Please pickup the Valgrind fix for RDARAND and " Illegal opcode"

Bug #1659716 reported by Jeffrey Walton on 2017-01-27
This bug affects 1 person
Affects Status Importance Assigned to Milestone
valgrind (Debian)
Fix Released
valgrind (Ubuntu)

Bug Description

Please pickup the Valgrind fix for RDARAND and " Illegal opcode".

Valgrind report:


Debian report:



Working with the Crypto++ library:

$ valgrind ./cryptest.exe v

vex amd64->IR: unhandled instruction bytes: 0x48 0xF 0xC7 0xF0 0x48 0x89 0x45 0x0
vex amd64->IR: REX=1 REX.W=1 REX.R=0 REX.X=0 REX.B=0
vex amd64->IR: VEX=0 VEX.L=0 VEX.nVVVV=0x0 ESC=0F
vex amd64->IR: PFX.66=0 PFX.F2=0 PFX.F3=0
==16081== valgrind: Unrecognised instruction at address 0x5c4902.
==16081== at 0x5C4902: _rdrand64_step (immintrin.h:186)
==16081== by 0x5C4902: ALL_RRI_GenerateBlock (rdrand.cpp:179)
==16081== by 0x5C4902: CryptoPP::RDRAND::GenerateBlock(unsigned char*, unsigned long) (rdrand.cpp:295)
==16081== by 0x505161: CryptoPP::RandomNumberGenerator::GenerateIntoBufferedTransformation(CryptoPP::BufferedTransformation&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, unsigned long) (cryptlib.cpp:350)


$ uname -a
Linux qotom 4.4.0-53-generic #74-Ubuntu SMP Fri Dec 2 15:59:10 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux

$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 16.04.1 LTS
Release: 16.04
Codename: xenial


$ which valgrind

$ valgrind --version

$ apt-cache show valgrind
Package: valgrind
Priority: optional
Section: devel
Installed-Size: 65186
Maintainer: Ubuntu Developers <email address hidden>
Original-Maintainer: Alessandro Ghedini <email address hidden>
Architecture: amd64
Version: 1:3.11.0-1ubuntu4.1
Replaces: valgrind-dev
Depends: libc6 (>= 2.14), libc6-dbg
Recommends: gdb
Suggests: valgrind-dbg, kcachegrind, alleyoop, valkyrie (>> 1.3.0)
Breaks: valgrind-dev
Filename: pool/main/v/valgrind/valgrind_3.11.0-1ubuntu4.1_amd64.deb
Size: 10967398
MD5sum: ee114c22adfd029443d62674a594f60a
SHA1: 8733fdc869aac7ccf044107377a15fead15a5269
SHA256: f559d5f438ee0f7490008901e7e774644d46456e083ef150ebd1c7e7ec2ff53f

Jeffrey Walton (noloader) wrote :

Thanks again Hans.

Looking at the bug report, something obvious (to me) was not clear... The patch was already applied to Ubuntu 16.10. 16.10 does not produce the Illegal Opcode.

Ubuntu 16.04 lacks the patch at the moment. 16.04 falls to the the Illegal Opcode.

Changed in valgrind (Debian):
status: Unknown → Fix Released
Jeffrey Walton (noloader) wrote :

Ubuntu 16.04 x86_64 tested OK this afternoon. Thanks again.

To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.