> vex and64->IR: unhandled instruction bytes: 0xDA 0xE9 0xDF 0xE0

> I checked and this turns out to be a fragment in the __ieee754_powl() routine
> executing these two instructions:
> 
>       fucompp 
>       fnstsw

> I checked Bugzilla, it doesn't seem listed in the bugs database already.

Thank you for checking.  Now you need to follow through,
by performing the next step:

> Hopefully, this is something that can be fixed in next version of valgrind...

It is unlikely to be fixed unless you file a bug report.
Visit  http://valgrind.org/  and click on the Bug Reports link in the
left column.

-- 

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Valgrind-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/valgrind-users

Reply via email to