G Shyam Sundar wrote:
> Hi,
>    I am working with a kernel module, which was compiled using GCC
> 4.X, for x86_64 platform.
>    After dis-assembling the module object file, I see that the callq
> function is always called with the next instruction of the code as the
> target address(based on IP only), as the offset feild following the
> instruction "e8"(corresponding to callq) is always 0, instead of the
> address of the function where I would think the call should be
> actually made to.

Use "objdump --reloc"

Andrew.

Reply via email to