> In the event  
> kernel.syscall_entry sys_access, I got the instruction pointer  
> ip=0x7fa4fba26ee7. I dumped the process memory map from  
> /proc/$PID/maps, and this address doesn't fit in the process memory  
> space. It's somewhat close to libc addresses, that are in the range of

That makes sense, most system calls first go through libc.

> Another example, inside a TRAP, I got two addresses,  
> ip=0xffffffff812c722b and address=0x7fa4fba2cbc0, those two addresses 

> First, what is the difference between ip and address attribute? And  
> wow does the ip can be converted back to the process address space?

The ip is probably in the kernel space. The address could be the data access 
address causing a trap.

_______________________________________________
ltt-dev mailing list
[email protected]
http://lists.casi.polymtl.ca/cgi-bin/mailman/listinfo/ltt-dev

Reply via email to