https://sourceware.org/bugzilla/show_bug.cgi?id=24836

Florian Weimer <fweimer at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |fweimer at redhat dot com

--- Comment #5 from Florian Weimer <fweimer at redhat dot com> ---
(In reply to crusader.mike from comment #4)
> Is this the reason for this behaviour?
> 
> $ readelf -s procmon.e | grep xalan
>    237: 0000000000415bb0    33 FUNC    WEAK   DEFAULT   13
> _ZN11xalanc_1_1111XalanVe
>    289: 0000000000415bb0    33 FUNC    WEAK   DEFAULT   13
> _ZN11xalanc_1_1111XalanVe
> 
> How can I drill deeper? (i.e. figure out what kind of symbols these are, why
> my executable references them, etc)

Try readelf -sW.  The non-truncated symbol should be decodable by c++filt.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
bug-binutils mailing list
bug-binutils@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-binutils

Reply via email to