error 0 ==26995== Memcheck, a memory error detector ==26995== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==26995== Using Valgrind-3.15.0.GIT and LibVEX; rerun with -h for copyright info ==26995== Command: ./try ==26995== vex amd64->IR: unhandled instruction bytes: 0x48 0xF 0xC7 0xF1 0xF 0x92 0xC0 0x48 0x89 0xC1 vex amd64->IR: REX=1 REX.W=1 REX.R=0 REX.X=0 REX.B=0 vex amd64->IR: VEX=0 VEX.L=0 VEX.nVVVV=0x0 ESC=0F vex amd64->IR: PFX.66=0 PFX.F2=0 PFX.F3=0 ==26995== valgrind: Unrecognised instruction at address 0x112055. ==26995== at 0x112055: crandom_generate (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==26995== by 0x10B182: goldilocks_keygen (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==26995== by 0x10A8E2: crypto_sign_ed448goldilocks_64_keypair (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==26995== by 0x1094BA: test (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==26995== by 0x10A78A: main (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==26995== Your program just tried to execute an instruction that Valgrind ==26995== did not recognise. There are two possible reasons for this. ==26995== 1. Your program has a bug and erroneously jumped to a non-code ==26995== location. If you are running Memcheck and you just saw a ==26995== warning about a bad jump, it's probably your program's fault. ==26995== 2. The instruction is legitimate but Valgrind doesn't handle it, ==26995== i.e. it's Valgrind's fault. If you think this is the case or ==26995== you are not sure, please let us know and we'll try to fix it. ==26995== Either way, Valgrind will now raise a SIGILL signal which will ==26995== probably kill your program. ==26995== ==26995== Process terminating with default action of signal 4 (SIGILL) ==26995== Illegal opcode at address 0x112055 ==26995== at 0x112055: crandom_generate (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==26995== by 0x10B182: goldilocks_keygen (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==26995== by 0x10A8E2: crypto_sign_ed448goldilocks_64_keypair (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==26995== by 0x1094BA: test (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==26995== by 0x10A78A: main (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==26995== ==26995== HEAP SUMMARY: ==26995== in use at exit: 44,640 bytes in 10 blocks ==26995== total heap usage: 20 allocs, 10 frees, 69,848 bytes allocated ==26995== ==26995== LEAK SUMMARY: ==26995== definitely lost: 0 bytes in 0 blocks ==26995== indirectly lost: 0 bytes in 0 blocks ==26995== possibly lost: 44,640 bytes in 10 blocks ==26995== still reachable: 0 bytes in 0 blocks ==26995== suppressed: 0 bytes in 0 blocks ==26995== Rerun with --leak-check=full to see details of leaked memory ==26995== ==26995== For lists of detected and suppressed errors, rerun with: -s ==26995== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)