[valgrind] [Bug 409999] vex amd64->IR: unhandled instruction bytes: 0x62 0xD1 0xFE 0x8 0x6F 0x84 0x24 0x8 0x0 0x0

2024-02-24 Thread Gabriel Ravier
https://bugs.kde.org/show_bug.cgi?id=40

Gabriel Ravier  changed:

   What|Removed |Added

 CC||gabrav...@gmail.com

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 409999] vex amd64->IR: unhandled instruction bytes: 0x62 0xD1 0xFE 0x8 0x6F 0x84 0x24 0x8 0x0 0x0

2019-12-29 Thread Julian Seward
https://bugs.kde.org/show_bug.cgi?id=40

--- Comment #5 from Julian Seward  ---
This bug has been reported 5 times in the past year, as bug numbers 393351,
40, 414944, 411303 and 414053.  I would like to fix it.  I tried the
steps-to-reproduce shown in bugs 393351 and 414053, but without success: I
can't reproduce it either with the trunk or with 3.15.0.

Without being able to reproduce it, I can't fix it.  The first unhandled byte,
0x62, isn't the start of any known instruction (in 64-bit mode), so I suspect
there has been some failure earlier on.  Maybe Valgrind's instruction decoder
lost track of where it was on the previous instruction.  That's just a guess,
though.

What would be really helpful is if someone could reproduce the failure, and
then use objdump -d to show the instructions around the failure point.  I can
give guidance on how to use objdump if that helps.  If you want to try this, I
suggest you first reproduce the failure while giving --demangle=no
--sym-offsets=yes to Valgrind.  That will make it much easier to relate the
stack trace that Valgrind produces at the failure point, to the output of
objdump -d.

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 409999] vex amd64->IR: unhandled instruction bytes: 0x62 0xD1 0xFE 0x8 0x6F 0x84 0x24 0x8 0x0 0x0

2019-08-26 Thread Tom Hughes
https://bugs.kde.org/show_bug.cgi?id=40

Tom Hughes  changed:

   What|Removed |Added

 Resolution|--- |DUPLICATE
 Status|REPORTED|RESOLVED

--- Comment #4 from Tom Hughes  ---


*** This bug has been marked as a duplicate of bug 393351 ***

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 409999] vex amd64->IR: unhandled instruction bytes: 0x62 0xD1 0xFE 0x8 0x6F 0x84 0x24 0x8 0x0 0x0

2019-07-22 Thread Andras Szabo
https://bugs.kde.org/show_bug.cgi?id=40

--- Comment #3 from Andras Szabo  ---
Here is the cpuinfo of the build host:

Architecture:  x86_64
CPU op-mode(s):32-bit, 64-bit
Byte Order:Little Endian
CPU(s):80
On-line CPU(s) list:   0-79
Thread(s) per core:2
Core(s) per socket:20
Socket(s): 2
NUMA node(s):  2
Vendor ID: GenuineIntel
CPU family:6
Model: 85
Model name:Intel(R) Xeon(R) Gold 6148 CPU @ 2.40GHz
Stepping:  4
CPU MHz:   3099.937
BogoMIPS:  4804.84
Virtualization:VT-x
L1d cache: 32K
L1i cache: 32K
L2 cache:  1024K
L3 cache:  28160K
NUMA node0 CPU(s): 0-19,40-59
NUMA node1 CPU(s): 20-39,60-79

As I look into the CMakeLists.txt file of rocksdb, i am seeing: -msse4.2
-mpclmul that stands out of the crowd. We used g++ 7.3 to build rocksdb. I am
gonna collect build logs to provide more specific info.

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 409999] vex amd64->IR: unhandled instruction bytes: 0x62 0xD1 0xFE 0x8 0x6F 0x84 0x24 0x8 0x0 0x0

2019-07-19 Thread Tom Hughes
https://bugs.kde.org/show_bug.cgi?id=40

--- Comment #2 from Tom Hughes  ---
The latest (May 2019) edition seems to agree.

Did you compile this yourself, and if you did what architecture did you target
exactly?

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 409999] vex amd64->IR: unhandled instruction bytes: 0x62 0xD1 0xFE 0x8 0x6F 0x84 0x24 0x8 0x0 0x0

2019-07-19 Thread Tom Hughes
https://bugs.kde.org/show_bug.cgi?id=40

--- Comment #1 from Tom Hughes  ---
In 32 bit mode 0x62 would be BOUND which would win some sort of obscurity
contest, but in 64 bit mode it doesn't appear to be valid and as far as I can
see it hasn't been replaced by anything else, at least in the version of the
Intel manual I am looking at...

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 409999] vex amd64->IR: unhandled instruction bytes: 0x62 0xD1 0xFE 0x8 0x6F 0x84 0x24 0x8 0x0 0x0

2019-07-19 Thread Tom Hughes
https://bugs.kde.org/show_bug.cgi?id=40

Tom Hughes  changed:

   What|Removed |Added

Summary|Valgrind causes SIGILL due  |vex amd64->IR: unhandled
   |to unrecognized instruction |instruction bytes: 0x62
   |in rocksdb static   |0xD1 0xFE 0x8 0x6F 0x84
   |initialization  |0x24 0x8 0x0 0x0
 CC||t...@compton.nu

-- 
You are receiving this mail because:
You are watching all bug changes.