/linux-5.19.10/scripts/ |
D | check_extable.sh | 10 objdump -hj __ex_table ${obj} 2> /dev/null > /dev/null 15 suspicious_relocs=$(objdump -rj __ex_table ${obj} | tail -n +6 | 33 …eval $(objdump -t ${obj} | grep ${1} | sed 's/\([0-9a-f]\+\) .\{7\} \([^ \t]\+\).*/section="\2"; s… 55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | … 72 objdump -hwj ${section} ${obj} | grep -q CODE 134 objdump -hj .debug_info ${obj} 2> /dev/null > /dev/null ||
|
D | recordmcount.pl | 123 my ($arch, $endian, $bits, $objdump, $objcopy, $cc, 151 $objdump = 'objdump' if (!$objdump); 206 $objdump .= " -M x86-64"; 216 $objdump .= " -M i386"; 339 $objdump .= " -Melf-trad".$endian."mips "; 457 open(IN, "LC_ALL=C $objdump -hdr $inputfile|") || die "error running $objdump";
|
D | decodecode | 101 ${CROSS_COMPILE}objdump $OBJDUMPFLAGS -S $t.o | \
|
/linux-5.19.10/arch/sparc/vdso/ |
D | checkundef.sh | 2 objdump="$1" 4 $objdump -t "$file" | grep '*UUND*' | grep -v '#scratch' > /dev/null 2>&1
|
/linux-5.19.10/arch/powerpc/tools/ |
D | relocs_check.sh | 19 objdump="$1" 30 $objdump -R "$vmlinux" |
|
D | unrel_branch_check.sh | 9 objdump="$1" 27 $objdump -D --no-show-raw-insn --start-address="$kstart" --stop-address="$end_intr" "$vmlinux" |
|
/linux-5.19.10/tools/perf/arch/x86/tests/ |
D | gen-insn-x86-dat.sh | 22 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-64.c 30 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-32.c
|
/linux-5.19.10/tools/perf/arch/arm/annotate/ |
D | instructions.c | 54 arch->objdump.comment_char = ';'; in arm__annotate_init() 55 arch->objdump.skip_functions_char = '+'; in arm__annotate_init()
|
/linux-5.19.10/tools/perf/arch/arm64/annotate/ |
D | instructions.c | 113 arch->objdump.comment_char = '/'; in arm64__annotate_init() 114 arch->objdump.skip_functions_char = '+'; in arm64__annotate_init()
|
/linux-5.19.10/tools/perf/arch/arc/annotate/ |
D | instructions.c | 7 arch->objdump.comment_char = ';'; in arc__annotate_init()
|
/linux-5.19.10/tools/perf/arch/s390/annotate/ |
D | instructions.c | 25 if (arch->objdump.skip_functions_char && in s390_call__parse() 26 strchr(name, arch->objdump.skip_functions_char)) in s390_call__parse()
|
/linux-5.19.10/arch/x86/tools/ |
D | chkobjdump.awk | 11 /^GNU objdump/ {
|
/linux-5.19.10/Documentation/translations/zh_CN/admin-guide/ |
D | bug-hunting.rst | 184 objdump section in 找到缺陷位置 187 要调试内核,请使用objdump并从崩溃输出中查找十六进制偏移,以找到有效的代码/汇 191 $ objdump -r -S -l --disassemble net/dccp/ipv4.o 214 "objdump --disassemble foo.o".
|
/linux-5.19.10/Documentation/translations/zh_TW/admin-guide/ |
D | bug-hunting.rst | 187 objdump section in 找到缺陷位置 190 要調試內核,請使用objdump並從崩潰輸出中查找十六進位偏移,以找到有效的代碼/匯 194 $ objdump -r -S -l --disassemble net/dccp/ipv4.o 217 "objdump --disassemble foo.o".
|
/linux-5.19.10/tools/perf/arch/riscv64/annotate/ |
D | instructions.c | 30 arch->objdump.comment_char = '#'; in riscv64__annotate_init()
|
/linux-5.19.10/tools/perf/Documentation/ |
D | perf-annotate.txt | 117 --disassembler-style=:: Set disassembler style for objdump. 119 --objdump=<path>:: 120 Path to objdump binary.
|
/linux-5.19.10/tools/perf/arch/csky/annotate/ |
D | instructions.c | 44 arch->objdump.comment_char = '/'; in csky__annotate_init()
|
/linux-5.19.10/arch/powerpc/kernel/ |
D | prom_init_check.sh | 41 size=$(objdump -h -j $section $file 2>/dev/null | awk "\$2 == \"$section\" {print \$3}")
|
/linux-5.19.10/tools/perf/arch/mips/annotate/ |
D | instructions.c | 42 arch->objdump.comment_char = '#'; in mips__annotate_init()
|
/linux-5.19.10/tools/perf/arch/powerpc/annotate/ |
D | instructions.c | 57 arch->objdump.comment_char = '#'; in powerpc__annotate_init()
|
/linux-5.19.10/tools/perf/arch/sparc/annotate/ |
D | instructions.c | 165 arch->objdump.comment_char = '#'; in sparc__annotate_init()
|
/linux-5.19.10/arch/powerpc/boot/ |
D | wrapper | 442 membase=`${CROSS}objdump -p "$kernel" | grep -m 1 LOAD | awk '{print $7}'` 514 entry=`${CROSS}objdump -f "$ofile" | grep '^start address ' | cut -d' ' -f3`
|
/linux-5.19.10/Documentation/x86/ |
D | exception-tables.rst | 165 > objdump --section-headers vmlinux 192 > objdump --disassemble --section=.text vmlinux 210 > objdump --disassemble --section=.fixup vmlinux 218 > objdump --full-contents --section=__ex_table vmlinux
|
/linux-5.19.10/Documentation/admin-guide/ |
D | bug-hunting.rst | 190 objdump section in Finding the bug's location 193 To debug a kernel, use objdump and look for the hex offset from the crash 199 $ objdump -r -S -l --disassemble net/dccp/ipv4.o 224 "objdump --disassemble foo.o".
|
/linux-5.19.10/tools/perf/util/ |
D | annotate.c | 90 } objdump; member 180 .objdump = { 189 .objdump = { 204 .objdump = { 211 .objdump = { 266 if (arch->objdump.skip_functions_char && in call__parse() 267 strchr(name, arch->objdump.skip_functions_char)) in call__parse() 355 ops->raw_comment = strchr(ops->raw, arch->objdump.comment_char); in jump__parse() 568 comment = strchr(s, arch->objdump.comment_char); in mov__parse() 631 comment = strchr(s, arch->objdump.comment_char); in dec__parse()
|