https://bugs.kde.org/show_bug.cgi?id=358030
Bug ID: 358030 Summary: support direct socket calls on x86 32bit (new in linux 4.3) Product: valgrind Version: unspecified Platform: Compiled Sources OS: Linux Status: UNCONFIRMED Severity: grave Priority: NOR Component: general Assignee: jsew...@acm.org Reporter: ronald.w...@raritan.com Linux kernel 4.3 adds direct socket syscalls instead of using the socketcall syscall. Valgrind cannot decode these yet for this arch and so the program running via valgrind does not work correctly. I created a patch that updates the syscall numbers and add the socket syscall wrappers. It is only roughly tested... Reproducible: Always Steps to Reproduce: 1. On x86 32bit call valgrind on an application that has been build against the new syscall interface 2. 3. Actual Results: --1536-- WARNING: unhandled x86-linux syscall: 359 --1536-- You may be able to write your own handler. --1536-- Read the file README_MISSING_SYSCALL_OR_IOCTL. --1536-- Nevertheless we consider this a bug. Please report --1536-- it at http://valgrind.org/support/bug_reports.html. or similar Expected Results: no such message listed above -- You are receiving this mail because: You are watching all bug changes.