From a1d0e5515e0eb706cb530ce1b9f285a6b8afc821 Mon Sep 17 00:00:00 2001 From: Ryan Long Date: Wed, 28 Jul 2021 13:20:34 -0400 Subject: Remove SymbolsToAnalyze global variable - Removed SymbolsToAnalyze from app_common and replaced it with the symbolsToAnalyze_m member variable in DesiredSymbols, GcovData, and ObjdumpProcessor - Added a parameter to constructors to initialize symbolsToAnalyze_m - Moved the definition of objdumpLine_t out of ObjdumpProcessor to make it work with DesiredSymbols --- tester/covoar/TraceConverter.cc | 17 ++++++++++++++--- 1 file changed, 14 insertions(+), 3 deletions(-) (limited to 'tester/covoar/TraceConverter.cc') diff --git a/tester/covoar/TraceConverter.cc b/tester/covoar/TraceConverter.cc index c997702..67edd11 100644 --- a/tester/covoar/TraceConverter.cc +++ b/tester/covoar/TraceConverter.cc @@ -89,9 +89,10 @@ int main( Coverage::ExecutableInfo* executableInfo; rld::process::tempfile objdumpFile( ".dmp" ); rld::process::tempfile err( ".err" ); - Coverage::ObjdumpProcessor objdumpProcessor; + Coverage::DesiredSymbols symbolsToAnalyze; bool verbose = false; std::string dynamicLibrary; + Coverage::ObjdumpProcessor objdumpProcessor( symbolsToAnalyze ); setup_signals(); @@ -132,9 +133,19 @@ int main( TargetInfo = Target::TargetFactory( cpuname ); if ( !dynamicLibrary.empty() ) - executableInfo = new Coverage::ExecutableInfo( executable, dynamicLibrary ); + executableInfo = new Coverage::ExecutableInfo( + executable, + dynamicLibrary, + false, + symbolsToAnalyze + ); else - executableInfo = new Coverage::ExecutableInfo( executable ); + executableInfo = new Coverage::ExecutableInfo( + executable, + "", + false, + symbolsToAnalyze + ); // If a dynamic library was specified, determine the load address. if ( !dynamicLibrary.empty() ) -- cgit v1.2.3