| /Linux-v5.15/scripts/ | 
| D | check_extable.sh | 10 objdump -hj __ex_table ${obj} 2> /dev/null > /dev/null15 suspicious_relocs=$(objdump -rj __ex_table ${obj}  | tail -n +6 |
 33 …eval $(objdump -t ${obj} | grep ${1} | sed 's/\([0-9a-f]\+\) .\{7\} \([^ \t]\+\).*/section="\2"; s…
 55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | …
 72     objdump -hwj ${section} ${obj} | grep -q CODE
 134     objdump -hj .debug_info ${obj} 2> /dev/null > /dev/null ||
 
 | 
| D | recordmcount.pl | 123 my ($arch, $endian, $bits, $objdump, $objcopy, $cc,151 $objdump = 'objdump' if (!$objdump);
 206     $objdump .= " -M x86-64";
 216     $objdump .= " -M i386";
 339     $objdump .= " -Melf-trad".$endian."mips ";
 460 open(IN, "LC_ALL=C $objdump -hdr $inputfile|") || die "error running $objdump";
 
 | 
| D | decodecode | 101 	${CROSS_COMPILE}objdump $OBJDUMPFLAGS -S $t.o | \
 | 
| /Linux-v5.15/arch/sparc/vdso/ | 
| D | checkundef.sh | 2 objdump="$1"4 $objdump -t "$file" | grep '*UUND*' | grep -v '#scratch' > /dev/null 2>&1
 
 | 
| /Linux-v5.15/arch/powerpc/tools/ | 
| D | relocs_check.sh | 19 objdump="$1"30 $objdump -R "$vmlinux" |
 
 | 
| D | unrel_branch_check.sh | 9 objdump="$1"27 $objdump -D --no-show-raw-insn --start-address="$kstart" --stop-address="$end_intr" "$vmlinux" |
 
 | 
| /Linux-v5.15/tools/perf/arch/x86/tests/ | 
| D | gen-insn-x86-dat.sh | 22 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-64.c30 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-32.c
 
 | 
| /Linux-v5.15/tools/perf/arch/arm/annotate/ | 
| D | instructions.c | 54 	arch->objdump.comment_char	  = ';';  in arm__annotate_init()55 	arch->objdump.skip_functions_char = '+';  in arm__annotate_init()
 
 | 
| /Linux-v5.15/tools/perf/arch/arm64/annotate/ | 
| D | instructions.c | 113 	arch->objdump.comment_char	  = '/';  in arm64__annotate_init()114 	arch->objdump.skip_functions_char = '+';  in arm64__annotate_init()
 
 | 
| /Linux-v5.15/tools/perf/arch/arc/annotate/ | 
| D | instructions.c | 7 	arch->objdump.comment_char = ';';  in arc__annotate_init()
 | 
| /Linux-v5.15/tools/perf/arch/s390/annotate/ | 
| D | instructions.c | 25 	if (arch->objdump.skip_functions_char &&  in s390_call__parse()26 	    strchr(name, arch->objdump.skip_functions_char))  in s390_call__parse()
 
 | 
| /Linux-v5.15/arch/x86/tools/ | 
| D | chkobjdump.awk | 11 /^GNU objdump/ {
 | 
| /Linux-v5.15/tools/perf/Documentation/ | 
| D | perf-annotate.txt | 117 --disassembler-style=:: Set disassembler style for objdump.119 --objdump=<path>::
 120         Path to objdump binary.
 
 | 
| /Linux-v5.15/Documentation/translations/zh_CN/admin-guide/ | 
| D | bug-hunting.rst | 184 objdump  subsection187 要调试内核,请使用objdump并从崩溃输出中查找十六进制偏移,以找到有效的代码/汇
 191     $ objdump -r -S -l --disassemble net/dccp/ipv4.o
 214      "objdump --disassemble foo.o".
 
 | 
| /Linux-v5.15/Documentation/translations/zh_TW/admin-guide/ | 
| D | bug-hunting.rst | 187 objdump  subsection190 要調試內核,請使用objdump並從崩潰輸出中查找十六進位偏移,以找到有效的代碼/匯
 194     $ objdump -r -S -l --disassemble net/dccp/ipv4.o
 217      "objdump --disassemble foo.o".
 
 | 
| /Linux-v5.15/arch/powerpc/kernel/ | 
| D | prom_init_check.sh | 41     size=$(objdump -h -j $section $file 2>/dev/null | awk "\$2 == \"$section\" {print \$3}")
 | 
| /Linux-v5.15/tools/perf/arch/csky/annotate/ | 
| D | instructions.c | 44 	arch->objdump.comment_char = '/';  in csky__annotate_init()
 | 
| /Linux-v5.15/tools/perf/arch/mips/annotate/ | 
| D | instructions.c | 42 		arch->objdump.comment_char = '#';  in mips__annotate_init()
 | 
| /Linux-v5.15/tools/perf/arch/powerpc/annotate/ | 
| D | instructions.c | 57 		arch->objdump.comment_char      = '#';  in powerpc__annotate_init()
 | 
| /Linux-v5.15/tools/perf/arch/sparc/annotate/ | 
| D | instructions.c | 165 		arch->objdump.comment_char = '#';  in sparc__annotate_init()
 | 
| /Linux-v5.15/arch/powerpc/boot/ | 
| D | wrapper | 440 membase=`${CROSS}objdump -p "$kernel" | grep -m 1 LOAD | awk '{print $7}'`512 entry=`${CROSS}objdump -f "$ofile" | grep '^start address ' | cut -d' ' -f3`
 
 | 
| /Linux-v5.15/Documentation/x86/ | 
| D | exception-tables.rst | 165  > objdump --section-headers vmlinux192  > objdump --disassemble --section=.text vmlinux
 210  > objdump --disassemble --section=.fixup vmlinux
 218  > objdump --full-contents --section=__ex_table vmlinux
 
 | 
| /Linux-v5.15/Documentation/admin-guide/ | 
| D | bug-hunting.rst | 190 objdump  subsection193 To debug a kernel, use objdump and look for the hex offset from the crash
 199     $ objdump -r -S -l --disassemble net/dccp/ipv4.o
 224      "objdump --disassemble foo.o".
 
 | 
| /Linux-v5.15/tools/perf/util/ | 
| D | annotate.c | 88 	} objdump;  member177 		.objdump = {
 187 		.objdump =  {
 198 		.objdump =  {
 205 		.objdump = {
 260 	if (arch->objdump.skip_functions_char &&  in call__parse()
 261 	    strchr(name, arch->objdump.skip_functions_char))  in call__parse()
 349 	ops->raw_comment = strchr(ops->raw, arch->objdump.comment_char);  in jump__parse()
 562 	comment = strchr(s, arch->objdump.comment_char);  in mov__parse()
 625 	comment = strchr(s, arch->objdump.comment_char);  in dec__parse()
 
 | 
| /Linux-v5.15/Documentation/bpf/ | 
| D | llvm_reloc.rst | 32 the code with ``llvm-objdump -dr test.o``::159 following code with `llvm-objdump -dr test.o``::
 
 |