You can subscribe to this list here.
| 2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
(122) |
Nov
(152) |
Dec
(69) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 |
Jan
(6) |
Feb
(25) |
Mar
(73) |
Apr
(82) |
May
(24) |
Jun
(25) |
Jul
(10) |
Aug
(11) |
Sep
(10) |
Oct
(54) |
Nov
(203) |
Dec
(182) |
| 2004 |
Jan
(307) |
Feb
(305) |
Mar
(430) |
Apr
(312) |
May
(187) |
Jun
(342) |
Jul
(487) |
Aug
(637) |
Sep
(336) |
Oct
(373) |
Nov
(441) |
Dec
(210) |
| 2005 |
Jan
(385) |
Feb
(480) |
Mar
(636) |
Apr
(544) |
May
(679) |
Jun
(625) |
Jul
(810) |
Aug
(838) |
Sep
(634) |
Oct
(521) |
Nov
(965) |
Dec
(543) |
| 2006 |
Jan
(494) |
Feb
(431) |
Mar
(546) |
Apr
(411) |
May
(406) |
Jun
(322) |
Jul
(256) |
Aug
(401) |
Sep
(345) |
Oct
(542) |
Nov
(308) |
Dec
(481) |
| 2007 |
Jan
(427) |
Feb
(326) |
Mar
(367) |
Apr
(255) |
May
(244) |
Jun
(204) |
Jul
(223) |
Aug
(231) |
Sep
(354) |
Oct
(374) |
Nov
(497) |
Dec
(362) |
| 2008 |
Jan
(322) |
Feb
(482) |
Mar
(658) |
Apr
(422) |
May
(476) |
Jun
(396) |
Jul
(455) |
Aug
(267) |
Sep
(280) |
Oct
(253) |
Nov
(232) |
Dec
(304) |
| 2009 |
Jan
(486) |
Feb
(470) |
Mar
(458) |
Apr
(423) |
May
(696) |
Jun
(461) |
Jul
(551) |
Aug
(575) |
Sep
(134) |
Oct
(110) |
Nov
(157) |
Dec
(102) |
| 2010 |
Jan
(226) |
Feb
(86) |
Mar
(147) |
Apr
(117) |
May
(107) |
Jun
(203) |
Jul
(193) |
Aug
(238) |
Sep
(300) |
Oct
(246) |
Nov
(23) |
Dec
(75) |
| 2011 |
Jan
(133) |
Feb
(195) |
Mar
(315) |
Apr
(200) |
May
(267) |
Jun
(293) |
Jul
(353) |
Aug
(237) |
Sep
(278) |
Oct
(611) |
Nov
(274) |
Dec
(260) |
| 2012 |
Jan
(303) |
Feb
(391) |
Mar
(417) |
Apr
(441) |
May
(488) |
Jun
(655) |
Jul
(590) |
Aug
(610) |
Sep
(526) |
Oct
(478) |
Nov
(359) |
Dec
(372) |
| 2013 |
Jan
(467) |
Feb
(226) |
Mar
(391) |
Apr
(281) |
May
(299) |
Jun
(252) |
Jul
(311) |
Aug
(352) |
Sep
(481) |
Oct
(571) |
Nov
(222) |
Dec
(231) |
| 2014 |
Jan
(185) |
Feb
(329) |
Mar
(245) |
Apr
(238) |
May
(281) |
Jun
(399) |
Jul
(382) |
Aug
(500) |
Sep
(579) |
Oct
(435) |
Nov
(487) |
Dec
(256) |
| 2015 |
Jan
(338) |
Feb
(357) |
Mar
(330) |
Apr
(294) |
May
(191) |
Jun
(108) |
Jul
(142) |
Aug
(261) |
Sep
(190) |
Oct
(54) |
Nov
(83) |
Dec
(22) |
| 2016 |
Jan
(49) |
Feb
(89) |
Mar
(33) |
Apr
(50) |
May
(27) |
Jun
(34) |
Jul
(53) |
Aug
(53) |
Sep
(98) |
Oct
(206) |
Nov
(93) |
Dec
(53) |
| 2017 |
Jan
(65) |
Feb
(82) |
Mar
(102) |
Apr
(86) |
May
(187) |
Jun
(67) |
Jul
(23) |
Aug
(93) |
Sep
(65) |
Oct
(45) |
Nov
(35) |
Dec
(17) |
| 2018 |
Jan
(26) |
Feb
(35) |
Mar
(38) |
Apr
(32) |
May
(8) |
Jun
(43) |
Jul
(27) |
Aug
(30) |
Sep
(43) |
Oct
(42) |
Nov
(38) |
Dec
(67) |
| 2019 |
Jan
(32) |
Feb
(37) |
Mar
(53) |
Apr
(64) |
May
(49) |
Jun
(18) |
Jul
(14) |
Aug
(53) |
Sep
(25) |
Oct
(30) |
Nov
(49) |
Dec
(31) |
| 2020 |
Jan
(87) |
Feb
(45) |
Mar
(37) |
Apr
(51) |
May
(99) |
Jun
(36) |
Jul
(11) |
Aug
(14) |
Sep
(20) |
Oct
(24) |
Nov
(40) |
Dec
(23) |
| 2021 |
Jan
(14) |
Feb
(53) |
Mar
(85) |
Apr
(15) |
May
(19) |
Jun
(3) |
Jul
(14) |
Aug
(1) |
Sep
(57) |
Oct
(73) |
Nov
(56) |
Dec
(22) |
| 2022 |
Jan
(3) |
Feb
(22) |
Mar
(6) |
Apr
(55) |
May
(46) |
Jun
(39) |
Jul
(15) |
Aug
(9) |
Sep
(11) |
Oct
(34) |
Nov
(20) |
Dec
(36) |
| 2023 |
Jan
(79) |
Feb
(41) |
Mar
(99) |
Apr
(169) |
May
(48) |
Jun
(16) |
Jul
(16) |
Aug
(57) |
Sep
(19) |
Oct
|
Nov
|
Dec
|
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
|
|
|
1
(2) |
2
(4) |
3
(1) |
4
(7) |
5
|
|
6
|
7
(4) |
8
|
9
(3) |
10
(6) |
11
(13) |
12
(6) |
|
13
(1) |
14
|
15
(1) |
16
|
17
(4) |
18
(3) |
19
(5) |
|
20
(5) |
21
(5) |
22
(5) |
23
(6) |
24
|
25
(1) |
26
(1) |
|
27
(1) |
28
(4) |
29
(5) |
30
|
|
|
|
|
From: <sv...@va...> - 2016-11-22 21:16:44
|
Author: philippe
Date: Tue Nov 22 21:16:37 2016
New Revision: 16151
Log:
Comments change only: add the profile of the hook called by the gnat runtime
Modified:
trunk/helgrind/hg_intercepts.c
Modified: trunk/helgrind/hg_intercepts.c
==============================================================================
--- trunk/helgrind/hg_intercepts.c (original)
+++ trunk/helgrind/hg_intercepts.c Tue Nov 22 21:16:37 2016
@@ -673,7 +673,11 @@
// We wrap two hook procedures called by the gnat gcc Ada runtime
// that allows helgrind to understand the semantic of Ada task dependencies
// and termination.
-
+// procedure Master_Hook
+// (Dependent : Task_Id;
+// Parent : Task_Id;
+// Master_Level : Integer);
+// where type Task_Id is access all Ada_Task_Control_Block;
// System.Tasking.Debug.Master_Hook is called by a task Dependent to
// indicate that its master is identified by master+master_level.
void I_WRAP_SONAME_FNNAME_ZU
@@ -707,6 +711,10 @@
// System.Tasking.Debug.Master_Completed_Hook is called by a task to
// indicate that it has completed a master.
+// procedure Master_Completed_Hook
+// (Self_ID : Task_Id;
+// Master_Level : Integer);
+// where type Task_Id is access all Ada_Task_Control_Block;
// This indicates that all its Dependent tasks (that identified themselves
// with the Master_Hook call) are terminated. Helgrind can consider
// at this point that the equivalent of a 'pthread_join' has been done
|
|
From: Philippe W. <phi...@sk...> - 2016-11-22 20:58:38
|
On Tue, 2016-11-22 at 21:08 +0100, Thomas Deutschmann wrote: > Hi, > > current trunk still contains minilzo v2.06 in > > svn://svn.valgrind.org/valgrind/trunk/coregrind/m_debuginfo > > which is vulnerable to CVE-2014-4607. Would it be possible to update > minilzo with the next version? For sure, it would be good to update this library. However, I am not too sure to understand the vulnerability in the case of valgrind: this minilzo is used to read the debug info of the executable or libraries being valgrind-ed. If an attacker is persuading someone to use valgrind on an executable or with a library containing some specially crafted debuginfo, the attacker might as well just put what is needed in the executable or library itself, without going through the effort to exploit this integer overflow via the debuginfo of the executable/lib. Or is there an attack path that is possible via this minilzo 'only' ? Philippe |
|
From: Thomas D. <wh...@ge...> - 2016-11-22 20:08:52
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hi, current trunk still contains minilzo v2.06 in svn://svn.valgrind.org/valgrind/trunk/coregrind/m_debuginfo which is vulnerable to CVE-2014-4607. Would it be possible to update minilzo with the next version? - -- Regards, Thomas -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0 iQJ8BAEBCgBmBQJYNKXCXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQzM0M1ODQ4MkM0MDIyOTJEMkUzQzVDMDY5 NzA5RjkwQzNDOTZGRkM4AAoJEJcJ+Qw8lv/IMJMQAJnqxWa6TCzdud+B+Tq+zy/x mn+QmzpUY25BZ/q/O6UQrTS3vBOgxpIeoEyQ5R+YbJvpj04gne39B4TuLlgch7hv tTXgWMy1tD7QXwGY+xsPr+f+37TaRmVJoxqXOE7SUm2ow2crtm5yrnXuyTrWSiAh AZIFHHZ3kd0Y1TtBcWm5rFFhycD0QZFiAkTogBgIFmrKvosD/SMXYXyhoIUsmkLz a30cz5B7DdFtcOWBoS6vLhfS4u2iTbSuvRj9wwUJzCb+RxyPnbHqM7BVR54QYkBP dN3HaHX7BytGG9RdYAK7YqJfZ2yEUf8ieQh+r/7/UFgewGGqjf6XajHukPccppNC Dgore/Z4i4j3e/2NMtUf/S7bHlvVME6dL6ffCVM0X9wDl8UBhs+wk+mZumI4yagy /cOf8i/8yGDEePpiyTumPLnU66GRGI9qOvsaZQFDelMZULYHrdy6wzTa1ZADwhgs t3AetRtACncHvZr97vf/kg7+4j5R37gKsPCTpFmCeNpSeurcC0in5hnkVSp3mwtI 265oiX1fz6JtN8qOL0iYqqlHW4hzqbsbc3vk5XrEX2SuxzEnCOd89y5Fvlg/b07T SBBi9LL637SqSZBjggHY6X6LU1FcWl+Fg6HMGt2J8a1r3yYDHwtlTPNv7Oc845qy IUlzCfoc/zdKropGdVLU =DXbl -----END PGP SIGNATURE----- |
|
From: Mark W. <mj...@re...> - 2016-11-22 13:26:50
|
On Mon, 2016-11-21 at 22:40 +0100, Philippe Waroquiers wrote: > On Mon, 2016-11-21 at 20:19 +0100, Petar Jovanovic wrote: > > On Thu, Nov 17, 2016 at 10:30 PM, Philippe Waroquiers > > <phi...@sk...> wrote: > > > On Tue, 2016-11-15 at 19:30 +0100, Petar Jovanovic wrote: > > >> Would the following one work for you? > > >> > > >> https://bugsfiles.kde.org/attachment.cgi?id=102247 > > >> > > >> bar_bad fails consistently on some systems and it would be good if we > > >> could > > >> find some solution for it. > > > Yes, that would be really good. > > > > > > And your last patch looks to be on the good way. > > > I have run: > > > perl tests/vg_regtest --loop-till-fail helgrind/tests/bar_bad*vgtest drd/tests/bar_bad*vgtest > > > > > > and it has done now already 60 tests without failing or blocking. > > > > > > So, seems nice ... > > > > > > > Mark, should we change the test this way? > Assuming Mark also thinks this is a good patch, I would just add > --fair-sched=try > as fair sched avoids the very variable and sometimes very long > run time for these tests. Adding --fair-sched=try to vgopts for these three tests doesn't seem to change anything for me. But I haven't seen long delays even without --fair-sched=try. If it helps in other cases then please do add it. Cheers, Mark |
|
From: Mark W. <mj...@re...> - 2016-11-22 13:21:01
|
On Mon, 2016-11-21 at 20:19 +0100, Petar Jovanovic wrote: > On Thu, Nov 17, 2016 at 10:30 PM, Philippe Waroquiers > <phi...@sk...> wrote: > > On Tue, 2016-11-15 at 19:30 +0100, Petar Jovanovic wrote: > >> Would the following one work for you? > >> > >> https://bugsfiles.kde.org/attachment.cgi?id=102247 > >> > >> bar_bad fails consistently on some systems and it would be good if we > >> could > >> find some solution for it. > > Yes, that would be really good. > > > > And your last patch looks to be on the good way. > > I have run: > > perl tests/vg_regtest --loop-till-fail helgrind/tests/bar_bad*vgtest drd/tests/bar_bad*vgtest > > > > and it has done now already 60 tests without failing or blocking. > > > > So, seems nice ... > > Mark, should we change the test this way? Yes. The patch makes both the helgrind and drd bar_bad testcase reliably PASS for me on x86_64 against glibc version 2.17 and 2.23. Thanks, Mark |