From: Jeremy Fitzhardinge <jeremy@goop.org>
To: Jeff Dike <jdike@addtoit.com>
Cc: Dan Kegel <dank@kegel.com>,
linux-kernel@vger.kernel.org, Robert Walsh <rjwalsh@durables.org>
Subject: Re: Valgrinding the kernel?
Date: Fri, 06 Jul 2007 12:51:27 -0700 [thread overview]
Message-ID: <468E9D3F.4030406@goop.org> (raw)
In-Reply-To: <20070706194252.GA12311@c2.user-mode-linux.org>
Jeff Dike wrote:
> On Fri, Jul 06, 2007 at 10:30:19AM -0700, Dan Kegel wrote:
>
>> Could you give it a shot?
>>
>
> OK, after ripping out the code that broke valgrind last time (patch
> below), I get this:
>
> ==27590== Warning: set address range perms: large range 516194304, a 0, v 0
>
Hm, wonder what that is...
> vex x86->IR: unhandled instruction bytes: 0xF3 0xAF 0x74 0x9
> ==27590== Your program just tried to execute an instruction that Valgrind
> ==27590== did not recognise. There are two possible reasons for this.
> ==27590== 1. Your program has a bug and erroneously jumped to a non-code
> ==27590== location. If you are running Memcheck and you just saw a
> ==27590== warning about a bad jump, it's probably your program's fault.
> ==27590== 2. The instruction is legitimate but Valgrind doesn't handle it,
> ==27590== i.e. it's Valgrind's fault. If you think this is the case or
> ==27590== you are not sure, please let us know.
> ==27590== Either way, Valgrind will now raise a SIGILL signal which will
> ==27590== probably kill your program.
> ==27590==
>
>
>> Maybe the problems after that will be more pedestrian.
>>
>
> Doesn't look like it.
>
> FWIW, that instruction is repz scas. In an earlier valgrind effort in
> 2002, I hit repe scas
> (http://www.goop.org/~jeremy/valgrind/76-repe-scas.patch), so maybe
> something similar is needed here.
>
The virtual CPU code has been competely rewritten since then. If its a
non-gcc generated instruction, its possible the new code
parser/generator hasn't been taught to deal with it.
>> I'm willing to focus a little effort on this.
>>
>
> I guess you'll have to fix valgrind's various bugs. See, simple :)
>
Exactly ;)
J
next prev parent reply other threads:[~2007-07-06 19:51 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-07-06 4:14 Valgrinding the kernel? Dan Kegel
2007-07-06 5:44 ` Jeremy Fitzhardinge
2007-07-06 17:25 ` Jeff Dike
2007-07-06 17:30 ` Dan Kegel
2007-07-06 19:42 ` Jeff Dike
2007-07-06 19:51 ` Jeremy Fitzhardinge [this message]
2007-07-06 21:09 ` Jeff Dike
2007-07-06 18:00 ` Jeremy Fitzhardinge
2007-07-06 19:04 ` Jeff Dike
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=468E9D3F.4030406@goop.org \
--to=jeremy@goop.org \
--cc=dank@kegel.com \
--cc=jdike@addtoit.com \
--cc=linux-kernel@vger.kernel.org \
--cc=rjwalsh@durables.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox