https://bugs.kde.org/show_bug.cgi?id=358620
Bug ID: 358620 Summary: WARNING: unhandled syscall: 357 Product: valgrind Version: 3.7.0 Platform: Debian stable OS: Linux Status: UNCONFIRMED Severity: crash Priority: NOR Component: memcheck Assignee: jsew...@acm.org Reporter: alexander.ress...@gmail.com I have an ARMv6 Raspberry Pi that I'm compiling and testing a small TCP server on. I'm using the epoll system call in my c/c++ program. The program runs fine when I don't use valgrind. However, when I use valgrind, the call to 'epoll_wait' returns -1, which indicates a kernel level error. This doesn't happen with valgrind and the same program on my typical desktop with an intel i7 cpu. See the results of valgrind below. ==2615== Memcheck, a memory error detector ==2615== Copyright (C) 2002-2011, and GNU GPL'd, by Julian Seward et al. ==2615== Using Valgrind-3.7.0 and LibVEX; rerun with -h for copyright info ==2615== Command: ./src/app/bserver ==2615== --2615-- WARNING: unhandled syscall: 357 --2615-- You may be able to write your own handler. --2615-- Read the file README_MISSING_SYSCALL_OR_IOCTL. --2615-- Nevertheless we consider this a bug. Please report --2615-- it at http://valgrind.org/support/bug_reports.html. --2615-- WARNING: unhandled syscall: 357 --2615-- You may be able to write your own handler. --2615-- Read the file README_MISSING_SYSCALL_OR_IOCTL. --2615-- Nevertheless we consider this a bug. Please report --2615-- it at http://valgrind.org/support/bug_reports.html. disInstr(arm): unhandled instruction: 0xF1010200 cond=15(0xF) 27:20=16(0x10) 4:4=0 3:0=0(0x0) ==2615== valgrind: Unrecognised instruction at address 0x4842588. ==2615== at 0x4842588: ??? (in /usr/lib/arm-linux-gnueabihf/libcofi_rpi.so) ==2615== Your program just tried to execute an instruction that Valgrind ==2615== did not recognise. There are two possible reasons for this. ==2615== 1. Your program has a bug and erroneously jumped to a non-code ==2615== location. If you are running Memcheck and you just saw a ==2615== warning about a bad jump, it's probably your program's fault. ==2615== 2. The instruction is legitimate but Valgrind doesn't handle it, ==2615== i.e. it's Valgrind's fault. If you think this is the case or ==2615== you are not sure, please let us know and we'll try to fix it. ==2615== Either way, Valgrind will now raise a SIGILL signal which will ==2615== probably kill your program. ==2615== ==2615== Process terminating with default action of signal 4 (SIGILL) ==2615== Illegal opcode at address 0x4842588 ==2615== at 0x4842588: ??? (in /usr/lib/arm-linux-gnueabihf/libcofi_rpi.so) ==2615== ==2615== HEAP SUMMARY: ==2615== in use at exit: 44,142 bytes in 302 blocks ==2615== total heap usage: 347 allocs, 45 frees, 48,218 bytes allocated ==2615== ==2615== LEAK SUMMARY: ==2615== definitely lost: 0 bytes in 0 blocks ==2615== indirectly lost: 0 bytes in 0 blocks ==2615== possibly lost: 3,060 bytes in 87 blocks ==2615== still reachable: 41,082 bytes in 215 blocks ==2615== suppressed: 0 bytes in 0 blocks ==2615== Rerun with --leak-check=full to see details of leaked memory ==2615== ==2615== For counts of detected and suppressed errors, rerun with: -v ==2615== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) Killed -- You are receiving this mail because: You are watching all bug changes.