G Shyam Sundar wrote: > Hi, > I am working with a kernel module, which was compiled using GCC > 4.X, for x86_64 platform. > After dis-assembling the module object file, I see that the callq > function is always called with the next instruction of the code as the > target address(based on IP only), as the offset feild following the > instruction "e8"(corresponding to callq) is always 0, instead of the > address of the function where I would think the call should be > actually made to.
Use "objdump --reloc" Andrew.