https://bugs.kde.org/show_bug.cgi?id=416387
Bug ID: 416387 Summary: finit_module and bpf syscalls are unhandled on arm64 Product: valgrind Version: unspecified Platform: Other OS: Linux Status: REPORTED Severity: normal Priority: NOR Component: general Assignee: jsew...@acm.org Reporter: ahajk...@redhat.com Target Milestone: --- Created attachment 125201 --> https://bugs.kde.org/attachment.cgi?id=125201&action=edit patch STEPS TO REPRODUCE 1. clone, compile and install linux test project (https://github.com/linux-test-project/ltp.git) 2. valgrind -q --trace-children=yes ~/ltp/testcases/kernel/syscalls/delete_module/delete_module01 Actual Results: tst_test.c:1217: INFO: Timeout per run is 0h 05m 00s --21002-- WARNING: unhandled arm64-linux syscall: 273 --21002-- You may be able to write your own handler. --21002-- Read the file README_MISSING_SYSCALL_OR_IOCTL. --21002-- Nevertheless we consider this a bug. Please report --21002-- it at http://valgrind.org/support/bug_reports.html. delete_module01.c:40: PASS: delete_module() successful Expected Results: tst_test.c:1217: INFO: Timeout per run is 0h 05m 00s delete_module01.c:40: PASS: delete_module() successful valgrind -q --trace-children=yes ~/ltp/testcases/kernel/syscalls/bpf/bpf_prog01 Actual Results: tst_buffers.c:55: INFO: Test is using guarded buffers tst_test.c:1217: INFO: Timeout per run is 0h 05m 00s bpf_common.h:18: INFO: Raising RLIMIT_MEMLOCK to 17039360 --22567-- WARNING: unhandled arm64-linux syscall: 280 --22567-- You may be able to write your own handler. --22567-- Read the file README_MISSING_SYSCALL_OR_IOCTL. --22567-- Nevertheless we consider this a bug. Please report --22567-- it at http://valgrind.org/support/bug_reports.html. ../../../../include/lapi/bpf.h:563: CONF: syscall(280) __NR_bpf not supported Expected results: tst_buffers.c:55: INFO: Test is using guarded buffers tst_test.c:1217: INFO: Timeout per run is 0h 05m 00s bpf_common.h:18: INFO: Raising RLIMIT_MEMLOCK to 17039360 bpf_prog01.c:90: PASS: Loaded program bpf_prog01.c:149: PASS: val = 1 Proposed patch hookes up these syscalls for arm64. -- You are receiving this mail because: You are watching all bug changes.