https://sourceware.org/bugzilla/show_bug.cgi?id=30834
Bug ID: 30834 Summary: improve disassembly output for call and branch instructions Product: binutils Version: 2.42 (HEAD) Status: NEW Severity: normal Priority: P2 Component: gprofng Assignee: vladimir.mezentsev at oracle dot com Reporter: vladimir.mezentsev at oracle dot com Target Milestone: --- gprofng only displays the hexadecimal address in call and jump instructions: % gprofng display src -dis main ./a.out | egrep 'call|jmp' [23] 401eca: call 0x1f68 [24] 401ee6: call 0xfffffffffffffafa [26] 401ef9: jmp 0x13f [28] 401f0d: call 0x3a2f [29] 401f27: call 0xfffffffffffffab9 Need to display the function name in the calling instruction, and the absolute and relative address in the branch instruction. For example, the output of gdb and er_src is: % gdb -batch -ex 'file a.out' -ex 'disassemble main' 2>&1 | egrep 'call|jmp' 0x0000000000401eca <+8>: call 0x403e32 <bfd_init> 0x0000000000401ee6 <+36>: call 0x4019e0 <printf@plt> 0x0000000000401ef9 <+55>: jmp 0x402038 <main+374> 0x0000000000401f0d <+75>: call 0x40593c <bfd_openr> 0x0000000000401f27 <+101>: call 0x4019e0 <printf@plt> % er_src -dis main a.out | egrep 'call|jmp' [23] 401eca: call bfd_init [ 0x403e32, .+0x1f68 ] [24] 401ee6: call .-0x506 [ 0x4019e0 ] [26] 401ef9: jmp .+0x13f [ 0x402038 ] [28] 401f0d: call bfd_openr [ 0x40593c, .+0x3a2f ] [29] 401f27: call .-0x547 [ 0x4019e0 ] -- You are receiving this mail because: You are on the CC list for the bug.