| Summary: | LTP 20250530 amd64 meta bug | ||
|---|---|---|---|
| Product: | [Developer tools] valgrind | Reporter: | Mark Wielaard <mark> |
| Component: | general | Assignee: | Julian Seward <jseward> |
| Status: | CONFIRMED --- | ||
| Severity: | normal | CC: | mcermak |
| Priority: | NOR | ||
| Version First Reported In: | 3.25.0 | ||
| Target Milestone: | --- | ||
| Platform: | Other | ||
| OS: | Linux | ||
| Latest Commit: | Version Fixed/Implemented In: | ||
| Sentry Crash Report: | |||
| Bug Depends on: | 369032, 420906, 506596, 309554, 331311, 368791, 369030, 418756, 506806, 506813, 506816, 506890, 506910, 506928, 506929, 506930, 506967, 506970, 507853, 507868, 507873, 508154, 509566, 509567 | ||
| Bug Blocks: | |||
|
Description
Mark Wielaard
2025-07-12 22:33:42 UTC
- clone302 ../../../../include/lapi/sched.h:80: TCONF: syscall(435) __NR_clone3 not supported on your arch https://bugs.kde.org/show_bug.cgi?id=420906 mseal01 ../../../../include/lapi/pkey.h:51: TCONF: pkeys are not available for test Because we don't support RDPKRU/WRPKRU instructions. Our pkey_alloc always returns ENOSPC. mseal02.c:45: TFAIL: mseal(0x483d000, 18446744073709547521, 0) expected EINVAL: +ENOMEM (12) We should check for overflow first (EINVAL), then valid memory (ENOMEM). Fixed in commit d7743540064c58d3dcb850804fb29f742757d853 linux mseal PRE wrapper should First check for overflow - eventfd2_03 sometimes fails with a different TINFO order eventfd2_03: diff -u log2err log3err: --- log2err 2025-08-02 13:36:29.936286548 +0000 +++ log3err 2025-08-02 13:36:30.233294160 +0000 @@ -5,8 +5,8 @@ eventfd2_03.c:36: TINFO: eventfd2_03.c:39: TINFO: eventfd2_03.c:36: TINFO: -eventfd2_03.c:39: TINFO: eventfd2_03.c:42: TINFO: +eventfd2_03.c:39: TINFO: eventfd2_03.c:45: TINFO: eventfd2_03.c:42: TINFO: eventfd2_03.c:45: TINFO: This probably comes from the fork children running in different order. - faccessat01 faccessat01.c:49: TFAIL: faccessat(-100, faccessatdir/faccessatfile, R_OK, 0) failed: EBADF (9) - faccessat201 faccessat201.c:50: TPASS: faccessat2(3, faccessat2file, R_OK, 0) passed faccessat201.c:50: TFAIL: faccessat2(-1, /tmp/LTP_facejD0qP/faccessat2dir/faccessat2file, R_OK, 0) failed: EBADF (9) faccessat201.c:50: TFAIL: faccessat2(-100, faccessat2dir/faccessat2file, R_OK, 0) failed: EBADF (9) faccessat201.c:50: TPASS: faccessat2(3, faccessat2file, R_OK, 512) passed faccessat201.c:50: TFAIL: faccessat2(-1, /tmp/LTP_facejD0qP/faccessat2dir/faccessat2file, R_OK, 512) failed: EBADF (9) faccessat201.c:50: TFAIL: faccessat2(-100, faccessat2dir/faccessat2file, R_OK, 512) failed: EBADF (9) faccessat201.c:50: TFAIL: faccessat2(-100, faccessat2symlink, R_OK, 256) failed: EBADF (9) This seems to be introduced by commit bc66a6e865d952ac51ffb0e63c127ce7cd977b98 Add fd_allowed and POST_newFd_RES to all syscalls that use or return fds https://bugs.kde.org/show_bug.cgi?id=507853 - futimesat01 ==695142== Warning: invalid file descriptor -100 in syscall futimesat() futimesat01 5 TFAIL : futimesat01.c:85: futimesat() failed: TEST_ERRNO=EBADF(9): Bad file descriptor futimesat doesn't handle AT_FDCWD https://bugs.kde.org/show_bug.cgi?id=507868 - fchmodat01 - fchmodat02 fchmodat01.c:47: TFAIL: fchmodat(-100, fchmodatdir/fchmodatfile, 0600, 0) failed: EBADF (9) fchmodat02.c:55: TFAIL: fchmodat() with invalid flag expected EINVAL: EBADF (9) This also seems to cause a lot of arm64 LTP failures fchmodat fchmodat2 should handle AT_FDCWD and absolute paths https://bugs.kde.org/show_bug.cgi?id=507873 |