[CVE-2009-0029] System call wrappers part 20
[linux/fpc-iii.git] / scripts / mksysmap
blob1db316a3712b640f38541d65c8e1d2ff5ebb4c7e
1 #!/bin/sh -x
2 # Based on the vmlinux file create the System.map file
3 # System.map is used by module-init tools and some debugging
4 # tools to retrieve the actual addresses of symbols in the kernel.
6 # Usage
7 # mksysmap vmlinux System.map
10 #####
11 # Generate System.map (actual filename passed as second argument)
13 # $NM produces the following output:
14 # f0081e80 T alloc_vfsmnt
16 # The second row specify the type of the symbol:
17 # A = Absolute
18 # B = Uninitialised data (.bss)
19 # C = Comon symbol
20 # D = Initialised data
21 # G = Initialised data for small objects
22 # I = Indirect reference to another symbol
23 # N = Debugging symbol
24 # R = Read only
25 # S = Uninitialised data for small objects
26 # T = Text code symbol
27 # U = Undefined symbol
28 # V = Weak symbol
29 # W = Weak symbol
30 # Corresponding small letters are local symbols
32 # For System.map filter away:
33 # a - local absolute symbols
34 # U - undefined global symbols
35 # N - debugging symbols
36 # w - local weak symbols
38 # readprofile starts reading symbols when _stext is found, and
39 # continue until it finds a symbol which is not either of 'T', 't',
40 # 'W' or 'w'.
42 $NM -n $1 | grep -v '\( [aNUw] \)\|\( \$[adt]\)' > $2