https://bugs.kde.org/show_bug.cgi?id=366344

            Bug ID: 366344
           Summary: Multiple unhandled instruction for Aarch64
                    (0x0EE0E020, 0x1AC15800, 0x4E284801, 0x5E040023,
                    0x5E056060)
           Product: valgrind
           Version: 3.11.0
          Platform: Other
                OS: Linux
            Status: UNCONFIRMED
          Severity: normal
          Priority: NOR
         Component: vex
          Assignee: jsew...@acm.org
          Reporter: noloa...@gmail.com
                CC: noloa...@gmail.com

I'm working on an ODROID C2. Its an ARMv8 device with a Amlogic SoC based on
A53 cores. It ships with a 64-bit OS named Linaro, which is Aarch64. The
Amlogic SoC has ASIMD (v8 NEON) and CRC32, but it lacks Crypto extensions.

The flags used to compile the sample program are `-march=armv8-a+crc+crypto
-mtune=cortex-a53`. Crypto is enabled because the sample program is guarded by
a runtime HasXXX() check. HasXXX() is a flag that is set by exercising the
instruction of interest guarded by a SIGILL handler.

Here's the output from Valgrind 3.11 built from sources. The program is Wei
Dai's test driver program for Crypto++.

$ valgrind ./cryptest.exe v
==26380== Memcheck, a memory error detector
==26380== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==26380== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==26380== Command: ./cryptest.exe v
==26380== 
Using seed: 1470136994      

Testing Settings...

passed:  Your machine is little endian.
passed:  CRYPTOPP_ALLOW_UNALIGNED_DATA_ACCESS is not defined. Will restrict to
aligned data access.
passed:  sizeof(byte) == 1
passed:  sizeof(word16) == 2
passed:  sizeof(word32) == 4
passed:  sizeof(word64) == 8
passed:  sizeof(hword) == 2, sizeof(word) == 4, sizeof(dword) == 8
disInstr(arm64): unhandled instruction 0x0EE0E020
disInstr(arm64): 0000'1110 1110'0000 1110'0000 0010'0000
==26380== valgrind: Unrecognised instruction at address 0x506e48.
==26380==    at 0x506E48: vmull_p64 (arm_neon.h:21482)
==26380==    by 0x506E48: CryptoPP::TryPMULL() (cpu.cpp:484)
==26380==    by 0x5072EB: CryptoPP::DetectArmFeatures() (cpu.cpp:740)
==26380==    by 0x4A09EF: HasNEON (cpu.h:331)
==26380==    by 0x4A09EF: TestSettings() (validat1.cpp:317)
==26380==    by 0x4A7D0B: ValidateAll(bool) (validat1.cpp:75)
==26380==    by 0x490083: Validate(int, bool, char const*) (test.cpp:889)
==26380==    by 0x458B8F: main (test.cpp:358)
==26380== Your program just tried to execute an instruction that Valgrind
==26380== did not recognise.  There are two possible reasons for this...
ARM64 front end: data_processing_register

disInstr(arm64): unhandled instruction 0x1AC15800
disInstr(arm64): 0001'1010 1100'0001 0101'1000 0000'0000
==26380== valgrind: Unrecognised instruction at address 0x506f98.
==26380==    at 0x506F98: __crc32cw (arm_acle.h:57)
==26380==    by 0x506F98: CryptoPP::TryCRC32() (cpu.cpp:543)
==26380==    by 0x5072FB: CryptoPP::DetectArmFeatures() (cpu.cpp:741)
==26380==    by 0x4A09EF: HasNEON (cpu.h:331)
==26380==    by 0x4A09EF: TestSettings() (validat1.cpp:317)
==26380==    by 0x4A7D0B: ValidateAll(bool) (validat1.cpp:75)
==26380==    by 0x490083: Validate(int, bool, char const*) (test.cpp:889)
==26380==    by 0x458B8F: main (test.cpp:358)
==26380== Your program just tried to execute an instruction that Valgrind
==26380== did not recognise.  There are two possible reasons for this...

disInstr(arm64): unhandled instruction 0x4E284801
disInstr(arm64): 0100'1110 0010'1000 0100'1000 0000'0001
==26380== valgrind: Unrecognised instruction at address 0x507058.
==26380==    at 0x507058: vaeseq_u8 (arm_neon.h:13731)
==26380==    by 0x507058: CryptoPP::TryAES() (cpu.cpp:597)
==26380==    by 0x50730B: CryptoPP::DetectArmFeatures() (cpu.cpp:742)
==26380==    by 0x4A09EF: HasNEON (cpu.h:331)
==26380==    by 0x4A09EF: TestSettings() (validat1.cpp:317)
==26380==    by 0x4A7D0B: ValidateAll(bool) (validat1.cpp:75)
==26380==    by 0x490083: Validate(int, bool, char const*) (test.cpp:889)
==26380==    by 0x458B8F: main (test.cpp:358)
==26380== Your program just tried to execute an instruction that Valgrind
==26380== did not recognise.  There are two possible reasons for this....

disInstr(arm64): unhandled instruction 0x5E040023
disInstr(arm64): 0101'1110 0000'0100 0000'0000 0010'0011
==26380== valgrind: Unrecognised instruction at address 0x507130.
==26380==    at 0x507130: vsha1cq_u32 (arm_neon.h:21423)
==26380==    by 0x507130: CryptoPP::TrySHA1() (cpu.cpp:654)
==26380==    by 0x50731B: CryptoPP::DetectArmFeatures() (cpu.cpp:743)
==26380==    by 0x4A09EF: HasNEON (cpu.h:331)
==26380==    by 0x4A09EF: TestSettings() (validat1.cpp:317)
==26380==    by 0x4A7D0B: ValidateAll(bool) (validat1.cpp:75)
==26380==    by 0x490083: Validate(int, bool, char const*) (test.cpp:889)
==26380==    by 0x458B8F: main (test.cpp:358)
==26380== Your program just tried to execute an instruction that Valgrind
==26380== did not recognise.  There are two possible reasons for this...

disInstr(arm64): unhandled instruction 0x5E056060
disInstr(arm64): 0101'1110 0000'0101 0110'0000 0110'0000
==26380== valgrind: Unrecognised instruction at address 0x50725c.
==26380==    at 0x50725C: vsha256su1q_u32 (arm_neon.h:21475)
==26380==    by 0x50725C: CryptoPP::TrySHA2() (cpu.cpp:716)
==26380==    by 0x50732B: CryptoPP::DetectArmFeatures() (cpu.cpp:744)
==26380==    by 0x4A09EF: HasNEON (cpu.h:331)
==26380==    by 0x4A09EF: TestSettings() (validat1.cpp:317)
==26380==    by 0x4A7D0B: ValidateAll(bool) (validat1.cpp:75)
==26380==    by 0x490083: Validate(int, bool, char const*) (test.cpp:889)
==26380==    by 0x458B8F: main (test.cpp:358)
==26380== Your program just tried to execute an instruction that Valgrind
==26380== did not recognise.  There are two possible reasons for this...
...

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to