Import rpm: c8s
This commit is contained in:
commit
ff28c4da5f
2
.gitignore
vendored
Normal file
2
.gitignore
vendored
Normal file
@ -0,0 +1,2 @@
|
||||
SOURCES/valgrind-3.16.0.tar.bz2
|
||||
/valgrind-3.16.0.tar.bz2
|
1
sources
Normal file
1
sources
Normal file
@ -0,0 +1 @@
|
||||
SHA512 (valgrind-3.16.0.tar.bz2) = 6c82a0121e0ffde79f84943ea0f5791159ad3e37a490c1a18ff23f41cd4de62b62110e9c4d48b95b06d542f2a6d638492ecaeba9fed48f7e909e959aa4b4856d
|
64
valgrind-3.16.0-387-float.patch
Normal file
64
valgrind-3.16.0-387-float.patch
Normal file
@ -0,0 +1,64 @@
|
||||
commit 6aa4f7e7e76b40c183fb29650540d119ce1b4a4a
|
||||
Author: Julian Seward <jseward@acm.org>
|
||||
Date: Thu Jun 11 09:01:52 2020 +0200
|
||||
|
||||
expr_is_guardable, stmt_is_guardable, add_guarded_stmt_to_end_of: handle GetI/PutI cases.
|
||||
|
||||
This fixes #422715.
|
||||
|
||||
diff --git a/VEX/priv/guest_generic_bb_to_IR.c b/VEX/priv/guest_generic_bb_to_IR.c
|
||||
index 2f204c5b0..0cee970e4 100644
|
||||
--- a/VEX/priv/guest_generic_bb_to_IR.c
|
||||
+++ b/VEX/priv/guest_generic_bb_to_IR.c
|
||||
@@ -425,6 +425,7 @@ static Bool expr_is_guardable ( const IRExpr* e )
|
||||
case Iex_ITE:
|
||||
case Iex_CCall:
|
||||
case Iex_Get:
|
||||
+ case Iex_GetI:
|
||||
case Iex_Const:
|
||||
case Iex_RdTmp:
|
||||
return True;
|
||||
@@ -450,6 +451,7 @@ static Bool stmt_is_guardable ( const IRStmt* st )
|
||||
case Ist_NoOp:
|
||||
case Ist_IMark:
|
||||
case Ist_Put:
|
||||
+ case Ist_PutI:
|
||||
return True;
|
||||
// These are definitely not guardable, or at least it's way too much
|
||||
// hassle to do so.
|
||||
@@ -506,7 +508,7 @@ static void add_guarded_stmt_to_end_of ( /*MOD*/IRSB* bb,
|
||||
// Put(offs, e) ==> Put(offs, ITE(guard, e, Get(offs, sizeof(e))))
|
||||
// Which when flattened out is:
|
||||
// t1 = Get(offs, sizeof(e))
|
||||
- // t2 = ITE(guard, e, t2)
|
||||
+ // t2 = ITE(guard, e, t1)
|
||||
// Put(offs, t2)
|
||||
Int offset = st->Ist.Put.offset;
|
||||
IRExpr* e = st->Ist.Put.data;
|
||||
@@ -519,6 +521,26 @@ static void add_guarded_stmt_to_end_of ( /*MOD*/IRSB* bb,
|
||||
addStmtToIRSB(bb, IRStmt_Put(offset, IRExpr_RdTmp(t2)));
|
||||
break;
|
||||
}
|
||||
+ case Ist_PutI: {
|
||||
+ // PutI(descr,ix,bias, e) ==> Put(descr,ix,bias, ITE(guard, e, GetI(descr,ix,bias)))
|
||||
+ // Which when flattened out is:
|
||||
+ // t1 = GetI(descr,ix,bias)
|
||||
+ // t2 = ITE(guard, e, t1)
|
||||
+ // PutI(descr,ix,bias, t2)
|
||||
+ IRPutI* details = st->Ist.PutI.details;
|
||||
+ IRRegArray* descr = details->descr;
|
||||
+ IRExpr* ix = details->ix;
|
||||
+ Int bias = details->bias;
|
||||
+ IRExpr* e = details->data;
|
||||
+ IRType ty = typeOfIRExpr(bb->tyenv, e);
|
||||
+ IRTemp t1 = newIRTemp(bb->tyenv, ty);
|
||||
+ IRTemp t2 = newIRTemp(bb->tyenv, ty);
|
||||
+ addStmtToIRSB(bb, IRStmt_WrTmp(t1, IRExpr_GetI(descr,ix,bias)));
|
||||
+ addStmtToIRSB(bb, IRStmt_WrTmp(t2, IRExpr_ITE(IRExpr_RdTmp(guard),
|
||||
+ e, IRExpr_RdTmp(t1))));
|
||||
+ addStmtToIRSB(bb, IRStmt_PutI(mkIRPutI(descr,ix,bias, IRExpr_RdTmp(t2))));
|
||||
+ break;
|
||||
+ }
|
||||
case Ist_Exit: {
|
||||
// Exit(xguard, dst, jk, offsIP)
|
||||
// ==> t1 = And1(xguard, guard)
|
117
valgrind-3.16.0-pkglibexecdir.patch
Normal file
117
valgrind-3.16.0-pkglibexecdir.patch
Normal file
@ -0,0 +1,117 @@
|
||||
diff --git a/Makefile.all.am b/Makefile.all.am
|
||||
index 3786e34..1befef5 100644
|
||||
--- a/Makefile.all.am
|
||||
+++ b/Makefile.all.am
|
||||
@@ -50,20 +50,20 @@ inplace-noinst_DSYMS: build-noinst_DSYMS
|
||||
done
|
||||
|
||||
# This is used by coregrind/Makefile.am and by <tool>/Makefile.am for doing
|
||||
-# "make install". It copies $(noinst_PROGRAMS) into $prefix/lib/valgrind/.
|
||||
+# "make install". It copies $(noinst_PROGRAMS) into $prefix/libexec/valgrind/.
|
||||
# It needs to be depended on by an 'install-exec-local' rule.
|
||||
install-noinst_PROGRAMS: $(noinst_PROGRAMS)
|
||||
- $(mkinstalldirs) $(DESTDIR)$(pkglibdir); \
|
||||
+ $(mkinstalldirs) $(DESTDIR)$(pkglibexecdir); \
|
||||
for f in $(noinst_PROGRAMS); do \
|
||||
- $(INSTALL_PROGRAM) $$f $(DESTDIR)$(pkglibdir); \
|
||||
+ $(INSTALL_PROGRAM) $$f $(DESTDIR)$(pkglibexecdir); \
|
||||
done
|
||||
|
||||
# This is used by coregrind/Makefile.am and by <tool>/Makefile.am for doing
|
||||
-# "make uninstall". It removes $(noinst_PROGRAMS) from $prefix/lib/valgrind/.
|
||||
+# "make uninstall". It removes $(noinst_PROGRAMS) from $prefix/libexec/valgrind/.
|
||||
# It needs to be depended on by an 'uninstall-local' rule.
|
||||
uninstall-noinst_PROGRAMS:
|
||||
for f in $(noinst_PROGRAMS); do \
|
||||
- rm -f $(DESTDIR)$(pkglibdir)/$$f; \
|
||||
+ rm -f $(DESTDIR)$(pkglibexecdir)/$$f; \
|
||||
done
|
||||
|
||||
# Similar to install-noinst_PROGRAMS.
|
||||
@@ -71,15 +71,15 @@ uninstall-noinst_PROGRAMS:
|
||||
# directories. XXX: not sure whether the resulting permissions will be
|
||||
# correct when using 'cp -R'...
|
||||
install-noinst_DSYMS: build-noinst_DSYMS
|
||||
- $(mkinstalldirs) $(DESTDIR)$(pkglibdir); \
|
||||
+ $(mkinstalldirs) $(DESTDIR)$(pkglibexecdir); \
|
||||
for f in $(noinst_DSYMS); do \
|
||||
- cp -R $$f.dSYM $(DESTDIR)$(pkglibdir); \
|
||||
+ cp -R $$f.dSYM $(DESTDIR)$(pkglibexecdir); \
|
||||
done
|
||||
|
||||
# Similar to uninstall-noinst_PROGRAMS.
|
||||
uninstall-noinst_DSYMS:
|
||||
for f in $(noinst_DSYMS); do \
|
||||
- rm -f $(DESTDIR)$(pkglibdir)/$$f.dSYM; \
|
||||
+ rm -f $(DESTDIR)$(pkglibexecdir)/$$f.dSYM; \
|
||||
done
|
||||
|
||||
# This needs to be depended on by a 'clean-local' rule.
|
||||
diff --git a/Makefile.am b/Makefile.am
|
||||
index 242b38a..3b7c806 100644
|
||||
--- a/Makefile.am
|
||||
+++ b/Makefile.am
|
||||
@@ -58,7 +58,7 @@ DEFAULT_SUPP_FILES = @DEFAULT_SUPP@
|
||||
# default.supp, as it is built from the base .supp files at compile-time.
|
||||
dist_noinst_DATA = $(SUPP_FILES)
|
||||
|
||||
-vglibdir = $(pkglibdir)
|
||||
+vglibdir = $(pkglibexecdir)
|
||||
vglib_DATA = default.supp
|
||||
|
||||
pkgconfigdir = $(libdir)/pkgconfig
|
||||
diff --git a/coregrind/Makefile.am b/coregrind/Makefile.am
|
||||
index 94030fd..f09763a 100644
|
||||
--- a/coregrind/Makefile.am
|
||||
+++ b/coregrind/Makefile.am
|
||||
@@ -11,12 +11,12 @@ include $(top_srcdir)/Makefile.all.am
|
||||
|
||||
AM_CPPFLAGS_@VGCONF_PLATFORM_PRI_CAPS@ += \
|
||||
-I$(top_srcdir)/coregrind \
|
||||
- -DVG_LIBDIR="\"$(pkglibdir)"\" \
|
||||
+ -DVG_LIBDIR="\"$(pkglibexecdir)"\" \
|
||||
-DVG_PLATFORM="\"@VGCONF_ARCH_PRI@-@VGCONF_OS@\""
|
||||
if VGCONF_HAVE_PLATFORM_SEC
|
||||
AM_CPPFLAGS_@VGCONF_PLATFORM_SEC_CAPS@ += \
|
||||
-I$(top_srcdir)/coregrind \
|
||||
- -DVG_LIBDIR="\"$(pkglibdir)"\" \
|
||||
+ -DVG_LIBDIR="\"$(pkglibexecdir)"\" \
|
||||
-DVG_PLATFORM="\"@VGCONF_ARCH_SEC@-@VGCONF_OS@\""
|
||||
endif
|
||||
|
||||
@@ -714,7 +714,7 @@ GDBSERVER_XML_FILES = \
|
||||
m_gdbserver/mips64-fpu.xml
|
||||
|
||||
# so as to make sure these get copied into the install tree
|
||||
-vglibdir = $(pkglibdir)
|
||||
+vglibdir = $(pkglibexecdir)
|
||||
vglib_DATA = $(GDBSERVER_XML_FILES)
|
||||
|
||||
# so as to make sure these get copied into the tarball
|
||||
diff --git a/mpi/Makefile.am b/mpi/Makefile.am
|
||||
index 7ad9a25..471fee0 100644
|
||||
--- a/mpi/Makefile.am
|
||||
+++ b/mpi/Makefile.am
|
||||
@@ -18,16 +18,18 @@ EXTRA_DIST = \
|
||||
# libmpiwrap-<platform>.so
|
||||
#----------------------------------------------------------------------------
|
||||
|
||||
-noinst_PROGRAMS =
|
||||
+# These are really real libraries, so they should go to libdir, not libexec.
|
||||
+mpidir = $(pkglibdir)
|
||||
+mpi_PROGRAMS =
|
||||
if BUILD_MPIWRAP_PRI
|
||||
-noinst_PROGRAMS += libmpiwrap-@VGCONF_ARCH_PRI@-@VGCONF_OS@.so
|
||||
+mpi_PROGRAMS += libmpiwrap-@VGCONF_ARCH_PRI@-@VGCONF_OS@.so
|
||||
endif
|
||||
if BUILD_MPIWRAP_SEC
|
||||
-noinst_PROGRAMS += libmpiwrap-@VGCONF_ARCH_SEC@-@VGCONF_OS@.so
|
||||
+mpi_PROGRAMS += libmpiwrap-@VGCONF_ARCH_SEC@-@VGCONF_OS@.so
|
||||
endif
|
||||
|
||||
if VGCONF_OS_IS_DARWIN
|
||||
-noinst_DSYMS = $(noinst_PROGRAMS)
|
||||
+mpi_DSYMS = $(mpi_PROGRAMS)
|
||||
endif
|
||||
|
||||
|
29
valgrind-3.16.0-ppc-L-field.patch
Normal file
29
valgrind-3.16.0-ppc-L-field.patch
Normal file
@ -0,0 +1,29 @@
|
||||
commit fb6f7abcbc92506d302fb18a2c5fc853d2929248
|
||||
Author: Carl Love <cel@us.ibm.com>
|
||||
Date: Tue Jun 9 10:42:03 2020 -0500
|
||||
|
||||
Power PC Fix extraction of the L field for sync instruction
|
||||
|
||||
The L field is currently a two bit[22:21] field in ISA 3.0. The size of the
|
||||
L field has changed over time.
|
||||
|
||||
Currently the ISA 3.0 Valgrind sync instruction support code sets the
|
||||
flag_L for the instruction L field to a five bit value that includes bits
|
||||
that are marked reserved the sync instruction. This patch fixes the issue for ISA 3.0
|
||||
to only setting flag_L the specified two bits.
|
||||
|
||||
Valgrind bugzilla: https://bugs.kde.org/show_bug.cgi?id=422677
|
||||
|
||||
diff --git a/VEX/priv/guest_ppc_toIR.c b/VEX/priv/guest_ppc_toIR.c
|
||||
index 582c59ec0..c4965a19e 100644
|
||||
--- a/VEX/priv/guest_ppc_toIR.c
|
||||
+++ b/VEX/priv/guest_ppc_toIR.c
|
||||
@@ -8777,7 +8777,7 @@ static Bool dis_memsync ( UInt theInstr )
|
||||
/* X-Form, XL-Form */
|
||||
UChar opc1 = ifieldOPC(theInstr);
|
||||
UInt b11to25 = IFIELD(theInstr, 11, 15);
|
||||
- UChar flag_L = ifieldRegDS(theInstr);
|
||||
+ UChar flag_L = IFIELD(theInstr, 21, 2); //ISA 3.0
|
||||
UInt b11to20 = IFIELD(theInstr, 11, 10);
|
||||
UInt M0 = IFIELD(theInstr, 11, 5);
|
||||
UChar rD_addr = ifieldRegDS(theInstr);
|
72
valgrind-3.16.0-some-Wl-z-now.patch
Normal file
72
valgrind-3.16.0-some-Wl-z-now.patch
Normal file
@ -0,0 +1,72 @@
|
||||
commit d3c977726064ba09fed6dfc7daf22b16824c97b4
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Fri May 24 18:24:56 2019 +0200
|
||||
|
||||
Add -Wl,-z,now to some binaries.
|
||||
|
||||
diff --git a/auxprogs/Makefile.am b/auxprogs/Makefile.am
|
||||
index 1b7842b..e211eec 100644
|
||||
--- a/auxprogs/Makefile.am
|
||||
+++ b/auxprogs/Makefile.am
|
||||
@@ -32,7 +32,7 @@ valgrind_listener_SOURCES = valgrind-listener.c
|
||||
valgrind_listener_CPPFLAGS = $(AM_CPPFLAGS_PRI) -I$(top_srcdir)/coregrind
|
||||
valgrind_listener_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
valgrind_listener_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-valgrind_listener_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
+valgrind_listener_LDFLAGS = $(AM_CFLAGS_PRI) -Wl,-z,now
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
||||
valgrind_listener_CFLAGS += -static
|
||||
endif
|
||||
@@ -51,7 +51,7 @@ valgrind_di_server_SOURCES = valgrind-di-server.c
|
||||
valgrind_di_server_CPPFLAGS = $(AM_CPPFLAGS_PRI) -I$(top_srcdir)/coregrind
|
||||
valgrind_di_server_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
valgrind_di_server_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-valgrind_di_server_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
+valgrind_di_server_LDFLAGS = $(AM_CFLAGS_PRI) -Wl,-z,now
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
||||
valgrind_di_server_CFLAGS += -static
|
||||
endif
|
||||
@@ -86,7 +86,7 @@ getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_SOURCES = getoff.c
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CPPFLAGS = $(AM_CPPFLAGS_@VGCONF_PLATFORM_PRI_CAPS@)
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CFLAGS = $(AM_CFLAGS_@VGCONF_PLATFORM_PRI_CAPS@) -fstack-protector-strong
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
+getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@ -Wl,-z,now
|
||||
if HAVE_DLINFO_RTLD_DI_TLS_MODID
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_LDADD = $(LDADD) -ldl
|
||||
endif
|
||||
diff --git a/cachegrind/Makefile.am b/cachegrind/Makefile.am
|
||||
index f572741..1c07e50 100644
|
||||
--- a/cachegrind/Makefile.am
|
||||
+++ b/cachegrind/Makefile.am
|
||||
@@ -27,7 +27,7 @@ cg_merge_SOURCES = cg_merge.c
|
||||
cg_merge_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
cg_merge_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
cg_merge_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-cg_merge_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
+cg_merge_LDFLAGS = $(AM_CFLAGS_PRI) -Wl,-z,now
|
||||
# If there is no secondary platform, and the platforms include x86-darwin,
|
||||
# then the primary platform must be x86-darwin. Hence:
|
||||
if ! VGCONF_HAVE_PLATFORM_SEC
|
||||
diff --git a/coregrind/Makefile.am b/coregrind/Makefile.am
|
||||
index 3c73210..fb6b7bb 100644
|
||||
--- a/coregrind/Makefile.am
|
||||
+++ b/coregrind/Makefile.am
|
||||
@@ -57,7 +57,7 @@ RANLIB = ${LTO_RANLIB}
|
||||
valgrind_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
valgrind_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS) -fstack-protector-strong
|
||||
valgrind_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-valgrind_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
+valgrind_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@ -Wl,-z,now
|
||||
# If there is no secondary platform, and the platforms include x86-darwin,
|
||||
# then the primary platform must be x86-darwin. Hence:
|
||||
if ! VGCONF_HAVE_PLATFORM_SEC
|
||||
@@ -96,7 +96,7 @@ endif
|
||||
vgdb_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
vgdb_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS) -fstack-protector-strong
|
||||
vgdb_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
-vgdb_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
+vgdb_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@ -Wl,-z,now
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
||||
vgdb_CFLAGS += -static
|
||||
endif
|
118
valgrind-3.16.0-some-stack-protector.patch
Normal file
118
valgrind-3.16.0-some-stack-protector.patch
Normal file
@ -0,0 +1,118 @@
|
||||
commit b73fb7a614e1b5d60af23fb0752b5cead995e02e
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Sun Apr 14 00:30:05 2019 +0200
|
||||
|
||||
Remove no-stack-protector, add stack-protector-strong to some.
|
||||
|
||||
diff --git a/auxprogs/Makefile.am b/auxprogs/Makefile.am
|
||||
index 56cc5ef..1b7842b 100644
|
||||
--- a/auxprogs/Makefile.am
|
||||
+++ b/auxprogs/Makefile.am
|
||||
@@ -30,7 +30,7 @@ bin_PROGRAMS = valgrind-listener valgrind-di-server
|
||||
|
||||
valgrind_listener_SOURCES = valgrind-listener.c
|
||||
valgrind_listener_CPPFLAGS = $(AM_CPPFLAGS_PRI) -I$(top_srcdir)/coregrind
|
||||
-valgrind_listener_CFLAGS = $(AM_CFLAGS_PRI)
|
||||
+valgrind_listener_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
valgrind_listener_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
valgrind_listener_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
||||
@@ -49,7 +49,7 @@ endif
|
||||
|
||||
valgrind_di_server_SOURCES = valgrind-di-server.c
|
||||
valgrind_di_server_CPPFLAGS = $(AM_CPPFLAGS_PRI) -I$(top_srcdir)/coregrind
|
||||
-valgrind_di_server_CFLAGS = $(AM_CFLAGS_PRI)
|
||||
+valgrind_di_server_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
valgrind_di_server_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
valgrind_di_server_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
||||
@@ -84,7 +84,7 @@ endif
|
||||
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_SOURCES = getoff.c
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CPPFLAGS = $(AM_CPPFLAGS_@VGCONF_PLATFORM_PRI_CAPS@)
|
||||
-getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CFLAGS = $(AM_CFLAGS_@VGCONF_PLATFORM_PRI_CAPS@)
|
||||
+getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CFLAGS = $(AM_CFLAGS_@VGCONF_PLATFORM_PRI_CAPS@) -fstack-protector-strong
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
getoff_@VGCONF_ARCH_PRI@_@VGCONF_OS@_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
if HAVE_DLINFO_RTLD_DI_TLS_MODID
|
||||
diff --git a/cachegrind/Makefile.am b/cachegrind/Makefile.am
|
||||
index f8447a1..f572741 100644
|
||||
--- a/cachegrind/Makefile.am
|
||||
+++ b/cachegrind/Makefile.am
|
||||
@@ -25,7 +25,7 @@ bin_PROGRAMS = cg_merge
|
||||
|
||||
cg_merge_SOURCES = cg_merge.c
|
||||
cg_merge_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
-cg_merge_CFLAGS = $(AM_CFLAGS_PRI)
|
||||
+cg_merge_CFLAGS = $(AM_CFLAGS_PRI) -fstack-protector-strong
|
||||
cg_merge_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
cg_merge_LDFLAGS = $(AM_CFLAGS_PRI)
|
||||
# If there is no secondary platform, and the platforms include x86-darwin,
|
||||
diff --git a/configure.ac b/configure.ac
|
||||
index f8c798b..ccc8f52 100755
|
||||
--- a/configure.ac
|
||||
+++ b/configure.ac
|
||||
@@ -2188,24 +2188,24 @@ AC_LANG(C)
|
||||
AC_SUBST(FLAG_FALIGNED_NEW)
|
||||
|
||||
# does this compiler support -fno-stack-protector ?
|
||||
-AC_MSG_CHECKING([if gcc accepts -fno-stack-protector])
|
||||
-
|
||||
-safe_CFLAGS=$CFLAGS
|
||||
-CFLAGS="-fno-stack-protector -Werror"
|
||||
-
|
||||
-AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[]], [[
|
||||
- return 0;
|
||||
-]])], [
|
||||
-no_stack_protector=yes
|
||||
-FLAG_FNO_STACK_PROTECTOR="-fno-stack-protector"
|
||||
-AC_MSG_RESULT([yes])
|
||||
-], [
|
||||
-no_stack_protector=no
|
||||
+#AC_MSG_CHECKING([if gcc accepts -fno-stack-protector])
|
||||
+#
|
||||
+#safe_CFLAGS=$CFLAGS
|
||||
+#CFLAGS="-fno-stack-protector -Werror"
|
||||
+#
|
||||
+#AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[]], [[
|
||||
+# return 0;
|
||||
+#]])], [
|
||||
+#no_stack_protector=yes
|
||||
+#FLAG_FNO_STACK_PROTECTOR="-fno-stack-protector"
|
||||
+#AC_MSG_RESULT([yes])
|
||||
+#], [
|
||||
+#no_stack_protector=no
|
||||
FLAG_FNO_STACK_PROTECTOR=""
|
||||
-AC_MSG_RESULT([no])
|
||||
-])
|
||||
-CFLAGS=$safe_CFLAGS
|
||||
-
|
||||
+#AC_MSG_RESULT([no])
|
||||
+#])
|
||||
+#CFLAGS=$safe_CFLAGS
|
||||
+#
|
||||
AC_SUBST(FLAG_FNO_STACK_PROTECTOR)
|
||||
|
||||
# does this compiler support -finline-functions ?
|
||||
diff --git a/coregrind/Makefile.am b/coregrind/Makefile.am
|
||||
index 94030fd..3c73210 100644
|
||||
--- a/coregrind/Makefile.am
|
||||
+++ b/coregrind/Makefile.am
|
||||
@@ -55,7 +55,7 @@ AR = ${LTO_AR}
|
||||
RANLIB = ${LTO_RANLIB}
|
||||
|
||||
valgrind_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
-valgrind_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS)
|
||||
+valgrind_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS) -fstack-protector-strong
|
||||
valgrind_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
valgrind_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
# If there is no secondary platform, and the platforms include x86-darwin,
|
||||
@@ -94,7 +94,7 @@ vgdb_SOURCES += vgdb-invoker-solaris.c
|
||||
endif
|
||||
|
||||
vgdb_CPPFLAGS = $(AM_CPPFLAGS_PRI)
|
||||
-vgdb_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS)
|
||||
+vgdb_CFLAGS = $(AM_CFLAGS_PRI) $(LTO_CFLAGS) -fstack-protector-strong
|
||||
vgdb_CCASFLAGS = $(AM_CCASFLAGS_PRI)
|
||||
vgdb_LDFLAGS = $(AM_CFLAGS_PRI) @LIB_UBSAN@
|
||||
if VGCONF_PLATVARIANT_IS_ANDROID
|
38
valgrind-3.16.1-REX-prefix-JMP.patch
Normal file
38
valgrind-3.16.1-REX-prefix-JMP.patch
Normal file
@ -0,0 +1,38 @@
|
||||
commit e2dec0ff9b1e071779bee2c4e6fc82f8194b1c1d
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Sun Jul 26 21:17:23 2020 +0200
|
||||
|
||||
Handle REX prefixed JMP instruction.
|
||||
|
||||
The NET Core runtime might generate a JMP with a REX prefix.
|
||||
For Jv (32bit offset) and Jb (8bit offset) this is valid.
|
||||
Prefixes that change operand size are ignored for such JMPs.
|
||||
So remove the check for sz == 4 and force sz = 4 for Jv.
|
||||
|
||||
https://bugs.kde.org/show_bug.cgi?id=422174
|
||||
|
||||
diff --git a/VEX/priv/guest_amd64_toIR.c b/VEX/priv/guest_amd64_toIR.c
|
||||
index fadf47d41..7888132eb 100644
|
||||
--- a/VEX/priv/guest_amd64_toIR.c
|
||||
+++ b/VEX/priv/guest_amd64_toIR.c
|
||||
@@ -21392,8 +21392,8 @@ Long dis_ESC_NONE (
|
||||
|
||||
case 0xE9: /* Jv (jump, 16/32 offset) */
|
||||
if (haveF3(pfx)) goto decode_failure;
|
||||
- if (sz != 4)
|
||||
- goto decode_failure; /* JRS added 2004 July 11 */
|
||||
+ sz = 4; /* Prefixes that change operand size are ignored for this
|
||||
+ instruction. Operand size is forced to 32bit. */
|
||||
if (haveF2(pfx)) DIP("bnd ; "); /* MPX bnd prefix. */
|
||||
d64 = (guest_RIP_bbstart+delta+sz) + getSDisp(sz,delta);
|
||||
delta += sz;
|
||||
@@ -21404,8 +21404,7 @@ Long dis_ESC_NONE (
|
||||
|
||||
case 0xEB: /* Jb (jump, byte offset) */
|
||||
if (haveF3(pfx)) goto decode_failure;
|
||||
- if (sz != 4)
|
||||
- goto decode_failure; /* JRS added 2004 July 11 */
|
||||
+ /* Prefixes that change operand size are ignored for this instruction. */
|
||||
if (haveF2(pfx)) DIP("bnd ; "); /* MPX bnd prefix. */
|
||||
d64 = (guest_RIP_bbstart+delta+1) + getSDisp8(delta);
|
||||
delta++;
|
206
valgrind-3.16.1-dl_runtime_resolve.patch
Normal file
206
valgrind-3.16.1-dl_runtime_resolve.patch
Normal file
@ -0,0 +1,206 @@
|
||||
commit f4abcc05fdba3f25890a9b30b71d511ccc906d46
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Mon Jul 27 22:43:28 2020 +0200
|
||||
|
||||
Incorrect call-graph tracking due to new _dl_runtime_resolve_xsave*
|
||||
|
||||
Newer glibc have alternate ld.so _ld_runtime_resolve functions.
|
||||
Namely _dl_runtime_resolve_xsave and _dl_runtime_resolve_xsave'2
|
||||
|
||||
This patch recognizes the xsave, xsvec and fxsave variants and
|
||||
changes callgrind so that any variant counts as _dl_runtime_resolve.
|
||||
|
||||
Original patch by paulo.cesar.pereira.de.andrade@gmail.com
|
||||
https://bugs.kde.org/show_bug.cgi?id=415293
|
||||
|
||||
diff --git a/callgrind/fn.c b/callgrind/fn.c
|
||||
index e9d8dd214..7cce1a0c7 100644
|
||||
--- a/callgrind/fn.c
|
||||
+++ b/callgrind/fn.c
|
||||
@@ -30,8 +30,11 @@
|
||||
|
||||
static fn_array current_fn_active;
|
||||
|
||||
-static Addr runtime_resolve_addr = 0;
|
||||
-static int runtime_resolve_length = 0;
|
||||
+/* x86_64 defines 4 variants. */
|
||||
+#define MAX_RESOLVE_ADDRS 4
|
||||
+static int runtime_resolve_addrs = 0;
|
||||
+static Addr runtime_resolve_addr[MAX_RESOLVE_ADDRS];
|
||||
+static int runtime_resolve_length[MAX_RESOLVE_ADDRS];
|
||||
|
||||
// a code pattern is a list of tuples (start offset, length)
|
||||
struct chunk_t { int start, len; };
|
||||
@@ -56,6 +59,9 @@ static Bool check_code(obj_node* obj,
|
||||
/* first chunk of pattern should always start at offset 0 and
|
||||
* have at least 3 bytes */
|
||||
CLG_ASSERT((pat->chunk[0].start == 0) && (pat->chunk[0].len >2));
|
||||
+
|
||||
+ /* and we cannot be called more than MAX_RESOLVE_ADDRS times */
|
||||
+ CLG_ASSERT(runtime_resolve_addrs < MAX_RESOLVE_ADDRS);
|
||||
|
||||
CLG_DEBUG(1, "check_code: %s, pattern %s, check %d bytes of [%x %x %x...]\n",
|
||||
obj->name, pat->name, pat->chunk[0].len, code[0], code[1], code[2]);
|
||||
@@ -93,8 +99,9 @@ static Bool check_code(obj_node* obj,
|
||||
pat->name, obj->name + obj->last_slash_pos,
|
||||
addr - obj->start, addr, pat->len);
|
||||
|
||||
- runtime_resolve_addr = addr;
|
||||
- runtime_resolve_length = pat->len;
|
||||
+ runtime_resolve_addr[runtime_resolve_addrs] = addr;
|
||||
+ runtime_resolve_length[runtime_resolve_addrs] = pat->len;
|
||||
+ runtime_resolve_addrs++;
|
||||
return True;
|
||||
}
|
||||
}
|
||||
@@ -138,8 +145,9 @@ static Bool search_runtime_resolve(obj_node* obj)
|
||||
"x86-glibc2.8", 30, {{ 0,12 }, { 16,14 }, { 30,0}} };
|
||||
|
||||
if (VG_(strncmp)(obj->name, "/lib/ld", 7) != 0) return False;
|
||||
- if (check_code(obj, code, &pat)) return True;
|
||||
- if (check_code(obj, code_28, &pat_28)) return True;
|
||||
+ Bool pat_p = check_code(obj, code, &pat);
|
||||
+ Bool pat_28_p = check_code(obj, code_28, &pat_28);
|
||||
+ if (pat_p || pat_28_p) return True;
|
||||
return False;
|
||||
#endif
|
||||
|
||||
@@ -186,9 +194,98 @@ static Bool search_runtime_resolve(obj_node* obj)
|
||||
static struct pattern pat = {
|
||||
"amd64-def", 110, {{ 0,62 }, { 66,44 }, { 110,0 }} };
|
||||
|
||||
+ static UChar code_xsavec[] = {
|
||||
+ /* 0*/ 0x53, 0x48, 0x89, 0xe3, 0x48, 0x83, 0xe4, 0xc0,
|
||||
+ /* 8*/ 0x48, 0x2b, 0x25, 0x00, 0x00, 0x00, 0x00, /* sub <i32>(%rip),%rsp */
|
||||
+ /*15*/ 0x48,
|
||||
+ /*16*/ 0x89, 0x04, 0x24, 0x48, 0x89, 0x4c, 0x24, 0x08,
|
||||
+ /*24*/ 0x48, 0x89, 0x54, 0x24, 0x10, 0x48, 0x89, 0x74,
|
||||
+ /*32*/ 0x24, 0x18, 0x48, 0x89, 0x7c, 0x24, 0x20, 0x4c,
|
||||
+ /*40*/ 0x89, 0x44, 0x24, 0x28, 0x4c, 0x89, 0x4c, 0x24,
|
||||
+ /*48*/ 0x30, 0xb8, 0xee, 0x00, 0x00, 0x00, 0x31, 0xd2,
|
||||
+ /*56*/ 0x48, 0x89, 0x94, 0x24, 0x50, 0x02, 0x00, 0x00,
|
||||
+ /*64*/ 0x48, 0x89, 0x94, 0x24, 0x58, 0x02, 0x00, 0x00,
|
||||
+ /*72*/ 0x48, 0x89, 0x94, 0x24, 0x60, 0x02, 0x00, 0x00,
|
||||
+ /*80*/ 0x48, 0x89, 0x94, 0x24, 0x68, 0x02, 0x00, 0x00,
|
||||
+ /*88*/ 0x48, 0x89, 0x94, 0x24, 0x70, 0x02, 0x00, 0x00,
|
||||
+ /*96*/ 0x48, 0x89, 0x94, 0x24, 0x78, 0x02, 0x00, 0x00,
|
||||
+ /*04*/ 0x0f, 0xc7, 0x64, 0x24, 0x40, 0x48, 0x8b, 0x73,
|
||||
+ /*112*/0x10, 0x48, 0x8b, 0x7b, 0x08,
|
||||
+ /*117*/0xe8, 0x00, 0x00, 0x00, 0x00, /* callq <_dl_fixup> */
|
||||
+ /*122*/0x49, 0x89, 0xc3, 0xb8, 0xee, 0x00,
|
||||
+ /*128*/0x00, 0x00, 0x31, 0xd2, 0x0f, 0xae, 0x6c, 0x24,
|
||||
+ /*136*/0x40, 0x4c, 0x8b, 0x4c, 0x24, 0x30, 0x4c, 0x8b,
|
||||
+ /*144*/0x44, 0x24, 0x28, 0x48, 0x8b, 0x7c, 0x24, 0x20,
|
||||
+ /*152*/0x48, 0x8b, 0x74, 0x24, 0x18, 0x48, 0x8b, 0x54,
|
||||
+ /*160*/0x24, 0x10, 0x48, 0x8b, 0x4c, 0x24, 0x08, 0x48,
|
||||
+ /*168*/0x8b, 0x04, 0x24, 0x48, 0x89, 0xdc, 0x48, 0x8b,
|
||||
+ /*176*/0x1c, 0x24, 0x48, 0x83, 0xc4, 0x18, 0xf2, 0x41,
|
||||
+ /*184*/0xff, 0xe3 };
|
||||
+ static struct pattern pat_xsavec = {
|
||||
+ "amd64-xsavec", 186, {{ 0,11 }, { 15,103 }, {122,64}, { 186,0 }} };
|
||||
+
|
||||
+ static UChar code_xsave[] = {
|
||||
+ /* 0*/ 0x53, 0x48, 0x89, 0xe3, 0x48, 0x83, 0xe4, 0xc0,
|
||||
+ /* 8*/ 0x48, 0x2b, 0x25, 0x00, 0x00, 0x00, 0x00, /* sub <i32>(%rip),%rsp */
|
||||
+ /*15*/ 0x48,
|
||||
+ /*16*/ 0x89, 0x04, 0x24, 0x48, 0x89, 0x4c, 0x24, 0x08,
|
||||
+ /*24*/ 0x48, 0x89, 0x54, 0x24, 0x10, 0x48, 0x89, 0x74,
|
||||
+ /*32*/ 0x24, 0x18, 0x48, 0x89, 0x7c, 0x24, 0x20, 0x4c,
|
||||
+ /*40*/ 0x89, 0x44, 0x24, 0x28, 0x4c, 0x89, 0x4c, 0x24,
|
||||
+ /*48*/ 0x30, 0xb8, 0xee, 0x00, 0x00, 0x00, 0x31, 0xd2,
|
||||
+ /*56*/ 0x48, 0x89, 0x94, 0x24, 0x40, 0x02, 0x00, 0x00,
|
||||
+ /*64*/ 0x48, 0x89, 0x94, 0x24, 0x48, 0x02, 0x00, 0x00,
|
||||
+ /*72*/ 0x48, 0x89, 0x94, 0x24, 0x50, 0x02, 0x00, 0x00,
|
||||
+ /*80*/ 0x48, 0x89, 0x94, 0x24, 0x58, 0x02, 0x00, 0x00,
|
||||
+ /*88*/ 0x48, 0x89, 0x94, 0x24, 0x60, 0x02, 0x00, 0x00,
|
||||
+ /*96*/ 0x48, 0x89, 0x94, 0x24, 0x68, 0x02, 0x00, 0x00,
|
||||
+ /*104*/0x48, 0x89, 0x94, 0x24, 0x70, 0x02, 0x00, 0x00,
|
||||
+ /*112*/0x48, 0x89, 0x94, 0x24, 0x78, 0x02, 0x00, 0x00,
|
||||
+ /*120*/0x0f, 0xae, 0x64, 0x24, 0x40, 0x48, 0x8b, 0x73,
|
||||
+ /*128*/0x10, 0x48, 0x8b, 0x7b, 0x08,
|
||||
+ /*133*/0xe8, 0x00, 0x00, 0x00, 0x00, /* callq <_dl_fixup> */
|
||||
+ /*138*/0x49, 0x89, 0xc3, 0xb8, 0xee, 0x00,
|
||||
+ /*144*/0x00, 0x00, 0x31, 0xd2, 0x0f, 0xae, 0x6c, 0x24,
|
||||
+ /*152*/0x40, 0x4c, 0x8b, 0x4c, 0x24, 0x30, 0x4c, 0x8b,
|
||||
+ /*160*/0x44, 0x24, 0x28, 0x48, 0x8b, 0x7c, 0x24, 0x20,
|
||||
+ /*168*/0x48, 0x8b, 0x74, 0x24, 0x18, 0x48, 0x8b, 0x54,
|
||||
+ /*176*/0x24, 0x10, 0x48, 0x8b, 0x4c, 0x24, 0x08, 0x48,
|
||||
+ /*184*/0x8b, 0x04, 0x24, 0x48, 0x89, 0xdc, 0x48, 0x8b,
|
||||
+ /*192*/0x1c, 0x24, 0x48, 0x83, 0xc4, 0x18, 0xf2, 0x41,
|
||||
+ /*200*/0xff, 0xe3 };
|
||||
+ static struct pattern pat_xsave = {
|
||||
+ "amd64-xsave", 202, {{ 0,11 }, { 15,119 }, {138,64}, { 202,0 }} };
|
||||
+
|
||||
+ static UChar code_fxsave[] = {
|
||||
+ /* 0*/ 0x53, 0x48, 0x89, 0xe3, 0x48, 0x83, 0xe4, 0xf0,
|
||||
+ /* 8*/ 0x48, 0x81, 0xec, 0x40, 0x02, 0x00, 0x00, 0x48,
|
||||
+ /*16*/ 0x89, 0x04, 0x24, 0x48, 0x89, 0x4c, 0x24, 0x08,
|
||||
+ /*24*/ 0x48, 0x89, 0x54, 0x24, 0x10, 0x48, 0x89, 0x74,
|
||||
+ /*32*/ 0x24, 0x18, 0x48, 0x89, 0x7c, 0x24, 0x20, 0x4c,
|
||||
+ /*40*/ 0x89, 0x44, 0x24, 0x28, 0x4c, 0x89, 0x4c, 0x24,
|
||||
+ /*48*/ 0x30, 0x0f, 0xae, 0x44, 0x24, 0x40, 0x48, 0x8b,
|
||||
+ /*56*/ 0x73, 0x10, 0x48, 0x8b, 0x7b, 0x08,
|
||||
+ /*62*/ 0xe8, 0x00, 0x00, 0x00, 0x00, /* callq <_dl_fixup> */
|
||||
+ /*67*/ 0x49, 0x89, 0xc3, 0x0f, 0xae,
|
||||
+ /*72*/ 0x4c, 0x24, 0x40, 0x4c, 0x8b, 0x4c, 0x24, 0x30,
|
||||
+ /*80*/ 0x4c, 0x8b, 0x44, 0x24, 0x28, 0x48, 0x8b, 0x7c,
|
||||
+ /*88*/ 0x24, 0x20, 0x48, 0x8b, 0x74, 0x24, 0x18, 0x48,
|
||||
+ /*96*/ 0x8b, 0x54, 0x24, 0x10, 0x48, 0x8b, 0x4c, 0x24,
|
||||
+ /*104*/0x08, 0x48, 0x8b, 0x04, 0x24, 0x48, 0x89, 0xdc,
|
||||
+ /*112*/0x48, 0x8b, 0x1c, 0x24, 0x48, 0x83, 0xc4, 0x18,
|
||||
+ /*120*/0xf2, 0x41, 0xff, 0xe3 };
|
||||
+ static struct pattern pat_fxsave = {
|
||||
+ "amd64-fxsave", 124, {{ 0,63 }, { 67,57 }, { 124,0 }} };
|
||||
+
|
||||
if ((VG_(strncmp)(obj->name, "/lib/ld", 7) != 0) &&
|
||||
- (VG_(strncmp)(obj->name, "/lib64/ld", 9) != 0)) return False;
|
||||
- return check_code(obj, code, &pat);
|
||||
+ (VG_(strncmp)(obj->name, "/lib64/ld", 9) != 0) &&
|
||||
+ (VG_(strncmp)(obj->name, "/usr/lib/ld", 11) != 0) &&
|
||||
+ (VG_(strncmp)(obj->name, "/usr/lib64/ld", 13) != 0)) return False;
|
||||
+ Bool pat_p = check_code(obj, code, &pat);
|
||||
+ Bool pat_xsavec_p = check_code(obj, code_xsavec, &pat_xsavec);
|
||||
+ Bool pat_xsave_p = check_code(obj, code_xsave, &pat_xsave);
|
||||
+ Bool pat_fxsave_p = check_code(obj, code_fxsave, &pat_fxsave);
|
||||
+ if (pat_p || pat_xsavec_p || pat_xsave_p || pat_fxsave_p) return True;
|
||||
#endif
|
||||
|
||||
/* For other platforms, no patterns known */
|
||||
@@ -254,7 +351,7 @@ obj_node* new_obj_node(DebugInfo* di, obj_node* next)
|
||||
i++;
|
||||
}
|
||||
|
||||
- if (runtime_resolve_addr == 0) search_runtime_resolve(obj);
|
||||
+ if (runtime_resolve_addrs == 0) search_runtime_resolve(obj);
|
||||
|
||||
return obj;
|
||||
}
|
||||
@@ -490,6 +587,7 @@ fn_node* CLG_(get_fn_node)(BB* bb)
|
||||
DebugInfo* di;
|
||||
UInt line_num;
|
||||
fn_node* fn;
|
||||
+ Int i;
|
||||
|
||||
/* fn from debug info is idempotent for a BB */
|
||||
if (bb->fn) return bb->fn;
|
||||
@@ -538,12 +636,14 @@ fn_node* CLG_(get_fn_node)(BB* bb)
|
||||
}
|
||||
if (0 == VG_(strcmp)(fnname, "_exit") && !exit_bb)
|
||||
exit_bb = bb;
|
||||
-
|
||||
- if (runtime_resolve_addr &&
|
||||
- (bb_addr(bb) >= runtime_resolve_addr) &&
|
||||
- (bb_addr(bb) < runtime_resolve_addr + runtime_resolve_length)) {
|
||||
- /* BB in runtime_resolve found by code check; use this name */
|
||||
- fnname = "_dl_runtime_resolve";
|
||||
+
|
||||
+ for (i = 0; i < runtime_resolve_addrs; i++) {
|
||||
+ if ((bb_addr(bb) >= runtime_resolve_addr[i]) &&
|
||||
+ (bb_addr(bb) < runtime_resolve_addr[i] + runtime_resolve_length[i])) {
|
||||
+ /* BB in runtime_resolve found by code check; use this name */
|
||||
+ fnname = "_dl_runtime_resolve";
|
||||
+ break;
|
||||
+ }
|
||||
}
|
||||
|
||||
/* get fn_node struct for this function */
|
117
valgrind-3.16.1-epoll.patch
Normal file
117
valgrind-3.16.1-epoll.patch
Normal file
@ -0,0 +1,117 @@
|
||||
commit f326d68d762edf4b0e9604daa446b6f8ca25725a
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Sun Jul 26 22:40:22 2020 +0200
|
||||
|
||||
epoll_ctl warns for uninitialized padding on non-amd64 64bit arches
|
||||
|
||||
struct vki_epoll_event is packed on x86_64, but not on other 64bit
|
||||
arches. This means that on 64bit arches there can be padding in the
|
||||
epoll_event struct. Seperately the data field is only used by user
|
||||
space (which might not set the data field if it doesn't need to).
|
||||
|
||||
Only check the events field on epoll_ctl. But assume both events
|
||||
and data are both written to by epoll_[p]wait (exclude padding).
|
||||
|
||||
https://bugs.kde.org/show_bug.cgi?id=422623
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
|
||||
index 5b5b7eee6..929a4d9af 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-linux.c
|
||||
@@ -2099,8 +2099,29 @@ PRE(sys_epoll_ctl)
|
||||
SARG1, ( ARG2<3 ? epoll_ctl_s[ARG2] : "?" ), SARG3, ARG4);
|
||||
PRE_REG_READ4(long, "epoll_ctl",
|
||||
int, epfd, int, op, int, fd, struct vki_epoll_event *, event);
|
||||
- if (ARG2 != VKI_EPOLL_CTL_DEL)
|
||||
- PRE_MEM_READ( "epoll_ctl(event)", ARG4, sizeof(struct vki_epoll_event) );
|
||||
+ if (ARG2 != VKI_EPOLL_CTL_DEL) {
|
||||
+ /* Just check the events field, the data field is for user space and
|
||||
+ unused by the kernel. */
|
||||
+ struct vki_epoll_event *event = (struct vki_epoll_event *) ARG4;
|
||||
+ PRE_MEM_READ( "epoll_ctl(event)", (Addr) &event->events,
|
||||
+ sizeof(__vki_u32) );
|
||||
+ }
|
||||
+}
|
||||
+
|
||||
+/* RES event records have been written (exclude padding). */
|
||||
+static void epoll_post_helper ( ThreadId tid, SyscallArgs* arrghs,
|
||||
+ SyscallStatus* status )
|
||||
+{
|
||||
+ vg_assert(SUCCESS);
|
||||
+ if (RES > 0) {
|
||||
+ Int i;
|
||||
+ struct vki_epoll_event **events = (struct vki_epoll_event**)(Addr)ARG2;
|
||||
+ for (i = 0; i < RES; i++) {
|
||||
+ /* Assume both events and data are set (data is user space only). */
|
||||
+ POST_FIELD_WRITE(events[i]->events);
|
||||
+ POST_FIELD_WRITE(events[i]->data);
|
||||
+ }
|
||||
+ }
|
||||
}
|
||||
|
||||
PRE(sys_epoll_wait)
|
||||
@@ -2111,13 +2132,12 @@ PRE(sys_epoll_wait)
|
||||
PRE_REG_READ4(long, "epoll_wait",
|
||||
int, epfd, struct vki_epoll_event *, events,
|
||||
int, maxevents, int, timeout);
|
||||
+ /* Assume all (maxevents) events records should be (fully) writable. */
|
||||
PRE_MEM_WRITE( "epoll_wait(events)", ARG2, sizeof(struct vki_epoll_event)*ARG3);
|
||||
}
|
||||
POST(sys_epoll_wait)
|
||||
{
|
||||
- vg_assert(SUCCESS);
|
||||
- if (RES > 0)
|
||||
- POST_MEM_WRITE( ARG2, sizeof(struct vki_epoll_event)*RES ) ;
|
||||
+ epoll_post_helper (tid, arrghs, status);
|
||||
}
|
||||
|
||||
PRE(sys_epoll_pwait)
|
||||
@@ -2130,15 +2150,14 @@ PRE(sys_epoll_pwait)
|
||||
int, epfd, struct vki_epoll_event *, events,
|
||||
int, maxevents, int, timeout, vki_sigset_t *, sigmask,
|
||||
vki_size_t, sigsetsize);
|
||||
+ /* Assume all (maxevents) events records should be (fully) writable. */
|
||||
PRE_MEM_WRITE( "epoll_pwait(events)", ARG2, sizeof(struct vki_epoll_event)*ARG3);
|
||||
if (ARG5)
|
||||
PRE_MEM_READ( "epoll_pwait(sigmask)", ARG5, sizeof(vki_sigset_t) );
|
||||
}
|
||||
POST(sys_epoll_pwait)
|
||||
{
|
||||
- vg_assert(SUCCESS);
|
||||
- if (RES > 0)
|
||||
- POST_MEM_WRITE( ARG2, sizeof(struct vki_epoll_event)*RES ) ;
|
||||
+ epoll_post_helper (tid, arrghs, status);
|
||||
}
|
||||
|
||||
PRE(sys_eventfd)
|
||||
commit b74f9f23c8758c77367f18368ea95baa858544cb
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Tue Aug 18 23:58:55 2020 +0200
|
||||
|
||||
Fix epoll_ctl setting of array event and data fields.
|
||||
|
||||
Fix for https://bugs.kde.org/show_bug.cgi?id=422623 in commit ecf5ba119
|
||||
epoll_ctl warns for uninitialized padding on non-amd64 64bit arches
|
||||
contained a bug. A pointer to an array is not a pointer to a pointer to
|
||||
an array. Found by a Fedora user:
|
||||
https://bugzilla.redhat.com/show_bug.cgi?id=1844778#c10
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
|
||||
index 0850487e9..3f488795a 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-linux.c
|
||||
@@ -2115,11 +2115,11 @@ static void epoll_post_helper ( ThreadId tid, SyscallArgs* arrghs,
|
||||
vg_assert(SUCCESS);
|
||||
if (RES > 0) {
|
||||
Int i;
|
||||
- struct vki_epoll_event **events = (struct vki_epoll_event**)(Addr)ARG2;
|
||||
+ struct vki_epoll_event *events = (struct vki_epoll_event*)(Addr)ARG2;
|
||||
for (i = 0; i < RES; i++) {
|
||||
/* Assume both events and data are set (data is user space only). */
|
||||
- POST_FIELD_WRITE(events[i]->events);
|
||||
- POST_FIELD_WRITE(events[i]->data);
|
||||
+ POST_FIELD_WRITE(events[i].events);
|
||||
+ POST_FIELD_WRITE(events[i].data);
|
||||
}
|
||||
}
|
||||
}
|
201
valgrind-3.16.1-sched_getsetattr.patch
Normal file
201
valgrind-3.16.1-sched_getsetattr.patch
Normal file
@ -0,0 +1,201 @@
|
||||
commit a53adb79711ccfc76a4ee32b20253045cdab55c7
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Mon Jul 27 16:36:17 2020 +0200
|
||||
|
||||
Handle linux syscalls sched_getattr and sched_setattr
|
||||
|
||||
The only "special" thing about these syscalls is that the given
|
||||
struct sched_attr determines its own size for future expansion.
|
||||
|
||||
Original fix by "ISHIKAWA,chiaki" <ishikawa@yk.rim.or.jp>
|
||||
|
||||
https://bugs.kde.org/show_bug.cgi?id=369029
|
||||
|
||||
diff --git a/coregrind/m_syswrap/priv_syswrap-linux.h b/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
index cdc73c1e6..eb0b320ca 100644
|
||||
--- a/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
+++ b/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
@@ -227,6 +227,8 @@ DECL_TEMPLATE(linux, sys_fremovexattr);
|
||||
// syscalls.
|
||||
DECL_TEMPLATE(linux, sys_sched_setparam);
|
||||
DECL_TEMPLATE(linux, sys_sched_getparam);
|
||||
+DECL_TEMPLATE(linux, sys_sched_setattr);
|
||||
+DECL_TEMPLATE(linux, sys_sched_getattr);
|
||||
DECL_TEMPLATE(linux, sys_sched_setscheduler);
|
||||
DECL_TEMPLATE(linux, sys_sched_getscheduler);
|
||||
DECL_TEMPLATE(linux, sys_sched_yield);
|
||||
diff --git a/coregrind/m_syswrap/syswrap-amd64-linux.c b/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
index 28d90135a..d6f3eb910 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
@@ -846,9 +846,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINX_(__NR_process_vm_writev, sys_process_vm_writev),// 311
|
||||
LINX_(__NR_kcmp, sys_kcmp), // 312
|
||||
LINX_(__NR_finit_module, sys_finit_module), // 313
|
||||
-// LIN__(__NR_sched_setattr, sys_ni_syscall), // 314
|
||||
-
|
||||
-// LIN__(__NR_sched_getattr, sys_ni_syscall), // 315
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 314
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 315
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 316
|
||||
// LIN__(__NR_seccomp, sys_ni_syscall), // 317
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 318
|
||||
diff --git a/coregrind/m_syswrap/syswrap-arm-linux.c b/coregrind/m_syswrap/syswrap-arm-linux.c
|
||||
index 579542785..70700e53f 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-arm-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-arm-linux.c
|
||||
@@ -1009,6 +1009,8 @@ static SyscallTableEntry syscall_main_table[] = {
|
||||
LINXY(__NR_process_vm_readv, sys_process_vm_readv), // 376
|
||||
LINX_(__NR_process_vm_writev, sys_process_vm_writev),// 377
|
||||
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 380
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 381
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 382
|
||||
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 384
|
||||
diff --git a/coregrind/m_syswrap/syswrap-arm64-linux.c b/coregrind/m_syswrap/syswrap-arm64-linux.c
|
||||
index 81e01456f..acca02442 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-arm64-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-arm64-linux.c
|
||||
@@ -806,8 +806,8 @@ static SyscallTableEntry syscall_main_table[] = {
|
||||
LINX_(__NR_process_vm_writev, sys_process_vm_writev), // 271
|
||||
LINX_(__NR_kcmp, sys_kcmp), // 272
|
||||
LINX_(__NR_finit_module, sys_finit_module), // 273
|
||||
- // (__NR_sched_setattr, sys_ni_syscall), // 274
|
||||
- // (__NR_sched_getattr, sys_ni_syscall), // 275
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 274
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 275
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 276
|
||||
// (__NR_seccomp, sys_ni_syscall), // 277
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 278
|
||||
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
|
||||
index 5b5b7eee6..56be3032d 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-linux.c
|
||||
@@ -3677,6 +3677,41 @@ POST(sys_sched_getparam)
|
||||
POST_MEM_WRITE( ARG2, sizeof(struct vki_sched_param) );
|
||||
}
|
||||
|
||||
+PRE(sys_sched_setattr)
|
||||
+{
|
||||
+ struct vki_sched_attr *attr;
|
||||
+ PRINT("sched_setattr ( %ld, %#" FMT_REGWORD "x, %#"
|
||||
+ FMT_REGWORD "x )", SARG1, ARG2, ARG3 );
|
||||
+ PRE_REG_READ3(long, "sched_setattr",
|
||||
+ vki_pid_t, pid, struct sched_attr *, p, unsigned int, flags);
|
||||
+ /* We need to be able to read at least the size field. */
|
||||
+ PRE_MEM_READ( "sched_setattr(attr->size)", ARG2, sizeof(vki_uint32_t) );
|
||||
+ attr = (struct vki_sched_attr *)(Addr)ARG2;
|
||||
+ if (ML_(safe_to_deref)(attr,sizeof(vki_uint32_t)))
|
||||
+ PRE_MEM_READ( "sched_setattr(attr)", (Addr)attr, attr->size);
|
||||
+}
|
||||
+
|
||||
+PRE(sys_sched_getattr)
|
||||
+{
|
||||
+ struct vki_sched_attr *attr;
|
||||
+ PRINT("sched_getattr ( %ld, %#" FMT_REGWORD "x, %ld, %#"
|
||||
+ FMT_REGWORD "x )", SARG1, ARG2, ARG3, ARG4 );
|
||||
+ PRE_REG_READ4(long, "sched_getattr",
|
||||
+ vki_pid_t, pid, struct sched_attr *, p,
|
||||
+ unsigned int, size, unsigned int, flags);
|
||||
+ /* We need to be able to read at least the size field. */
|
||||
+ PRE_MEM_READ( "sched_setattr(attr->size)", ARG2, sizeof(vki_uint32_t) );
|
||||
+ /* And the kernel needs to be able to write to the whole struct size. */
|
||||
+ attr = (struct vki_sched_attr *)(Addr)ARG2;
|
||||
+ if (ML_(safe_to_deref)(attr,sizeof(vki_uint32_t)))
|
||||
+ PRE_MEM_WRITE( "sched_setattr(attr)", (Addr)attr, attr->size);
|
||||
+}
|
||||
+POST(sys_sched_getattr)
|
||||
+{
|
||||
+ struct vki_sched_attr *attr = (struct vki_sched_attr *)(Addr)ARG2;
|
||||
+ POST_MEM_WRITE( (Addr)attr, attr->size );
|
||||
+}
|
||||
+
|
||||
PRE(sys_sched_getscheduler)
|
||||
{
|
||||
PRINT("sys_sched_getscheduler ( %ld )", SARG1);
|
||||
diff --git a/coregrind/m_syswrap/syswrap-ppc32-linux.c b/coregrind/m_syswrap/syswrap-ppc32-linux.c
|
||||
index eed12a1bc..c19cb9e0e 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-ppc32-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-ppc32-linux.c
|
||||
@@ -1016,6 +1016,9 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINXY(__NR_process_vm_readv, sys_process_vm_readv), // 351
|
||||
LINX_(__NR_process_vm_writev, sys_process_vm_writev),// 352
|
||||
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 355
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 356
|
||||
+
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 359
|
||||
LINXY(__NR_memfd_create, sys_memfd_create), // 360
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-ppc64-linux.c b/coregrind/m_syswrap/syswrap-ppc64-linux.c
|
||||
index d58200b49..b6422a765 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-ppc64-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-ppc64-linux.c
|
||||
@@ -998,6 +998,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINXY(__NR_process_vm_readv, sys_process_vm_readv), // 351
|
||||
LINX_(__NR_process_vm_writev, sys_process_vm_writev),// 352
|
||||
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 355
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 356
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 357
|
||||
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 359
|
||||
diff --git a/coregrind/m_syswrap/syswrap-s390x-linux.c b/coregrind/m_syswrap/syswrap-s390x-linux.c
|
||||
index a0a330aa2..3427fee16 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-s390x-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-s390x-linux.c
|
||||
@@ -825,8 +825,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINX_(__NR_kcmp, sys_kcmp), // 343
|
||||
// ?????(__NR_finit_module, ), // 344
|
||||
|
||||
-// ?????(__NR_sched_setattr, ), // 345
|
||||
-// ?????(__NR_sched_getattr, ), // 346
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 345
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 346
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 347
|
||||
// ?????(__NR_seccomp, ), // 348
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 349
|
||||
diff --git a/coregrind/m_syswrap/syswrap-x86-linux.c b/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
index 332ed0bf2..b59d96f37 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
@@ -1580,8 +1580,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINX_(__NR_kcmp, sys_kcmp), // 349
|
||||
|
||||
// LIN__(__NR_finit_module, sys_ni_syscall), // 350
|
||||
-// LIN__(__NR_sched_setattr, sys_ni_syscall), // 351
|
||||
-// LIN__(__NR_sched_getattr, sys_ni_syscall), // 352
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 351
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 352
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 353
|
||||
// LIN__(__NR_seccomp, sys_ni_syscall), // 354
|
||||
|
||||
diff --git a/include/vki/vki-linux.h b/include/vki/vki-linux.h
|
||||
index 75b583165..ef93b9258 100644
|
||||
--- a/include/vki/vki-linux.h
|
||||
+++ b/include/vki/vki-linux.h
|
||||
@@ -410,6 +410,23 @@ struct vki_sched_param {
|
||||
int sched_priority;
|
||||
};
|
||||
|
||||
+struct vki_sched_attr {
|
||||
+ vki_uint32_t size;
|
||||
+ vki_uint32_t sched_policy;
|
||||
+ vki_uint64_t sched_flags;
|
||||
+
|
||||
+ /* SCHED_NORMAL, SCHED_BATCH */
|
||||
+ vki_int32_t sched_nice;
|
||||
+
|
||||
+ /* SCHED_FIFO, SCHED_RR */
|
||||
+ vki_uint32_t sched_priority;
|
||||
+
|
||||
+ /* SCHED_DEADLINE */
|
||||
+ vki_uint64_t sched_runtime;
|
||||
+ vki_uint64_t sched_deadline;
|
||||
+ vki_uint64_t sched_period;
|
||||
+};
|
||||
+
|
||||
#define VKI_TASK_COMM_LEN 16
|
||||
|
||||
//----------------------------------------------------------------------
|
54
valgrind-3.9.0-cachegrind-improvements.patch
Normal file
54
valgrind-3.9.0-cachegrind-improvements.patch
Normal file
@ -0,0 +1,54 @@
|
||||
--- valgrind-3.8.1/cachegrind/cg_sim.c.jj 2011-10-26 23:24:32.000000000 +0200
|
||||
+++ valgrind-3.8.1/cachegrind/cg_sim.c 2011-12-09 17:31:19.256023683 +0100
|
||||
@@ -42,27 +42,30 @@ typedef struct {
|
||||
Int size; /* bytes */
|
||||
Int assoc;
|
||||
Int line_size; /* bytes */
|
||||
- Int sets;
|
||||
Int sets_min_1;
|
||||
Int line_size_bits;
|
||||
Int tag_shift;
|
||||
- HChar desc_line[128]; /* large enough */
|
||||
UWord* tags;
|
||||
-} cache_t2;
|
||||
+ HChar desc_line[128];
|
||||
+} cache_t2
|
||||
+#ifdef __GNUC__
|
||||
+__attribute__ ((aligned (8 * sizeof (Int))))
|
||||
+#endif
|
||||
+;
|
||||
|
||||
/* By this point, the size/assoc/line_size has been checked. */
|
||||
static void cachesim_initcache(cache_t config, cache_t2* c)
|
||||
{
|
||||
- Int i;
|
||||
+ Int sets;
|
||||
|
||||
c->size = config.size;
|
||||
c->assoc = config.assoc;
|
||||
c->line_size = config.line_size;
|
||||
|
||||
- c->sets = (c->size / c->line_size) / c->assoc;
|
||||
- c->sets_min_1 = c->sets - 1;
|
||||
+ sets = (c->size / c->line_size) / c->assoc;
|
||||
+ c->sets_min_1 = sets - 1;
|
||||
c->line_size_bits = VG_(log2)(c->line_size);
|
||||
- c->tag_shift = c->line_size_bits + VG_(log2)(c->sets);
|
||||
+ c->tag_shift = c->line_size_bits + VG_(log2)(sets);
|
||||
|
||||
if (c->assoc == 1) {
|
||||
VG_(sprintf)(c->desc_line, "%d B, %d B, direct-mapped",
|
||||
@@ -72,11 +75,8 @@ static void cachesim_initcache(cache_t c
|
||||
c->size, c->line_size, c->assoc);
|
||||
}
|
||||
|
||||
- c->tags = VG_(malloc)("cg.sim.ci.1",
|
||||
- sizeof(UWord) * c->sets * c->assoc);
|
||||
-
|
||||
- for (i = 0; i < c->sets * c->assoc; i++)
|
||||
- c->tags[i] = 0;
|
||||
+ c->tags = VG_(calloc)("cg.sim.ci.1",
|
||||
+ sizeof(UWord), sets * c->assoc);
|
||||
}
|
||||
|
||||
/* This attribute forces GCC to inline the function, getting rid of a
|
15
valgrind-3.9.0-helgrind-race-supp.patch
Normal file
15
valgrind-3.9.0-helgrind-race-supp.patch
Normal file
@ -0,0 +1,15 @@
|
||||
--- valgrind/glibc-2.34567-NPTL-helgrind.supp.jj 2009-08-19 15:37:48.000000000 +0200
|
||||
+++ valgrind/glibc-2.34567-NPTL-helgrind.supp 2009-10-21 16:46:31.000000000 +0200
|
||||
@@ -88,6 +88,12 @@
|
||||
obj:*/lib*/libpthread-2.*so*
|
||||
}
|
||||
{
|
||||
+ helgrind-glibc2X-102a
|
||||
+ Helgrind:Race
|
||||
+ fun:mythread_wrapper
|
||||
+ obj:*vgpreload_helgrind*.so
|
||||
+}
|
||||
+{
|
||||
helgrind-glibc2X-103
|
||||
Helgrind:Race
|
||||
fun:pthread_cond_*@@GLIBC_2.*
|
28
valgrind-3.9.0-ldso-supp.patch
Normal file
28
valgrind-3.9.0-ldso-supp.patch
Normal file
@ -0,0 +1,28 @@
|
||||
--- valgrind/glibc-2.X.supp.in.jj 2011-10-26 23:24:45.000000000 +0200
|
||||
+++ valgrind/glibc-2.X.supp.in 2012-05-07 10:55:20.395942656 +0200
|
||||
@@ -124,7 +124,7 @@
|
||||
glibc-2.5.x-on-SUSE-10.2-(PPC)-2a
|
||||
Memcheck:Cond
|
||||
fun:index
|
||||
- obj:*ld-@GLIBC_VERSION@.*.so
|
||||
+ obj:*ld-@GLIBC_VERSION@*.so
|
||||
}
|
||||
{
|
||||
glibc-2.5.x-on-SuSE-10.2-(PPC)-2b
|
||||
@@ -136,14 +136,14 @@
|
||||
glibc-2.5.5-on-SuSE-10.2-(PPC)-2c
|
||||
Memcheck:Addr4
|
||||
fun:index
|
||||
- obj:*ld-@GLIBC_VERSION@.*.so
|
||||
+ obj:*ld-@GLIBC_VERSION@*.so
|
||||
}
|
||||
{
|
||||
glibc-2.3.5-on-SuSE-10.1-(PPC)-3
|
||||
Memcheck:Addr4
|
||||
fun:*wordcopy_fwd_dest_aligned*
|
||||
fun:mem*cpy
|
||||
- obj:*lib*@GLIBC_VERSION@.*.so
|
||||
+ obj:*lib*@GLIBC_VERSION@*.so
|
||||
}
|
||||
|
||||
{
|
1935
valgrind.spec
Normal file
1935
valgrind.spec
Normal file
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user