[prev in list] [next in list] [prev in thread] [next in thread] 

List:       kde-bugs-dist
Subject:    [valgrind] [Bug 381819] amd64: unhandled instruction bextr (0x8F 0xEA 0x78 0x10 0xD0 0x8 0x4) from B
From:       Ivo Raisr <bugzilla_noreply () kde ! org>
Date:       2017-08-10 10:36:53
Message-ID: bug-381819-17878-BmpI1bPzkw () http ! bugs ! kde ! org/
[Download RAW message or body]

https://bugs.kde.org/show_bug.cgi?id=381819

--- Comment #11 from Ivo Raisr <ivosh@ivosh.net> ---
Awesome!

So the patch is able properly decode the following variants:
bextr 408,%eax,%edx
bextr 404,%eax,%edx
bextr 1D03,%rcx,%rcx
bextr 305,%eax,%eax
bextr A0C,%ebx,%edx
bextr 305,%eax,%eax
bextr 305,%eax,%ecx
bextr A0E,%eax,%edi
bextr A0E,%eax,%r10d  (why 'd' here is displayed?)
bextr 101,%edx,%r11d
bextr 103,%r12,%rsi
bextr 103,%rsi,%rdi
bextr 1D03,%rcx,%rcx
bextr 1D03,%rcx,%rcx
bextr 1D03,%rcx,%rcx
bextr 1D03,%rcx,%rcx
bextr 1D03,%rcx,%rcx
bextr 1D03,%rcx,%rcx

however it chokes on:
0x496044:  bextr 10D,2543347(%rip),%esi

This probably means that 'delta' is calculated incorrectly in
dis_ESC_0F3A__XOP(). The difference between assumed and expected %rip is 4
bytes.

The patch also provides test case none/tests/amd64/tbm.c. Were you able to
build it and run it successfully under Valgrind?

-- 
You are receiving this mail because:
You are watching all bug changes.=
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic