Created
July 2, 2014 15:02
-
-
Save radare/4ed3ea985d32b37c90b3 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[0x00000000]> e asm.arch=arm | |
[0x00000000]> e asm.bits=32 | |
[0x00000000]> wx 00108100 | |
[0x00000000]> pd 1 | |
==15855== Use of uninitialised value of size 8 | |
==15855== at 0x5EFF3FE: _ARM_getInstruction (in /var/lib/jenkins/workspace/radare2/libr/anal/libr_anal.so) | |
==15855== by 0x5F00642: ARM_getInstruction (in /var/lib/jenkins/workspace/radare2/libr/anal/libr_anal.so) | |
==15855== by 0x5ECEBF1: cs_disasm_ex (cs.c:469) | |
==15855== by 0x71EEFC0: disassemble (asm_arm_cs.c:31) | |
==15855== by 0x7264B67: r_asm_disassemble (asm.c:307) | |
==15855== by 0x4EB1E71: perform_disassembly (disasm.c:850) | |
==15855== by 0x4EB4AB1: r_core_print_disasm (disasm.c:1601) | |
==15855== by 0x4E7C871: cmd_print (cmd_print.c:1210) | |
==15855== by 0x4EA1D84: r_cmd_call (cmd_api.c:179) | |
==15855== by 0x4E86C56: r_core_cmd_subst_i (cmd.c:1274) | |
==15855== by 0x4E85424: r_core_cmd_subst (cmd.c:834) | |
==15855== by 0x4E87699: r_core_cmd (cmd.c:1463) | |
==15855== | |
==15855== Invalid read of size 8 | |
==15855== at 0x5EFF3FE: _ARM_getInstruction (in /var/lib/jenkins/workspace/radare2/libr/anal/libr_anal.so) | |
==15855== by 0x5F00642: ARM_getInstruction (in /var/lib/jenkins/workspace/radare2/libr/anal/libr_anal.so) | |
==15855== by 0x5ECEBF1: cs_disasm_ex (cs.c:469) | |
==15855== by 0x71EEFC0: disassemble (asm_arm_cs.c:31) | |
==15855== by 0x7264B67: r_asm_disassemble (asm.c:307) | |
==15855== by 0x4EB1E71: perform_disassembly (disasm.c:850) | |
==15855== by 0x4EB4AB1: r_core_print_disasm (disasm.c:1601) | |
==15855== by 0x4E7C871: cmd_print (cmd_print.c:1210) | |
==15855== by 0x4EA1D84: r_cmd_call (cmd_api.c:179) | |
==15855== by 0x4E86C56: r_core_cmd_subst_i (cmd.c:1274) | |
==15855== by 0x4E85424: r_core_cmd_subst (cmd.c:834) | |
==15855== by 0x4E87699: r_core_cmd (cmd.c:1463) | |
==15855== Address 0xe8 is not stack'd, malloc'd or (recently) free'd | |
==15855== | |
==15855== | |
==15855== Process terminating with default action of signal 11 (SIGSEGV) | |
==15855== Access not within mapped region at address 0xE8 | |
==15855== at 0x5EFF3FE: _ARM_getInstruction (in /var/lib/jenkins/workspace/radare2/libr/anal/libr_anal.so) | |
==15855== by 0x5F00642: ARM_getInstruction (in /var/lib/jenkins/workspace/radare2/libr/anal/libr_anal.so) | |
==15855== by 0x5ECEBF1: cs_disasm_ex (cs.c:469) | |
==15855== by 0x71EEFC0: disassemble (asm_arm_cs.c:31) | |
==15855== by 0x7264B67: r_asm_disassemble (asm.c:307) | |
==15855== by 0x4EB1E71: perform_disassembly (disasm.c:850) | |
==15855== by 0x4EB4AB1: r_core_print_disasm (disasm.c:1601) | |
==15855== by 0x4E7C871: cmd_print (cmd_print.c:1210) | |
==15855== by 0x4EA1D84: r_cmd_call (cmd_api.c:179) | |
==15855== by 0x4E86C56: r_core_cmd_subst_i (cmd.c:1274) | |
==15855== by 0x4E85424: r_core_cmd_subst (cmd.c:834) | |
==15855== by 0x4E87699: r_core_cmd (cmd.c:1463) | |
==15855== If you believe this happened as a result of a stack | |
==15855== overflow in your program's main thread (unlikely but | |
==15855== possible), you can try to increase the size of the | |
==15855== main thread stack using the --main-stacksize= flag. | |
==15855== The main thread stack size used in this run was 8388608. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment