Bug 380183 - WARNING: unhandled amd64-linux syscall: 317 (seccomp)
Summary: WARNING: unhandled amd64-linux syscall: 317 (seccomp)
Status: RESOLVED DUPLICATE of bug 345414
Alias: None
Product: valgrind
Classification: Developer tools
Component: general (show other bugs)
Version: 3.12.0
Platform: Other Linux
: NOR normal
Target Milestone: ---
Assignee: Julian Seward
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-05-25 12:24 UTC by Toralf Förster
Modified: 2023-11-14 23:12 UTC (History)
1 user (show)

See Also:
Latest Commit:
Version Fixed In:


Attachments
terminal log (191.45 KB, text/plain)
2017-05-25 12:24 UTC, Toralf Förster
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Toralf Förster 2017-05-25 12:24:58 UTC
Created attachment 105706 [details]
terminal log

Well, got at a stable hardened Gentoo Linux the following for tor-0.3.1.1_alpha:

t44 ~ # /etc/init.d/tor start
 * Starting tor ...
==8226== Memcheck, a memory error detector
==8226== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==8226== Using Valgrind-3.12.0 and LibVEX; rerun with -h for copyright info                                     
==8226== Command: /usr/bin/tor --hush --runasdaemon 1 --pidfile /var/run/tor/tor.pid                            
==8226==                                                                                                        
==8226== Use of uninitialised value of size 8                                                                   
==8226==    at 0x173F51: ??? (in /usr/bin/tor)                                                                  
==8226==    by 0x1AF645: ??? (in /usr/bin/tor)
==8226==    by 0x1B4FB4: router_parse_addr_policy_item_from_string (in /usr/bin/tor)
==8226==    by 0x177E68: ??? (in /usr/bin/tor)
==8226==    by 0x17804F: ??? (in /usr/bin/tor)
==8226==    by 0x1782CA: policies_parse_exit_policy (in /usr/bin/tor)
==8226==    by 0x1783EC: policies_parse_exit_policy_from_options (in /usr/bin/tor)
==8226==    by 0x17852D: validate_addr_policies (in /usr/bin/tor)
==8226==    by 0x200EF2: ??? (in /usr/bin/tor)
==8226==    by 0x205D0C: options_init_from_string (in /usr/bin/tor)
==8226==    by 0x2060E0: options_init_from_torrc (in /usr/bin/tor)
==8226==    by 0x156252: tor_init (in /usr/bin/tor)
==8226== 
...

==21116== Use of uninitialised value of size 8
==21116==    at 0x28506B: strmap_free (container.c:1428)
==21116==    by 0x299B22: prot_strings (sandbox.c:1262)
==21116==    by 0x299B22: install_syscall_filter (sandbox.c:1660)
==21116==    by 0x299B22: initialise_libseccomp_sandbox (sandbox.c:1836)
==21116==    by 0x299B22: sandbox_init (sandbox.c:1862)
==21116==    by 0x1592A0: tor_main (main.c:3728)
==21116==    by 0x150D17: main (tor_main.c:34)
==21116== 
--21116-- WARNING: unhandled amd64-linux syscall: 317
--21116-- You may be able to write your own handler.
--21116-- Read the file README_MISSING_SYSCALL_OR_IOCTL.
--21116-- Nevertheless we consider this a bug.  Please report
--21116-- it at http://valgrind.org/support/bug_reports.html.


And the last 2 lines forced me to file this bug.
Comment 1 Mark Wielaard 2017-05-25 12:31:44 UTC
syscall 317 on x86_64-linux is seccomp.
Comment 2 Mark Wielaard 2023-11-14 23:12:12 UTC

*** This bug has been marked as a duplicate of bug 345414 ***