https://sourceware.org/bugzilla/show_bug.cgi?id=24836
Florian Weimer <fweimer at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |fweimer at redhat dot com
--- Comment #5 from Florian Weimer <fweimer at redhat dot com> ---
(In reply to crusader.mike from comment #4)
> Is this the reason for this behaviour?
>
> $ readelf -s procmon.e | grep xalan
> 237: 0000000000415bb0 33 FUNC WEAK DEFAULT 13
> _ZN11xalanc_1_1111XalanVe
> 289: 0000000000415bb0 33 FUNC WEAK DEFAULT 13
> _ZN11xalanc_1_1111XalanVe
>
> How can I drill deeper? (i.e. figure out what kind of symbols these are, why
> my executable references them, etc)
Try readelf -sW. The non-truncated symbol should be decodable by c++filt.
--
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
bug-binutils mailing list
[email protected]
https://lists.gnu.org/mailman/listinfo/bug-binutils