Zhenyu Guo wrote:
0x4000000000000720 <gmon_initializer+48>:       [BBB]       nop.b 0x0
0x4000000000000721 <gmon_initializer+49>:             (p08)
br.cond.dpnt.few 0x4000000000000740 <gmon_initializer+80>
0x4000000000000722 <gmon_initializer+50>:
br.call.sptk.many b0=0x4000000000000720 <gmon_initializer+48>;;

Most likely this means that you are looking at unlinked (i.e. unrelocated) code. Did you run objdump on a .o file? In this case, the actual call address is in the relocation. Try objdump -r and you will see a relocation for the address 0x4000000000000722 that contains the actual call target. Also try objdump -r -d.
--
Jim Wilson, GNU Tools Support, http://www.SpecifixInc.com

Reply via email to