https://bugs.kde.org/show_bug.cgi?id=504341
Mark Wielaard <m...@klomp.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|ASSIGNED |RESOLVED Resolution|--- |FIXED --- Comment #4 from Mark Wielaard <m...@klomp.org> --- This looks good. Pushed as: commit 859d267a456c2921772f0c957bf24f463c51bd93 Author: Martin Cermak <mcer...@redhat.com> Date: Mon May 19 11:45:04 2025 +0200 PR504341: Prevent LTP setrlimit05 syscall test from crashing valgrind Prevent ltp/testcases/kernel/syscalls/setrlimit/setrlimit05 testcase from crashing valgrind when passing 0xffffffffffff as ARG3 and then trying to dereference it. https://bugs.kde.org/show_bug.cgi?id=504341 It might be good as a followup to also wrap the other accesses of ARG3 and ARG4 as vki_rlimit64 pointers in ML_(safe_to_deref) checks. The trick there is that they occur after the SET_STATUS_Success( 0 ); call. So they should probably call SET_STATUS_Failure( VKI_FAULT ); themselves if the safe_to_deref check fails. -- You are receiving this mail because: You are watching all bug changes.