Thanks Pat.Here's the output of "otool -v -t check"Is this what is required?Do 
let me know if I need to disassemble in some other way.
-----------------------------------------------------------check:(__TEXT,__text)
 sectionstart:0000000100000c78  pushq   $0x000000000100000c7a   movq    
%rsp,%rbp0000000100000c7d       andq    $0xf0,%rsp0000000100000c81      movq    
0x08(%rbp),%rdi0000000100000c85 leaq    0x10(%rbp),%rsi0000000100000c89 movl    
%edi,%edx0000000100000c8b       addl    $0x01,%edx0000000100000c8e      shll    
$0x03,%edx0000000100000c91      addq    %rsi,%rdx0000000100000c94       movq    
%rdx,%rcx0000000100000c97       jmp     0x100000c9d0000000100000c99     addq    
$0x08,%rcx0000000100000c9d      cmpq    $0x00,(%rcx)0000000100000ca1    jne     
0x100000c990000000100000ca3     addq    $0x08,%rcx0000000100000ca7      callq   
0x100000cb40000000100000cac     movl    %eax,%edi0000000100000cae       callq   
0x100000e5c0000000100000cb3     hlt_main:0000000100000cb4       pushq   
%rbp0000000100000cb5    movq    %rsp,%rbp0000000100000cb8       subq    
$0x20,%rsp0000000100000cbc      movl    $0x000001c8,%edi0000000100000cc1        
callq   0x100000e620000000100000cc6     movq    %rax,0xf0(%rbp)0000000100000cca 
movl    $0x000011d0,%edi0000000100000ccf        callq   
0x100000e620000000100000cd4     movq    %rax,0xe8(%rbp)0000000100000cd8 movq    
0xe8(%rbp),%rdx0000000100000cdc addq    $0x00000130,%rdx0000000100000ce3        
movq    0xe8(%rbp),%rcx0000000100000ce7 addq    
$0x00000098,%rcx0000000100000cee        movq    0xf0(%rbp),%rax0000000100000cf2 
movq    0xe8(%rbp),%rsi0000000100000cf6 movq    %rax,%r90000000100000cf9        
movq    %rdx,%r80000000100000cfc        movq    %rsi,%rdx0000000100000cff       
movl    $0x00000098,%esi0000000100000d04        leaq    
0x00000165(%rip),%rdi0000000100000d0b   movl    
$0x00000000,%eax0000000100000d10        callq   0x100000e680000000100000d15     
movq    $0xffffffff,%rax0000000100000d1c        cmpq    
$0xff,%rax0000000100000d20      je      0x100000d3e0000000100000d22     movq    
$0xffffffff,%rcx0000000100000d29        movq    0xf0(%rbp),%rdi0000000100000d2d 
movl    $0x00000098,%edx0000000100000d32        movl    
$0x00000000,%esi0000000100000d37        callq   0x100000e560000000100000d3c     
jmp     0x100000d510000000100000d3e     movq    0xf0(%rbp),%rdi0000000100000d42 
movl    $0x00000098,%edx0000000100000d47        movl    
$0x00000000,%esi0000000100000d4c        callq   0x100000df60000000100000d51     
movl    $0x00000000,0xfc(%rbp)0000000100000d58  movl    
$0x00000000,0xfc(%rbp)0000000100000d5f  jmp     0x100000de70000000100000d64     
movl    0xfc(%rbp),%esi0000000100000d67 leaq    
0x0000012d(%rip),%rdi0000000100000d6e   movl    
$0x00000000,%eax0000000100000d73        callq   0x100000e680000000100000d78     
movq    $0xffffffff,%rax0000000100000d7f        cmpq    
$0xff,%rax0000000100000d83      je      0x100000daf0000000100000d85     movq    
$0xffffffff,%rcx0000000100000d8c        movl    0xfc(%rbp),%eax0000000100000d8f 
cdqe0000000100000d91    imulq   $0x00000098,%rax,%rax0000000100000d98   movq    
%rax,%rdi0000000100000d9b       addq    0xe8(%rbp),%rdi0000000100000d9f movq    
0xf0(%rbp),%rsi0000000100000da3 movl    $0x000001c8,%edx0000000100000da8        
callq   0x100000e500000000100000dad     jmp     0x100000dd00000000100000daf     
movl    0xfc(%rbp),%eax0000000100000db2 cdqe0000000100000db4    imulq   
$0x00000098,%rax,%rax0000000100000dbb   movq    %rax,%rdi0000000100000dbe       
addq    0xe8(%rbp),%rdi0000000100000dc2 movq    0xf0(%rbp),%rsi0000000100000dc6 
movl    $0x000001c8,%edx0000000100000dcb        callq   
0x100000e220000000100000dd0     movl    0xfc(%rbp),%esi0000000100000dd3 leaq    
0x000000ce(%rip),%rdi0000000100000dda   movl    
$0x00000000,%eax0000000100000ddf        callq   0x100000e680000000100000de4     
incl    0xfc(%rbp)0000000100000de7      cmpl    
$0x1a,0xfc(%rbp)0000000100000deb        jle     0x200000d640000000100000df1     
movl    0xfc(%rbp),%eax0000000100000df4 leave0000000100000df5   
ret___inline_memset_chk:0000000100000df6        pushq   %rbp0000000100000df7    
movq    %rsp,%rbp0000000100000dfa       subq    $0x20,%rsp0000000100000dfe      
movq    %rdi,0xf8(%rbp)0000000100000e02 movl    %esi,0xf4(%rbp)0000000100000e05 
movq    %rdx,0xe8(%rbp)0000000100000e09 movq    
$0xffffffff,%rcx0000000100000e10        movq    0xe8(%rbp),%rdx0000000100000e14 
movl    0xf4(%rbp),%esi0000000100000e17 movq    0xf8(%rbp),%rdi0000000100000e1b 
callq   0x100000e560000000100000e20     leave0000000100000e21   
ret___inline_memcpy_chk:0000000100000e22        pushq   %rbp0000000100000e23    
movq    %rsp,%rbp0000000100000e26       subq    $0x20,%rsp0000000100000e2a      
movq    %rdi,0xf8(%rbp)0000000100000e2e movq    %rsi,0xf0(%rbp)0000000100000e32 
movq    %rdx,0xe8(%rbp)0000000100000e36 movq    
$0xffffffff,%rcx0000000100000e3d        movq    0xe8(%rbp),%rdx0000000100000e41 
movq    0xf0(%rbp),%rsi0000000100000e45 movq    0xf8(%rbp),%rdi0000000100000e49 
callq   0x100000e500000000100000e4e     leave0000000100000e4f   
ret-------------------------------------------------------

> > I suspect it's not the real problem in your case.
> 
> And I suspect it is.  Of course, I could be wrong.  There is only one
> way to find out...
> 
> > We need to see the actual code
> > that is being executed.  In particular, you haven't shown the code which
> > surrounds 0x7FFFFFE00BAC from your initial report:
> >    ==57528== Invalid read of size 8
> >    ==57528==    at 0x7FFFFFE00BAC: ???
> >    ==57528==    by 0x100000E4D: __inline_memcpy_chk (in ./check)
> > Please produce a disassembly of __inline_memcpy_chk that surrounds
> > address 0x100000E4D.  Please produce a disassembly of the routine
> > that __inline_memcpy_chk calls (probably surrounding 0x7FFFFFE00BAC).
> 
> I agree completely.  Seeing the disassembly is the only way to know
> what is really going on.
> 
>  - Pat

                                          
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Valgrind-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/valgrind-users

Reply via email to