You can subscribe to this list here.
| 2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
(122) |
Nov
(152) |
Dec
(69) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 |
Jan
(6) |
Feb
(25) |
Mar
(73) |
Apr
(82) |
May
(24) |
Jun
(25) |
Jul
(10) |
Aug
(11) |
Sep
(10) |
Oct
(54) |
Nov
(203) |
Dec
(182) |
| 2004 |
Jan
(307) |
Feb
(305) |
Mar
(430) |
Apr
(312) |
May
(187) |
Jun
(342) |
Jul
(487) |
Aug
(637) |
Sep
(336) |
Oct
(373) |
Nov
(441) |
Dec
(210) |
| 2005 |
Jan
(385) |
Feb
(480) |
Mar
(636) |
Apr
(544) |
May
(679) |
Jun
(625) |
Jul
(810) |
Aug
(838) |
Sep
(634) |
Oct
(521) |
Nov
(965) |
Dec
(543) |
| 2006 |
Jan
(494) |
Feb
(431) |
Mar
(546) |
Apr
(411) |
May
(406) |
Jun
(322) |
Jul
(256) |
Aug
(401) |
Sep
(345) |
Oct
(542) |
Nov
(308) |
Dec
(481) |
| 2007 |
Jan
(427) |
Feb
(326) |
Mar
(367) |
Apr
(255) |
May
(244) |
Jun
(204) |
Jul
(223) |
Aug
(231) |
Sep
(354) |
Oct
(374) |
Nov
(497) |
Dec
(362) |
| 2008 |
Jan
(322) |
Feb
(482) |
Mar
(658) |
Apr
(422) |
May
(476) |
Jun
(396) |
Jul
(455) |
Aug
(267) |
Sep
(280) |
Oct
(253) |
Nov
(232) |
Dec
(304) |
| 2009 |
Jan
(486) |
Feb
(470) |
Mar
(458) |
Apr
(423) |
May
(696) |
Jun
(461) |
Jul
(551) |
Aug
(575) |
Sep
(134) |
Oct
(110) |
Nov
(157) |
Dec
(102) |
| 2010 |
Jan
(226) |
Feb
(86) |
Mar
(147) |
Apr
(117) |
May
(107) |
Jun
(203) |
Jul
(193) |
Aug
(238) |
Sep
(300) |
Oct
(246) |
Nov
(23) |
Dec
(75) |
| 2011 |
Jan
(133) |
Feb
(195) |
Mar
(315) |
Apr
(200) |
May
(267) |
Jun
(293) |
Jul
(353) |
Aug
(237) |
Sep
(278) |
Oct
(611) |
Nov
(274) |
Dec
(260) |
| 2012 |
Jan
(303) |
Feb
(391) |
Mar
(417) |
Apr
(441) |
May
(488) |
Jun
(655) |
Jul
(590) |
Aug
(610) |
Sep
(526) |
Oct
(478) |
Nov
(359) |
Dec
(372) |
| 2013 |
Jan
(467) |
Feb
(226) |
Mar
(391) |
Apr
(281) |
May
(299) |
Jun
(252) |
Jul
(311) |
Aug
(352) |
Sep
(481) |
Oct
(571) |
Nov
(222) |
Dec
(231) |
| 2014 |
Jan
(185) |
Feb
(329) |
Mar
(245) |
Apr
(238) |
May
(281) |
Jun
(399) |
Jul
(382) |
Aug
(500) |
Sep
(579) |
Oct
(435) |
Nov
(487) |
Dec
(256) |
| 2015 |
Jan
(338) |
Feb
(357) |
Mar
(330) |
Apr
(294) |
May
(191) |
Jun
(108) |
Jul
(142) |
Aug
(261) |
Sep
(190) |
Oct
(54) |
Nov
(83) |
Dec
(22) |
| 2016 |
Jan
(49) |
Feb
(89) |
Mar
(33) |
Apr
(50) |
May
(27) |
Jun
(34) |
Jul
(53) |
Aug
(53) |
Sep
(98) |
Oct
(206) |
Nov
(93) |
Dec
(53) |
| 2017 |
Jan
(65) |
Feb
(82) |
Mar
(102) |
Apr
(86) |
May
(187) |
Jun
(67) |
Jul
(23) |
Aug
(93) |
Sep
(65) |
Oct
(45) |
Nov
(35) |
Dec
(17) |
| 2018 |
Jan
(26) |
Feb
(35) |
Mar
(38) |
Apr
(32) |
May
(8) |
Jun
(43) |
Jul
(27) |
Aug
(30) |
Sep
(43) |
Oct
(42) |
Nov
(38) |
Dec
(67) |
| 2019 |
Jan
(32) |
Feb
(37) |
Mar
(53) |
Apr
(64) |
May
(49) |
Jun
(18) |
Jul
(14) |
Aug
(53) |
Sep
(25) |
Oct
(30) |
Nov
(49) |
Dec
(31) |
| 2020 |
Jan
(87) |
Feb
(45) |
Mar
(37) |
Apr
(51) |
May
(99) |
Jun
(36) |
Jul
(11) |
Aug
(14) |
Sep
(20) |
Oct
(24) |
Nov
(40) |
Dec
(23) |
| 2021 |
Jan
(14) |
Feb
(53) |
Mar
(85) |
Apr
(15) |
May
(19) |
Jun
(3) |
Jul
(14) |
Aug
(1) |
Sep
(57) |
Oct
(73) |
Nov
(56) |
Dec
(22) |
| 2022 |
Jan
(3) |
Feb
(22) |
Mar
(6) |
Apr
(55) |
May
(46) |
Jun
(39) |
Jul
(15) |
Aug
(9) |
Sep
(11) |
Oct
(34) |
Nov
(20) |
Dec
(36) |
| 2023 |
Jan
(79) |
Feb
(41) |
Mar
(99) |
Apr
(169) |
May
(48) |
Jun
(16) |
Jul
(16) |
Aug
(57) |
Sep
(19) |
Oct
|
Nov
|
Dec
|
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
|
1
|
2
(1) |
3
|
4
|
5
|
6
|
7
|
|
8
|
9
|
10
(1) |
11
(1) |
12
(1) |
13
(2) |
14
(3) |
|
15
|
16
(2) |
17
(1) |
18
|
19
|
20
|
21
|
|
22
|
23
(1) |
24
(1) |
25
(3) |
26
|
27
(4) |
28
(2) |
|
29
(1) |
30
(3) |
31
|
|
|
|
|
|
From: Philippe W. <phi...@so...> - 2018-07-30 22:19:22
|
https://sourceware.org/git/gitweb.cgi?p=valgrind.git;h=5f900edef158f39b51414f8d5f20cd99363b2c09 commit 5f900edef158f39b51414f8d5f20cd99363b2c09 Author: Philippe Waroquiers <phi...@sk...> Date: Tue Jul 31 00:08:38 2018 +0200 Remove the useless (Addr) cast when calculating the highest stack byte addr Cast not needed, as stack_low_addr is an Addr. Diff: --- coregrind/m_libcassert.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/coregrind/m_libcassert.c b/coregrind/m_libcassert.c index 2792f6d..3dba677 100644 --- a/coregrind/m_libcassert.c +++ b/coregrind/m_libcassert.c @@ -336,7 +336,7 @@ static void print_thread_state (Bool stack_usage, ("%svalgrind stack range: [%p %p] top usage: %lu of %lu\n", prefix, (void*)stack_low_addr, - (void*)((Addr)stack_low_addr + VG_(clo_valgrind_stacksize) - 1), + (void*)(stack_low_addr + VG_(clo_valgrind_stacksize) - 1), VG_(clo_valgrind_stacksize) - VG_(am_get_VgStack_unused_szB) (stack, VG_(clo_valgrind_stacksize)), |
|
From: Philippe W. <phi...@so...> - 2018-07-30 21:56:25
|
https://sourceware.org/git/gitweb.cgi?p=valgrind.git;h=400e0e2afe156c2b51f8851c7ae598c06850d8e5 commit 400e0e2afe156c2b51f8851c7ae598c06850d8e5 Author: Philippe Waroquiers <phi...@sk...> Date: Mon Jul 30 22:28:48 2018 +0200 Fix wrong stack range output by commit 7daa08611 (more info in scheduler state) The stack base starts at the beginning of the protection page/zone, so we need to add VG_STACK_GUARD_SZB to get the real lowest usable byte. As the VgStack is an opaque type, add a function in aspacemgr to return the Addr of the first lowest usable byte. Diff: --- coregrind/m_aspacemgr/aspacemgr-common.c | 4 ++++ coregrind/m_libcassert.c | 8 ++++++-- coregrind/pub_core_aspacemgr.h | 3 +++ 3 files changed, 13 insertions(+), 2 deletions(-) diff --git a/coregrind/m_aspacemgr/aspacemgr-common.c b/coregrind/m_aspacemgr/aspacemgr-common.c index bbfe19d..95c8dd3 100644 --- a/coregrind/m_aspacemgr/aspacemgr-common.c +++ b/coregrind/m_aspacemgr/aspacemgr-common.c @@ -505,6 +505,10 @@ SizeT VG_(am_get_VgStack_unused_szB)( const VgStack* stack, SizeT limit ) return i * sizeof(UInt); } +Addr VG_(am_valgrind_stack_low_addr)( const VgStack* stack) +{ + return (Addr)&stack->bytes[VG_STACK_GUARD_SZB]; +} /*--------------------------------------------------------------------*/ /*--- end ---*/ diff --git a/coregrind/m_libcassert.c b/coregrind/m_libcassert.c index 5afe1ce..2792f6d 100644 --- a/coregrind/m_libcassert.c +++ b/coregrind/m_libcassert.c @@ -329,15 +329,19 @@ static void print_thread_state (Bool stack_usage, prefix, (void*)VG_(get_SP)(i)); } - if (stack_usage && stack != 0) + if (stack_usage && stack != 0) { + Addr stack_low_addr = VG_(am_valgrind_stack_low_addr) (stack); + VG_(printf) ("%svalgrind stack range: [%p %p] top usage: %lu of %lu\n", prefix, - (void*)stack, (void*)((Addr)stack + VG_(clo_valgrind_stacksize) - 1), + (void*)stack_low_addr, + (void*)((Addr)stack_low_addr + VG_(clo_valgrind_stacksize) - 1), VG_(clo_valgrind_stacksize) - VG_(am_get_VgStack_unused_szB) (stack, VG_(clo_valgrind_stacksize)), (SizeT) VG_(clo_valgrind_stacksize)); + } } // Print the scheduler status. diff --git a/coregrind/pub_core_aspacemgr.h b/coregrind/pub_core_aspacemgr.h index 67ec528..2d80119 100644 --- a/coregrind/pub_core_aspacemgr.h +++ b/coregrind/pub_core_aspacemgr.h @@ -361,6 +361,9 @@ extern VgStack* VG_(am_alloc_VgStack)( /*OUT*/Addr* initial_sp ); extern SizeT VG_(am_get_VgStack_unused_szB)( const VgStack* stack, SizeT limit ); +/* Returns the Addr of the lowest usable byte of stack. */ +extern Addr VG_(am_valgrind_stack_low_addr)( const VgStack* stack); + // DDD: this is ugly #if defined(VGO_darwin) typedef |
|
From: Mark W. <ma...@so...> - 2018-07-30 10:25:09
|
https://sourceware.org/git/gitweb.cgi?p=valgrind.git;h=21a01b13e259b9a43f10f0046b2b3f409c11ea75 commit 21a01b13e259b9a43f10f0046b2b3f409c11ea75 Author: Mark Wielaard <ma...@kl...> Date: Mon Jul 30 12:20:16 2018 +0200 Bug 396887 - arch_prctl should return EINVAL on unknown option. Currently arch_prctl calls VG_(core_panic) when it sees an unknown arch_prctl option which kills the process. glibc uses arch_prctl with an (as yet) unknown option to see if the kernel supports CET. This breaks any application running under valgrind on x86_64 with: valgrind: the 'impossible' happened: Unsupported arch_prctl option Thread 1: status = VgTs_Runnable (lwpid 19934) ==19934== at 0x121A15: get_cet_status (cpu-features.c:28) ==19934== by 0x121A15: init_cpu_features (cpu-features.c:474) ==19934== by 0x121A15: dl_platform_init (dl-machine.h:228) ==19934== by 0x121A15: _dl_sysdep_start (dl-sysdep.c:231) ==19934== by 0x10A1D7: _dl_start_final (rtld.c:413) ==19934== by 0x10A1D7: _dl_start (rtld.c:520) We already handle all known options. It would be better to do as the kernel does and just return failure with EINVAL instead. Diff: --- NEWS | 1 + coregrind/m_syswrap/syswrap-amd64-linux.c | 8 ++++++-- 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/NEWS b/NEWS index 8f0db3e..03c1f82 100644 --- a/NEWS +++ b/NEWS @@ -132,6 +132,7 @@ where XXXXXX is the bug number as listed below. 395709 PPC64 is missing support for the xvnegsp instruction 395682 Accept read-only PT_LOAD segments and .rodata by ld -z separate-code == 384727 +396887 arch_prctl should return EINVAL on unknown option n-i-bz Fix missing workq_ops operations (macOS) n-i-bz fix bug in strspn replacement diff --git a/coregrind/m_syswrap/syswrap-amd64-linux.c b/coregrind/m_syswrap/syswrap-amd64-linux.c index 0f2ad8c..407af7f 100644 --- a/coregrind/m_syswrap/syswrap-amd64-linux.c +++ b/coregrind/m_syswrap/syswrap-amd64-linux.c @@ -249,6 +249,7 @@ PRE(sys_rt_sigreturn) PRE(sys_arch_prctl) { ThreadState* tst; + Bool known_option = True; PRINT( "arch_prctl ( %ld, %lx )", SARG1, ARG2 ); vg_assert(VG_(is_valid_tid)(tid)); @@ -283,13 +284,16 @@ PRE(sys_arch_prctl) POST_MEM_WRITE(ARG2, sizeof(unsigned long)); } else { - VG_(core_panic)("Unsupported arch_prctl option"); + known_option = False; } /* Note; the Status writeback to guest state that happens after this wrapper returns does not change guest_FS_CONST or guest_GS_CONST; hence that direct assignment to the guest state is safe here. */ - SET_STATUS_Success( 0 ); + if (known_option) + SET_STATUS_Success( 0 ); + else + SET_STATUS_Failure( VKI_EINVAL ); } // Parts of this are amd64-specific, but the *PEEK* cases are generic. |