Hi Ahmad,

(gdb) disas 0xa830
Dump of assembler code for function ev_link_from_action(PdfDocument*,
PopplerAction*):
    0x000000000000a830 <+0>:     cmpl   $0xa,(%rsi)
[...]
The output of `objdump -D` on the library for this offset is shown below:

a826:   66 2e 0f 1f 84 00 00    nopw   %cs:0x0(%rax,%rax,1)
a82d:   00 00 00
a830:   83 3e 0a                cmpl   $0xa,(%rsi)


No function name is printed at `0xa830`. Also, the output of `objdump
-t` on the library does not contain this offset. How can I detect the
symbol name assuming the offset is known and GDB is not available?

Objdump is likely using the symbol information in libpdfdocument.so and
not consulting the DWARF debug information.  Since the ev_link_from_action
symbol does not appear to be in the symbol table (based upon what you said
about "objdump -t"'s output), no symbol is display for address 0xa830.

This is just a guess however.  We would need a copy of the actual
libpdfdocument.so binary to investigate further.

Cheers
  Nick



Reply via email to