Bug 368913 - WARNING: unhandled arm64-linux syscall: 117 (ptrace)
Summary: WARNING: unhandled arm64-linux syscall: 117 (ptrace)
Status: RESOLVED FIXED
Alias: None
Product: valgrind
Classification: Developer tools
Component: general (show other bugs)
Version: 3.11.0
Platform: Fedora RPMs Linux
: NOR normal
Target Milestone: ---
Assignee: Julian Seward
URL:
Keywords:
: 388664 (view as bug list)
Depends on:
Blocks:
 
Reported: 2016-09-16 20:30 UTC by Marcin Juszkiewicz
Modified: 2018-06-21 06:28 UTC (History)
2 users (show)

See Also:
Latest Commit:
Version Fixed In:


Attachments
Implement PRE and POST sys_ptrace for arm64 (8.03 KB, patch)
2018-06-19 16:24 UTC, Mark Wielaard
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Marcin Juszkiewicz 2016-09-16 20:30:52 UTC
<<<test_start>>>
tag=ptrace01_valgrind_memory_leak_check stime=1473972958
cmdline=" valgrind -q --leak-check=full --trace-children=yes ptrace01"
contacts=""
analysis=exit
<<<test_output>>>
--23224-- WARNING: unhandled arm64-linux syscall: 117
--23224-- You may be able to write your own handler.
--23224-- Read the file README_MISSING_SYSCALL_OR_IOCTL.
--23224-- Nevertheless we consider this a bug.  Please report
--23224-- it at http://valgrind.org/support/bug_reports.html.
ptrace01    0  TWARN  :  ptrace01.c:237: ptrace() failed in child
ptrace01    1  TFAIL  :  ptrace01.c:182: Test Failed
--23225-- WARNING: unhandled arm64-linux syscall: 117
--23225-- You may be able to write your own handler.
--23225-- Read the file README_MISSING_SYSCALL_OR_IOCTL.
--23225-- Nevertheless we consider this a bug.  Please report
--23225-- it at http://valgrind.org/support/bug_reports.html.
ptrace01    0  TWARN  :  ptrace01.c:237: ptrace() failed in child
ptrace01    2  TFAIL  :  ptrace01.c:182: Test Failed
<<<execution_status>>>
initiation_status="ok"
duration=1 termination_type=exited termination_id=1 corefile=no
cutime=58 cstime=3
<<<test_end>>>


Reproducible: Always
Comment 1 Marcin Juszkiewicz 2018-04-30 08:07:55 UTC
Can we close it? IIRC it was merged into valgrind.
Comment 2 Mark Wielaard 2018-06-19 16:20:26 UTC
*** Bug 388664 has been marked as a duplicate of this bug. ***
Comment 3 Mark Wielaard 2018-06-19 16:21:50 UTC
$ /usr/bin/valgrind -q gdb --quiet -ex where -ex detach -ex quit -p $$
Attaching to process 696
--6315-- WARNING: unhandled arm64-linux syscall: 117
--6315-- You may be able to write your own handler.
--6315-- Read the file README_MISSING_SYSCALL_OR_IOCTL.
--6315-- Nevertheless we consider this a bug.  Please report
--6315-- it at http://valgrind.org/support/bug_reports.html.
ptrace: Function not implemented.
No stack.
The program is not being run.
Comment 4 Mark Wielaard 2018-06-19 16:24:39 UTC
Created attachment 113433 [details]
Implement PRE and POST sys_ptrace for arm64

With this gdb can be run under valgrind on arm64:

$ valgrind -q gdb --quiet -ex where -ex detach -ex quit -p $$
Attaching to process 696
Reading symbols from /usr/bin/bash...Reading symbols from /usr/bin/bash...(no debugging symbols found)...done.
(no debugging symbols found)...done.
Reading symbols from /lib64/libtinfo.so.5...Reading symbols from /lib64/libtinfo.so.5...(no debugging symbols found)...done.
(no debugging symbols found)...done.
Loaded symbols for /lib64/libtinfo.so.5
Reading symbols from /lib64/libdl.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib64/libdl.so.2
Reading symbols from /lib64/libc.so.6...(no debugging symbols found)...done.
Loaded symbols for /lib64/libc.so.6
Reading symbols from /lib/ld-linux-aarch64.so.1...(no debugging symbols found)...done.
Loaded symbols for /lib/ld-linux-aarch64.so.1
Reading symbols from /lib64/libnss_files.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib64/libnss_files.so.2
0x0000ffffa7f902ec in waitpid () from /lib64/libc.so.6
#0  0x0000ffffa7f902ec in waitpid () from /lib64/libc.so.6
#1  0x0000000000441d50 in waitchld.isra.10 ()
#2  0x00000000004430d0 in wait_for ()
#3  0x0000000000434a78 in execute_command_internal ()
#4  0x0000000000434b2c in execute_command ()
#5  0x000000000041f728 in reader_loop ()
#6  0x000000000041dd38 in main ()
Detaching from program: /usr/bin/bash, process 696
Comment 5 Mark Wielaard 2018-06-21 06:28:13 UTC
commit 6fbd9bf771494a4c547c6649cf90ae285fb709ae
Author: Mark Wielaard <mark@klomp.org>
Date:   Tue Jun 19 18:26:43 2018 +0200

    Implement ptrace syscall wrapper for arm64-linux.
    
    With this valgrind is able to run gdb on arm64.
    Also fixes the memcheck/tests/linux/getregset testcase.
    
    https://bugs.kde.org/show_bug.cgi?id=368913