Hi Tom,

I'm not sure. Again, I'd add the Vma and the SyscallVerbose debug flags
which may help figure it out. It's possible that's the address of a
dynamically-loaded library as well.

Also, this trace looks like it came from Arm instead of x86. I don't
have as much experience looking at Arm addresses and guessing the meaning
:).

Cheers,
Jason

On Tue, Mar 22, 2022 at 8:32 AM tomjosekallooran--- via gem5-users <
gem5-users@gem5.org> wrote:

> Hi Jason,
> I have one doubt.
> The following is some selected parts of Exec trace:
> If we look at lines:
> line 4    :   ldr   x1, [sp]                : MemRead :
> D=0x0000000000000001
> A=0x7ffffefe70
> line 74  :   ldr   x1, [x0]                : MemRead :
> D=0x0000000000000010
> A=0x7ffffefe90
> line 88  :   ldr   x3, [x8, #3840]    : MemRead :  D=0x0000000000000001
> A=0x498f00
> line 92  :   ldr   x7, [x10, #3896]  : MemRead :  D=0x0000000000010000
> A=0x499f38
> line 152:   ldr   x28, [x0, #8]        : MemRead :  D=0x00000000004471e3
> A=0x7ffffefe98
>
> Prior to these lines, there was no MemWrite to the corresponding address.
> Is this also related to Stack addresses?Could you please provide an insight
> on how these addresses are loaded with these data?
>
> Any information on the same would hugely help.
>
> Regards,
> Tom
> _______________________________________________
> gem5-users mailing list -- gem5-users@gem5.org
> To unsubscribe send an email to gem5-users-le...@gem5.org
> %(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s
>
_______________________________________________
gem5-users mailing list -- gem5-users@gem5.org
To unsubscribe send an email to gem5-users-le...@gem5.org
%(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s

Reply via email to