Hi,
Thanks for the reply.
I understand what they do, but is there a way to capture them?
Valgrind doesn't generate any PUT to 0 for the first load, and hence I am
not able to trace the first load.
Regards,
pankaj
2011/9/23 Julian Seward <[email protected]>
> On Thursday, September 22, 2011, pankaj pawan wrote:
> > Hi all,
> >
> > For a simple program with two consecutive reads to same registers.
> >
> > 0x80483e3: mov 0x8049ce0,%eax (a)
> > 0x80483e8: mov 0x8049cd0,%eax (b)
>
> These are writes to registers, not reads from them.
>
> > IR generated by valgrind :
> >
> > IMark(0x80483E3, 5, 0) //denotes start of an istruction
> > PUT(60) = 0x80483E3:I32
> >
> > IMark(0x80483E8, 5, 0)
> > PUT(60) = 0x80483E8:I32
>
> And these two PUTs of (60) are updates of the program counter. The
> updates to %eax will appear as PUTs of (0).
>
> J
>
>
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Valgrind-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/valgrind-users