https://bugs.kde.org/show_bug.cgi?id=478774

            Bug ID: 478774
           Summary: The coregrind linux syswrap does not handle fully the
                    bpf BPF_OBJ_GET_INFO_BY_FD call which would return
                    btf_info
    Classification: Developer tools
           Product: valgrind
           Version: unspecified
          Platform: Ubuntu
                OS: Linux
            Status: REPORTED
          Severity: normal
          Priority: NOR
         Component: general
          Assignee: [email protected]
          Reporter: [email protected]
                CC: [email protected]
  Target Milestone: ---

The Linux eBPF syscall
(https://docs.kernel.org/userspace-api/ebpf/syscall.html)
BPF_OBJ_GET_INFO_BY_FD type may populate multiple data formats based on the
eBPF object type. The bpf_btf_info datatype contains a pointer which points to
another block of memory which is populated. The coregrind linux syswrap handler
does not account for that memory being written to by the kernel and thus
properly initialized.

OBSERVED RESULT

Running valgrind against a program which executes these syscalls and uses the
results will return a large number of errors such as "Conditional jump or move
depends on uninitialised value(s)".

EXPECTED RESULT

No incorrect errors are returned.

SOFTWARE/OS VERSIONS
ADDITIONAL INFORMATION

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to