More detail: vex amd64->IR: unhandled instruction bytes: 0x8F 0x6A 0x78 0x10 0xC8 0x4 0x4 0x0 0x0 0xC1 vex amd64->IR: REX=0 REX.W=0 REX.R=0 REX.X=0 REX.B=0 vex amd64->IR: VEX=0 VEX.L=0 VEX.nVVVV=0x0 ESC=NONE vex amd64->IR: PFX.66=0 PFX.F2=0 PFX.F3=0 This is from today's valgrind trunk.
A quick online disasm says that this is a bit extract opcode. Can you provide a small reproducer?
(In reply to Paul Floyd from comment #1) > A quick online disasm says that this is a bit extract opcode. Righto. > Can you provide a small reproducer? Sadly no. Not this many months later. I suspect it wouldn't be too hard to construct an artificial example in C which contains that opcode.
This is BEXTR, Bit field extract (with register), part of BMI1 *** This bug has been marked as a duplicate of bug 381819 ***