https://bugs.kde.org/show_bug.cgi?id=358030

            Bug ID: 358030
           Summary: support direct socket calls on x86 32bit (new in linux
                    4.3)
           Product: valgrind
           Version: unspecified
          Platform: Compiled Sources
                OS: Linux
            Status: UNCONFIRMED
          Severity: grave
          Priority: NOR
         Component: general
          Assignee: jsew...@acm.org
          Reporter: ronald.w...@raritan.com

Linux kernel 4.3 adds direct socket syscalls instead of using the socketcall
syscall. Valgrind cannot decode these yet for this arch and so the program
running via valgrind does not work correctly. I created a patch that updates
the syscall numbers and add the socket syscall wrappers. It is only roughly
tested...

Reproducible: Always

Steps to Reproduce:
1. On x86 32bit call valgrind on an application that has been build against the
new syscall interface
2.
3.

Actual Results:  
--1536-- WARNING: unhandled x86-linux syscall: 359
--1536-- You may be able to write your own handler.
--1536-- Read the file README_MISSING_SYSCALL_OR_IOCTL.
--1536-- Nevertheless we consider this a bug.  Please report
--1536-- it at http://valgrind.org/support/bug_reports.html.
or similar

Expected Results:  
no such message listed above

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to