binutils-gdb/binutils/testsuite/binutils-all/readelf.wKis
Nick Clifton 39f0547e55 Extend objdump's --dwarf=follow-links option so that separate debug info files will also be affected by other dump function, and symbol tables from separate debug info files will be used when disassembling the main file.
* objdump.c (sym_ok): New function.
	(find_symbol_for_address): Use new function.
	(disassemble_section): Compare sections by name, not pointer.
	(dump_dwarf): Move code to initialise byte_get pointer and iterate
	over separate debug files from here to ...
	(dump_bfd): ... here.  Add parameter indicating that a separate
	debug info file is being dumped.  For main file, pull in the
	symbol tables from all separate debug info files.
	(display_object): Update call to dump_bfd.
	* doc/binutils.texi: Document extened behaviour of the
	--dwarf=follow-links option.
	* NEWS: Mention this new feature.
	* testsuite/binutils-all/objdump.WK2: Update expected output.
	* testsuite/binutils-all/objdump.exp (test_follow_debuglink): Add
	options and dump file parameters.
	Add extra test.
	* testsuite/binutils-all/objdump.WK3: New file.
	* testsuite/binutils-all/readelf.exp: Change expected output for
	readelf -wKis test.
	* testsuite/binutils-all/readelf.wKis: New file.
2019-02-25 12:15:41 +00:00

26 lines
910 B
Plaintext

#...
.*debuglink.o: Found separate debug info file:.*linkdebug.debug
#...
Contents of the .debug_str section \(loaded from .*debuglink.o\):
0x00000000 73747269 6e672d31 00737472 696e672d string-1.string-
0x00000010 3200 2.
#...
Contents of the .debug_info section \(loaded from .*debuglink.o\):
Compilation Unit @ offset 0x0:
Length: 0x12 \(32-bit\)
Version: 4
Abbrev Offset: 0x0
Pointer Size: 4
<0><b>: Abbrev Number: 1 \(DW_TAG_compile_unit\)
<c> DW_AT_name : \(indirect string, offset: 0x0\): string-1
<0><10>: Abbrev Number: 2 \(DW_TAG_subprogram\)
<11> DW_AT_name : \(alt indirect string, offset: 0x0\) string-3
#...
Contents of the .debug_str section \(loaded from .*linkdebug.debug\):
0x00000000 73747269 6e672d33 00737472 696e672d string-3.string-
0x00000010 3400 4.
#pass