> In the event > kernel.syscall_entry sys_access, I got the instruction pointer > ip=0x7fa4fba26ee7. I dumped the process memory map from > /proc/$PID/maps, and this address doesn't fit in the process memory > space. It's somewhat close to libc addresses, that are in the range of
That makes sense, most system calls first go through libc. > Another example, inside a TRAP, I got two addresses, > ip=0xffffffff812c722b and address=0x7fa4fba2cbc0, those two addresses > First, what is the difference between ip and address attribute? And > wow does the ip can be converted back to the process address space? The ip is probably in the kernel space. The address could be the data access address causing a trap. _______________________________________________ ltt-dev mailing list [email protected] http://lists.casi.polymtl.ca/cgi-bin/mailman/listinfo/ltt-dev
