Hi,

Thanks for the reply.

I understand what they do, but is there a way to capture them?

Valgrind doesn't generate any PUT to 0 for the first load, and hence I am
not able to trace the first load.


Regards,
pankaj

2011/9/23 Julian Seward <[email protected]>

> On Thursday, September 22, 2011, pankaj pawan wrote:
> > Hi all,
> >
> > For a simple program with two consecutive reads to same registers.
> >
> > 0x80483e3:   mov    0x8049ce0,%eax           (a)
> > 0x80483e8:   mov    0x8049cd0,%eax           (b)
>
> These are writes to registers, not reads from them.
>
> > IR generated by valgrind :
> >
> > IMark(0x80483E3, 5, 0)           //denotes start of an istruction
> > PUT(60) = 0x80483E3:I32
> >
> > IMark(0x80483E8, 5, 0)
> > PUT(60) = 0x80483E8:I32
>
> And these two PUTs of (60) are updates of the program counter.  The
> updates to %eax will appear as PUTs of (0).
>
> J
>
>
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Valgrind-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/valgrind-users

Reply via email to