https://bugs.kde.org/show_bug.cgi?id=358030
Bug ID: 358030
Summary: support direct socket calls on x86 32bit (new in linux
4.3)
Product: valgrind
Version: unspecified
Platform: Compiled Sources
OS: Linux
Status: UNCONFIRMED
Severity: grave
Priority: NOR
Component: general
Assignee: [email protected]
Reporter: [email protected]
Linux kernel 4.3 adds direct socket syscalls instead of using the socketcall
syscall. Valgrind cannot decode these yet for this arch and so the program
running via valgrind does not work correctly. I created a patch that updates
the syscall numbers and add the socket syscall wrappers. It is only roughly
tested...
Reproducible: Always
Steps to Reproduce:
1. On x86 32bit call valgrind on an application that has been build against the
new syscall interface
2.
3.
Actual Results:
--1536-- WARNING: unhandled x86-linux syscall: 359
--1536-- You may be able to write your own handler.
--1536-- Read the file README_MISSING_SYSCALL_OR_IOCTL.
--1536-- Nevertheless we consider this a bug. Please report
--1536-- it at http://valgrind.org/support/bug_reports.html.
or similar
Expected Results:
no such message listed above
--
You are receiving this mail because:
You are watching all bug changes.