https://bugs.kde.org/show_bug.cgi?id=478774
Bug ID: 478774
Summary: The coregrind linux syswrap does not handle fully the
bpf BPF_OBJ_GET_INFO_BY_FD call which would return
btf_info
Classification: Developer tools
Product: valgrind
Version: unspecified
Platform: Ubuntu
OS: Linux
Status: REPORTED
Severity: normal
Priority: NOR
Component: general
Assignee: [email protected]
Reporter: [email protected]
CC: [email protected]
Target Milestone: ---
The Linux eBPF syscall
(https://docs.kernel.org/userspace-api/ebpf/syscall.html)
BPF_OBJ_GET_INFO_BY_FD type may populate multiple data formats based on the
eBPF object type. The bpf_btf_info datatype contains a pointer which points to
another block of memory which is populated. The coregrind linux syswrap handler
does not account for that memory being written to by the kernel and thus
properly initialized.
OBSERVED RESULT
Running valgrind against a program which executes these syscalls and uses the
results will return a large number of errors such as "Conditional jump or move
depends on uninitialised value(s)".
EXPECTED RESULT
No incorrect errors are returned.
SOFTWARE/OS VERSIONS
ADDITIONAL INFORMATION
--
You are receiving this mail because:
You are watching all bug changes.