Home
last modified time | relevance | path

Searched refs:objdump (Results 1 – 25 of 36) sorted by relevance

12

/linux/scripts/
H A Dcheck_extable.sh10 objdump -hj __ex_table ${obj} 2> /dev/null > /dev/null
15 suspicious_relocs=$(objdump -rj __ex_table ${obj} | tail -n +6 |
33 eval $(objdump -t ${obj} | grep ${1} | sed 's/\([0-9a-f]\+\) .\{7\} \([^ \t]\+\).*/section="\2"; section_offset="0x\1" /')
41 # Extract symbol and offset from the objdump output
55 eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | awk '{print $3}' |
72 objdump -hwj ${section} ${obj} | grep -q CODE
115 # objdump will use it instead of giving us a section+offset, so
120 # In this case objdump was presenting us with a reloc to a symbol
134 objdump -hj .debug_info ${obj} 2> /dev/null > /dev/null ||
H A Drecordmcount.pl20 # When parse this object file using 'objdump', the references to the call
96 # 2) Use objdump to find all the call site offsets and sections for
118 print "usage: $P arch endian bits objdump objcopy cc ld nm rm mv is_module inputfile\n";
123 my ($arch, $endian, $bits, $objdump, $objcopy, $cc,
151 $objdump = 'objdump' if (!$objdump);
159 #print STDERR "running: $P '$arch' '$objdump' '$objcopy' '$cc' '$ld' " .
206 $objdump .= " -M x86-64";
216 $objdump
[all...]
H A Drelocs_check.sh8 objdump="$1"
18 $objdump -R "$vmlinux" |
/linux/tools/perf/tests/shell/
H A Dannotate.sh93 # check one more with external objdump tool (forced by --objdump option)
96 perf annotate --no-demangle -i "${perfdata}" --percent-limit 10 --objdump=objdump 2> /dev/null > "${perfout}"
98 perf annotate --no-demangle -i - "${testsym}" --percent-limit 10 --objdump=objdump 2> /dev/null < "${perfdata}" > "${perfout}"
102 echo "${mode} annotate [Failed: missing disasm output from non default disassembler (using --objdump)]"
/linux/arch/powerpc/tools/
H A Dftrace-gen-ool-stubs.sh9 objdump="$3"
18 num_ool_stubs_total=$($objdump -r -j __patchable_function_entries "$vmlinux_o" |
20 num_ool_stubs_inittext=$($objdump -r -j __patchable_function_entries "$vmlinux_o" |
H A Dunrel_branch_check.sh8 # Have Kbuild supply the path to objdump and nm so we handle cross compilation.
9 objdump="$1"
27 $objdump -D --no-show-raw-insn --start-address="$kstart" --stop-address="$end_intr" "$vmlinux" |
/linux/tools/perf/arch/x86/tests/
H A Dgen-insn-x86-dat.sh22 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-64.c
30 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-32.c
/linux/tools/perf/arch/arm/annotate/
H A Dinstructions.c54 arch->objdump.comment_char = ';'; in arm__annotate_init()
55 arch->objdump.skip_functions_char = '+'; in arm__annotate_init()
/linux/tools/perf/arch/arc/annotate/
H A Dinstructions.c7 arch->objdump.comment_char = ';'; in arc__annotate_init()
/linux/tools/perf/arch/s390/annotate/
H A Dinstructions.c25 if (arch->objdump.skip_functions_char && in s390_call__parse()
26 strchr(name, arch->objdump.skip_functions_char)) in s390_call__parse()
/linux/Documentation/translations/zh_CN/admin-guide/
H A Dbug-hunting.rst184 objdump section in 找到缺陷位置
191 $ objdump -r -S -l --disassemble net/ipv4/tcp.o
214 "objdump --disassemble foo.o".
/linux/tools/perf/arch/riscv64/annotate/
H A Dinstructions.c30 arch->objdump.comment_char = '#'; in riscv64__annotate_init()
/linux/arch/powerpc/kernel/
H A Dprom_init_check.sh45 size=$(objdump -h -j $section $file 2>/dev/null | awk "\$2 == \"$section\" {print \$3}")
/linux/tools/perf/util/
H A Ddisasm.c139 .objdump = {
149 .objdump = {
173 .objdump = {
180 .objdump = {
187 .objdump = {
283 if (arch->objdump.skip_functions_char && in call__parse()
284 strchr(name, arch->objdump.skip_functions_char)) in call__parse()
373 ops->jump.raw_comment = strchr(ops->raw, arch->objdump.comment_char); in jump__parse()
466 /* mirror arch objdump's space-after-comma style */ in jump__scnprintf()
593 if (arch->objdump in check_multi_regs()
[all...]
H A Ddisasm.h41 } objdump; member
/linux/tools/perf/Documentation/
H A Dperf-annotate.txt117 --disassembler-style=:: Set disassembler style for objdump.
122 --objdump=<path>::
123 Path to objdump binary.
/linux/tools/perf/arch/mips/annotate/
H A Dinstructions.c42 arch->objdump.comment_char = '#'; in mips__annotate_init()
/linux/tools/perf/arch/csky/annotate/
H A Dinstructions.c44 arch->objdump.comment_char = '/'; in csky__annotate_init()
/linux/tools/perf/scripts/python/
H A Darm-cs-trace-disasm.py36 # Output disassembly with objdump and auto detect vmlinux
40 # Output disassembly with llvm-objdump:
42 # -- -d llvm-objdump-11 -k path/to/vmlinux
48 config = perf_config_get("annotate.objdump")
49 return config if config else "objdump"
61 args.add_argument("-d", "--objdump", nargs="?", const=default_objdump(),
62 help="Show disassembly. Can also be used to change the objdump path"),
158 disasm = [ options.objdump, "-d", "-z",
317 # 'stop_addr' is for the sake of objdump so the final assembler dump can
339 if (options.objdump !
[all...]
/linux/tools/perf/arch/sparc/annotate/
H A Dinstructions.c165 arch->objdump.comment_char = '#'; in sparc__annotate_init()
/linux/arch/powerpc/boot/
H A Dwrapper196 LC_ALL=C elfformat="`${CROSS}objdump -p "$kernel" | grep 'file format' | awk '{print $4}'`"
452 membase=`${CROSS}objdump -p "$kernel" | grep -m 1 LOAD | awk '{print $7}'`
504 entry=`${CROSS}objdump -f "$ofile" | grep '^start address ' | cut -d' ' -f3`
/linux/Documentation/arch/x86/
H A Dexception-tables.rst165 > objdump --section-headers vmlinux
192 > objdump --disassemble --section=.text vmlinux
210 > objdump --disassemble --section=.fixup vmlinux
218 > objdump --full-contents --section=__ex_table vmlinux
/linux/Documentation/process/debugging/
H A Duserspace_debugging_guide.rst222 An alternative to using ``faddr2line`` is the use of ``objdump`` (and its
223 derivatives for the different platforms like ``aarch64-linux-gnu-objdump``).
230 aarch64-linux-gnu-objdump -dS drivers/staging/media/rkvdec/rockchip-vdec.ko | grep rkvdec_device_run\>: -A 40
/linux/Documentation/admin-guide/
H A Dbug-hunting.rst190 objdump section in Finding the bug's location
193 To debug a kernel, use objdump and look for the hex offset from the crash
199 $ objdump -r -S -l --disassemble net/ipv4/tcp.o
224 "objdump --disassemble foo.o".
/linux/tools/perf/arch/powerpc/annotate/
H A Dinstructions.c310 arch->objdump.comment_char = '#'; in powerpc__annotate_init()

12