You can subscribe to this list here.
| 2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
(122) |
Nov
(152) |
Dec
(69) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 |
Jan
(6) |
Feb
(25) |
Mar
(73) |
Apr
(82) |
May
(24) |
Jun
(25) |
Jul
(10) |
Aug
(11) |
Sep
(10) |
Oct
(54) |
Nov
(203) |
Dec
(182) |
| 2004 |
Jan
(307) |
Feb
(305) |
Mar
(430) |
Apr
(312) |
May
(187) |
Jun
(342) |
Jul
(487) |
Aug
(637) |
Sep
(336) |
Oct
(373) |
Nov
(441) |
Dec
(210) |
| 2005 |
Jan
(385) |
Feb
(480) |
Mar
(636) |
Apr
(544) |
May
(679) |
Jun
(625) |
Jul
(810) |
Aug
(838) |
Sep
(634) |
Oct
(521) |
Nov
(965) |
Dec
(543) |
| 2006 |
Jan
(494) |
Feb
(431) |
Mar
(546) |
Apr
(411) |
May
(406) |
Jun
(322) |
Jul
(256) |
Aug
(401) |
Sep
(345) |
Oct
(542) |
Nov
(308) |
Dec
(481) |
| 2007 |
Jan
(427) |
Feb
(326) |
Mar
(367) |
Apr
(255) |
May
(244) |
Jun
(204) |
Jul
(223) |
Aug
(231) |
Sep
(354) |
Oct
(374) |
Nov
(497) |
Dec
(362) |
| 2008 |
Jan
(322) |
Feb
(482) |
Mar
(658) |
Apr
(422) |
May
(476) |
Jun
(396) |
Jul
(455) |
Aug
(267) |
Sep
(280) |
Oct
(253) |
Nov
(232) |
Dec
(304) |
| 2009 |
Jan
(486) |
Feb
(470) |
Mar
(458) |
Apr
(423) |
May
(696) |
Jun
(461) |
Jul
(551) |
Aug
(575) |
Sep
(134) |
Oct
(110) |
Nov
(157) |
Dec
(102) |
| 2010 |
Jan
(226) |
Feb
(86) |
Mar
(147) |
Apr
(117) |
May
(107) |
Jun
(203) |
Jul
(193) |
Aug
(238) |
Sep
(300) |
Oct
(246) |
Nov
(23) |
Dec
(75) |
| 2011 |
Jan
(133) |
Feb
(195) |
Mar
(315) |
Apr
(200) |
May
(267) |
Jun
(293) |
Jul
(353) |
Aug
(237) |
Sep
(278) |
Oct
(611) |
Nov
(274) |
Dec
(260) |
| 2012 |
Jan
(303) |
Feb
(391) |
Mar
(417) |
Apr
(441) |
May
(488) |
Jun
(655) |
Jul
(590) |
Aug
(610) |
Sep
(526) |
Oct
(478) |
Nov
(359) |
Dec
(372) |
| 2013 |
Jan
(467) |
Feb
(226) |
Mar
(391) |
Apr
(281) |
May
(299) |
Jun
(252) |
Jul
(311) |
Aug
(352) |
Sep
(481) |
Oct
(571) |
Nov
(222) |
Dec
(231) |
| 2014 |
Jan
(185) |
Feb
(329) |
Mar
(245) |
Apr
(238) |
May
(281) |
Jun
(399) |
Jul
(382) |
Aug
(500) |
Sep
(579) |
Oct
(435) |
Nov
(487) |
Dec
(256) |
| 2015 |
Jan
(338) |
Feb
(357) |
Mar
(330) |
Apr
(294) |
May
(191) |
Jun
(108) |
Jul
(142) |
Aug
(261) |
Sep
(190) |
Oct
(54) |
Nov
(83) |
Dec
(22) |
| 2016 |
Jan
(49) |
Feb
(89) |
Mar
(33) |
Apr
(50) |
May
(27) |
Jun
(34) |
Jul
(53) |
Aug
(53) |
Sep
(98) |
Oct
(206) |
Nov
(93) |
Dec
(53) |
| 2017 |
Jan
(65) |
Feb
(82) |
Mar
(102) |
Apr
(86) |
May
(187) |
Jun
(67) |
Jul
(23) |
Aug
(93) |
Sep
(65) |
Oct
(45) |
Nov
(35) |
Dec
(17) |
| 2018 |
Jan
(26) |
Feb
(35) |
Mar
(38) |
Apr
(32) |
May
(8) |
Jun
(43) |
Jul
(27) |
Aug
(30) |
Sep
(43) |
Oct
(42) |
Nov
(38) |
Dec
(67) |
| 2019 |
Jan
(32) |
Feb
(37) |
Mar
(53) |
Apr
(64) |
May
(49) |
Jun
(18) |
Jul
(14) |
Aug
(53) |
Sep
(25) |
Oct
(30) |
Nov
(49) |
Dec
(31) |
| 2020 |
Jan
(87) |
Feb
(45) |
Mar
(37) |
Apr
(51) |
May
(99) |
Jun
(36) |
Jul
(11) |
Aug
(14) |
Sep
(20) |
Oct
(24) |
Nov
(40) |
Dec
(23) |
| 2021 |
Jan
(14) |
Feb
(53) |
Mar
(85) |
Apr
(15) |
May
(19) |
Jun
(3) |
Jul
(14) |
Aug
(1) |
Sep
(57) |
Oct
(73) |
Nov
(56) |
Dec
(22) |
| 2022 |
Jan
(3) |
Feb
(22) |
Mar
(6) |
Apr
(55) |
May
(46) |
Jun
(39) |
Jul
(15) |
Aug
(9) |
Sep
(11) |
Oct
(34) |
Nov
(20) |
Dec
(36) |
| 2023 |
Jan
(79) |
Feb
(41) |
Mar
(99) |
Apr
(169) |
May
(48) |
Jun
(16) |
Jul
(16) |
Aug
(57) |
Sep
(19) |
Oct
|
Nov
|
Dec
|
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
|
|
|
|
|
1
(6) |
2
(10) |
3
(4) |
|
4
|
5
|
6
|
7
|
8
|
9
(2) |
10
|
|
11
|
12
(6) |
13
(5) |
14
(2) |
15
(4) |
16
(3) |
17
(1) |
|
18
|
19
(1) |
20
(6) |
21
(4) |
22
|
23
|
24
(2) |
|
25
|
26
(4) |
27
(10) |
28
(12) |
29
(29) |
30
(6) |
|
|
From: <sv...@va...> - 2010-04-12 20:57:05
|
Author: sewardj
Date: 2010-04-12 21:56:56 +0100 (Mon, 12 Apr 2010)
New Revision: 11104
Log:
search_all_symtabs: when mapping addresses to text symbols, consider
any symbol in the r-x mapped segment to be a valid candidate. This
relaxes the filtering criterion slightly, makes it consistent with
other is-it-text? checks. Some addresses which before didn't get
mapped to anything are now correctly mapped to "vtable for Foo"
symbols.
Modified:
trunk/coregrind/m_debuginfo/debuginfo.c
Modified: trunk/coregrind/m_debuginfo/debuginfo.c
===================================================================
--- trunk/coregrind/m_debuginfo/debuginfo.c 2010-04-12 20:05:24 UTC (rev 11103)
+++ trunk/coregrind/m_debuginfo/debuginfo.c 2010-04-12 20:56:56 UTC (rev 11104)
@@ -1239,10 +1239,13 @@
for (di = debugInfo_list; di != NULL; di = di->next) {
if (findText) {
- inRange = di->text_present
- && di->text_size > 0
- && di->text_avma <= ptr
- && ptr < di->text_avma + di->text_size;
+ /* Consider any symbol in the r-x mapped area to be text.
+ See Comment_Regarding_Text_Range_Checks in storage.c for
+ details. */
+ inRange = di->have_rx_map
+ && di->rx_map_size > 0
+ && di->rx_map_avma <= ptr
+ && ptr < di->rx_map_avma + di->rx_map_size;
} else {
inRange = (di->data_present
&& di->data_size > 0
|
|
From: <sv...@va...> - 2010-04-12 20:05:40
|
Author: sewardj
Date: 2010-04-12 21:05:24 +0100 (Mon, 12 Apr 2010)
New Revision: 11103
Log:
Comment-only change.
Modified:
trunk/helgrind/libhb_core.c
Modified: trunk/helgrind/libhb_core.c
===================================================================
--- trunk/helgrind/libhb_core.c 2010-04-12 19:53:05 UTC (rev 11102)
+++ trunk/helgrind/libhb_core.c 2010-04-12 20:05:24 UTC (rev 11103)
@@ -3183,7 +3183,7 @@
///////////////////////////////////////////////////////
-//// Part (1): An OSet of RCECs
+//// Part (1): A hash table of RCECs
///
#define N_FRAMES 8
@@ -3250,7 +3250,7 @@
tl_assert(rcec->magic == RCEC_MAGIC);
gal_Free( &rcec_group_allocator, rcec );
}
-//////////// END OldRef group allocator
+//////////// END RCEC group allocator
/* Find 'ec' in the RCEC list whose head pointer lives at 'headp' and
|
|
From: <sv...@va...> - 2010-04-12 19:53:13
|
Author: sewardj
Date: 2010-04-12 20:53:05 +0100 (Mon, 12 Apr 2010)
New Revision: 11102
Log:
Change the method used in hg_intercepts.c to hide from the user, the
race between mythread_wrapper and the wrapper for pthread_create. The
previous scheme could lead to false race reports in obscure cases.
Modified:
trunk/glibc-2.34567-NPTL-helgrind.supp
trunk/helgrind/hg_intercepts.c
Modified: trunk/glibc-2.34567-NPTL-helgrind.supp
===================================================================
--- trunk/glibc-2.34567-NPTL-helgrind.supp 2010-04-12 19:51:04 UTC (rev 11101)
+++ trunk/glibc-2.34567-NPTL-helgrind.supp 2010-04-12 19:53:05 UTC (rev 11102)
@@ -135,12 +135,6 @@
fun:__lll_*lock_*
}
{
- helgrind-glibc2X-112
- Helgrind:Race
- fun:pthread_create_WRK
- fun:pthread_create@*
-}
-{
helgrind-glibc2X-113
Helgrind:Race
fun:pthread_barrier_wait*
Modified: trunk/helgrind/hg_intercepts.c
===================================================================
--- trunk/helgrind/hg_intercepts.c 2010-04-12 19:51:04 UTC (rev 11101)
+++ trunk/helgrind/hg_intercepts.c 2010-04-12 19:53:05 UTC (rev 11102)
@@ -193,8 +193,6 @@
/*--- pthread_create, pthread_join, pthread_exit ---*/
/*----------------------------------------------------------------*/
-/* Do not rename this function. It contains an unavoidable race and
- so is mentioned by name in glibc-*helgrind*.supp. */
static void* mythread_wrapper ( void* xargsV )
{
volatile Word* xargs = (volatile Word*) xargsV;
@@ -207,7 +205,17 @@
we're ready because (1) we need to make sure it doesn't exit and
hence deallocate xargs[] while we still need it, and (2) we
don't want either parent nor child to proceed until the tool has
- been notified of the child's pthread_t. */
+ been notified of the child's pthread_t.
+
+ Note that parent and child access args[] without a lock,
+ effectively using args[2] as a spinlock in order to get the
+ parent to wait until the child passes this point. The parent
+ disables checking on xargs[] before creating the child and
+ re-enables it once the child goes past this point, so the user
+ never sees the race. The previous approach (suppressing the
+ resulting error) was flawed, because it could leave shadow
+ memory for args[] in a state in which subsequent use of it by
+ the parent would report further races. */
xargs[2] = 0;
/* Now we can no longer safely use xargs[]. */
return (void*) fn( (void*)arg );
@@ -237,6 +245,14 @@
xargs[0] = (Word)start;
xargs[1] = (Word)arg;
xargs[2] = 1; /* serves as a spinlock -- sigh */
+ /* Disable checking on the spinlock and the two words used to
+ convey args to the child. Basically we need to make it appear
+ as if the child never accessed this area, since merely
+ suppressing the resulting races does not address the issue that
+ that piece of the parent's stack winds up in the "wrong" state
+ and therefore may give rise to mysterious races when the parent
+ comes to re-use this piece of stack in some other frame. */
+ VALGRIND_HG_DISABLE_CHECKING(&xargs, sizeof(xargs));
CALL_FN_W_WWWW(ret, fn, thread,attr,mythread_wrapper,&xargs[0]);
@@ -256,6 +272,10 @@
DO_PthAPIerror( "pthread_create", ret );
}
+ /* Reenable checking on the area previously used to communicate
+ with the child. */
+ VALGRIND_HG_ENABLE_CHECKING(&xargs, sizeof(xargs));
+
if (TRACE_PTH_FNS) {
fprintf(stderr, " :: pth_create -> %d >>\n", ret);
}
|
|
From: <sv...@va...> - 2010-04-12 19:51:13
|
Author: sewardj
Date: 2010-04-12 20:51:04 +0100 (Mon, 12 Apr 2010)
New Revision: 11101
Log:
Take account the ABI-mandated stack redzone when changing stack
shvals. AFAIR this has never been handled correctly by Helgrind.
Modified:
trunk/helgrind/hg_main.c
Modified: trunk/helgrind/hg_main.c
===================================================================
--- trunk/helgrind/hg_main.c 2010-04-02 10:27:35 UTC (rev 11100)
+++ trunk/helgrind/hg_main.c 2010-04-12 19:51:04 UTC (rev 11101)
@@ -1501,6 +1501,16 @@
}
static
+void evh__new_mem_stack ( Addr a, SizeT len ) {
+ if (SHOW_EVENTS >= 2)
+ VG_(printf)("evh__new_mem_stack(%p, %lu)\n", (void*)a, len );
+ shadow_mem_make_New( get_current_Thread(),
+ -VG_STACK_REDZONE_SZB + a, len );
+ if (len >= SCE_BIGRANGE_T && (HG_(clo_sanity_flags) & SCE_BIGRANGE))
+ all__sanity_check("evh__new_mem_stack-post");
+}
+
+static
void evh__new_mem_w_tid ( Addr a, SizeT len, ThreadId tid ) {
if (SHOW_EVENTS >= 2)
VG_(printf)("evh__new_mem_w_tid(%p, %lu)\n", (void*)a, len );
@@ -2022,7 +2032,7 @@
/* ------------------------------------------------------- */
-/* -------------- events to do with mutexes -------------- */
+/* -------------- events to do with spinlocks ------------ */
/* ------------------------------------------------------- */
/* All a bit of a kludge. Pretend we're really dealing with ordinary
@@ -4810,7 +4820,7 @@
VG_(track_new_mem_stack_signal)( evh__new_mem_w_tid );
VG_(track_new_mem_brk) ( evh__new_mem_w_tid );
VG_(track_new_mem_mmap) ( evh__new_mem_w_perms );
- VG_(track_new_mem_stack) ( evh__new_mem );
+ VG_(track_new_mem_stack) ( evh__new_mem_stack );
// FIXME: surely this isn't thread-aware
VG_(track_copy_mem_remap) ( evh__copy_mem );
|
|
From: <sv...@va...> - 2010-04-12 12:55:53
|
Author: de
Date: 2010-04-12 13:55:44 +0100 (Mon, 12 Apr 2010)
New Revision: 1972
Log:
Fixed copy+paste error in R1971
Modified:
trunk/priv/guest_amd64_toIR.c
Modified: trunk/priv/guest_amd64_toIR.c
===================================================================
--- trunk/priv/guest_amd64_toIR.c 2010-04-12 12:40:25 UTC (rev 1971)
+++ trunk/priv/guest_amd64_toIR.c 2010-04-12 12:55:44 UTC (rev 1972)
@@ -14053,7 +14053,6 @@
assign( max_min_vec,
binop( Iop_OrV128,
binop( Iop_AndV128, mkexpr(rom_vec),
- unopAndV128, mkexpr(rom_vec),
unop( Iop_NotV128, mkexpr(mask_vec) ) ),
binop( Iop_AndV128, mkexpr(reg_vec), mkexpr(mask_vec) ) ) );
} else {
|
|
From: <sv...@va...> - 2010-04-12 12:40:34
|
Author: de
Date: 2010-04-12 13:40:25 +0100 (Mon, 12 Apr 2010)
New Revision: 1971
Log:
Added new SSE4 instructions PMINSD, PMAXSD.
Modified:
trunk/priv/guest_amd64_toIR.c
Modified: trunk/priv/guest_amd64_toIR.c
===================================================================
--- trunk/priv/guest_amd64_toIR.c 2010-04-09 16:10:35 UTC (rev 1970)
+++ trunk/priv/guest_amd64_toIR.c 2010-04-12 12:40:25 UTC (rev 1971)
@@ -14012,6 +14012,64 @@
}
+ /* 66 0F 38 3D /r = PMAXSD xmm1, xmm2/m128
+ Maximum of Packed Signed Double Word Integers (XMM)
+ --
+ 66 0F 38 39 /r = PMINSD xmm1, xmm2/m128
+ Minimum of Packed Signed Double Word Integers (XMM) */
+ if ( have66noF2noF3( pfx )
+ && sz == 2
+ && insn[0] == 0x0F && insn[1] == 0x38
+ && ( (insn[2] == 0x3D) || (insn[2] == 0x39) ) ) {
+
+ IRTemp reg_vec = newTemp(Ity_V128);
+ IRTemp rom_vec = newTemp(Ity_V128);
+ IRTemp mask_vec = newTemp(Ity_V128);
+
+ Bool isPMAX = (insn[2] == 0x3D) ? True : False;
+
+ HChar* str = isPMAX ? "pmaxsd" : "pminsd";
+
+ modrm = insn[3];
+ assign( reg_vec, getXMMReg( gregOfRexRM(pfx, modrm) ) );
+
+ if ( epartIsReg( modrm ) ) {
+ assign( rom_vec, getXMMReg( eregOfRexRM(pfx, modrm) ) );
+ delta += 3+1;
+ DIP( "%s %s,%s\n", str,
+ nameXMMReg( eregOfRexRM(pfx, modrm) ),
+ nameXMMReg( gregOfRexRM(pfx, modrm) ) );
+ } else {
+ addr = disAMode( &alen, vbi, pfx, delta+3, dis_buf, 0 );
+ assign( rom_vec, loadLE( Ity_V128, mkexpr(addr) ) );
+ delta += 3+alen;
+ DIP( "%s %s,%s\n", str, dis_buf, nameXMMReg( gregOfRexRM(pfx, modrm) ) );
+ }
+
+ assign( mask_vec, binop( Iop_CmpGT32Sx4, mkexpr(reg_vec), mkexpr(rom_vec) ) );
+
+ IRTemp max_min_vec = newTemp(Ity_V128);
+ if ( isPMAX ) {
+ assign( max_min_vec,
+ binop( Iop_OrV128,
+ binop( Iop_AndV128, mkexpr(rom_vec),
+ unopAndV128, mkexpr(rom_vec),
+ unop( Iop_NotV128, mkexpr(mask_vec) ) ),
+ binop( Iop_AndV128, mkexpr(reg_vec), mkexpr(mask_vec) ) ) );
+ } else {
+ assign( max_min_vec,
+ binop( Iop_OrV128,
+ binop( Iop_AndV128, mkexpr(reg_vec),
+ unop( Iop_NotV128, mkexpr(mask_vec) ) ),
+ binop( Iop_AndV128, mkexpr(rom_vec), mkexpr(mask_vec) ) ) );
+ }
+
+ putXMMReg( gregOfRexRM(pfx, modrm), mkexpr(max_min_vec) );
+
+ goto decode_success;
+ }
+
+
/* 66 0f 38 20 /r = PMOVSXBW xmm1, xmm2/m64
Packed Move with Sign Extend from Byte to Word (XMM) */
if ( have66noF2noF3( pfx )
@@ -14880,12 +14938,12 @@
case 0xE1:
xtra = "e";
zbit = mk_amd64g_calculate_condition( AMD64CondZ );
- cond = mkAnd1(cond, zbit);
+ cond = mkAnd1(cond, zbit);
break;
case 0xE0:
xtra = "ne";
zbit = mk_amd64g_calculate_condition( AMD64CondNZ );
- cond = mkAnd1(cond, zbit);
+ cond = mkAnd1(cond, zbit);
break;
default:
vassert(0);
|