error 0 ==27335== Memcheck, a memory error detector ==27335== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==27335== Using Valgrind-3.15.0.GIT and LibVEX; rerun with -h for copyright info ==27335== Command: ./try ==27335== vex amd64->IR: unhandled instruction bytes: 0x48 0xF 0xC7 0xF7 0xF 0x92 0xC0 0x83 0xEA 0x1 vex amd64->IR: REX=1 REX.W=1 REX.R=0 REX.X=0 REX.B=0 vex amd64->IR: VEX=0 VEX.L=0 VEX.nVVVV=0x0 ESC=0F vex amd64->IR: PFX.66=0 PFX.F2=0 PFX.F3=0 ==27335== valgrind: Unrecognised instruction at address 0x110f98. ==27335== at 0x110F98: crandom_generate (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==27335== by 0x10B2F3: goldilocks_keygen (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==27335== by 0x10AA92: crypto_sign_ed448goldilocks_amd64_keypair (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==27335== by 0x109683: test (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==27335== by 0x109094: main (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==27335== Your program just tried to execute an instruction that Valgrind ==27335== did not recognise. There are two possible reasons for this. ==27335== 1. Your program has a bug and erroneously jumped to a non-code ==27335== location. If you are running Memcheck and you just saw a ==27335== warning about a bad jump, it's probably your program's fault. ==27335== 2. The instruction is legitimate but Valgrind doesn't handle it, ==27335== i.e. it's Valgrind's fault. If you think this is the case or ==27335== you are not sure, please let us know and we'll try to fix it. ==27335== Either way, Valgrind will now raise a SIGILL signal which will ==27335== probably kill your program. ==27335== ==27335== Process terminating with default action of signal 4 (SIGILL) ==27335== Illegal opcode at address 0x110F98 ==27335== at 0x110F98: crandom_generate (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==27335== by 0x10B2F3: goldilocks_keygen (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==27335== by 0x10AA92: crypto_sign_ed448goldilocks_amd64_keypair (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==27335== by 0x109683: test (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==27335== by 0x109094: main (in /home/moritz/Uni/2015-2016/research-internship/letstrythisagain/supercop-20181113/bench/venus/work/compile/try) ==27335== ==27335== HEAP SUMMARY: ==27335== in use at exit: 44,640 bytes in 10 blocks ==27335== total heap usage: 20 allocs, 10 frees, 69,848 bytes allocated ==27335== ==27335== LEAK SUMMARY: ==27335== definitely lost: 0 bytes in 0 blocks ==27335== indirectly lost: 0 bytes in 0 blocks ==27335== possibly lost: 44,640 bytes in 10 blocks ==27335== still reachable: 0 bytes in 0 blocks ==27335== suppressed: 0 bytes in 0 blocks ==27335== Rerun with --leak-check=full to see details of leaked memory ==27335== ==27335== For lists of detected and suppressed errors, rerun with: -s ==27335== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)