> vex and64->IR: unhandled instruction bytes: 0xDA 0xE9 0xDF 0xE0 > I checked and this turns out to be a fragment in the __ieee754_powl() routine > executing these two instructions: > > fucompp > fnstsw
> I checked Bugzilla, it doesn't seem listed in the bugs database already. Thank you for checking. Now you need to follow through, by performing the next step: > Hopefully, this is something that can be fixed in next version of valgrind... It is unlikely to be fixed unless you file a bug report. Visit http://valgrind.org/ and click on the Bug Reports link in the left column. -- ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Valgrind-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/valgrind-users
