https://bugs.kde.org/show_bug.cgi?id=381514

            Bug ID: 381514
           Summary: unhandled instruction 0xD53BE002
           Product: valgrind
           Version: 3.12.0
          Platform: Other
                OS: Linux
            Status: UNCONFIRMED
          Severity: normal
          Priority: NOR
         Component: memcheck
          Assignee: jsew...@acm.org
          Reporter: soren.brinkm...@xilinx.com
  Target Milestone: ---

I have an aarch64 Linux application that has the following instruction in its
code:
   7d48c:       d53be002        mrs     x2, cntfrq_el0

That causes valgrind to abort execution with
ARM64 front end: branch_etc
disInstr(arm64): unhandled instruction 0xD53BE002
disInstr(arm64): 1101'0101 0011'1011 1110'0000 0000'0010
==2561== valgrind: Unrecognised instruction at address 0x48eb48c.
==2561==    at 0x48EB48C: xlnkGetGlobalCounter (in
/media/card/libfilter2d_optflow.so)
==2561== Your program just tried to execute an instruction that Valgrind
==2561== did not recognise.  There are two possible reasons for this.
==2561== 1. Your program has a bug and erroneously jumped to a non-code
==2561==    location.  If you are running Memcheck and you just saw a
==2561==    warning about a bad jump, it's probably your program's fault.
==2561== 2. The instruction is legitimate but Valgrind doesn't handle it,
==2561==    i.e. it's Valgrind's fault.  If you think this is the case or
==2561==    you are not sure, please let us know and we'll try to fix it.
==2561== Either way, Valgrind will now raise a SIGILL signal which will
==2561== probably kill your program.
==2561==
==2561== Process terminating with default action of signal 4 (SIGILL)
==2561==  Illegal opcode at address 0x48EB48C
==2561==    at 0x48EB48C: xlnkGetGlobalCounter (in
/media/card/libfilter2d_optflow.so)

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to