[prev in list] [next in list] [prev in thread] [next in thread]
List: kde-bugs-dist
Subject: [valgrind] [Bug 310845] Application being checked generates illegal instruction
From: Alan Wild <alan () madllama ! net>
Date: 2013-12-16 20:43:38
Message-ID: bug-310845-17878-Bjf97xqnSF () http ! bugs ! kde ! org/
[Download RAW message or body]
https://bugs.kde.org/show_bug.cgi?id=310845
Alan Wild <alan@madllama.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |alan@madllama.net
--- Comment #16 from Alan Wild <alan@madllama.net> ---
I just hit this same bug today in valgrind 3.9. I added the same imm8 codes
and that got me past the __intel_sse4_strrchr call only to have it die in
__intel_sse4_strspn. Using the same objdump trick I found calls to pcmpistrm
with a value of 0x72.
[arwild1@hplcslsp1 ~]$ /apps_hpc/GCC/gcc-4.7.2/bin/objdump -t
/apps_hpc/intel/composer_xe_2013.3.163/compiler/lib/intel64/libintlc.so.5 |
egrep __intel_sse4_strspn
00000000000209e0 g F .text 0000000000000310 __intel_sse4_strspn
[arwild1@hplcslsp1 ~]$ /apps_hpc/GCC/gcc-4.7.2/bin/objdump -d -f
--start-address=0x00000000000209e0 --stop-address=0x0000000000020cf0
/apps_hpc/intel/composer_xe_2013.3.163/compiler/lib/intel64/libintlc.so.5 |
egrep pcmp
20a7b: 66 0f 74 c8 pcmpeqb %xmm0,%xmm1
20c41: 66 0f 3a 62 d1 72 pcmpistrm $0x72,%xmm1,%xmm2
20c70: 66 0f 3a 62 e1 72 pcmpistrm $0x72,%xmm1,%xmm4
20c99: 66 0f 3a 63 c9 3a pcmpistri $0x3a,%xmm1,%xmm1
(NOTE: 0x3a is already handled in the above source files).
After adding 0x72 to the same two files I was able to run without error. I'll
attach my diff against 3.9.0 below.
--
You are receiving this mail because:
You are watching all bug changes.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic