Searched refs:objtool (Results 1 – 15 of 15) sorted by relevance
/Linux-v5.4/tools/objtool/ |
D | Build | 1 objtool-y += arch/$(SRCARCH)/ 2 objtool-y += builtin-check.o 3 objtool-y += builtin-orc.o 4 objtool-y += check.o 5 objtool-y += orc_gen.o 6 objtool-y += orc_dump.o 7 objtool-y += elf.o 8 objtool-y += special.o 9 objtool-y += objtool.o 11 objtool-y += libstring.o [all …]
|
D | Makefile | 26 OBJTOOL := $(OUTPUT)objtool 50 @$(MAKE) $(build)=objtool 61 $(call QUIET_CLEAN, objtool) $(RM) $(OBJTOOL)
|
D | .gitignore | 2 objtool
|
D | sync-check.sh | 36 if [ ! -d ../../kernel ] || [ ! -d ../../tools ] || [ ! -d ../objtool ]; then
|
/Linux-v5.4/tools/objtool/Documentation/ |
D | stack-validation.txt | 9 objtool which runs at compile time. It has a "check" subcommand which 88 The benefit of objtool here is that because it ensures that *all* 119 To achieve the validation, objtool enforces the following rules: 123 ENTRY/ENDPROC macros. If objtool finds a return instruction 127 This rule is needed so that objtool can properly identify each 134 This rule is needed so that objtool can ignore non-callable code. 154 This rule is needed so that objtool can reliably analyze all of a 156 and it's not a sibling call, objtool has no way to follow the jump 179 Here are some examples of common warnings reported by objtool, what 183 1. file.o: warning: objtool: func()+0x128: call without frame pointer save/setup [all …]
|
/Linux-v5.4/Documentation/x86/ |
D | orc-unwinder.rst | 15 The ORC data consists of unwind tables which are generated by objtool. 93 The ORC data is generated by objtool. With the existing compile-time 94 stack metadata validation feature, objtool already follows all code 117 So the advantages of using objtool to generate ORC data are that it 123 The downside is that the unwinder now becomes dependent on objtool's 125 too complicated for objtool to follow, the ORC data generation might 127 already has such a dependency on objtool's ability to follow GCC code 131 objtool, we may need to revisit the current implementation. Some 133 palatable, or having objtool use DWARF as an additional input, or 134 creating a GCC plugin to assist objtool with its analysis. But for now, [all …]
|
/Linux-v5.4/tools/objtool/arch/x86/ |
D | Build | 1 objtool-y += decode.o
|
/Linux-v5.4/tools/ |
D | Makefile | 66 cgroup firewire hv guest spi usb virtio vm bpf iio gpio objtool leds wmi pci firmware debugging: FO… target 101 tmon freefall iio objtool kvm_stat wmi \
|
/Linux-v5.4/scripts/ |
D | Makefile.build | 197 __objtool_obj := $(objtree)/tools/objtool/objtool 244 $(call cmd,objtool) 252 $(call cmd,objtool)
|
/Linux-v5.4/scripts/package/ |
D | builddeb | 173 (cd $objtree; find tools/objtool -type f -executable) >> "$objtree/debian/hdrobjfiles"
|
/Linux-v5.4/ |
D | Makefile | 1004 objtool_target := tools/objtool FORCE 1115 prepare: prepare0 prepare-objtool 1128 PHONY += prepare-objtool 1129 prepare-objtool: $(objtool_target)
|
D | MAINTAINERS | 11722 F: tools/objtool/
|
/Linux-v5.4/Documentation/livepatch/ |
D | livepatch.rst | 192 1) Add CONFIG_HAVE_RELIABLE_STACKTRACE. This means porting objtool, and
|
/Linux-v5.4/arch/ |
D | Kconfig | 730 Architecture supports the 'objtool check' host tool command, which
|
/Linux-v5.4/lib/ |
D | Kconfig.debug | 385 tools/objtool/Documentation/stack-validation.txt.
|