Home
last modified time | relevance | path

Searched refs:objdump (Results 1 – 20 of 20) sorted by relevance

/linux/scripts/
H A Dcheck_extable.sh10 objdump -hj __ex_table ${obj} 2> /dev/null > /dev/null
15 suspicious_relocs=$(objdump -rj __ex_table ${obj} | tail -n +6 |
33 …eval $(objdump -t ${obj} | grep ${1} | sed 's/\([0-9a-f]\+\) .\{7\} \([^ \t]\+\).*/section="\2"; s…
55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | …
72 objdump -hwj ${section} ${obj} | grep -q CODE
134 objdump -hj .debug_info ${obj} 2> /dev/null > /dev/null ||
H A Drecordmcount.pl123 my ($arch, $endian, $bits, $objdump, $objcopy, $cc,
151 $objdump = 'objdump' if (!$objdump);
206 $objdump .= " -M x86-64";
216 $objdump .= " -M i386";
332 $objdump .= " -Melf-trad".$endian."mips ";
450 open(IN, "LC_ALL=C $objdump -hdr $inputfile|") || die "error running $objdump";
H A Drelocs_check.sh8 objdump="$1"
18 $objdump -R "$vmlinux" |
H A Ddecodecode113 ${CROSS_COMPILE}objdump $OBJDUMPFLAGS -S $t.o | \
/linux/arch/sparc/vdso/
H A Dcheckundef.sh2 objdump="$1"
4 $objdump -t "$file" | grep '*UUND*' | grep -v '#scratch' > /dev/null 2>&1
/linux/tools/perf/arch/x86/tests/
H A Dgen-insn-x86-dat.sh22 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-64.c
30 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-32.c
/linux/arch/powerpc/tools/
H A Dunrel_branch_check.sh9 objdump="$1"
27 $objdump -D --no-show-raw-insn --start-address="$kstart" --stop-address="$end_intr" "$vmlinux" |
/linux/tools/perf/util/
H A Ddisasm.c139 .objdump = {
149 .objdump = {
173 .objdump = {
180 .objdump = {
187 .objdump = {
283 if (arch->objdump.skip_functions_char && in call__parse()
284 strchr(name, arch->objdump.skip_functions_char)) in call__parse()
373 ops->jump.raw_comment = strchr(ops->raw, arch->objdump.comment_char); in jump__parse()
593 if (arch->objdump.register_char == 0) in check_multi_regs()
596 if (arch->objdump.memory_ref_char) { in check_multi_regs()
[all …]
H A Dannotate.c2333 if (arch->objdump.register_char == 0) in extract_reg_offset()
2343 if (*str == arch->objdump.register_char) { in extract_reg_offset()
2351 *str != arch->objdump.memory_ref_char) in extract_reg_offset()
2357 p = strchr(p, arch->objdump.register_char); in extract_reg_offset()
2370 p = strchr(p + 1, arch->objdump.register_char); in extract_reg_offset()
2454 } else if (strchr(insn_str, arch->objdump.memory_ref_char)) { in annotate_get_insn_location()
2477 if (*s == arch->objdump.register_char) in annotate_get_insn_location()
2479 else if (*s == arch->objdump.imm_char) { in annotate_get_insn_location()
/linux/tools/perf/Documentation/
H A Dperf-annotate.txt117 --disassembler-style=:: Set disassembler style for objdump.
122 --objdump=<path>::
123 Path to objdump binary.
H A Dperf-top.txt166 --disassembler-style=:: Set disassembler style for objdump.
171 --objdump=<path>::
172 Path to objdump binary.
/linux/arch/powerpc/kernel/
H A Dprom_init_check.sh45 size=$(objdump -h -j $section $file 2>/dev/null | awk "\$2 == \"$section\" {print \$3}")
/linux/Documentation/arch/x86/
H A Dexception-tables.rst165 > objdump --section-headers vmlinux
192 > objdump --disassemble --section=.text vmlinux
210 > objdump --disassemble --section=.fixup vmlinux
218 > objdump --full-contents --section=__ex_table vmlinux
/linux/Documentation/trace/
H A Duprobetracer.rst114 # objdump -T /bin/zsh | grep -w zfree
H A Dftrace-design.rst245 details for how to locate the addresses of mcount call sites via objdump.
H A Dkprobes.rst344 so you can use "objdump -d -l vmlinux" to see the source-to-object
/linux/Documentation/bpf/
H A Dllvm_reloc.rst32 the code with ``llvm-objdump -dr test.o``::
161 following code with `llvm-objdump -dr test.o``::
/linux/tools/bpf/bpftool/bash-completion/
H A Dbpftool113 maps=$(objdump -j .maps -t $obj 2>/dev/null | \
125 nmaps=$(objdump -j maps -t $obj 2>/dev/null | grep -c 'g . maps')
/linux/
H A DMakefile510 OBJDUMP = $(LLVM_PREFIX)llvm-objdump$(LLVM_SUFFIX)
519 OBJDUMP = $(CROSS_COMPILE)objdump
/linux/Documentation/RCU/
H A Dtorture.rst279 objdump and gdb.