https://sourceware.org/bugzilla/show_bug.cgi?id=24836
Florian Weimer <fweimer at redhat dot com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |fweimer at redhat dot com --- Comment #5 from Florian Weimer <fweimer at redhat dot com> --- (In reply to crusader.mike from comment #4) > Is this the reason for this behaviour? > > $ readelf -s procmon.e | grep xalan > 237: 0000000000415bb0 33 FUNC WEAK DEFAULT 13 > _ZN11xalanc_1_1111XalanVe > 289: 0000000000415bb0 33 FUNC WEAK DEFAULT 13 > _ZN11xalanc_1_1111XalanVe > > How can I drill deeper? (i.e. figure out what kind of symbols these are, why > my executable references them, etc) Try readelf -sW. The non-truncated symbol should be decodable by c++filt. -- You are receiving this mail because: You are on the CC list for the bug. _______________________________________________ bug-binutils mailing list bug-binutils@gnu.org https://lists.gnu.org/mailman/listinfo/bug-binutils