Home
last modified time | relevance | path

Searched refs:objdump (Results 1 – 25 of 39) sorted by relevance

12

/linux-6.12.1/scripts/
Dcheck_extable.sh10 objdump -hj __ex_table ${obj} 2> /dev/null > /dev/null
15 suspicious_relocs=$(objdump -rj __ex_table ${obj} | tail -n +6 |
33 …eval $(objdump -t ${obj} | grep ${1} | sed 's/\([0-9a-f]\+\) .\{7\} \([^ \t]\+\).*/section="\2"; s…
55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | …
72 objdump -hwj ${section} ${obj} | grep -q CODE
134 objdump -hj .debug_info ${obj} 2> /dev/null > /dev/null ||
Drecordmcount.pl123 my ($arch, $endian, $bits, $objdump, $objcopy, $cc,
151 $objdump = 'objdump' if (!$objdump);
206 $objdump .= " -M x86-64";
216 $objdump .= " -M i386";
332 $objdump .= " -Melf-trad".$endian."mips ";
450 open(IN, "LC_ALL=C $objdump -hdr $inputfile|") || die "error running $objdump";
Drelocs_check.sh8 objdump="$1"
18 $objdump -R "$vmlinux" |
Ddecodecode113 ${CROSS_COMPILE}objdump $OBJDUMPFLAGS -S $t.o | \
/linux-6.12.1/arch/sparc/vdso/
Dcheckundef.sh2 objdump="$1"
4 $objdump -t "$file" | grep '*UUND*' | grep -v '#scratch' > /dev/null 2>&1
/linux-6.12.1/tools/perf/arch/loongarch/annotate/
Dinstructions.c26 if (arch->objdump.skip_functions_char && in loongarch_call__parse()
27 strchr(name, arch->objdump.skip_functions_char)) in loongarch_call__parse()
66 ops->jump.raw_comment = strchr(ops->raw, arch->objdump.comment_char); in loongarch_jump__parse()
133 arch->objdump.comment_char = '#'; in loongarch__annotate_init()
/linux-6.12.1/tools/perf/arch/x86/tests/
Dgen-insn-x86-dat.sh22 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-64.c
30 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-32.c
/linux-6.12.1/arch/powerpc/tools/
Dunrel_branch_check.sh9 objdump="$1"
27 $objdump -D --no-show-raw-insn --start-address="$kstart" --stop-address="$end_intr" "$vmlinux" |
/linux-6.12.1/tools/perf/tests/shell/
Dannotate.sh75 if ! perf annotate -i "${perfdata}" --objdump=objdump 2> /dev/null | \
/linux-6.12.1/tools/perf/arch/arm/annotate/
Dinstructions.c54 arch->objdump.comment_char = ';'; in arm__annotate_init()
55 arch->objdump.skip_functions_char = '+'; in arm__annotate_init()
/linux-6.12.1/tools/perf/arch/arm64/annotate/
Dinstructions.c114 arch->objdump.comment_char = '/'; in arm64__annotate_init()
115 arch->objdump.skip_functions_char = '+'; in arm64__annotate_init()
/linux-6.12.1/tools/perf/util/
Ddisasm.c138 .objdump = {
148 .objdump = {
172 .objdump = {
179 .objdump = {
186 .objdump = {
282 if (arch->objdump.skip_functions_char && in call__parse()
283 strchr(name, arch->objdump.skip_functions_char)) in call__parse()
372 ops->jump.raw_comment = strchr(ops->raw, arch->objdump.comment_char); in jump__parse()
592 if (arch->objdump.register_char == 0) in check_multi_regs()
595 if (arch->objdump.memory_ref_char) { in check_multi_regs()
[all …]
Ddisasm.h41 } objdump; member
/linux-6.12.1/tools/perf/arch/arc/annotate/
Dinstructions.c7 arch->objdump.comment_char = ';'; in arc__annotate_init()
/linux-6.12.1/Documentation/translations/zh_CN/admin-guide/
Dbug-hunting.rst184 objdump section in 找到缺陷位置
187 要调试内核,请使用objdump并从崩溃输出中查找十六进制偏移,以找到有效的代码/汇
191 $ objdump -r -S -l --disassemble net/dccp/ipv4.o
214 "objdump --disassemble foo.o".
/linux-6.12.1/Documentation/translations/zh_TW/admin-guide/
Dbug-hunting.rst187 objdump section in 找到缺陷位置
190 要調試內核,請使用objdump並從崩潰輸出中查找十六進制偏移,以找到有效的代碼/匯
194 $ objdump -r -S -l --disassemble net/dccp/ipv4.o
217 "objdump --disassemble foo.o".
/linux-6.12.1/tools/perf/arch/s390/annotate/
Dinstructions.c25 if (arch->objdump.skip_functions_char && in s390_call__parse()
26 strchr(name, arch->objdump.skip_functions_char)) in s390_call__parse()
/linux-6.12.1/tools/perf/arch/riscv64/annotate/
Dinstructions.c30 arch->objdump.comment_char = '#'; in riscv64__annotate_init()
/linux-6.12.1/tools/perf/arch/csky/annotate/
Dinstructions.c44 arch->objdump.comment_char = '/'; in csky__annotate_init()
/linux-6.12.1/arch/powerpc/kernel/
Dprom_init_check.sh45 size=$(objdump -h -j $section $file 2>/dev/null | awk "\$2 == \"$section\" {print \$3}")
/linux-6.12.1/tools/perf/Documentation/
Dperf-annotate.txt117 --disassembler-style=:: Set disassembler style for objdump.
122 --objdump=<path>::
123 Path to objdump binary.
/linux-6.12.1/tools/perf/arch/mips/annotate/
Dinstructions.c42 arch->objdump.comment_char = '#'; in mips__annotate_init()
/linux-6.12.1/tools/perf/arch/sparc/annotate/
Dinstructions.c165 arch->objdump.comment_char = '#'; in sparc__annotate_init()
/linux-6.12.1/Documentation/arch/x86/
Dexception-tables.rst165 > objdump --section-headers vmlinux
192 > objdump --disassemble --section=.text vmlinux
210 > objdump --disassemble --section=.fixup vmlinux
218 > objdump --full-contents --section=__ex_table vmlinux
/linux-6.12.1/arch/powerpc/boot/
Dwrapper459 membase=`${CROSS}objdump -p "$kernel" | grep -m 1 LOAD | awk '{print $7}'`
511 entry=`${CROSS}objdump -f "$ofile" | grep '^start address ' | cut -d' ' -f3`

12