You can subscribe to this list here.
| 2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
(122) |
Nov
(152) |
Dec
(69) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 |
Jan
(6) |
Feb
(25) |
Mar
(73) |
Apr
(82) |
May
(24) |
Jun
(25) |
Jul
(10) |
Aug
(11) |
Sep
(10) |
Oct
(54) |
Nov
(203) |
Dec
(182) |
| 2004 |
Jan
(307) |
Feb
(305) |
Mar
(430) |
Apr
(312) |
May
(187) |
Jun
(342) |
Jul
(487) |
Aug
(637) |
Sep
(336) |
Oct
(373) |
Nov
(441) |
Dec
(210) |
| 2005 |
Jan
(385) |
Feb
(480) |
Mar
(636) |
Apr
(544) |
May
(679) |
Jun
(625) |
Jul
(810) |
Aug
(838) |
Sep
(634) |
Oct
(521) |
Nov
(965) |
Dec
(543) |
| 2006 |
Jan
(494) |
Feb
(431) |
Mar
(546) |
Apr
(411) |
May
(406) |
Jun
(322) |
Jul
(256) |
Aug
(401) |
Sep
(345) |
Oct
(542) |
Nov
(308) |
Dec
(481) |
| 2007 |
Jan
(427) |
Feb
(326) |
Mar
(367) |
Apr
(255) |
May
(244) |
Jun
(204) |
Jul
(223) |
Aug
(231) |
Sep
(354) |
Oct
(374) |
Nov
(497) |
Dec
(362) |
| 2008 |
Jan
(322) |
Feb
(482) |
Mar
(658) |
Apr
(422) |
May
(476) |
Jun
(396) |
Jul
(455) |
Aug
(267) |
Sep
(280) |
Oct
(253) |
Nov
(232) |
Dec
(304) |
| 2009 |
Jan
(486) |
Feb
(470) |
Mar
(458) |
Apr
(423) |
May
(696) |
Jun
(461) |
Jul
(551) |
Aug
(575) |
Sep
(134) |
Oct
(110) |
Nov
(157) |
Dec
(102) |
| 2010 |
Jan
(226) |
Feb
(86) |
Mar
(147) |
Apr
(117) |
May
(107) |
Jun
(203) |
Jul
(193) |
Aug
(238) |
Sep
(300) |
Oct
(246) |
Nov
(23) |
Dec
(75) |
| 2011 |
Jan
(133) |
Feb
(195) |
Mar
(315) |
Apr
(200) |
May
(267) |
Jun
(293) |
Jul
(353) |
Aug
(237) |
Sep
(278) |
Oct
(611) |
Nov
(274) |
Dec
(260) |
| 2012 |
Jan
(303) |
Feb
(391) |
Mar
(417) |
Apr
(441) |
May
(488) |
Jun
(655) |
Jul
(590) |
Aug
(610) |
Sep
(526) |
Oct
(478) |
Nov
(359) |
Dec
(372) |
| 2013 |
Jan
(467) |
Feb
(226) |
Mar
(391) |
Apr
(281) |
May
(299) |
Jun
(252) |
Jul
(311) |
Aug
(352) |
Sep
(481) |
Oct
(571) |
Nov
(222) |
Dec
(231) |
| 2014 |
Jan
(185) |
Feb
(329) |
Mar
(245) |
Apr
(238) |
May
(281) |
Jun
(399) |
Jul
(382) |
Aug
(500) |
Sep
(579) |
Oct
(435) |
Nov
(487) |
Dec
(256) |
| 2015 |
Jan
(338) |
Feb
(357) |
Mar
(330) |
Apr
(294) |
May
(191) |
Jun
(108) |
Jul
(142) |
Aug
(261) |
Sep
(190) |
Oct
(54) |
Nov
(83) |
Dec
(22) |
| 2016 |
Jan
(49) |
Feb
(89) |
Mar
(33) |
Apr
(50) |
May
(27) |
Jun
(34) |
Jul
(53) |
Aug
(53) |
Sep
(98) |
Oct
(206) |
Nov
(93) |
Dec
(53) |
| 2017 |
Jan
(65) |
Feb
(82) |
Mar
(102) |
Apr
(86) |
May
(187) |
Jun
(67) |
Jul
(23) |
Aug
(93) |
Sep
(65) |
Oct
(45) |
Nov
(35) |
Dec
(17) |
| 2018 |
Jan
(26) |
Feb
(35) |
Mar
(38) |
Apr
(32) |
May
(8) |
Jun
(43) |
Jul
(27) |
Aug
(30) |
Sep
(43) |
Oct
(42) |
Nov
(38) |
Dec
(67) |
| 2019 |
Jan
(32) |
Feb
(37) |
Mar
(53) |
Apr
(64) |
May
(49) |
Jun
(18) |
Jul
(14) |
Aug
(53) |
Sep
(25) |
Oct
(30) |
Nov
(49) |
Dec
(31) |
| 2020 |
Jan
(87) |
Feb
(45) |
Mar
(37) |
Apr
(51) |
May
(99) |
Jun
(36) |
Jul
(11) |
Aug
(14) |
Sep
(20) |
Oct
(24) |
Nov
(40) |
Dec
(23) |
| 2021 |
Jan
(14) |
Feb
(53) |
Mar
(85) |
Apr
(15) |
May
(19) |
Jun
(3) |
Jul
(14) |
Aug
(1) |
Sep
(57) |
Oct
(73) |
Nov
(56) |
Dec
(22) |
| 2022 |
Jan
(3) |
Feb
(22) |
Mar
(6) |
Apr
(55) |
May
(46) |
Jun
(39) |
Jul
(15) |
Aug
(9) |
Sep
(11) |
Oct
(34) |
Nov
(20) |
Dec
(36) |
| 2023 |
Jan
(79) |
Feb
(41) |
Mar
(99) |
Apr
(169) |
May
(48) |
Jun
(16) |
Jul
(16) |
Aug
(57) |
Sep
(19) |
Oct
|
Nov
|
Dec
|
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
1
(5) |
|
2
(2) |
3
(3) |
4
(2) |
5
(4) |
6
(4) |
7
(1) |
8
|
|
9
|
10
(1) |
11
|
12
(3) |
13
(2) |
14
(2) |
15
|
|
16
|
17
|
18
|
19
(2) |
20
(10) |
21
|
22
(6) |
|
23
(7) |
24
|
25
(2) |
26
|
27
(1) |
28
(8) |
29
(2) |
|
30
|
31
|
|
|
|
|
|
|
From: Philippe W. <phi...@sk...> - 2018-12-23 23:13:31
|
Hello, The bug https://bugs.kde.org/show_bug.cgi?id=402515 contains a patch that implements the options: --show-error-list-suppression-counts=no|yes show detected errors list and suppression counts at exit [no] -s same as --show-error-list-suppression-counts=yes These options allow to see the error information without seeing a whole bunch of messages related to REDIR, debuginfo reading, etc ... Feedback welcome Thanks Philippe |
|
From: Mark W. <ma...@so...> - 2018-12-23 22:42:51
|
https://sourceware.org/git/gitweb.cgi?p=valgrind.git;h=39f0abfc92c6f494696fdfc02baa41d460a49fd8 commit 39f0abfc92c6f494696fdfc02baa41d460a49fd8 Author: Mark Wielaard <ma...@kl...> Date: Sun Dec 23 23:42:27 2018 +0100 Add vbit-test-sec.vgtest and vbit-test-sec.stderr.exp to EXTRA_DIST. Diff: --- memcheck/tests/vbit-test/Makefile.am | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/memcheck/tests/vbit-test/Makefile.am b/memcheck/tests/vbit-test/Makefile.am index 124e82e..b679683 100644 --- a/memcheck/tests/vbit-test/Makefile.am +++ b/memcheck/tests/vbit-test/Makefile.am @@ -1,6 +1,7 @@ include $(top_srcdir)/Makefile.all.am -EXTRA_DIST = vbit-test.vgtest vbit-test.stderr.exp +EXTRA_DIST = vbit-test.vgtest vbit-test.stderr.exp \ + vbit-test-sec.vgtest vbit-test-sec.stderr.exp dist_noinst_SCRIPTS = filter_stderr |
|
From: Mark W. <ma...@so...> - 2018-12-23 22:11:56
|
https://sourceware.org/git/gitweb.cgi?p=valgrind.git;h=087979e4674d9064222347649f5a439d503e934f commit 087979e4674d9064222347649f5a439d503e934f Author: Mark Wielaard <ma...@kl...> Date: Sun Dec 23 23:11:42 2018 +0100 Mention 402481 as fixed in NEWS. Diff: --- NEWS | 1 + 1 file changed, 1 insertion(+) diff --git a/NEWS b/NEWS index f3dc757..5ccf6a9 100644 --- a/NEWS +++ b/NEWS @@ -76,6 +76,7 @@ where XXXXXX is the bug number as listed below. 402327 Warning: DWARF2 CFI reader: unhandled DW_OP_ opcode 0x13 (DW_OP_drop) 402395 coregrind/vgdb-invoker-solaris.c: 2 * poor error checking 402480 Do not use %rsp in clobber list +402481 vbit-test fails on x86 for Iop_CmpEQ64 iselInt64Expr Sar64 Release 3.14.0 (9 October 2018) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
From: Mark W. <ma...@so...> - 2018-12-23 22:10:43
|
https://sourceware.org/git/gitweb.cgi?p=valgrind.git;h=022f5af61bc3cbfa2b74ab355b0d2d30b3dab027 commit 022f5af61bc3cbfa2b74ab355b0d2d30b3dab027 Author: Khem Raj <raj...@gm...> Date: Sat Dec 22 15:28:40 2018 -0800 tests/amd64: Do not clobber %rsp register This is seen with gcc-9.0 compiler now which is fix that gcc community did recently https://gcc.gnu.org/bugzilla/show_bug.cgi?id=52813 Signed-off-by: Khem Raj <raj...@gm...> Diff: --- NEWS | 1 + none/tests/amd64-linux/bug345887.c | 6 +++++- 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/NEWS b/NEWS index 18ee9d5..f3dc757 100644 --- a/NEWS +++ b/NEWS @@ -75,6 +75,7 @@ where XXXXXX is the bug number as listed below. 402134 assertion fail in mc_translate.c (noteTmpUsesIn) Iex_VECRET on arm64 402327 Warning: DWARF2 CFI reader: unhandled DW_OP_ opcode 0x13 (DW_OP_drop) 402395 coregrind/vgdb-invoker-solaris.c: 2 * poor error checking +402480 Do not use %rsp in clobber list Release 3.14.0 (9 October 2018) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ diff --git a/none/tests/amd64-linux/bug345887.c b/none/tests/amd64-linux/bug345887.c index 0f9237d..269bd70 100644 --- a/none/tests/amd64-linux/bug345887.c +++ b/none/tests/amd64-linux/bug345887.c @@ -20,13 +20,17 @@ static void inner(void) "movq $0x10d, %%r14\n" "movq $0x10e, %%r15\n" // not %rbp as mdb is then not able to reconstruct stack trace + // Do change %rsp (to test a bogus stack pointer), + // but don't add %rsp to the clobber list since gcc ignores it + // and since gcc >= 9.0 errors about it + // see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=52813 "movq $0x10f, %%rsp\n" "movq $0x1234, (%%rax)\n" // should cause SEGV here "ud2" // should never get here : // no output registers : // no input registers : "memory", "%rax", "%rbx", "%rcx", "%rdx", "%rsi", "%rdi", - "%r8", "%r9", "%r10", "%r11", "%r12", "%r13", "%r14", "%r15", "%rsp"); + "%r8", "%r9", "%r10", "%r11", "%r12", "%r13", "%r14", "%r15"); } __attribute__((noinline)) |
|
From: Mark W. <ma...@so...> - 2018-12-23 21:21:19
|
https://sourceware.org/git/gitweb.cgi?p=valgrind.git;h=49ca1853fccccd2d5cd63ac82fe9ad0954d2ea2d commit 49ca1853fccccd2d5cd63ac82fe9ad0954d2ea2d Author: Mark Wielaard <ma...@kl...> Date: Sun Dec 23 13:29:27 2018 +0100 Also test memcheck/tests/vbit-test on any secondary arch. If we are building a secondary arch then also build and run the memcheck vbit-test for that architecture. Diff: --- memcheck/tests/vbit-test/Makefile.am | 20 ++++++++++++++++++++ memcheck/tests/vbit-test/vbit-test-sec.stderr.exp | 0 memcheck/tests/vbit-test/vbit-test-sec.vgtest | 3 +++ 3 files changed, 23 insertions(+) diff --git a/memcheck/tests/vbit-test/Makefile.am b/memcheck/tests/vbit-test/Makefile.am index 371a71b..124e82e 100644 --- a/memcheck/tests/vbit-test/Makefile.am +++ b/memcheck/tests/vbit-test/Makefile.am @@ -17,6 +17,10 @@ noinst_HEADERS = vtest.h vbits.h noinst_PROGRAMS = vbit-test +if VGCONF_HAVE_PLATFORM_SEC +noinst_PROGRAMS += vbit-test-sec +endif + if VGCONF_OS_IS_DARWIN noinst_DSYMS = $(noinst_PROGRAMS) endif @@ -41,3 +45,19 @@ vbit_test_CFLAGS = $(AM_CFLAGS_PRI) vbit_test_DEPENDENCIES = vbit_test_LDADD = $(top_builddir)/VEX/libvex-@VGCONF_ARCH_PRI@-@VGCONF_OS@.a vbit_test_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@ + +if VGCONF_HAVE_PLATFORM_SEC +vbit_test_sec_SOURCES = $(SOURCES) +vbit_test_sec_CPPFLAGS = $(AM_CPPFLAGS_SEC) \ + $(AM_CPPFLAGS_@VGCONF_PLATFORM_SEC_CAPS@) \ + -I$(top_srcdir)/include \ + -I$(top_srcdir)/memcheck \ + -I$(top_srcdir)/VEX/pub +vbit_test_sec_CFLAGS = $(AM_CFLAGS_SEC) \ + $(AM_CFLAGS_@VGCONF_PLATFORM_SEC_CAPS@) +vbit_test_sec_DEPENDENCIES = +vbit_test_sec_LDADD = $(top_builddir)/VEX/libvex-@VGCONF_ARCH_SEC@-@VGCONF_OS@.a \ + $(TOOL_LDADD_@VGCONF_PLATFORM_SEC_CAPS@) +vbit_test_sec_LDFLAGS = $(AM_CFLAGS_SEC) @LIB_UBSAN@ \ + $(TOOL_LDFLAGS_@VGCONF_PLATFORM_SEC_CAPS@) +endif diff --git a/memcheck/tests/vbit-test/vbit-test-sec.stderr.exp b/memcheck/tests/vbit-test/vbit-test-sec.stderr.exp new file mode 100644 index 0000000..e69de29 diff --git a/memcheck/tests/vbit-test/vbit-test-sec.vgtest b/memcheck/tests/vbit-test/vbit-test-sec.vgtest new file mode 100644 index 0000000..2d3c938 --- /dev/null +++ b/memcheck/tests/vbit-test/vbit-test-sec.vgtest @@ -0,0 +1,3 @@ +prog: vbit-test-sec +prereq: test -x vbit-test-sec +vgopts: -q --expensive-definedness-checks=yes |
|
From: Julian S. <se...@so...> - 2018-12-23 21:03:28
|
https://sourceware.org/git/gitweb.cgi?p=valgrind.git;h=d43c20b3913780276f2c97a62cd8fba376be8c64 commit d43c20b3913780276f2c97a62cd8fba376be8c64 Author: Julian Seward <js...@ac...> Date: Sun Dec 23 22:02:03 2018 +0100 Bug 402481 - vbit-test fails on x86 for Iop_CmpEQ64 iselInt64Expr Sar64(Sub64(t14,Shr64(t14,0x1:I8)),0x3F:I8). Fixes the failure by implementing Iop_Sar64 in the x86 back end. Diff: --- VEX/priv/host_x86_isel.c | 50 ++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) diff --git a/VEX/priv/host_x86_isel.c b/VEX/priv/host_x86_isel.c index 45aafeb..9ca8a45 100644 --- a/VEX/priv/host_x86_isel.c +++ b/VEX/priv/host_x86_isel.c @@ -2380,6 +2380,56 @@ static void iselInt64Expr_wrk ( HReg* rHi, HReg* rLo, ISelEnv* env, return; } + case Iop_Sar64: { + /* gcc -O2 does the following. I don't know how it works, but it + does work. Don't mess with it. This is hard to test because the + x86 front end doesn't create Iop_Sar64 for any x86 instruction, + so it's impossible to write a test program that feeds values + through Iop_Sar64 and prints their results. The implementation + here was tested by using psrlq on mmx registers -- that generates + Iop_Shr64 -- and temporarily hacking the front end to generate + Iop_Sar64 for that instruction instead. + + movl %amount, %ecx + movl %srcHi, %r1 + movl %srcLo, %r2 + + movl %r1, %r3 + sarl %cl, %r3 + movl %r2, %r4 + shrdl %cl, %r1, %r4 + movl %r3, %r2 + sarl $31, %r2 + andl $32, %ecx + cmovne %r3, %r4 // = resLo + cmovne %r2, %r3 // = resHi + */ + HReg amount = iselIntExpr_R(env, e->Iex.Binop.arg2); + HReg srcHi = INVALID_HREG, srcLo = INVALID_HREG; + iselInt64Expr(&srcHi, &srcLo, env, e->Iex.Binop.arg1); + HReg r1 = newVRegI(env); + HReg r2 = newVRegI(env); + HReg r3 = newVRegI(env); + HReg r4 = newVRegI(env); + addInstr(env, mk_iMOVsd_RR(amount, hregX86_ECX())); + addInstr(env, mk_iMOVsd_RR(srcHi, r1)); + addInstr(env, mk_iMOVsd_RR(srcLo, r2)); + + addInstr(env, mk_iMOVsd_RR(r1, r3)); + addInstr(env, X86Instr_Sh32(Xsh_SAR, 0/*%cl*/, r3)); + addInstr(env, mk_iMOVsd_RR(r2, r4)); + addInstr(env, X86Instr_Sh3232(Xsh_SHR, 0/*%cl*/, r1, r4)); + addInstr(env, mk_iMOVsd_RR(r3, r2)); + addInstr(env, X86Instr_Sh32(Xsh_SAR, 31, r2)); + addInstr(env, X86Instr_Alu32R(Xalu_AND, X86RMI_Imm(32), + hregX86_ECX())); + addInstr(env, X86Instr_CMov32(Xcc_NZ, X86RM_Reg(r3), r4)); + addInstr(env, X86Instr_CMov32(Xcc_NZ, X86RM_Reg(r2), r3)); + *rHi = r3; + *rLo = r4; + return; + } + /* F64 -> I64 */ /* Sigh, this is an almost exact copy of the F64 -> I32/I16 case. Unfortunately I see no easy way to avoid the |
|
From: Philippe W. <phi...@so...> - 2018-12-23 14:12:10
|
https://sourceware.org/git/gitweb.cgi?p=valgrind.git;h=59f0855049a125a92c84ef8a5e7874a5953a2cf9 commit 59f0855049a125a92c84ef8a5e7874a5953a2cf9 Author: Philippe Waroquiers <phi...@sk...> Date: Sun Dec 23 14:49:25 2018 +0100 Fix 402395 coregrind/vgdb-invoker-solaris.c: 2 * poor error checking 2 size_t variables were used as return value of read syscalls, while ssize_t must be used. Diff: --- NEWS | 1 + coregrind/vgdb-invoker-solaris.c | 8 ++++---- 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/NEWS b/NEWS index e1645ef..18ee9d5 100644 --- a/NEWS +++ b/NEWS @@ -74,6 +74,7 @@ where XXXXXX is the bug number as listed below. 402048 WARNING: unhandled ppc64[be|le]-linux syscall: 26 (ptrace) 402134 assertion fail in mc_translate.c (noteTmpUsesIn) Iex_VECRET on arm64 402327 Warning: DWARF2 CFI reader: unhandled DW_OP_ opcode 0x13 (DW_OP_drop) +402395 coregrind/vgdb-invoker-solaris.c: 2 * poor error checking Release 3.14.0 (9 October 2018) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ diff --git a/coregrind/vgdb-invoker-solaris.c b/coregrind/vgdb-invoker-solaris.c index 8185e70..b62902b 100644 --- a/coregrind/vgdb-invoker-solaris.c +++ b/coregrind/vgdb-invoker-solaris.c @@ -173,8 +173,8 @@ static Bool attach(pid_t pid) } pstatus_t pstatus; - bytes = read(status_fd, &pstatus, sizeof(pstatus)); - if ((bytes < 0) || (bytes != sizeof(pstatus))) { + ssize_t nread = read(status_fd, &pstatus, sizeof(pstatus)); + if ((nread < 0) || (nread != sizeof(pstatus))) { ERROR(errno, "Failed to read from %s.\n", procname); close(status_fd); return False; @@ -400,8 +400,8 @@ static Bool invoke_agent(pid_t pid, prgregset_t *regs, id_t *agent_lwpid) } lwpstatus_t status; - bytes = read(status_fd, &status, sizeof(status)); - if ((bytes < 0) || (bytes != sizeof(status))) { + ssize_t nread = read(status_fd, &status, sizeof(status)); + if ((nread < 0) || (nread != sizeof(status))) { ERROR(errno, "Failed to read from %s.\n", procname); close(status_fd); return False; |