* Francis Giraldeau ([email protected]) wrote:
> Hi,
>
> I want to relate trace events to source code. For testing, I did a small 
> C program that does a file access. In the event kernel.syscall_entry 
> sys_access, I got the instruction pointer ip=0x7fa4fba26ee7. I dumped the 
> process memory map from /proc/$PID/maps, and this address doesn't fit in 
> the process memory space. It's somewhat close to libc addresses, that are 
> in the range of 0x7f6471f56000-0x7f64724fc000.
>
> Another example, inside a TRAP, I got two addresses,  
> ip=0xffffffff812c722b

This looks like the vDSO.

 and address=0x7fa4fba2cbc0, those two addresses  
> doesn't map in the process space.
>
> First, what is the difference between ip and address attribute? And wow 
> does the ip can be converted back to the process address space?

Make sure you cat the /proc/$PID/maps from the exact same process you
gather the trace from, because the addresses at which the libraries are
loaded and the stack is located are randomised between executions.

Cheers,

Mathieu

>
> Cheer,
>
> Francis
>
>
> _______________________________________________
> ltt-dev mailing list
> [email protected]
> http://lists.casi.polymtl.ca/cgi-bin/mailman/listinfo/ltt-dev
>

-- 
Mathieu Desnoyers
Operating System Efficiency R&D Consultant
EfficiOS Inc.
http://www.efficios.com

_______________________________________________
ltt-dev mailing list
[email protected]
http://lists.casi.polymtl.ca/cgi-bin/mailman/listinfo/ltt-dev

Reply via email to