On Thu, Apr 28, 2016 at 05:48:33AM -0400, Brad Hubbard wrote: [...] > The offsets are relative to the address where the function is loaded in memory > and I don't think searching for 0x6d, 0x2fb, 0x62a or 0x75a will give you the > correct result if you don't know which function you are dealing with. The > offset is just an offset from the start of *some function* so without knowing > which function we can't be sure what instruction we were on. That's my > understanding anyway. Then I was reading the trace incorrectly. I assumed the address pointed to the instruction in the disassembled binary :/ My mistake. Thanks! -- Regards, Karol
Attachment:
signature.asc
Description: Digital signature
_______________________________________________ ceph-users mailing list ceph-users@xxxxxxxxxxxxxx http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com