Summary: | unhandled instruction bytes: 0x8F 0x6A 0x78 0x10 0xC8 0x4 0x4 0x0 0x0 0xC1 | ||
---|---|---|---|
Product: | [Developer tools] valgrind | Reporter: | dcb314 |
Component: | vex | Assignee: | Julian Seward <jseward> |
Status: | RESOLVED DUPLICATE | ||
Severity: | normal | CC: | mark, pjfloyd |
Priority: | NOR | ||
Version: | 3.19 GIT | ||
Target Milestone: | --- | ||
Platform: | Other | ||
OS: | Linux | ||
Latest Commit: | Version Fixed In: |
Description
dcb314
2022-01-06 15:32:10 UTC
A quick online disasm says that this is a bit extract opcode. Can you provide a small reproducer? (In reply to Paul Floyd from comment #1) > A quick online disasm says that this is a bit extract opcode. Righto. > Can you provide a small reproducer? Sadly no. Not this many months later. I suspect it wouldn't be too hard to construct an artificial example in C which contains that opcode. This is BEXTR, Bit field extract (with register), part of BMI1 *** This bug has been marked as a duplicate of bug 381819 *** |