On Friday, November 06, 2015 07:02:59 PM Hans Petter Selasky wrote: > On 11/06/15 12:20, Andriy Gapon wrote: > > Now the strange part: > > > > 0xffffffff80619a18 <+744>: jne 0xffffffff80619a61 <__mtx_lock_flags+817> > > 0xffffffff80619a1a <+746>: mov %rbx,(%rsp) > > => 0xffffffff80619a1e <+750>: movq $0x0,0x18(%rsp) > > 0xffffffff80619a27 <+759>: movq $0x0,0x10(%rsp) > > 0xffffffff80619a30 <+768>: movq $0x0,0x8(%rsp) > > Were these instructions dumped from RAM or from the kernel ELF file? Probably not from RAM. You can use 'info files' in gdb to see what is handling the address range in question (core vs executable). x/i in ddb would have been the "real" truth. -- John BaldwinReceived on Mon Nov 09 2015 - 20:15:38 UTC
This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:41:00 UTC