfd, ".text"); in dso__load_bfd_symbols()
[all …]
/linux/scripts/
H A Dcheck_extable.sh55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | …
62 find_alt_replacement_target ${section} ${section_offset}
72 objdump -hwj ${section} ${obj} | grep -q CODE
78 if is_executable_section ${section}; then
83 echo "Warning: found a reference to section \"${section}\" in __ex_table:"
84 addr2line -fip -j ${section} -e ${obj} ${section_offset} | awk '{print "\t" $0}'
89 …echo "Error: found a reference to non-executable section \"${section}\" in __ex_table at offset ${…
96 case "${section}" in
98 handle_alt_replacement_reloc ${section} ${section_offset}
101 handle_suspicious_generic_reloc ${section} ${section_offset}
[all …]
H A DMakefile.vmlinux24 echo '.section .dtb.init.rodata,"a"'; \
84 remove-section-y := .modinfo
85 remove-section-$(CONFIG_ARCH_VMLINUX_NEEDS_RELOCS) += '.rel*' '!.rel*.dyn'
88 remove-section-$(CONFIG_ARCH_VMLINUX_NEEDS_RELOCS) += '.rel.*'
95 cmd_strip_relocs = $(OBJCOPY) $(patsubst %,--set-section-flags %=noload,$(remove-section-y)) $< $@; \
96 $(OBJCOPY) $(addprefix --remove-section=,$(remove-section-y)) $(remove-symbols) $@
/linux/arch/x86/kernel/cpu/sgx/
H A Dmain.c82 struct sgx_epc_section *section = &sgx_epc_sections[page->section]; in __sgx_sanitize_pages() local
83 struct sgx_numa_node *node = section->node; in __sgx_sanitize_pages()
609 struct sgx_epc_section *section = &sgx_epc_sections[page->section]; in sgx_free_epc_page() local
610 struct sgx_numa_node *node = section->node; in sgx_free_epc_page()
627 struct sgx_epc_section *section) in sgx_setup_epc_section() argument
632 section->virt_addr = memremap(phys_addr, size, MEMREMAP_WB); in sgx_setup_epc_section()
633 if (!section->virt_addr) in sgx_setup_epc_section()
636 section->pages = vmalloc_array(nr_pages, sizeof(struct sgx_epc_page)); in sgx_setup_epc_section()
637 if (!section->pages) { in sgx_setup_epc_section()
638 memunmap(section->virt_addr); in sgx_setup_epc_section()
[all …]
/linux/Documentation/firmware-guide/acpi/apei/
H A Doutput_format.rst13 section: <integer>, severity: <integer>, <severity string>
15 <section flags strings>
18 section_type: <section type string>
19 <section data>
23 <section flags strings># :=
27 <section type string> := generic processor error | memory error | \
30 <section data> :=
31 <generic processor section data> | <memory section data> | \
32 <pcie section data> | <null>
34 <generic processor section data> :=
[all …]
/linux/drivers/mtd/nand/raw/
H A Dsm_common.c12 static int oob_sm_ooblayout_ecc(struct mtd_info *mtd, int section, in oob_sm_ooblayout_ecc() argument
15 if (section > 1) in oob_sm_ooblayout_ecc()
19 oobregion->offset = ((section + 1) * 8) - 3; in oob_sm_ooblayout_ecc()
24 static int oob_sm_ooblayout_free(struct mtd_info *mtd, int section, in oob_sm_ooblayout_free() argument
27 switch (section) { in oob_sm_ooblayout_free()
61 static int oob_sm_small_ooblayout_ecc(struct mtd_info *mtd, int section, in oob_sm_small_ooblayout_ecc() argument
64 if (section) in oob_sm_small_ooblayout_ecc()
73 static int oob_sm_small_ooblayout_free(struct mtd_info *mtd, int section, in oob_sm_small_ooblayout_free() argument
76 switch (section) { in oob_sm_small_ooblayout_free()
/linux/arch/m68k/ifpsp060/
H A DTEST.DOC60 | | - 128 byte-sized section
68 | | - code section
74 The first section of this module is the "Call-out" section. This section
75 is NOT INCLUDED in {i,f}test.sa (an example "Call-out" section is provided at
76 the end of this file). The purpose of this section is to allow the test
78 by the host operating system. This section MUST be exactly 128 bytes in
83 the starting address of the "call-out" section. The "Call-out" section must
87 The second section, the "Entry-point" section, is used by external routines
89 no symbol names, this section contains function entry points that are fixed
91 are listed in section "68060{ISP,FPSP}-TEST entry points" below. A calling
[all …]
H A Dfpsp.doc66 | | - 128 byte-sized section
74 | | - code section
80 The first section of this module is the "Call-out" section. This section
81 is NOT INCLUDED in fpsp.sa (an example "Call-out" section is provided at
82 the end of the file fskeleton.s). The purpose of this section is to allow
84 by the host operating system. This section MUST be exactly 128 bytes in
89 of the "call-out" section. The "Call-out" section must sit adjacent to the
92 The second section, the "Entry-point" section, is used by external routines
94 no symbol names, this section contains function entry points that are fixed
96 are listed in section "68060 FPSP entry points" below. A calling routine
[all …]
H A Disp.doc74 | | - 128 byte-sized section
82 | | - code section
88 The first section of this module is the "Call-out" section. This section
89 is NOT INCLUDED in isp.sa (an example "Call-out" section is provided at
90 the end of the file iskeleton.s). The purpose of this section is to allow
92 by the host operating system. This section MUST be exactly 128 bytes in
97 of the "call-out" section. The "Call-out" section must sit adjacent to the
100 The second section, the "Entry-point" section, is used by external routines
102 no symbol names, this section contains function entry points that are fixed
104 are listed in section "68060 ISP entry points" below. A calling routine
[all …]
/linux/tools/testing/selftests/x86/bugs/
H A Dcommon.py108 section = elffile.get_section_by_name(section_name)
109 if section is None:
114 return section['sh_addr'], section['sh_offset'], section['sh_size']
131 def get_instruction_from_vmlinux(elffile, section, virtual_address, target_address): argument
133 section_start = section['sh_addr']
134 section_end = section_start + section['sh_size']
140 code = section.data()[offset:offset + 16]
/linux/Documentation/livepatch/
H A Dmodule-elf-format.rst29 Since apply_relocate_add() requires access to a module's section header
30 table, symbol table, and relocation section indices, ELF information is
31 preserved for livepatch modules (see section 5). Livepatch manages its own
52 relas reference are special livepatch symbols (see section 2 and 3). The
87 relocation section(s) to the driver once it loads.
92 between a livepatch relocation section and the target section (usually the
93 text section of a function) to which the relocation(s) apply. It is
99 livepatch relocation section can be applied simply by passing in the
100 appropriate section index to apply_relocate_add(), which then uses it to
101 access the relocation section and apply the relocations.
[all …]
/linux/tools/objtool/
H A Delf.c133 struct section *find_section_by_name(const struct elf *elf, const char *name) in find_section_by_name()
135 struct section *sec; in find_section_by_name()
145 static struct section *find_section_by_index(struct elf *elf, in find_section_by_index()
148 struct section *sec; in find_section_by_index()
150 elf_hash_for_each_possible(section, sec, hash, idx) { in find_section_by_index()
170 struct symbol *find_symbol_by_offset(struct section *sec, unsigned long offset) in find_symbol_by_offset()
183 struct symbol *find_func_by_offset(struct section *sec, unsigned long offset) in find_func_by_offset()
196 struct symbol *find_symbol_containing(const struct section *sec, unsigned long offset) in find_symbol_containing()
227 int find_symbol_hole_containing(const struct section *sec, unsigned long offset) in find_symbol_hole_containing()
264 struct symbol *find_func_containing(struct section *sec, unsigned long offset) in find_func_containing()
[all …]
/linux/drivers/mtd/nand/spi/
H A Dgigadevice.c147 static int gd5fxgq4xa_ooblayout_ecc(struct mtd_info *mtd, int section, in gd5fxgq4xa_ooblayout_ecc() argument
150 if (section > 3) in gd5fxgq4xa_ooblayout_ecc()
153 region->offset = (16 * section) + 8; in gd5fxgq4xa_ooblayout_ecc()
159 static int gd5fxgq4xa_ooblayout_free(struct mtd_info *mtd, int section, in gd5fxgq4xa_ooblayout_free() argument
162 if (section > 3) in gd5fxgq4xa_ooblayout_free()
165 if (section) { in gd5fxgq4xa_ooblayout_free()
166 region->offset = 16 * section; in gd5fxgq4xa_ooblayout_free()
205 static int gd5fxgqx_variant2_ooblayout_ecc(struct mtd_info *mtd, int section, in gd5fxgqx_variant2_ooblayout_ecc() argument
208 if (section) in gd5fxgqx_variant2_ooblayout_ecc()
217 static int gd5fxgqx_variant2_ooblayout_free(struct mtd_info *mtd, int section, in gd5fxgqx_variant2_ooblayout_free() argument
[all …]
/linux/scripts/gcc-plugins/
H A Dstackleak_plugin.c451 tree section; in stackleak_gate() local
453 section = lookup_attribute("section", in stackleak_gate()
455 if (section && TREE_VALUE(section)) { in stackleak_gate()
456 section = TREE_VALUE(TREE_VALUE(section)); in stackleak_gate()
458 if (STRING_EQUAL(section, ".init.text")) in stackleak_gate()
460 if (STRING_EQUAL(section, ".devinit.text")) in stackleak_gate()
462 if (STRING_EQUAL(section, ".cpuinit.text")) in stackleak_gate()
464 if (STRING_EQUAL(section, ".meminit.text")) in stackleak_gate()
466 if (STRING_EQUAL(section, ".noinstr.text")) in stackleak_gate()
468 if (STRING_EQUAL(section, ".entry.text")) in stackleak_gate()
[all …]
/linux/scripts/gendwarfksyms/
H A Dsymbols.c18 return hash_32(addr->section ^ addr_hash(addr->address)); in symbol_addr_hash()
33 if (match->addr.section == sym->addr.section && in __for_each_addr()
77 if (match->addr.section != SHN_UNDEF) in for_each()
152 sym->addr.section = SHN_UNDEF; in symbol_read_exports()
291 if (sym->addr.section == SHN_UNDEF) { in set_symbol_addr()
296 debug("%s -> { %u, %" PRIx64 " }", sym->name, sym->addr.section, in set_symbol_addr()
298 } else if (sym->addr.section != addr->section || in set_symbol_addr()
307 struct symbol_addr addr = { .section in elf_set_symbol_addr()
[all...]
/linux/arch/powerpc/include/asm/
H A Dhead-64.h13 .section ".head.text.\name\()","ax",@progbits
16 .section ".head.data.\name\()","a",@progbits
19 .section ".head.text.\name\()","ax",@progbits
77 .section ".linker_stub_catch","ax",@progbits; \
81 .section ".text","ax",@progbits; \
87 .section ".text","ax",@progbits; \
/linux/Documentation/arch/x86/
H A Dexception-tables.rst85 ".section .fixup,\"ax\"\n"
89 ".section __ex_table,\"a\"\n"
99 ".section .fixup,\"ax\"\n"
103 ".section __ex_table,\"a\"\n"
113 ".section .fixup,\"ax\"\n"
117 ".section __ex_table,\"a\"\n"
146 > .section .fixup,"ax"
150 > .section __ex_table,"a"
161 memory. But what does the .section stuff do?????
165 > objdump --section-headers vmlinux
[all …]
/linux/Documentation/bpf/
H A Dllvm_reloc.rst17 Elf64_Addr r_offset; // Offset from the beginning of section.
23 int g1 __attribute__((section("sec")));
24 int g2 __attribute__((section("sec")));
25 static volatile int l1 __attribute__((section("sec")));
26 static volatile int l2 __attribute__((section("sec")));
55 Relocation section '.rel.text' at offset 0x190 contains 4 entries:
85 section where the initial value of the global variable ``g2`` is stored.
88 and ``l2``. From the ``.rel.text`` section above, it is not clear
91 and represents a section. So for a static variable or function,
92 the section offset is written to the original insn
[all …]
/linux/arch/mips/boot/tools/
H A Drelocs.c24 struct section { struct
26 struct section *link; argument
32 static struct section *secs; argument
109 static struct section *sec_lookup(const char *secname) in sec_lookup()
266 secs = calloc(ehdr.e_shnum, sizeof(struct section)); in read_shdrs()
274 struct section *sec = &secs[i]; in read_shdrs()
300 struct section *sec = &secs[i]; in read_strtabs()
325 struct section *sec = &secs[i]; in read_symtabs()
359 struct section *sec = sec_lookup(".text"); in read_relocs()
368 struct section *sec = &secs[i]; in read_relocs()
[all …]
/linux/arch/powerpc/kernel/
H A Dprom_init_check.sh44 section=$2
45 size=$(objdump -h -j "$section" "$file" 2>/dev/null | awk "\$2 == \"$section\" {print \$3}")
49 echo "Error: Section $section not empty in prom_init.c" >&2
/linux/include/linux/
H A Dmmzone.h1896 #error Subsection size exceeds section size
2027 static inline struct page *__section_mem_map_addr(struct mem_section *section) in __section_mem_map_addr() argument
2029 unsigned long map = section->section_mem_map; in __section_mem_map_addr()
2034 static inline int present_section(const struct mem_section *section) in present_section() argument
2036 return (section && (section->section_mem_map & SECTION_MARKED_PRESENT)); in present_section()
2044 static inline int valid_section(const struct mem_section *section) in valid_section() argument
2046 return (section && (section->section_mem_map & SECTION_HAS_MEM_MAP)); in valid_section()
2049 static inline int early_section(const struct mem_section *section) in early_section() argument
2051 return (section && (section->section_mem_map & SECTION_IS_EARLY)); in early_section()
2059 static inline int online_section(const struct mem_section *section) in online_section() argument
[all …]
/linux/arch/arc/include/asm/
H A Dlinkage.h38 .section .data.arcfp
40 .section .data
48 .section .text.arcfp, "ax",@progbits
50 .section .text, "ax",@progbits
/linux/Documentation/core-api/
H A Dcpu_hotplug.rst174 * The PREPARE section
176 The PREPARE section covers the state space from CPUHP_OFFLINE to
179 The startup callbacks in this section are invoked before the CPU is
196 The teardown callbacks in this section are not allowed to fail.
198 * The STARTING section
200 The STARTING section covers the state space between CPUHP_BRINGUP_CPU + 1
203 The startup callbacks in this section are invoked on the hotplugged CPU
209 The callbacks in this section are not allowed to fail.
214 * The ONLINE section
216 The ONLINE section covers the state space between CPUHP_AP_ONLINE + 1 and
[all …]

12345678910>>...42