[strace/strace] [RFC] Add 64-bit LoongArch support (PR #205)

Dmitry V. Levin notifications at github.com
Fri Jan 7 12:46:40 UTC 2022


I've tested this on gcc401.fsffrance.org:
Linux gcc401 5.15.0+ #348 SMP PREEMPT Thu Dec 30 13:46:50 CST 2021 loongarch64 GNU/Linux

Testsuite summary:

FAIL: bpf-success.gen
FAIL: bpf-success-v.gen
FAIL: clone3-success.gen
FAIL: clone3-success-Xabbrev.gen
FAIL: clone3-success-Xraw.gen
FAIL: clone3-success-Xverbose.gen
FAIL: landlock_create_ruleset-success.gen
FAIL: landlock_create_ruleset-success-y.gen
FAIL: prctl-fp-mode.gen
FAIL: prctl-spec-inject.gen
FAIL: prlimit64-success.gen
FAIL: prlimit64-success--pidns-translation.gen
FAIL: quotactl-success.gen
FAIL: quotactl-success-v.gen
FAIL: quotactl-xfs-success.gen
FAIL: quotactl-xfs-success-v.gen
FAIL: seccomp_get_notif_sizes-success.gen
FAIL: bpf-success-long-y
FAIL: qual_fault-exit_group
FAIL: syslog-success
FAIL: poke-ptrace
FAIL: poke-unaligned
FAIL: printpath-umovestr-legacy
FAIL: printstrn-umoven-legacy
FAIL: qual_fault
FAIL: qual_inject-error-signal
FAIL: qual_inject-retval

In other words, all tests based on syscall tampering are failing there.

Assuming that src/linux/loongarch64/set_scno.c and src/linux/loongarch64/set_error.c are correct,
the kernel seems to be missing syscall tampering support.

-- 
Reply to this email directly or view it on GitHub:
https://github.com/strace/strace/pull/205#issuecomment-1007380587
You are receiving this because you are subscribed to this thread.

Message ID: <strace/strace/pull/205/c1007380587 at github.com>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strace.io/pipermail/strace-devel/attachments/20220107/7884d346/attachment.htm>


More information about the Strace-devel mailing list