https://bugs.kde.org/show_bug.cgi?id=393351

--- Comment #15 from jody <jody....@gmail.com> ---
Hi Julian
I can still reproduce the failure.
When i run valgrind with '--demangle=no --sym-offsets=yes' i get a stack
dump as follows:
-----
vex amd64->IR: unhandled instruction bytes: 0x62 0xF1 0xFE 0x8 0x6F 0x45
0x0 0xC5 0xF8 0x11
vex amd64->IR:   REX=0 REX.W=0 REX.R=0 REX.X=0 REX.B=0
vex amd64->IR:   VEX=0 VEX.L=0 VEX.nVVVV=0x0 ESC=NONE
vex amd64->IR:   PFX.66=0 PFX.F2=0 PFX.F3=0
==6297== valgrind: Unrecognised instruction at address 0x4a54820.
==6297==    at 0x4A54820: H5P_dup_prop+64 (in /usr/lib64/libhdf5.so.103.1.0)
==6297==    by 0x4A56465: H5P__do_prop_cb1.part.13+85 (in
/usr/lib64/libhdf5.so.103.1.0)
==6297==    by 0x4A55C01: H5P_create_id+385 (in
/usr/lib64/libhdf5.so.103.1.0)
==6297==    by 0x4A56155: H5P__init_package+373 (in
/usr/lib64/libhdf5.so.103.1.0)
==6297==    by 0x4A562C7: H5P_init+39 (in /usr/lib64/libhdf5.so.103.1.0)
==6297==    by 0x48CA0ED: H5_init_library+285 (in
/usr/lib64/libhdf5.so.103.1.0)
==6297==    by 0x48CA90F: H5open+63 (in /usr/lib64/libhdf5.so.103.1.0)
==6297==    by 0x1091C8: main+67 (h5simple.cpp:6)
-----

I have no experience at all with objdump. I tried 'objdump -d ./h5s_8.3.0'
(h5s_8.3.0 is my test-application compiled with g++ 8.3.0), I see some
references to hdf5 calls (e.g. H5open, but no H5P_dup_prop), but i can't
really interpret the output. I attached both the output of Valgrind and of
objdump to this mail.
Let  me know how i can be of further help
Regards
  Jody

On Sun, Dec 29, 2019 at 10:34 AM Julian Seward <bugzilla_nore...@kde.org>
wrote:

> https://bugs.kde.org/show_bug.cgi?id=393351
>
> --- Comment #14 from Julian Seward <jsew...@acm.org> ---
> This bug has been reported 5 times in the past year, as bug numbers 393351,
> 409999, 414944, 411303 and 414053.  I would like to fix it.  I tried the
> steps-to-reproduce shown in bugs 393351 and 414053, but without success: I
> can't reproduce it either with the trunk or with 3.15.0.
>
> Without being able to reproduce it, I can't fix it.  The first unhandled
> byte,
> 0x62, isn't the start of any known instruction (in 64-bit mode), so I
> suspect
> there has been some failure earlier on.  Maybe Valgrind's instruction
> decoder
> lost track of where it was on the previous instruction.  That's just a
> guess,
> though.
>
> What would be really helpful is if someone could reproduce the failure, and
> then use objdump -d to show the instructions around the failure point.  I
> can
> give guidance on how to use objdump if that helps.  If you want to try
> this, I
> suggest you first reproduce the failure while giving --demangle=no
> --sym-offsets=yes to Valgrind.  That will make it much easier to relate the
> stack trace that Valgrind produces at the failure point, to the output of
> objdump -d.
>
> --
> You are receiving this mail because:
> You are on the CC list for the bug.

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to