| /Linux-v5.4/scripts/ | 
| D | check_extable.sh | 10 objdump -hj __ex_table ${obj} 2> /dev/null > /dev/null15 suspicious_relocs=$(objdump -rj __ex_table ${obj}  | tail -n +6 |
 33 …eval $(objdump -t ${obj} | grep ${1} | sed 's/\([0-9a-f]\+\) .\{7\} \([^ \t]\+\).*/section="\2"; s…
 55 …eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | …
 72     objdump -hwj ${section} ${obj} | grep -q CODE
 134     objdump -hj .debug_info ${obj} 2> /dev/null > /dev/null ||
 
 | 
| D | recordmcount.pl | 123 my ($arch, $endian, $bits, $objdump, $objcopy, $cc,151 $objdump = 'objdump' if (!$objdump);
 239     $objdump .= " -M x86-64";
 249     $objdump .= " -M i386";
 371     $objdump .= " -Melf-trad".$endian."mips ";
 499 open(IN, "LANG=C $objdump -hdr $inputfile|") || die "error running $objdump";
 
 | 
| D | namespace.pl | 71 my $objdump = ($ENV{'OBJDUMP'} || "objdump") . " -s -j .comment";241 	        open(my $objdumpdata, "$objdump $basename|")
 242 		    or die "$objdump $fullname failed $!\n";
 
 | 
| D | decodecode | 89 	${CROSS_COMPILE}objdump $OBJDUMPFLAGS -S $1.o | \
 | 
| /Linux-v5.4/arch/powerpc/tools/ | 
| D | unrel_branch_check.sh | 15 objdump="$1"21 "$objdump" -R "$vmlinux" -d --start-address=0xc000000000000000		\
 28 "$objdump" -R "$vmlinux" -D --start-address=0xc000000000000000		\
 
 | 
| D | relocs_check.sh | 19 objdump="$1"23 "$objdump" -R "$vmlinux" |
 
 | 
| /Linux-v5.4/arch/sparc/vdso/ | 
| D | checkundef.sh | 2 objdump="$1"4 $objdump -t "$file" | grep '*UUND*' | grep -v '#scratch' > /dev/null 2>&1
 
 | 
| /Linux-v5.4/tools/perf/arch/x86/tests/ | 
| D | gen-insn-x86-dat.sh | 22 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-64.c30 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-32.c
 
 | 
| /Linux-v5.4/tools/perf/arch/arm/annotate/ | 
| D | instructions.c | 54 	arch->objdump.comment_char	  = ';';  in arm__annotate_init()55 	arch->objdump.skip_functions_char = '+';  in arm__annotate_init()
 
 | 
| /Linux-v5.4/tools/perf/arch/arm64/annotate/ | 
| D | instructions.c | 113 	arch->objdump.comment_char	  = '/';  in arm64__annotate_init()114 	arch->objdump.skip_functions_char = '+';  in arm64__annotate_init()
 
 | 
| /Linux-v5.4/tools/perf/arch/arc/annotate/ | 
| D | instructions.c | 7 	arch->objdump.comment_char = ';';  in arc__annotate_init()
 | 
| /Linux-v5.4/tools/perf/Documentation/ | 
| D | perf-annotate.txt | 110 --disassembler-style=:: Set disassembler style for objdump.112 --objdump=<path>::
 113         Path to objdump binary.
 
 | 
| D | perf-report.txt | 335 --disassembler-style=:: Set disassembler style for objdump.367 --objdump=<path>::
 368         Path to objdump binary.
 
 | 
| /Linux-v5.4/arch/x86/tools/ | 
| D | chkobjdump.awk | 11 /^GNU objdump/ {
 | 
| /Linux-v5.4/tools/perf/arch/s390/annotate/ | 
| D | instructions.c | 25 	if (arch->objdump.skip_functions_char &&  in s390_call__parse()26 	    strchr(name, arch->objdump.skip_functions_char))  in s390_call__parse()
 
 | 
| /Linux-v5.4/arch/powerpc/kernel/ | 
| D | prom_init_check.sh | 41     size=$(objdump -h -j $section $file 2>/dev/null | awk "\$2 == \"$section\" {print \$3}")
 | 
| /Linux-v5.4/tools/perf/arch/csky/annotate/ | 
| D | instructions.c | 44 	arch->objdump.comment_char = '/';  in csky__annotate_init()
 | 
| /Linux-v5.4/tools/perf/arch/powerpc/annotate/ | 
| D | instructions.c | 57 		arch->objdump.comment_char      = '#';  in powerpc__annotate_init()
 | 
| /Linux-v5.4/tools/perf/arch/sparc/annotate/ | 
| D | instructions.c | 165 		arch->objdump.comment_char = '#';  in sparc__annotate_init()
 | 
| /Linux-v5.4/arch/powerpc/boot/ | 
| D | wrapper | 438 membase=`${CROSS}objdump -p "$kernel" | grep -m 1 LOAD | awk '{print $7}'`510 entry=`${CROSS}objdump -f "$ofile" | grep '^start address ' | cut -d' ' -f3`
 
 | 
| /Linux-v5.4/Documentation/x86/ | 
| D | exception-tables.rst | 165  > objdump --section-headers vmlinux192  > objdump --disassemble --section=.text vmlinux
 210  > objdump --disassemble --section=.fixup vmlinux
 218  > objdump --full-contents --section=__ex_table vmlinux
 
 | 
| /Linux-v5.4/Documentation/admin-guide/ | 
| D | bug-hunting.rst | 186 objdump  subsection189 To debug a kernel, use objdump and look for the hex offset from the crash
 195     $ objdump -r -S -l --disassemble net/dccp/ipv4.o
 219      "objdump --disassemble foo.o".
 
 | 
| /Linux-v5.4/tools/perf/util/ | 
| D | annotate.c | 92 	} objdump;  member183 		.objdump =  {
 194 		.objdump =  {
 201 		.objdump = {
 256 	if (arch->objdump.skip_functions_char &&  in call__parse()
 257 	    strchr(name, arch->objdump.skip_functions_char))  in call__parse()
 339 	ops->raw_comment = strchr(ops->raw, arch->objdump.comment_char);  in jump__parse()
 550 	comment = strchr(s, arch->objdump.comment_char);  in mov__parse()
 613 	comment = strchr(s, arch->objdump.comment_char);  in dec__parse()
 
 | 
| /Linux-v5.4/tools/bpf/bpftool/bash-completion/ | 
| D | bpftool | 86     maps=$(objdump -j maps -t $obj 2>/dev/null | \98     nmaps=$(objdump -j maps -t $obj 2>/dev/null | grep -c 'g     . maps')
 
 | 
| /Linux-v5.4/Documentation/trace/ | 
| D | uprobetracer.rst | 112     # objdump -T /bin/zsh | grep -w zfree
 |