Dear Colleagues,
If you received this email in error, please forward it to the appropriate
department at your institution. If you wish to unsubscribe please follow
the unsubscribe link at bottom of the email.
Please do not reply to this message. If you need to contact us please email
us at i...
Hi,
I have a question regarding the ability of strace to print the
instruction pointer where the syscall takes place. I'm trying to use
this feature to trace a 32-bit process running on a amd64 gentoo
system. Unfortunately, the eip values returned by strace don't make
much sense:
[f7fc643