https://bugs.kde.org/show_bug.cgi?id=429424
Bug ID: 429424
Summary: vex amd64->IR: unhandled instruction bytes
Product: valgrind
Version: unspecified
Platform: openSUSE RPMs
OS: Linux
Status: REPORTED
Severity: normal
Priority: NOR
Component: vex
Assignee: [email protected]
Reporter: [email protected]
Target Milestone: ---
SUMMARY
vex amd64->IR: unhandled instruction bytes: 0xF0 0xC 0x0 0x0 0x0 0x0 0xC0 0x95
0xF0 0xC
echo 'asm(".byte 0xF0, 0xC, 0x0, 0x0, 0x0, 0x0, 0xC0, 0x95, 0xF0, 0xC");' > i.c
gcc -c i.c
objdump -d i.o
Disassembly of section .text:
0000000000000000 <.text>:
0: f0 0c 00 lock or $0x0,%al
3: 00 00 add %al,(%rax)
5: 00 c0 add %al,%al
7: 95 xchg %eax,%ebp
8: f0 lock
9: 0c .byte 0xc
on running valgrind on self built umbrello
(https://invent.kde.org/sdk/umbrello)
STEPS TO REPRODUCE
valgrind ./umbrello/umbrello5
OBSERVED RESULT
==24798== Memcheck, a memory error detector
==24798== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==24798== Using Valgrind-3.16.1 and LibVEX; rerun with -h for copyright info
==24798== Command: ./umbrello/umbrello5
==24798==
==24798== Conditional jump or move depends on uninitialised value(s)
==24798== at 0x13DB3C6D: ??? (in /memfd:sljit (deleted))
==24798== by 0x10E53477: ???
==24798==
==24798== Conditional jump or move depends on uninitialised value(s)
==24798== at 0x13DB3C75: ??? (in /memfd:sljit (deleted))
==24798== by 0x11267387: ???
==24798==
==24798== Conditional jump or move depends on uninitialised value(s)
==24798== at 0x13DB3C75: ??? (in /memfd:sljit (deleted))
==24798== by 0x11267387: ???
==24798== by 0x11267387: ???
==24798== by 0x11267397: ???
==24798== by 0x11369B6F: ???
==24798== by 0x11267387: ???
==24798==
==24798== Use of uninitialised value of size 8
==24798== at 0x13DB3E85: ??? (in /memfd:sljit (deleted))
==24798== by 0x11267387: ???
==24798== by 0x11267387: ???
==24798== by 0x11267397: ???
==24798== by 0x11369B6F: ???
==24798== by 0x11267387: ???
==24798==
vex amd64->IR: unhandled instruction bytes: 0xF0 0xC 0x0 0x0 0x0 0x0 0xC0 0x95
0xF0 0xC
vex amd64->IR: REX=0 REX.W=0 REX.R=0 REX.X=0 REX.B=0
vex amd64->IR: VEX=0 VEX.L=0 VEX.nVVVV=0x0 ESC=NONE
vex amd64->IR: PFX.66=0 PFX.F2=0 PFX.F3=0
==24798== valgrind: Unrecognised instruction at address 0x11369b72.
==24798== at 0x11369B72: ???
==24798== by 0x11267387: ???
==24798== by 0x11267387: ???
==24798== by 0x11267397: ???
==24798== by 0x11369B6F: ???
==24798== by 0x11267387: ???
==24798== Your program just tried to execute an instruction that Valgrind
==24798== did not recognise. There are two possible reasons for this.
==24798== 1. Your program has a bug and erroneously jumped to a non-code
==24798== location. If you are running Memcheck and you just saw a
==24798== warning about a bad jump, it's probably your program's fault.
==24798== 2. The instruction is legitimate but Valgrind doesn't handle it,
==24798== i.e. it's Valgrind's fault. If you think this is the case or
==24798== you are not sure, please let us know and we'll try to fix it.
==24798== Either way, Valgrind will now raise a SIGILL signal which will
==24798== probably kill your program.
KCrash: Application 'umbrello5' crashing...
EXPECTED RESULT
No unhandled instruction bytes
SOFTWARE/OS VERSIONS
Linux/KDE Plasma:
(available in About System)
KDE Plasma Version: 5.20.2
KDE Frameworks Version: 5.75.0
Qt Version: 5.15.1
ADDITIONAL INFORMATION
Tried this with SuSE provided valgrind-3.16.1 using gcc-7 and gcc-10 on:
openSUSE Tumbleweed 20201110 and older
Linux 5.9.1-2-default #1 SMP Mon Oct 26 07:02:23 UTC 2020 (435e92d) x86_64
x86_64 x86_64 GNU/Linux
AMD Athlon II X2 250
--
You are receiving this mail because:
You are watching all bug changes.