Home
last modified time | relevance | path

Searched refs:objdump (Results 1 – 25 of 36) sorted by relevance

12

/linux-5.19.10/scripts/
Dcheck_extable.sh10 objdump -hj __ex_table ${obj} 2> /dev/null > /dev/null
15 suspicious_relocs=$(objdump -rj __ex_table ${obj} | tail -n +6 |
33 …eval $(objdump -t ${obj} | grep ${1} | sed 's/\([0-9a-f]\+\) .\{7\} \([^ \t]\+\).*/section="\2"; s…
55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | …
72 objdump -hwj ${section} ${obj} | grep -q CODE
134 objdump -hj .debug_info ${obj} 2> /dev/null > /dev/null ||
Drecordmcount.pl123 my ($arch, $endian, $bits, $objdump, $objcopy, $cc,
151 $objdump = 'objdump' if (!$objdump);
206 $objdump .= " -M x86-64";
216 $objdump .= " -M i386";
339 $objdump .= " -Melf-trad".$endian."mips ";
457 open(IN, "LC_ALL=C $objdump -hdr $inputfile|") || die "error running $objdump";
Ddecodecode101 ${CROSS_COMPILE}objdump $OBJDUMPFLAGS -S $t.o | \
/linux-5.19.10/arch/sparc/vdso/
Dcheckundef.sh2 objdump="$1"
4 $objdump -t "$file" | grep '*UUND*' | grep -v '#scratch' > /dev/null 2>&1
/linux-5.19.10/arch/powerpc/tools/
Drelocs_check.sh19 objdump="$1"
30 $objdump -R "$vmlinux" |
Dunrel_branch_check.sh9 objdump="$1"
27 $objdump -D --no-show-raw-insn --start-address="$kstart" --stop-address="$end_intr" "$vmlinux" |
/linux-5.19.10/tools/perf/arch/x86/tests/
Dgen-insn-x86-dat.sh22 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-64.c
30 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-32.c
/linux-5.19.10/tools/perf/arch/arm/annotate/
Dinstructions.c54 arch->objdump.comment_char = ';'; in arm__annotate_init()
55 arch->objdump.skip_functions_char = '+'; in arm__annotate_init()
/linux-5.19.10/tools/perf/arch/arm64/annotate/
Dinstructions.c113 arch->objdump.comment_char = '/'; in arm64__annotate_init()
114 arch->objdump.skip_functions_char = '+'; in arm64__annotate_init()
/linux-5.19.10/tools/perf/arch/arc/annotate/
Dinstructions.c7 arch->objdump.comment_char = ';'; in arc__annotate_init()
/linux-5.19.10/tools/perf/arch/s390/annotate/
Dinstructions.c25 if (arch->objdump.skip_functions_char && in s390_call__parse()
26 strchr(name, arch->objdump.skip_functions_char)) in s390_call__parse()
/linux-5.19.10/arch/x86/tools/
Dchkobjdump.awk11 /^GNU objdump/ {
/linux-5.19.10/Documentation/translations/zh_CN/admin-guide/
Dbug-hunting.rst184 objdump section in 找到缺陷位置
187 要调试内核,请使用objdump并从崩溃输出中查找十六进制偏移,以找到有效的代码/汇
191 $ objdump -r -S -l --disassemble net/dccp/ipv4.o
214 "objdump --disassemble foo.o".
/linux-5.19.10/Documentation/translations/zh_TW/admin-guide/
Dbug-hunting.rst187 objdump section in 找到缺陷位置
190 要調試內核,請使用objdump並從崩潰輸出中查找十六進位偏移,以找到有效的代碼/匯
194 $ objdump -r -S -l --disassemble net/dccp/ipv4.o
217 "objdump --disassemble foo.o".
/linux-5.19.10/tools/perf/arch/riscv64/annotate/
Dinstructions.c30 arch->objdump.comment_char = '#'; in riscv64__annotate_init()
/linux-5.19.10/tools/perf/Documentation/
Dperf-annotate.txt117 --disassembler-style=:: Set disassembler style for objdump.
119 --objdump=<path>::
120 Path to objdump binary.
/linux-5.19.10/tools/perf/arch/csky/annotate/
Dinstructions.c44 arch->objdump.comment_char = '/'; in csky__annotate_init()
/linux-5.19.10/arch/powerpc/kernel/
Dprom_init_check.sh41 size=$(objdump -h -j $section $file 2>/dev/null | awk "\$2 == \"$section\" {print \$3}")
/linux-5.19.10/tools/perf/arch/mips/annotate/
Dinstructions.c42 arch->objdump.comment_char = '#'; in mips__annotate_init()
/linux-5.19.10/tools/perf/arch/powerpc/annotate/
Dinstructions.c57 arch->objdump.comment_char = '#'; in powerpc__annotate_init()
/linux-5.19.10/tools/perf/arch/sparc/annotate/
Dinstructions.c165 arch->objdump.comment_char = '#'; in sparc__annotate_init()
/linux-5.19.10/arch/powerpc/boot/
Dwrapper442 membase=`${CROSS}objdump -p "$kernel" | grep -m 1 LOAD | awk '{print $7}'`
514 entry=`${CROSS}objdump -f "$ofile" | grep '^start address ' | cut -d' ' -f3`
/linux-5.19.10/Documentation/x86/
Dexception-tables.rst165 > objdump --section-headers vmlinux
192 > objdump --disassemble --section=.text vmlinux
210 > objdump --disassemble --section=.fixup vmlinux
218 > objdump --full-contents --section=__ex_table vmlinux
/linux-5.19.10/Documentation/admin-guide/
Dbug-hunting.rst190 objdump section in Finding the bug's location
193 To debug a kernel, use objdump and look for the hex offset from the crash
199 $ objdump -r -S -l --disassemble net/dccp/ipv4.o
224 "objdump --disassemble foo.o".
/linux-5.19.10/tools/perf/util/
Dannotate.c90 } objdump; member
180 .objdump = {
189 .objdump = {
204 .objdump = {
211 .objdump = {
266 if (arch->objdump.skip_functions_char && in call__parse()
267 strchr(name, arch->objdump.skip_functions_char)) in call__parse()
355 ops->raw_comment = strchr(ops->raw, arch->objdump.comment_char); in jump__parse()
568 comment = strchr(s, arch->objdump.comment_char); in mov__parse()
631 comment = strchr(s, arch->objdump.comment_char); in dec__parse()

12