[prev in list] [next in list] [prev in thread] [next in thread] 

List:       kde-bugs-dist
Subject:    [valgrind] [Bug 358856] New: unhandled instruction bytes: 0xC4 0xE2 0x7B 0xF7
From:       Jeffrey Walton via KDE Bugzilla <bugzilla_noreply () kde ! org>
Date:       2016-02-01 6:58:53
Message-ID: bug-358856-17878 () http ! bugs ! kde ! org/
[Download RAW message or body]

https://bugs.kde.org/show_bug.cgi?id=358856

            Bug ID: 358856
           Summary: unhandled instruction bytes: 0xC4 0xE2 0x7B 0xF7
           Product: valgrind
           Version: unspecified
          Platform: Compiled Sources
               URL: http://pastebin.com/mx3hJKtV
                OS: Linux
            Status: UNCONFIRMED
          Severity: normal
          Priority: NOR
         Component: general
          Assignee: jseward@acm.org
          Reporter: noloader@gmail.com

This looks similar to Bug 356715 (http://bugs.kde.org/show_bug.cgi?id=356715),
but only the first 3 bytes match. My apologies if I should have "me too'd".

It appears SHRX on Debian 8.2/i686 is giving Valgrind some trouble.

$ valgrind ./cryptest.exe v
==30929== Memcheck, a memory error detector
==30929== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==30929== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==30929== Command: ./cryptest.exe v
==30929== 
vex x86->IR: unhandled instruction bytes: 0xC4 0xE2 0x7B 0xF7
==30929== valgrind: Unrecognised instruction at address 0x811c731.
...

And:

(gdb) disass /r 0x811c731
Dump of assembler code for function
CryptoPP::Rijndael::Base::UncheckedSetKey(unsigned char const*, unsigned int,
CryptoPP::NameValuePairs const&):
   0x0811c720 <+0>:    55    push   %ebp
   0x0811c721 <+1>:    b8 02 00 00 00    mov    $0x2,%eax
   0x0811c726 <+6>:    89 e5    mov    %esp,%ebp
   0x0811c728 <+8>:    57    push   %edi
   0x0811c729 <+9>:    56    push   %esi
   0x0811c72a <+10>:    53    push   %ebx
   0x0811c72b <+11>:    83 ec 4c    sub    $0x4c,%esp
   0x0811c72e <+14>:    8b 4d 08    mov    0x8(%ebp),%ecx
   0x0811c731 <+17>:    c4 e2 7b f7 45 10    shrx   %eax,0x10(%ebp),%eax
   0x0811c737 <+23>:    8b 75 08    mov    0x8(%ebp),%esi
   0x0811c73a <+26>:    8d 50 06    lea    0x6(%eax),%edx
   0x0811c73d <+29>:    83 c0 07    add    $0x7,%eax
   0x0811c740 <+32>:    8d 59 10    lea    0x10(%ecx),%ebx


Reproducible: Always

-- 
You are receiving this mail because:
You are watching all bug changes.
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic