On Thu, Apr 28, 2016 at 05:48:33AM -0400, Brad Hubbard wrote:
[...]
> The offsets are relative to the address where the function is loaded in memory
> and I don't think searching for 0x6d, 0x2fb, 0x62a or 0x75a will give you the
> correct result if you don't know which function you are dealing with.  The
> offset is just an offset from the start of *some function* so without knowing
> which function we can't be sure what instruction we were on.  That's my
> understanding anyway.

Then I was reading the trace incorrectly. I assumed the address pointed to the
instruction in the disassembled binary :/ My mistake.

Thanks!

-- 
Regards,
Karol

Attachment: signature.asc
Description: Digital signature

_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com

Reply via email to