Add a wrapper around llvm-objdump to look for indirect calls/jmps in x86 assembly.
authorEric Christopher <echristo@gmail.com>
Tue, 3 Apr 2018 07:01:33 +0000 (07:01 +0000)
committerEric Christopher <echristo@gmail.com>
Tue, 3 Apr 2018 07:01:33 +0000 (07:01 +0000)
commitb0c403d7aef0cf232563b83d5773c589d859e057
tree6051b0eb3e64958d7819a6bd369cf89c46a38088
parent9b6a65b9ef6959f390fe30385ca8851fa6f18418
Add a wrapper around llvm-objdump to look for indirect calls/jmps in x86 assembly.

Useful when looking for indirect calls/jmps the need mitigation
via retpoline or other mitigations for Spectre v2.

Feedback, extension, additional patches welcome.

llvm-svn: 329050
llvm/utils/indirect_calls.py [new file with mode: 0755]