When there are only uimage and no vmlinux, you can view the disassembly in this way when you encounter problems.
1. Refer to compressed image from Uimage
Use the UE to open the Uimage file, find the 1f 8b location, such as, from 0X58D4 to gzip compressed file, use DD to intercept the previous content.
000058c0h:75 6E 6F 6D (20 65 72) 6F 6E; Uncompression ER
000058d0h:72 6F 1F 8B (E4) FD; Ror..? ....... Playing
000058e0h:09 D5 B5 0E EF D1 7D 7A; 楾 Light 7 颯 cwuw duplicate Z
000058f0h:40 5A B5 of 0A 45 21 69; @z@ (...?) Tbp.e!i
2. Extract Original image
GZIP-DC zimage > Image
3. Anti-assembly
Arm-linux-objcopy--change-addresses=0x80008000-i binary-o elf32-littlearm-b arm image out
Arm-linux-objdump-d out > Dump.dis
4. Kernel symbol table
Cat/proc/kallsyms can list all the symbols and corresponding addresses in the kernel.
Android If the address is 0, you need to enter:
echo 0 >/proc/sys/kernel/kptr_restrict