You can subscribe to this list here.
| 2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
(122) |
Nov
(152) |
Dec
(69) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 |
Jan
(6) |
Feb
(25) |
Mar
(73) |
Apr
(82) |
May
(24) |
Jun
(25) |
Jul
(10) |
Aug
(11) |
Sep
(10) |
Oct
(54) |
Nov
(203) |
Dec
(182) |
| 2004 |
Jan
(307) |
Feb
(305) |
Mar
(430) |
Apr
(312) |
May
(187) |
Jun
(342) |
Jul
(487) |
Aug
(637) |
Sep
(336) |
Oct
(373) |
Nov
(441) |
Dec
(210) |
| 2005 |
Jan
(385) |
Feb
(480) |
Mar
(636) |
Apr
(544) |
May
(679) |
Jun
(625) |
Jul
(810) |
Aug
(838) |
Sep
(634) |
Oct
(521) |
Nov
(965) |
Dec
(543) |
| 2006 |
Jan
(494) |
Feb
(431) |
Mar
(546) |
Apr
(411) |
May
(406) |
Jun
(322) |
Jul
(256) |
Aug
(401) |
Sep
(345) |
Oct
(542) |
Nov
(308) |
Dec
(481) |
| 2007 |
Jan
(427) |
Feb
(326) |
Mar
(367) |
Apr
(255) |
May
(244) |
Jun
(204) |
Jul
(223) |
Aug
(231) |
Sep
(354) |
Oct
(374) |
Nov
(497) |
Dec
(362) |
| 2008 |
Jan
(322) |
Feb
(482) |
Mar
(658) |
Apr
(422) |
May
(476) |
Jun
(396) |
Jul
(455) |
Aug
(267) |
Sep
(280) |
Oct
(253) |
Nov
(232) |
Dec
(304) |
| 2009 |
Jan
(486) |
Feb
(470) |
Mar
(458) |
Apr
(423) |
May
(696) |
Jun
(461) |
Jul
(551) |
Aug
(575) |
Sep
(134) |
Oct
(110) |
Nov
(157) |
Dec
(102) |
| 2010 |
Jan
(226) |
Feb
(86) |
Mar
(147) |
Apr
(117) |
May
(107) |
Jun
(203) |
Jul
(193) |
Aug
(238) |
Sep
(300) |
Oct
(246) |
Nov
(23) |
Dec
(75) |
| 2011 |
Jan
(133) |
Feb
(195) |
Mar
(315) |
Apr
(200) |
May
(267) |
Jun
(293) |
Jul
(353) |
Aug
(237) |
Sep
(278) |
Oct
(611) |
Nov
(274) |
Dec
(260) |
| 2012 |
Jan
(303) |
Feb
(391) |
Mar
(417) |
Apr
(441) |
May
(488) |
Jun
(655) |
Jul
(590) |
Aug
(610) |
Sep
(526) |
Oct
(478) |
Nov
(359) |
Dec
(372) |
| 2013 |
Jan
(467) |
Feb
(226) |
Mar
(391) |
Apr
(281) |
May
(299) |
Jun
(252) |
Jul
(311) |
Aug
(352) |
Sep
(481) |
Oct
(571) |
Nov
(222) |
Dec
(231) |
| 2014 |
Jan
(185) |
Feb
(329) |
Mar
(245) |
Apr
(238) |
May
(281) |
Jun
(399) |
Jul
(382) |
Aug
(500) |
Sep
(579) |
Oct
(435) |
Nov
(487) |
Dec
(256) |
| 2015 |
Jan
(338) |
Feb
(357) |
Mar
(330) |
Apr
(294) |
May
(191) |
Jun
(108) |
Jul
(142) |
Aug
(261) |
Sep
(190) |
Oct
(54) |
Nov
(83) |
Dec
(22) |
| 2016 |
Jan
(49) |
Feb
(89) |
Mar
(33) |
Apr
(50) |
May
(27) |
Jun
(34) |
Jul
(53) |
Aug
(53) |
Sep
(98) |
Oct
(206) |
Nov
(93) |
Dec
(53) |
| 2017 |
Jan
(65) |
Feb
(82) |
Mar
(102) |
Apr
(86) |
May
(187) |
Jun
(67) |
Jul
(23) |
Aug
(93) |
Sep
(65) |
Oct
(45) |
Nov
(35) |
Dec
(17) |
| 2018 |
Jan
(26) |
Feb
(35) |
Mar
(38) |
Apr
(32) |
May
(8) |
Jun
(43) |
Jul
(27) |
Aug
(30) |
Sep
(43) |
Oct
(42) |
Nov
(38) |
Dec
(67) |
| 2019 |
Jan
(32) |
Feb
(37) |
Mar
(53) |
Apr
(64) |
May
(49) |
Jun
(18) |
Jul
(14) |
Aug
(53) |
Sep
(25) |
Oct
(30) |
Nov
(49) |
Dec
(31) |
| 2020 |
Jan
(87) |
Feb
(45) |
Mar
(37) |
Apr
(51) |
May
(99) |
Jun
(36) |
Jul
(11) |
Aug
(14) |
Sep
(20) |
Oct
(24) |
Nov
(40) |
Dec
(23) |
| 2021 |
Jan
(14) |
Feb
(53) |
Mar
(85) |
Apr
(15) |
May
(19) |
Jun
(3) |
Jul
(14) |
Aug
(1) |
Sep
(57) |
Oct
(73) |
Nov
(56) |
Dec
(22) |
| 2022 |
Jan
(3) |
Feb
(22) |
Mar
(6) |
Apr
(55) |
May
(46) |
Jun
(39) |
Jul
(15) |
Aug
(9) |
Sep
(11) |
Oct
(34) |
Nov
(20) |
Dec
(36) |
| 2023 |
Jan
(79) |
Feb
(41) |
Mar
(99) |
Apr
(169) |
May
(48) |
Jun
(16) |
Jul
(16) |
Aug
(57) |
Sep
(19) |
Oct
|
Nov
|
Dec
|
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
|
|
|
|
|
1
(1) |
2
(13) |
3
(1) |
|
4
(1) |
5
(11) |
6
|
7
|
8
(3) |
9
(18) |
10
(7) |
|
11
(21) |
12
(26) |
13
(16) |
14
(17) |
15
(14) |
16
(6) |
17
(6) |
|
18
(17) |
19
(1) |
20
(16) |
21
(1) |
22
(2) |
23
(14) |
24
(7) |
|
25
(6) |
26
(3) |
27
(11) |
28
(9) |
29
(2) |
30
(7) |
31
(3) |
|
From: <sv...@va...> - 2011-12-26 21:26:19
|
Author: philippe
Date: 2011-12-26 21:21:37 +0000 (Mon, 26 Dec 2011)
New Revision: 12319
Log:
fix 289699 vgdb connection in relay mode erroneously closed due to buffer overrun
* use PBUFSIZ+1 for buffers reading characters from gdbserver:
vgdb reads up to PBUFSIZ characters from gdbserver.
If vgdb receives a burst of packet from Valgrind gdbserver, PBUFSIZ
characters can be read. The tracing code adds a trailing \0 to
this buffer => to avoid buffer overrun, the buffers are dimensionned
with PBUFSIZ+1.
* use read_buf in function read_char, rather than directly calling read.
Modified:
trunk/NEWS
trunk/coregrind/vgdb.c
Modified: trunk/NEWS
===================================================================
--- trunk/NEWS 2011-12-26 18:35:29 UTC (rev 12318)
+++ trunk/NEWS 2011-12-26 21:21:37 UTC (rev 12319)
@@ -29,8 +29,8 @@
286270 vgpreload is not friendly to 64->32 bit execs, gives ld.so warnings
286374 Running cachegrind with --branch-sim=yes on 64-bit PowerPC program fails
287858 VG_(strerror): unknown error
+289699 vgdb connection in relay mode erroneously closed due to buffer overrun
-
Release 3.7.0 (5 November 2011)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
3.7.0 is a feature release with many significant improvements and the
Modified: trunk/coregrind/vgdb.c
===================================================================
--- trunk/coregrind/vgdb.c 2011-12-26 18:35:29 UTC (rev 12318)
+++ trunk/coregrind/vgdb.c 2011-12-26 21:21:37 UTC (rev 12319)
@@ -1364,7 +1364,7 @@
static
Bool read_from_gdb_write_to_pid(int to_pid)
{
- char buf[PBUFSIZ];
+ char buf[PBUFSIZ+1]; // +1 for trailing \0
int nrread;
nrread = read_buf(from_gdb, buf, "from gdb on stdin");
@@ -1388,7 +1388,7 @@
static
Bool read_from_pid_write_to_gdb(int from_pid)
{
- char buf[PBUFSIZ];
+ char buf[PBUFSIZ+1]; // +1 for trailing \0
int nrread;
nrread = read_buf(from_pid, buf, "from pid");
@@ -1493,14 +1493,14 @@
static int
readchar (int fd)
{
- static unsigned char buf[PBUFSIZ];
+ static unsigned char buf[PBUFSIZ+1]; // +1 for trailing \0
static int bufcnt = 0;
static unsigned char *bufp;
if (bufcnt-- > 0)
return *bufp++;
- bufcnt = read (fd, buf, sizeof (buf));
+ bufcnt = read_buf (fd, buf, "static buf readchar");
if (bufcnt <= 0) {
if (bufcnt == 0) {
@@ -1810,10 +1810,10 @@
if (!read_from_gdb_write_to_pid(to_pid))
shutting_down = True;
break;
- case FROM_PID:
- if (!read_from_pid_write_to_gdb(from_pid))
- shutting_down = True;
- break;
+ case FROM_PID:
+ if (!read_from_pid_write_to_gdb(from_pid))
+ shutting_down = True;
+ break;
default: XERROR(0, "unexpected POLLIN on %s\n",
ppConnectionKind(ck));
}
@@ -1874,7 +1874,7 @@
unsigned char hex[3];
unsigned char cksum;
unsigned char *hexcommand;
- unsigned char buf[PBUFSIZ];
+ unsigned char buf[PBUFSIZ+1]; // +1 for trailing \0
int buflen;
int nc;
|
|
From: <sv...@va...> - 2011-12-26 18:40:08
|
Author: florian
Date: 2011-12-26 18:35:29 +0000 (Mon, 26 Dec 2011)
New Revision: 12318
Log:
While investigating whether bugzilla #286040 was a problem or
not (it's not) I noticed that the code was more complex than
it needed to be. So this patch simplifies it a little.
Modified:
trunk/coregrind/m_aspacemgr/aspacemgr-linux.c
Modified: trunk/coregrind/m_aspacemgr/aspacemgr-linux.c
===================================================================
--- trunk/coregrind/m_aspacemgr/aspacemgr-linux.c 2011-12-26 18:30:18 UTC (rev 12317)
+++ trunk/coregrind/m_aspacemgr/aspacemgr-linux.c 2011-12-26 18:35:29 UTC (rev 12318)
@@ -3299,19 +3299,21 @@
read_line_ok:
+ aspacem_assert(i < buf_n_tot);
+
/* Try and find the name of the file mapped to this segment, if
- it exists. Note that files can contains spaces. */
+ it exists. Note that file names can contain spaces. */
- // Move i to the next non-space char, which should be either a '/' or
- // a newline.
- while (procmap_buf[i] == ' ' && i < buf_n_tot-1) i++;
+ // Move i to the next non-space char, which should be either a '/',
+ // a '[', or a newline.
+ while (procmap_buf[i] == ' ') i++;
// Move i_eol to the end of the line.
i_eol = i;
- while (procmap_buf[i_eol] != '\n' && i_eol < buf_n_tot-1) i_eol++;
+ while (procmap_buf[i_eol] != '\n') i_eol++;
// If there's a filename...
- if (i < i_eol-1 && procmap_buf[i] == '/') {
+ if (procmap_buf[i] == '/') {
/* Minor hack: put a '\0' at the filename end for the call to
'record_mapping', then restore the old char with 'tmp'. */
filename = &procmap_buf[i];
|
|
From: <sv...@va...> - 2011-12-26 18:34:57
|
Author: florian
Date: 2011-12-26 18:30:18 +0000 (Mon, 26 Dec 2011)
New Revision: 12317
Log:
When reading a decimal value consume decimal digits, not hexdigits.
Modified:
trunk/coregrind/m_aspacemgr/aspacemgr-linux.c
Modified: trunk/coregrind/m_aspacemgr/aspacemgr-linux.c
===================================================================
--- trunk/coregrind/m_aspacemgr/aspacemgr-linux.c 2011-12-24 21:50:53 UTC (rev 12316)
+++ trunk/coregrind/m_aspacemgr/aspacemgr-linux.c 2011-12-26 18:30:18 UTC (rev 12317)
@@ -3141,7 +3141,7 @@
{
Int n = 0;
*val = 0;
- while (hexdigit(*buf) >= 0) {
+ while (decdigit(*buf) >= 0) {
*val = (*val * 10) + decdigit(*buf);
n++; buf++;
}
|