[prev in list] [next in list] [prev in thread] [next in thread]
List: kde-bugs-dist
Subject: [valgrind] [Bug 381819] amd64: unhandled instruction bextr (0x8F 0xEA 0x78 0x10 0xD0 0x8 0x4) from B
From: Ivo Raisr <bugzilla_noreply () kde ! org>
Date: 2017-08-10 10:36:53
Message-ID: bug-381819-17878-BmpI1bPzkw () http ! bugs ! kde ! org/
[Download RAW message or body]
https://bugs.kde.org/show_bug.cgi?id=381819
--- Comment #11 from Ivo Raisr <ivosh@ivosh.net> ---
Awesome!
So the patch is able properly decode the following variants:
bextr 408,%eax,%edx
bextr 404,%eax,%edx
bextr 1D03,%rcx,%rcx
bextr 305,%eax,%eax
bextr A0C,%ebx,%edx
bextr 305,%eax,%eax
bextr 305,%eax,%ecx
bextr A0E,%eax,%edi
bextr A0E,%eax,%r10d (why 'd' here is displayed?)
bextr 101,%edx,%r11d
bextr 103,%r12,%rsi
bextr 103,%rsi,%rdi
bextr 1D03,%rcx,%rcx
bextr 1D03,%rcx,%rcx
bextr 1D03,%rcx,%rcx
bextr 1D03,%rcx,%rcx
bextr 1D03,%rcx,%rcx
bextr 1D03,%rcx,%rcx
however it chokes on:
0x496044: bextr 10D,2543347(%rip),%esi
This probably means that 'delta' is calculated incorrectly in
dis_ESC_0F3A__XOP(). The difference between assumed and expected %rip is 4
bytes.
The patch also provides test case none/tests/amd64/tbm.c. Were you able to
build it and run it successfully under Valgrind?
--
You are receiving this mail because:
You are watching all bug changes.=
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic