<<<test_start>>> tag=ptrace01_valgrind_memory_leak_check stime=1473972958 cmdline=" valgrind -q --leak-check=full --trace-children=yes ptrace01" contacts="" analysis=exit <<<test_output>>> --23224-- WARNING: unhandled arm64-linux syscall: 117 --23224-- You may be able to write your own handler. --23224-- Read the file README_MISSING_SYSCALL_OR_IOCTL. --23224-- Nevertheless we consider this a bug. Please report --23224-- it at http://valgrind.org/support/bug_reports.html. ptrace01 0 TWARN : ptrace01.c:237: ptrace() failed in child ptrace01 1 TFAIL : ptrace01.c:182: Test Failed --23225-- WARNING: unhandled arm64-linux syscall: 117 --23225-- You may be able to write your own handler. --23225-- Read the file README_MISSING_SYSCALL_OR_IOCTL. --23225-- Nevertheless we consider this a bug. Please report --23225-- it at http://valgrind.org/support/bug_reports.html. ptrace01 0 TWARN : ptrace01.c:237: ptrace() failed in child ptrace01 2 TFAIL : ptrace01.c:182: Test Failed <<<execution_status>>> initiation_status="ok" duration=1 termination_type=exited termination_id=1 corefile=no cutime=58 cstime=3 <<<test_end>>> Reproducible: Always
Can we close it? IIRC it was merged into valgrind.
*** Bug 388664 has been marked as a duplicate of this bug. ***
$ /usr/bin/valgrind -q gdb --quiet -ex where -ex detach -ex quit -p $$ Attaching to process 696 --6315-- WARNING: unhandled arm64-linux syscall: 117 --6315-- You may be able to write your own handler. --6315-- Read the file README_MISSING_SYSCALL_OR_IOCTL. --6315-- Nevertheless we consider this a bug. Please report --6315-- it at http://valgrind.org/support/bug_reports.html. ptrace: Function not implemented. No stack. The program is not being run.
Created attachment 113433 [details] Implement PRE and POST sys_ptrace for arm64 With this gdb can be run under valgrind on arm64: $ valgrind -q gdb --quiet -ex where -ex detach -ex quit -p $$ Attaching to process 696 Reading symbols from /usr/bin/bash...Reading symbols from /usr/bin/bash...(no debugging symbols found)...done. (no debugging symbols found)...done. Reading symbols from /lib64/libtinfo.so.5...Reading symbols from /lib64/libtinfo.so.5...(no debugging symbols found)...done. (no debugging symbols found)...done. Loaded symbols for /lib64/libtinfo.so.5 Reading symbols from /lib64/libdl.so.2...(no debugging symbols found)...done. Loaded symbols for /lib64/libdl.so.2 Reading symbols from /lib64/libc.so.6...(no debugging symbols found)...done. Loaded symbols for /lib64/libc.so.6 Reading symbols from /lib/ld-linux-aarch64.so.1...(no debugging symbols found)...done. Loaded symbols for /lib/ld-linux-aarch64.so.1 Reading symbols from /lib64/libnss_files.so.2...(no debugging symbols found)...done. Loaded symbols for /lib64/libnss_files.so.2 0x0000ffffa7f902ec in waitpid () from /lib64/libc.so.6 #0 0x0000ffffa7f902ec in waitpid () from /lib64/libc.so.6 #1 0x0000000000441d50 in waitchld.isra.10 () #2 0x00000000004430d0 in wait_for () #3 0x0000000000434a78 in execute_command_internal () #4 0x0000000000434b2c in execute_command () #5 0x000000000041f728 in reader_loop () #6 0x000000000041dd38 in main () Detaching from program: /usr/bin/bash, process 696
commit 6fbd9bf771494a4c547c6649cf90ae285fb709ae Author: Mark Wielaard <mark@klomp.org> Date: Tue Jun 19 18:26:43 2018 +0200 Implement ptrace syscall wrapper for arm64-linux. With this valgrind is able to run gdb on arm64. Also fixes the memcheck/tests/linux/getregset testcase. https://bugs.kde.org/show_bug.cgi?id=368913