import valgrind-3.17.0-5.el8
This commit is contained in:
parent
22ffdfb122
commit
4a71c5f6b1
2
.gitignore
vendored
2
.gitignore
vendored
@ -1 +1 @@
|
||||
SOURCES/valgrind-3.16.0.tar.bz2
|
||||
SOURCES/valgrind-3.17.0.tar.bz2
|
||||
|
@ -1 +1 @@
|
||||
cf9fba00b597d9baa3f673cc0960b23a40473ff1 SOURCES/valgrind-3.16.0.tar.bz2
|
||||
7770912c7465f93a90c5a9d5c1b1b036ebec04fd SOURCES/valgrind-3.17.0.tar.bz2
|
||||
|
@ -1,64 +0,0 @@
|
||||
commit 6aa4f7e7e76b40c183fb29650540d119ce1b4a4a
|
||||
Author: Julian Seward <jseward@acm.org>
|
||||
Date: Thu Jun 11 09:01:52 2020 +0200
|
||||
|
||||
expr_is_guardable, stmt_is_guardable, add_guarded_stmt_to_end_of: handle GetI/PutI cases.
|
||||
|
||||
This fixes #422715.
|
||||
|
||||
diff --git a/VEX/priv/guest_generic_bb_to_IR.c b/VEX/priv/guest_generic_bb_to_IR.c
|
||||
index 2f204c5b0..0cee970e4 100644
|
||||
--- a/VEX/priv/guest_generic_bb_to_IR.c
|
||||
+++ b/VEX/priv/guest_generic_bb_to_IR.c
|
||||
@@ -425,6 +425,7 @@ static Bool expr_is_guardable ( const IRExpr* e )
|
||||
case Iex_ITE:
|
||||
case Iex_CCall:
|
||||
case Iex_Get:
|
||||
+ case Iex_GetI:
|
||||
case Iex_Const:
|
||||
case Iex_RdTmp:
|
||||
return True;
|
||||
@@ -450,6 +451,7 @@ static Bool stmt_is_guardable ( const IRStmt* st )
|
||||
case Ist_NoOp:
|
||||
case Ist_IMark:
|
||||
case Ist_Put:
|
||||
+ case Ist_PutI:
|
||||
return True;
|
||||
// These are definitely not guardable, or at least it's way too much
|
||||
// hassle to do so.
|
||||
@@ -506,7 +508,7 @@ static void add_guarded_stmt_to_end_of ( /*MOD*/IRSB* bb,
|
||||
// Put(offs, e) ==> Put(offs, ITE(guard, e, Get(offs, sizeof(e))))
|
||||
// Which when flattened out is:
|
||||
// t1 = Get(offs, sizeof(e))
|
||||
- // t2 = ITE(guard, e, t2)
|
||||
+ // t2 = ITE(guard, e, t1)
|
||||
// Put(offs, t2)
|
||||
Int offset = st->Ist.Put.offset;
|
||||
IRExpr* e = st->Ist.Put.data;
|
||||
@@ -519,6 +521,26 @@ static void add_guarded_stmt_to_end_of ( /*MOD*/IRSB* bb,
|
||||
addStmtToIRSB(bb, IRStmt_Put(offset, IRExpr_RdTmp(t2)));
|
||||
break;
|
||||
}
|
||||
+ case Ist_PutI: {
|
||||
+ // PutI(descr,ix,bias, e) ==> Put(descr,ix,bias, ITE(guard, e, GetI(descr,ix,bias)))
|
||||
+ // Which when flattened out is:
|
||||
+ // t1 = GetI(descr,ix,bias)
|
||||
+ // t2 = ITE(guard, e, t1)
|
||||
+ // PutI(descr,ix,bias, t2)
|
||||
+ IRPutI* details = st->Ist.PutI.details;
|
||||
+ IRRegArray* descr = details->descr;
|
||||
+ IRExpr* ix = details->ix;
|
||||
+ Int bias = details->bias;
|
||||
+ IRExpr* e = details->data;
|
||||
+ IRType ty = typeOfIRExpr(bb->tyenv, e);
|
||||
+ IRTemp t1 = newIRTemp(bb->tyenv, ty);
|
||||
+ IRTemp t2 = newIRTemp(bb->tyenv, ty);
|
||||
+ addStmtToIRSB(bb, IRStmt_WrTmp(t1, IRExpr_GetI(descr,ix,bias)));
|
||||
+ addStmtToIRSB(bb, IRStmt_WrTmp(t2, IRExpr_ITE(IRExpr_RdTmp(guard),
|
||||
+ e, IRExpr_RdTmp(t1))));
|
||||
+ addStmtToIRSB(bb, IRStmt_PutI(mkIRPutI(descr,ix,bias, IRExpr_RdTmp(t2))));
|
||||
+ break;
|
||||
+ }
|
||||
case Ist_Exit: {
|
||||
// Exit(xguard, dst, jk, offsIP)
|
||||
// ==> t1 = And1(xguard, guard)
|
@ -1,117 +0,0 @@
|
||||
diff --git a/Makefile.all.am b/Makefile.all.am
|
||||
index 3786e34..1befef5 100644
|
||||
--- a/Makefile.all.am
|
||||
+++ b/Makefile.all.am
|
||||
@@ -50,20 +50,20 @@ inplace-noinst_DSYMS: build-noinst_DSYMS
|
||||
done
|
||||
|
||||
# This is used by coregrind/Makefile.am and by <tool>/Makefile.am for doing
|
||||
-# "make install". It copies $(noinst_PROGRAMS) into $prefix/lib/valgrind/.
|
||||
+# "make install". It copies $(noinst_PROGRAMS) into $prefix/libexec/valgrind/.
|
||||
# It needs to be depended on by an 'install-exec-local' rule.
|
||||
install-noinst_PROGRAMS: $(noinst_PROGRAMS)
|
||||
- $(mkinstalldirs) $(DESTDIR)$(pkglibdir); \
|
||||
+ $(mkinstalldirs) $(DESTDIR)$(pkglibexecdir); \
|
||||
for f in $(noinst_PROGRAMS); do \
|
||||
- $(INSTALL_PROGRAM) $$f $(DESTDIR)$(pkglibdir); \
|
||||
+ $(INSTALL_PROGRAM) $$f $(DESTDIR)$(pkglibexecdir); \
|
||||
done
|
||||
|
||||
# This is used by coregrind/Makefile.am and by <tool>/Makefile.am for doing
|
||||
-# "make uninstall". It removes $(noinst_PROGRAMS) from $prefix/lib/valgrind/.
|
||||
+# "make uninstall". It removes $(noinst_PROGRAMS) from $prefix/libexec/valgrind/.
|
||||
# It needs to be depended on by an 'uninstall-local' rule.
|
||||
uninstall-noinst_PROGRAMS:
|
||||
for f in $(noinst_PROGRAMS); do \
|
||||
- rm -f $(DESTDIR)$(pkglibdir)/$$f; \
|
||||
+ rm -f $(DESTDIR)$(pkglibexecdir)/$$f; \
|
||||
done
|
||||
|
||||
# Similar to install-noinst_PROGRAMS.
|
||||
@@ -71,15 +71,15 @@ uninstall-noinst_PROGRAMS:
|
||||
# directories. XXX: not sure whether the resulting permissions will be
|
||||
# correct when using 'cp -R'...
|
||||
install-noinst_DSYMS: build-noinst_DSYMS
|
||||
- $(mkinstalldirs) $(DESTDIR)$(pkglibdir); \
|
||||
+ $(mkinstalldirs) $(DESTDIR)$(pkglibexecdir); \
|
||||
for f in $(noinst_DSYMS); do \
|
||||
- cp -R $$f.dSYM $(DESTDIR)$(pkglibdir); \
|
||||
+ cp -R $$f.dSYM $(DESTDIR)$(pkglibexecdir); \
|
||||
done
|
||||
|
||||
# Similar to uninstall-noinst_PROGRAMS.
|
||||
uninstall-noinst_DSYMS:
|
||||
for f in $(noinst_DSYMS); do \
|
||||
- rm -f $(DESTDIR)$(pkglibdir)/$$f.dSYM; \
|
||||
+ rm -f $(DESTDIR)$(pkglibexecdir)/$$f.dSYM; \
|
||||
done
|
||||
|
||||
# This needs to be depended on by a 'clean-local' rule.
|
||||
diff --git a/Makefile.am b/Makefile.am
|
||||
index 242b38a..3b7c806 100644
|
||||
--- a/Makefile.am
|
||||
+++ b/Makefile.am
|
||||
@@ -58,7 +58,7 @@ DEFAULT_SUPP_FILES = @DEFAULT_SUPP@
|
||||
# default.supp, as it is built from the base .supp files at compile-time.
|
||||
dist_noinst_DATA = $(SUPP_FILES)
|
||||
|
||||
-vglibdir = $(pkglibdir)
|
||||
+vglibdir = $(pkglibexecdir)
|
||||
vglib_DATA = default.supp
|
||||
|
||||
pkgconfigdir = $(libdir)/pkgconfig
|
||||
diff --git a/coregrind/Makefile.am b/coregrind/Makefile.am
|
||||
index 94030fd..f09763a 100644
|
||||
--- a/coregrind/Makefile.am
|
||||
+++ b/coregrind/Makefile.am
|
||||
@@ -11,12 +11,12 @@ include $(top_srcdir)/Makefile.all.am
|
||||
|
||||
AM_CPPFLAGS_@VGCONF_PLATFORM_PRI_CAPS@ += \
|
||||
-I$(top_srcdir)/coregrind \
|
||||
- -DVG_LIBDIR="\"$(pkglibdir)"\" \
|
||||
+ -DVG_LIBDIR="\"$(pkglibexecdir)"\" \
|
||||
-DVG_PLATFORM="\"@VGCONF_ARCH_PRI@-@VGCONF_OS@\""
|
||||
if VGCONF_HAVE_PLATFORM_SEC
|
||||
AM_CPPFLAGS_@VGCONF_PLATFORM_SEC_CAPS@ += \
|
||||
-I$(top_srcdir)/coregrind \
|
||||
- -DVG_LIBDIR="\"$(pkglibdir)"\" \
|
||||
+ -DVG_LIBDIR="\"$(pkglibexecdir)"\" \
|
||||
-DVG_PLATFORM="\"@VGCONF_ARCH_SEC@-@VGCONF_OS@\""
|
||||
endif
|
||||
|
||||
@@ -714,7 +714,7 @@ GDBSERVER_XML_FILES = \
|
||||
m_gdbserver/mips64-fpu.xml
|
||||
|
||||
# so as to make sure these get copied into the install tree
|
||||
-vglibdir = $(pkglibdir)
|
||||
+vglibdir = $(pkglibexecdir)
|
||||
vglib_DATA = $(GDBSERVER_XML_FILES)
|
||||
|
||||
# so as to make sure these get copied into the tarball
|
||||
diff --git a/mpi/Makefile.am b/mpi/Makefile.am
|
||||
index 7ad9a25..471fee0 100644
|
||||
--- a/mpi/Makefile.am
|
||||
+++ b/mpi/Makefile.am
|
||||
@@ -18,16 +18,18 @@ EXTRA_DIST = \
|
||||
# libmpiwrap-<platform>.so
|
||||
#----------------------------------------------------------------------------
|
||||
|
||||
-noinst_PROGRAMS =
|
||||
+# These are really real libraries, so they should go to libdir, not libexec.
|
||||
+mpidir = $(pkglibdir)
|
||||
+mpi_PROGRAMS =
|
||||
if BUILD_MPIWRAP_PRI
|
||||
-noinst_PROGRAMS += libmpiwrap-@VGCONF_ARCH_PRI@-@VGCONF_OS@.so
|
||||
+mpi_PROGRAMS += libmpiwrap-@VGCONF_ARCH_PRI@-@VGCONF_OS@.so
|
||||
endif
|
||||
if BUILD_MPIWRAP_SEC
|
||||
-noinst_PROGRAMS += libmpiwrap-@VGCONF_ARCH_SEC@-@VGCONF_OS@.so
|
||||
+mpi_PROGRAMS += libmpiwrap-@VGCONF_ARCH_SEC@-@VGCONF_OS@.so
|
||||
endif
|
||||
|
||||
if VGCONF_OS_IS_DARWIN
|
||||
-noinst_DSYMS = $(noinst_PROGRAMS)
|
||||
+mpi_DSYMS = $(mpi_PROGRAMS)
|
||||
endif
|
||||
|
||||
|
@ -1,29 +0,0 @@
|
||||
commit fb6f7abcbc92506d302fb18a2c5fc853d2929248
|
||||
Author: Carl Love <cel@us.ibm.com>
|
||||
Date: Tue Jun 9 10:42:03 2020 -0500
|
||||
|
||||
Power PC Fix extraction of the L field for sync instruction
|
||||
|
||||
The L field is currently a two bit[22:21] field in ISA 3.0. The size of the
|
||||
L field has changed over time.
|
||||
|
||||
Currently the ISA 3.0 Valgrind sync instruction support code sets the
|
||||
flag_L for the instruction L field to a five bit value that includes bits
|
||||
that are marked reserved the sync instruction. This patch fixes the issue for ISA 3.0
|
||||
to only setting flag_L the specified two bits.
|
||||
|
||||
Valgrind bugzilla: https://bugs.kde.org/show_bug.cgi?id=422677
|
||||
|
||||
diff --git a/VEX/priv/guest_ppc_toIR.c b/VEX/priv/guest_ppc_toIR.c
|
||||
index 582c59ec0..c4965a19e 100644
|
||||
--- a/VEX/priv/guest_ppc_toIR.c
|
||||
+++ b/VEX/priv/guest_ppc_toIR.c
|
||||
@@ -8777,7 +8777,7 @@ static Bool dis_memsync ( UInt theInstr )
|
||||
/* X-Form, XL-Form */
|
||||
UChar opc1 = ifieldOPC(theInstr);
|
||||
UInt b11to25 = IFIELD(theInstr, 11, 15);
|
||||
- UChar flag_L = ifieldRegDS(theInstr);
|
||||
+ UChar flag_L = IFIELD(theInstr, 21, 2); //ISA 3.0
|
||||
UInt b11to20 = IFIELD(theInstr, 11, 10);
|
||||
UInt M0 = IFIELD(theInstr, 11, 5);
|
||||
UChar rD_addr = ifieldRegDS(theInstr);
|
@ -52,8 +52,8 @@ diff --git a/configure.ac b/configure.ac
|
||||
index f8c798b..ccc8f52 100755
|
||||
--- a/configure.ac
|
||||
+++ b/configure.ac
|
||||
@@ -2188,24 +2188,24 @@ AC_LANG(C)
|
||||
AC_SUBST(FLAG_FALIGNED_NEW)
|
||||
@@ -2352,24 +2352,24 @@
|
||||
AM_CONDITIONAL([HAVE_ALIGNED_CXX_ALLOC], [test x$ac_have_aligned_cxx_alloc = xyes])
|
||||
|
||||
# does this compiler support -fno-stack-protector ?
|
||||
-AC_MSG_CHECKING([if gcc accepts -fno-stack-protector])
|
||||
|
@ -1,38 +0,0 @@
|
||||
commit e2dec0ff9b1e071779bee2c4e6fc82f8194b1c1d
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Sun Jul 26 21:17:23 2020 +0200
|
||||
|
||||
Handle REX prefixed JMP instruction.
|
||||
|
||||
The NET Core runtime might generate a JMP with a REX prefix.
|
||||
For Jv (32bit offset) and Jb (8bit offset) this is valid.
|
||||
Prefixes that change operand size are ignored for such JMPs.
|
||||
So remove the check for sz == 4 and force sz = 4 for Jv.
|
||||
|
||||
https://bugs.kde.org/show_bug.cgi?id=422174
|
||||
|
||||
diff --git a/VEX/priv/guest_amd64_toIR.c b/VEX/priv/guest_amd64_toIR.c
|
||||
index fadf47d41..7888132eb 100644
|
||||
--- a/VEX/priv/guest_amd64_toIR.c
|
||||
+++ b/VEX/priv/guest_amd64_toIR.c
|
||||
@@ -21392,8 +21392,8 @@ Long dis_ESC_NONE (
|
||||
|
||||
case 0xE9: /* Jv (jump, 16/32 offset) */
|
||||
if (haveF3(pfx)) goto decode_failure;
|
||||
- if (sz != 4)
|
||||
- goto decode_failure; /* JRS added 2004 July 11 */
|
||||
+ sz = 4; /* Prefixes that change operand size are ignored for this
|
||||
+ instruction. Operand size is forced to 32bit. */
|
||||
if (haveF2(pfx)) DIP("bnd ; "); /* MPX bnd prefix. */
|
||||
d64 = (guest_RIP_bbstart+delta+sz) + getSDisp(sz,delta);
|
||||
delta += sz;
|
||||
@@ -21404,8 +21404,7 @@ Long dis_ESC_NONE (
|
||||
|
||||
case 0xEB: /* Jb (jump, byte offset) */
|
||||
if (haveF3(pfx)) goto decode_failure;
|
||||
- if (sz != 4)
|
||||
- goto decode_failure; /* JRS added 2004 July 11 */
|
||||
+ /* Prefixes that change operand size are ignored for this instruction. */
|
||||
if (haveF2(pfx)) DIP("bnd ; "); /* MPX bnd prefix. */
|
||||
d64 = (guest_RIP_bbstart+delta+1) + getSDisp8(delta);
|
||||
delta++;
|
@ -1,206 +0,0 @@
|
||||
commit f4abcc05fdba3f25890a9b30b71d511ccc906d46
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Mon Jul 27 22:43:28 2020 +0200
|
||||
|
||||
Incorrect call-graph tracking due to new _dl_runtime_resolve_xsave*
|
||||
|
||||
Newer glibc have alternate ld.so _ld_runtime_resolve functions.
|
||||
Namely _dl_runtime_resolve_xsave and _dl_runtime_resolve_xsave'2
|
||||
|
||||
This patch recognizes the xsave, xsvec and fxsave variants and
|
||||
changes callgrind so that any variant counts as _dl_runtime_resolve.
|
||||
|
||||
Original patch by paulo.cesar.pereira.de.andrade@gmail.com
|
||||
https://bugs.kde.org/show_bug.cgi?id=415293
|
||||
|
||||
diff --git a/callgrind/fn.c b/callgrind/fn.c
|
||||
index e9d8dd214..7cce1a0c7 100644
|
||||
--- a/callgrind/fn.c
|
||||
+++ b/callgrind/fn.c
|
||||
@@ -30,8 +30,11 @@
|
||||
|
||||
static fn_array current_fn_active;
|
||||
|
||||
-static Addr runtime_resolve_addr = 0;
|
||||
-static int runtime_resolve_length = 0;
|
||||
+/* x86_64 defines 4 variants. */
|
||||
+#define MAX_RESOLVE_ADDRS 4
|
||||
+static int runtime_resolve_addrs = 0;
|
||||
+static Addr runtime_resolve_addr[MAX_RESOLVE_ADDRS];
|
||||
+static int runtime_resolve_length[MAX_RESOLVE_ADDRS];
|
||||
|
||||
// a code pattern is a list of tuples (start offset, length)
|
||||
struct chunk_t { int start, len; };
|
||||
@@ -56,6 +59,9 @@ static Bool check_code(obj_node* obj,
|
||||
/* first chunk of pattern should always start at offset 0 and
|
||||
* have at least 3 bytes */
|
||||
CLG_ASSERT((pat->chunk[0].start == 0) && (pat->chunk[0].len >2));
|
||||
+
|
||||
+ /* and we cannot be called more than MAX_RESOLVE_ADDRS times */
|
||||
+ CLG_ASSERT(runtime_resolve_addrs < MAX_RESOLVE_ADDRS);
|
||||
|
||||
CLG_DEBUG(1, "check_code: %s, pattern %s, check %d bytes of [%x %x %x...]\n",
|
||||
obj->name, pat->name, pat->chunk[0].len, code[0], code[1], code[2]);
|
||||
@@ -93,8 +99,9 @@ static Bool check_code(obj_node* obj,
|
||||
pat->name, obj->name + obj->last_slash_pos,
|
||||
addr - obj->start, addr, pat->len);
|
||||
|
||||
- runtime_resolve_addr = addr;
|
||||
- runtime_resolve_length = pat->len;
|
||||
+ runtime_resolve_addr[runtime_resolve_addrs] = addr;
|
||||
+ runtime_resolve_length[runtime_resolve_addrs] = pat->len;
|
||||
+ runtime_resolve_addrs++;
|
||||
return True;
|
||||
}
|
||||
}
|
||||
@@ -138,8 +145,9 @@ static Bool search_runtime_resolve(obj_node* obj)
|
||||
"x86-glibc2.8", 30, {{ 0,12 }, { 16,14 }, { 30,0}} };
|
||||
|
||||
if (VG_(strncmp)(obj->name, "/lib/ld", 7) != 0) return False;
|
||||
- if (check_code(obj, code, &pat)) return True;
|
||||
- if (check_code(obj, code_28, &pat_28)) return True;
|
||||
+ Bool pat_p = check_code(obj, code, &pat);
|
||||
+ Bool pat_28_p = check_code(obj, code_28, &pat_28);
|
||||
+ if (pat_p || pat_28_p) return True;
|
||||
return False;
|
||||
#endif
|
||||
|
||||
@@ -186,9 +194,98 @@ static Bool search_runtime_resolve(obj_node* obj)
|
||||
static struct pattern pat = {
|
||||
"amd64-def", 110, {{ 0,62 }, { 66,44 }, { 110,0 }} };
|
||||
|
||||
+ static UChar code_xsavec[] = {
|
||||
+ /* 0*/ 0x53, 0x48, 0x89, 0xe3, 0x48, 0x83, 0xe4, 0xc0,
|
||||
+ /* 8*/ 0x48, 0x2b, 0x25, 0x00, 0x00, 0x00, 0x00, /* sub <i32>(%rip),%rsp */
|
||||
+ /*15*/ 0x48,
|
||||
+ /*16*/ 0x89, 0x04, 0x24, 0x48, 0x89, 0x4c, 0x24, 0x08,
|
||||
+ /*24*/ 0x48, 0x89, 0x54, 0x24, 0x10, 0x48, 0x89, 0x74,
|
||||
+ /*32*/ 0x24, 0x18, 0x48, 0x89, 0x7c, 0x24, 0x20, 0x4c,
|
||||
+ /*40*/ 0x89, 0x44, 0x24, 0x28, 0x4c, 0x89, 0x4c, 0x24,
|
||||
+ /*48*/ 0x30, 0xb8, 0xee, 0x00, 0x00, 0x00, 0x31, 0xd2,
|
||||
+ /*56*/ 0x48, 0x89, 0x94, 0x24, 0x50, 0x02, 0x00, 0x00,
|
||||
+ /*64*/ 0x48, 0x89, 0x94, 0x24, 0x58, 0x02, 0x00, 0x00,
|
||||
+ /*72*/ 0x48, 0x89, 0x94, 0x24, 0x60, 0x02, 0x00, 0x00,
|
||||
+ /*80*/ 0x48, 0x89, 0x94, 0x24, 0x68, 0x02, 0x00, 0x00,
|
||||
+ /*88*/ 0x48, 0x89, 0x94, 0x24, 0x70, 0x02, 0x00, 0x00,
|
||||
+ /*96*/ 0x48, 0x89, 0x94, 0x24, 0x78, 0x02, 0x00, 0x00,
|
||||
+ /*04*/ 0x0f, 0xc7, 0x64, 0x24, 0x40, 0x48, 0x8b, 0x73,
|
||||
+ /*112*/0x10, 0x48, 0x8b, 0x7b, 0x08,
|
||||
+ /*117*/0xe8, 0x00, 0x00, 0x00, 0x00, /* callq <_dl_fixup> */
|
||||
+ /*122*/0x49, 0x89, 0xc3, 0xb8, 0xee, 0x00,
|
||||
+ /*128*/0x00, 0x00, 0x31, 0xd2, 0x0f, 0xae, 0x6c, 0x24,
|
||||
+ /*136*/0x40, 0x4c, 0x8b, 0x4c, 0x24, 0x30, 0x4c, 0x8b,
|
||||
+ /*144*/0x44, 0x24, 0x28, 0x48, 0x8b, 0x7c, 0x24, 0x20,
|
||||
+ /*152*/0x48, 0x8b, 0x74, 0x24, 0x18, 0x48, 0x8b, 0x54,
|
||||
+ /*160*/0x24, 0x10, 0x48, 0x8b, 0x4c, 0x24, 0x08, 0x48,
|
||||
+ /*168*/0x8b, 0x04, 0x24, 0x48, 0x89, 0xdc, 0x48, 0x8b,
|
||||
+ /*176*/0x1c, 0x24, 0x48, 0x83, 0xc4, 0x18, 0xf2, 0x41,
|
||||
+ /*184*/0xff, 0xe3 };
|
||||
+ static struct pattern pat_xsavec = {
|
||||
+ "amd64-xsavec", 186, {{ 0,11 }, { 15,103 }, {122,64}, { 186,0 }} };
|
||||
+
|
||||
+ static UChar code_xsave[] = {
|
||||
+ /* 0*/ 0x53, 0x48, 0x89, 0xe3, 0x48, 0x83, 0xe4, 0xc0,
|
||||
+ /* 8*/ 0x48, 0x2b, 0x25, 0x00, 0x00, 0x00, 0x00, /* sub <i32>(%rip),%rsp */
|
||||
+ /*15*/ 0x48,
|
||||
+ /*16*/ 0x89, 0x04, 0x24, 0x48, 0x89, 0x4c, 0x24, 0x08,
|
||||
+ /*24*/ 0x48, 0x89, 0x54, 0x24, 0x10, 0x48, 0x89, 0x74,
|
||||
+ /*32*/ 0x24, 0x18, 0x48, 0x89, 0x7c, 0x24, 0x20, 0x4c,
|
||||
+ /*40*/ 0x89, 0x44, 0x24, 0x28, 0x4c, 0x89, 0x4c, 0x24,
|
||||
+ /*48*/ 0x30, 0xb8, 0xee, 0x00, 0x00, 0x00, 0x31, 0xd2,
|
||||
+ /*56*/ 0x48, 0x89, 0x94, 0x24, 0x40, 0x02, 0x00, 0x00,
|
||||
+ /*64*/ 0x48, 0x89, 0x94, 0x24, 0x48, 0x02, 0x00, 0x00,
|
||||
+ /*72*/ 0x48, 0x89, 0x94, 0x24, 0x50, 0x02, 0x00, 0x00,
|
||||
+ /*80*/ 0x48, 0x89, 0x94, 0x24, 0x58, 0x02, 0x00, 0x00,
|
||||
+ /*88*/ 0x48, 0x89, 0x94, 0x24, 0x60, 0x02, 0x00, 0x00,
|
||||
+ /*96*/ 0x48, 0x89, 0x94, 0x24, 0x68, 0x02, 0x00, 0x00,
|
||||
+ /*104*/0x48, 0x89, 0x94, 0x24, 0x70, 0x02, 0x00, 0x00,
|
||||
+ /*112*/0x48, 0x89, 0x94, 0x24, 0x78, 0x02, 0x00, 0x00,
|
||||
+ /*120*/0x0f, 0xae, 0x64, 0x24, 0x40, 0x48, 0x8b, 0x73,
|
||||
+ /*128*/0x10, 0x48, 0x8b, 0x7b, 0x08,
|
||||
+ /*133*/0xe8, 0x00, 0x00, 0x00, 0x00, /* callq <_dl_fixup> */
|
||||
+ /*138*/0x49, 0x89, 0xc3, 0xb8, 0xee, 0x00,
|
||||
+ /*144*/0x00, 0x00, 0x31, 0xd2, 0x0f, 0xae, 0x6c, 0x24,
|
||||
+ /*152*/0x40, 0x4c, 0x8b, 0x4c, 0x24, 0x30, 0x4c, 0x8b,
|
||||
+ /*160*/0x44, 0x24, 0x28, 0x48, 0x8b, 0x7c, 0x24, 0x20,
|
||||
+ /*168*/0x48, 0x8b, 0x74, 0x24, 0x18, 0x48, 0x8b, 0x54,
|
||||
+ /*176*/0x24, 0x10, 0x48, 0x8b, 0x4c, 0x24, 0x08, 0x48,
|
||||
+ /*184*/0x8b, 0x04, 0x24, 0x48, 0x89, 0xdc, 0x48, 0x8b,
|
||||
+ /*192*/0x1c, 0x24, 0x48, 0x83, 0xc4, 0x18, 0xf2, 0x41,
|
||||
+ /*200*/0xff, 0xe3 };
|
||||
+ static struct pattern pat_xsave = {
|
||||
+ "amd64-xsave", 202, {{ 0,11 }, { 15,119 }, {138,64}, { 202,0 }} };
|
||||
+
|
||||
+ static UChar code_fxsave[] = {
|
||||
+ /* 0*/ 0x53, 0x48, 0x89, 0xe3, 0x48, 0x83, 0xe4, 0xf0,
|
||||
+ /* 8*/ 0x48, 0x81, 0xec, 0x40, 0x02, 0x00, 0x00, 0x48,
|
||||
+ /*16*/ 0x89, 0x04, 0x24, 0x48, 0x89, 0x4c, 0x24, 0x08,
|
||||
+ /*24*/ 0x48, 0x89, 0x54, 0x24, 0x10, 0x48, 0x89, 0x74,
|
||||
+ /*32*/ 0x24, 0x18, 0x48, 0x89, 0x7c, 0x24, 0x20, 0x4c,
|
||||
+ /*40*/ 0x89, 0x44, 0x24, 0x28, 0x4c, 0x89, 0x4c, 0x24,
|
||||
+ /*48*/ 0x30, 0x0f, 0xae, 0x44, 0x24, 0x40, 0x48, 0x8b,
|
||||
+ /*56*/ 0x73, 0x10, 0x48, 0x8b, 0x7b, 0x08,
|
||||
+ /*62*/ 0xe8, 0x00, 0x00, 0x00, 0x00, /* callq <_dl_fixup> */
|
||||
+ /*67*/ 0x49, 0x89, 0xc3, 0x0f, 0xae,
|
||||
+ /*72*/ 0x4c, 0x24, 0x40, 0x4c, 0x8b, 0x4c, 0x24, 0x30,
|
||||
+ /*80*/ 0x4c, 0x8b, 0x44, 0x24, 0x28, 0x48, 0x8b, 0x7c,
|
||||
+ /*88*/ 0x24, 0x20, 0x48, 0x8b, 0x74, 0x24, 0x18, 0x48,
|
||||
+ /*96*/ 0x8b, 0x54, 0x24, 0x10, 0x48, 0x8b, 0x4c, 0x24,
|
||||
+ /*104*/0x08, 0x48, 0x8b, 0x04, 0x24, 0x48, 0x89, 0xdc,
|
||||
+ /*112*/0x48, 0x8b, 0x1c, 0x24, 0x48, 0x83, 0xc4, 0x18,
|
||||
+ /*120*/0xf2, 0x41, 0xff, 0xe3 };
|
||||
+ static struct pattern pat_fxsave = {
|
||||
+ "amd64-fxsave", 124, {{ 0,63 }, { 67,57 }, { 124,0 }} };
|
||||
+
|
||||
if ((VG_(strncmp)(obj->name, "/lib/ld", 7) != 0) &&
|
||||
- (VG_(strncmp)(obj->name, "/lib64/ld", 9) != 0)) return False;
|
||||
- return check_code(obj, code, &pat);
|
||||
+ (VG_(strncmp)(obj->name, "/lib64/ld", 9) != 0) &&
|
||||
+ (VG_(strncmp)(obj->name, "/usr/lib/ld", 11) != 0) &&
|
||||
+ (VG_(strncmp)(obj->name, "/usr/lib64/ld", 13) != 0)) return False;
|
||||
+ Bool pat_p = check_code(obj, code, &pat);
|
||||
+ Bool pat_xsavec_p = check_code(obj, code_xsavec, &pat_xsavec);
|
||||
+ Bool pat_xsave_p = check_code(obj, code_xsave, &pat_xsave);
|
||||
+ Bool pat_fxsave_p = check_code(obj, code_fxsave, &pat_fxsave);
|
||||
+ if (pat_p || pat_xsavec_p || pat_xsave_p || pat_fxsave_p) return True;
|
||||
#endif
|
||||
|
||||
/* For other platforms, no patterns known */
|
||||
@@ -254,7 +351,7 @@ obj_node* new_obj_node(DebugInfo* di, obj_node* next)
|
||||
i++;
|
||||
}
|
||||
|
||||
- if (runtime_resolve_addr == 0) search_runtime_resolve(obj);
|
||||
+ if (runtime_resolve_addrs == 0) search_runtime_resolve(obj);
|
||||
|
||||
return obj;
|
||||
}
|
||||
@@ -490,6 +587,7 @@ fn_node* CLG_(get_fn_node)(BB* bb)
|
||||
DebugInfo* di;
|
||||
UInt line_num;
|
||||
fn_node* fn;
|
||||
+ Int i;
|
||||
|
||||
/* fn from debug info is idempotent for a BB */
|
||||
if (bb->fn) return bb->fn;
|
||||
@@ -538,12 +636,14 @@ fn_node* CLG_(get_fn_node)(BB* bb)
|
||||
}
|
||||
if (0 == VG_(strcmp)(fnname, "_exit") && !exit_bb)
|
||||
exit_bb = bb;
|
||||
-
|
||||
- if (runtime_resolve_addr &&
|
||||
- (bb_addr(bb) >= runtime_resolve_addr) &&
|
||||
- (bb_addr(bb) < runtime_resolve_addr + runtime_resolve_length)) {
|
||||
- /* BB in runtime_resolve found by code check; use this name */
|
||||
- fnname = "_dl_runtime_resolve";
|
||||
+
|
||||
+ for (i = 0; i < runtime_resolve_addrs; i++) {
|
||||
+ if ((bb_addr(bb) >= runtime_resolve_addr[i]) &&
|
||||
+ (bb_addr(bb) < runtime_resolve_addr[i] + runtime_resolve_length[i])) {
|
||||
+ /* BB in runtime_resolve found by code check; use this name */
|
||||
+ fnname = "_dl_runtime_resolve";
|
||||
+ break;
|
||||
+ }
|
||||
}
|
||||
|
||||
/* get fn_node struct for this function */
|
@ -1,117 +0,0 @@
|
||||
commit f326d68d762edf4b0e9604daa446b6f8ca25725a
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Sun Jul 26 22:40:22 2020 +0200
|
||||
|
||||
epoll_ctl warns for uninitialized padding on non-amd64 64bit arches
|
||||
|
||||
struct vki_epoll_event is packed on x86_64, but not on other 64bit
|
||||
arches. This means that on 64bit arches there can be padding in the
|
||||
epoll_event struct. Seperately the data field is only used by user
|
||||
space (which might not set the data field if it doesn't need to).
|
||||
|
||||
Only check the events field on epoll_ctl. But assume both events
|
||||
and data are both written to by epoll_[p]wait (exclude padding).
|
||||
|
||||
https://bugs.kde.org/show_bug.cgi?id=422623
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
|
||||
index 5b5b7eee6..929a4d9af 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-linux.c
|
||||
@@ -2099,8 +2099,29 @@ PRE(sys_epoll_ctl)
|
||||
SARG1, ( ARG2<3 ? epoll_ctl_s[ARG2] : "?" ), SARG3, ARG4);
|
||||
PRE_REG_READ4(long, "epoll_ctl",
|
||||
int, epfd, int, op, int, fd, struct vki_epoll_event *, event);
|
||||
- if (ARG2 != VKI_EPOLL_CTL_DEL)
|
||||
- PRE_MEM_READ( "epoll_ctl(event)", ARG4, sizeof(struct vki_epoll_event) );
|
||||
+ if (ARG2 != VKI_EPOLL_CTL_DEL) {
|
||||
+ /* Just check the events field, the data field is for user space and
|
||||
+ unused by the kernel. */
|
||||
+ struct vki_epoll_event *event = (struct vki_epoll_event *) ARG4;
|
||||
+ PRE_MEM_READ( "epoll_ctl(event)", (Addr) &event->events,
|
||||
+ sizeof(__vki_u32) );
|
||||
+ }
|
||||
+}
|
||||
+
|
||||
+/* RES event records have been written (exclude padding). */
|
||||
+static void epoll_post_helper ( ThreadId tid, SyscallArgs* arrghs,
|
||||
+ SyscallStatus* status )
|
||||
+{
|
||||
+ vg_assert(SUCCESS);
|
||||
+ if (RES > 0) {
|
||||
+ Int i;
|
||||
+ struct vki_epoll_event **events = (struct vki_epoll_event**)(Addr)ARG2;
|
||||
+ for (i = 0; i < RES; i++) {
|
||||
+ /* Assume both events and data are set (data is user space only). */
|
||||
+ POST_FIELD_WRITE(events[i]->events);
|
||||
+ POST_FIELD_WRITE(events[i]->data);
|
||||
+ }
|
||||
+ }
|
||||
}
|
||||
|
||||
PRE(sys_epoll_wait)
|
||||
@@ -2111,13 +2132,12 @@ PRE(sys_epoll_wait)
|
||||
PRE_REG_READ4(long, "epoll_wait",
|
||||
int, epfd, struct vki_epoll_event *, events,
|
||||
int, maxevents, int, timeout);
|
||||
+ /* Assume all (maxevents) events records should be (fully) writable. */
|
||||
PRE_MEM_WRITE( "epoll_wait(events)", ARG2, sizeof(struct vki_epoll_event)*ARG3);
|
||||
}
|
||||
POST(sys_epoll_wait)
|
||||
{
|
||||
- vg_assert(SUCCESS);
|
||||
- if (RES > 0)
|
||||
- POST_MEM_WRITE( ARG2, sizeof(struct vki_epoll_event)*RES ) ;
|
||||
+ epoll_post_helper (tid, arrghs, status);
|
||||
}
|
||||
|
||||
PRE(sys_epoll_pwait)
|
||||
@@ -2130,15 +2150,14 @@ PRE(sys_epoll_pwait)
|
||||
int, epfd, struct vki_epoll_event *, events,
|
||||
int, maxevents, int, timeout, vki_sigset_t *, sigmask,
|
||||
vki_size_t, sigsetsize);
|
||||
+ /* Assume all (maxevents) events records should be (fully) writable. */
|
||||
PRE_MEM_WRITE( "epoll_pwait(events)", ARG2, sizeof(struct vki_epoll_event)*ARG3);
|
||||
if (ARG5)
|
||||
PRE_MEM_READ( "epoll_pwait(sigmask)", ARG5, sizeof(vki_sigset_t) );
|
||||
}
|
||||
POST(sys_epoll_pwait)
|
||||
{
|
||||
- vg_assert(SUCCESS);
|
||||
- if (RES > 0)
|
||||
- POST_MEM_WRITE( ARG2, sizeof(struct vki_epoll_event)*RES ) ;
|
||||
+ epoll_post_helper (tid, arrghs, status);
|
||||
}
|
||||
|
||||
PRE(sys_eventfd)
|
||||
commit b74f9f23c8758c77367f18368ea95baa858544cb
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Tue Aug 18 23:58:55 2020 +0200
|
||||
|
||||
Fix epoll_ctl setting of array event and data fields.
|
||||
|
||||
Fix for https://bugs.kde.org/show_bug.cgi?id=422623 in commit ecf5ba119
|
||||
epoll_ctl warns for uninitialized padding on non-amd64 64bit arches
|
||||
contained a bug. A pointer to an array is not a pointer to a pointer to
|
||||
an array. Found by a Fedora user:
|
||||
https://bugzilla.redhat.com/show_bug.cgi?id=1844778#c10
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
|
||||
index 0850487e9..3f488795a 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-linux.c
|
||||
@@ -2115,11 +2115,11 @@ static void epoll_post_helper ( ThreadId tid, SyscallArgs* arrghs,
|
||||
vg_assert(SUCCESS);
|
||||
if (RES > 0) {
|
||||
Int i;
|
||||
- struct vki_epoll_event **events = (struct vki_epoll_event**)(Addr)ARG2;
|
||||
+ struct vki_epoll_event *events = (struct vki_epoll_event*)(Addr)ARG2;
|
||||
for (i = 0; i < RES; i++) {
|
||||
/* Assume both events and data are set (data is user space only). */
|
||||
- POST_FIELD_WRITE(events[i]->events);
|
||||
- POST_FIELD_WRITE(events[i]->data);
|
||||
+ POST_FIELD_WRITE(events[i].events);
|
||||
+ POST_FIELD_WRITE(events[i].data);
|
||||
}
|
||||
}
|
||||
}
|
@ -1,27 +0,0 @@
|
||||
commit ba73f8d2ebe4b5fe8163ee5ab806f0e50961ebdf
|
||||
Author: Andreas Arnez <arnez@linux.ibm.com>
|
||||
Date: Tue Nov 3 18:17:30 2020 +0100
|
||||
|
||||
Bug 428648 - s390x: Force 12-bit amode for vector loads in isel
|
||||
|
||||
Similar to Bug 417452, where the instruction selector sometimes attempted
|
||||
to generate vector stores with a 20-bit displacement, the same problem has
|
||||
now been reported with vector loads.
|
||||
|
||||
The problem is caused in s390_isel_vec_expr_wrk(), where the addressing
|
||||
mode is generated with s390_isel_amode() instead of
|
||||
s390_isel_amode_short(). This is fixed.
|
||||
|
||||
diff --git a/VEX/priv/host_s390_isel.c b/VEX/priv/host_s390_isel.c
|
||||
index 2f80dd850..134f3eb6f 100644
|
||||
--- a/VEX/priv/host_s390_isel.c
|
||||
+++ b/VEX/priv/host_s390_isel.c
|
||||
@@ -3741,7 +3741,7 @@ s390_isel_vec_expr_wrk(ISelEnv *env, IRExpr *expr)
|
||||
/* --------- LOAD --------- */
|
||||
case Iex_Load: {
|
||||
HReg dst = newVRegV(env);
|
||||
- s390_amode *am = s390_isel_amode(env, expr->Iex.Load.addr);
|
||||
+ s390_amode *am = s390_isel_amode_short(env, expr->Iex.Load.addr);
|
||||
|
||||
if (expr->Iex.Load.end != Iend_BE)
|
||||
goto irreducible;
|
File diff suppressed because it is too large
Load Diff
@ -1,201 +0,0 @@
|
||||
commit a53adb79711ccfc76a4ee32b20253045cdab55c7
|
||||
Author: Mark Wielaard <mark@klomp.org>
|
||||
Date: Mon Jul 27 16:36:17 2020 +0200
|
||||
|
||||
Handle linux syscalls sched_getattr and sched_setattr
|
||||
|
||||
The only "special" thing about these syscalls is that the given
|
||||
struct sched_attr determines its own size for future expansion.
|
||||
|
||||
Original fix by "ISHIKAWA,chiaki" <ishikawa@yk.rim.or.jp>
|
||||
|
||||
https://bugs.kde.org/show_bug.cgi?id=369029
|
||||
|
||||
diff --git a/coregrind/m_syswrap/priv_syswrap-linux.h b/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
index cdc73c1e6..eb0b320ca 100644
|
||||
--- a/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
+++ b/coregrind/m_syswrap/priv_syswrap-linux.h
|
||||
@@ -227,6 +227,8 @@ DECL_TEMPLATE(linux, sys_fremovexattr);
|
||||
// syscalls.
|
||||
DECL_TEMPLATE(linux, sys_sched_setparam);
|
||||
DECL_TEMPLATE(linux, sys_sched_getparam);
|
||||
+DECL_TEMPLATE(linux, sys_sched_setattr);
|
||||
+DECL_TEMPLATE(linux, sys_sched_getattr);
|
||||
DECL_TEMPLATE(linux, sys_sched_setscheduler);
|
||||
DECL_TEMPLATE(linux, sys_sched_getscheduler);
|
||||
DECL_TEMPLATE(linux, sys_sched_yield);
|
||||
diff --git a/coregrind/m_syswrap/syswrap-amd64-linux.c b/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
index 28d90135a..d6f3eb910 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-amd64-linux.c
|
||||
@@ -846,9 +846,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINX_(__NR_process_vm_writev, sys_process_vm_writev),// 311
|
||||
LINX_(__NR_kcmp, sys_kcmp), // 312
|
||||
LINX_(__NR_finit_module, sys_finit_module), // 313
|
||||
-// LIN__(__NR_sched_setattr, sys_ni_syscall), // 314
|
||||
-
|
||||
-// LIN__(__NR_sched_getattr, sys_ni_syscall), // 315
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 314
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 315
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 316
|
||||
// LIN__(__NR_seccomp, sys_ni_syscall), // 317
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 318
|
||||
diff --git a/coregrind/m_syswrap/syswrap-arm-linux.c b/coregrind/m_syswrap/syswrap-arm-linux.c
|
||||
index 579542785..70700e53f 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-arm-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-arm-linux.c
|
||||
@@ -1009,6 +1009,8 @@ static SyscallTableEntry syscall_main_table[] = {
|
||||
LINXY(__NR_process_vm_readv, sys_process_vm_readv), // 376
|
||||
LINX_(__NR_process_vm_writev, sys_process_vm_writev),// 377
|
||||
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 380
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 381
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 382
|
||||
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 384
|
||||
diff --git a/coregrind/m_syswrap/syswrap-arm64-linux.c b/coregrind/m_syswrap/syswrap-arm64-linux.c
|
||||
index 81e01456f..acca02442 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-arm64-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-arm64-linux.c
|
||||
@@ -806,8 +806,8 @@ static SyscallTableEntry syscall_main_table[] = {
|
||||
LINX_(__NR_process_vm_writev, sys_process_vm_writev), // 271
|
||||
LINX_(__NR_kcmp, sys_kcmp), // 272
|
||||
LINX_(__NR_finit_module, sys_finit_module), // 273
|
||||
- // (__NR_sched_setattr, sys_ni_syscall), // 274
|
||||
- // (__NR_sched_getattr, sys_ni_syscall), // 275
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 274
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 275
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 276
|
||||
// (__NR_seccomp, sys_ni_syscall), // 277
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 278
|
||||
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
|
||||
index 5b5b7eee6..56be3032d 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-linux.c
|
||||
@@ -3677,6 +3677,41 @@ POST(sys_sched_getparam)
|
||||
POST_MEM_WRITE( ARG2, sizeof(struct vki_sched_param) );
|
||||
}
|
||||
|
||||
+PRE(sys_sched_setattr)
|
||||
+{
|
||||
+ struct vki_sched_attr *attr;
|
||||
+ PRINT("sched_setattr ( %ld, %#" FMT_REGWORD "x, %#"
|
||||
+ FMT_REGWORD "x )", SARG1, ARG2, ARG3 );
|
||||
+ PRE_REG_READ3(long, "sched_setattr",
|
||||
+ vki_pid_t, pid, struct sched_attr *, p, unsigned int, flags);
|
||||
+ /* We need to be able to read at least the size field. */
|
||||
+ PRE_MEM_READ( "sched_setattr(attr->size)", ARG2, sizeof(vki_uint32_t) );
|
||||
+ attr = (struct vki_sched_attr *)(Addr)ARG2;
|
||||
+ if (ML_(safe_to_deref)(attr,sizeof(vki_uint32_t)))
|
||||
+ PRE_MEM_READ( "sched_setattr(attr)", (Addr)attr, attr->size);
|
||||
+}
|
||||
+
|
||||
+PRE(sys_sched_getattr)
|
||||
+{
|
||||
+ struct vki_sched_attr *attr;
|
||||
+ PRINT("sched_getattr ( %ld, %#" FMT_REGWORD "x, %ld, %#"
|
||||
+ FMT_REGWORD "x )", SARG1, ARG2, ARG3, ARG4 );
|
||||
+ PRE_REG_READ4(long, "sched_getattr",
|
||||
+ vki_pid_t, pid, struct sched_attr *, p,
|
||||
+ unsigned int, size, unsigned int, flags);
|
||||
+ /* We need to be able to read at least the size field. */
|
||||
+ PRE_MEM_READ( "sched_setattr(attr->size)", ARG2, sizeof(vki_uint32_t) );
|
||||
+ /* And the kernel needs to be able to write to the whole struct size. */
|
||||
+ attr = (struct vki_sched_attr *)(Addr)ARG2;
|
||||
+ if (ML_(safe_to_deref)(attr,sizeof(vki_uint32_t)))
|
||||
+ PRE_MEM_WRITE( "sched_setattr(attr)", (Addr)attr, attr->size);
|
||||
+}
|
||||
+POST(sys_sched_getattr)
|
||||
+{
|
||||
+ struct vki_sched_attr *attr = (struct vki_sched_attr *)(Addr)ARG2;
|
||||
+ POST_MEM_WRITE( (Addr)attr, attr->size );
|
||||
+}
|
||||
+
|
||||
PRE(sys_sched_getscheduler)
|
||||
{
|
||||
PRINT("sys_sched_getscheduler ( %ld )", SARG1);
|
||||
diff --git a/coregrind/m_syswrap/syswrap-ppc32-linux.c b/coregrind/m_syswrap/syswrap-ppc32-linux.c
|
||||
index eed12a1bc..c19cb9e0e 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-ppc32-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-ppc32-linux.c
|
||||
@@ -1016,6 +1016,9 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINXY(__NR_process_vm_readv, sys_process_vm_readv), // 351
|
||||
LINX_(__NR_process_vm_writev, sys_process_vm_writev),// 352
|
||||
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 355
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 356
|
||||
+
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 359
|
||||
LINXY(__NR_memfd_create, sys_memfd_create), // 360
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-ppc64-linux.c b/coregrind/m_syswrap/syswrap-ppc64-linux.c
|
||||
index d58200b49..b6422a765 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-ppc64-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-ppc64-linux.c
|
||||
@@ -998,6 +998,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINXY(__NR_process_vm_readv, sys_process_vm_readv), // 351
|
||||
LINX_(__NR_process_vm_writev, sys_process_vm_writev),// 352
|
||||
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 355
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 356
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 357
|
||||
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 359
|
||||
diff --git a/coregrind/m_syswrap/syswrap-s390x-linux.c b/coregrind/m_syswrap/syswrap-s390x-linux.c
|
||||
index a0a330aa2..3427fee16 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-s390x-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-s390x-linux.c
|
||||
@@ -825,8 +825,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINX_(__NR_kcmp, sys_kcmp), // 343
|
||||
// ?????(__NR_finit_module, ), // 344
|
||||
|
||||
-// ?????(__NR_sched_setattr, ), // 345
|
||||
-// ?????(__NR_sched_getattr, ), // 346
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 345
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 346
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 347
|
||||
// ?????(__NR_seccomp, ), // 348
|
||||
LINXY(__NR_getrandom, sys_getrandom), // 349
|
||||
diff --git a/coregrind/m_syswrap/syswrap-x86-linux.c b/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
index 332ed0bf2..b59d96f37 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-x86-linux.c
|
||||
@@ -1580,8 +1580,8 @@ static SyscallTableEntry syscall_table[] = {
|
||||
LINX_(__NR_kcmp, sys_kcmp), // 349
|
||||
|
||||
// LIN__(__NR_finit_module, sys_ni_syscall), // 350
|
||||
-// LIN__(__NR_sched_setattr, sys_ni_syscall), // 351
|
||||
-// LIN__(__NR_sched_getattr, sys_ni_syscall), // 352
|
||||
+ LINX_(__NR_sched_setattr, sys_sched_setattr), // 351
|
||||
+ LINXY(__NR_sched_getattr, sys_sched_getattr), // 352
|
||||
LINX_(__NR_renameat2, sys_renameat2), // 353
|
||||
// LIN__(__NR_seccomp, sys_ni_syscall), // 354
|
||||
|
||||
diff --git a/include/vki/vki-linux.h b/include/vki/vki-linux.h
|
||||
index 75b583165..ef93b9258 100644
|
||||
--- a/include/vki/vki-linux.h
|
||||
+++ b/include/vki/vki-linux.h
|
||||
@@ -410,6 +410,23 @@ struct vki_sched_param {
|
||||
int sched_priority;
|
||||
};
|
||||
|
||||
+struct vki_sched_attr {
|
||||
+ vki_uint32_t size;
|
||||
+ vki_uint32_t sched_policy;
|
||||
+ vki_uint64_t sched_flags;
|
||||
+
|
||||
+ /* SCHED_NORMAL, SCHED_BATCH */
|
||||
+ vki_int32_t sched_nice;
|
||||
+
|
||||
+ /* SCHED_FIFO, SCHED_RR */
|
||||
+ vki_uint32_t sched_priority;
|
||||
+
|
||||
+ /* SCHED_DEADLINE */
|
||||
+ vki_uint64_t sched_runtime;
|
||||
+ vki_uint64_t sched_deadline;
|
||||
+ vki_uint64_t sched_period;
|
||||
+};
|
||||
+
|
||||
#define VKI_TASK_COMM_LEN 16
|
||||
|
||||
//----------------------------------------------------------------------
|
21
SOURCES/valgrind-3.17.0-clone-parent-res.patch
Normal file
21
SOURCES/valgrind-3.17.0-clone-parent-res.patch
Normal file
@ -0,0 +1,21 @@
|
||||
commit e08a82991a9b9dc87c13f2b89273f25f97d14baf
|
||||
Author: Tom Hughes <tom@compton.nu>
|
||||
Date: Tue Apr 6 22:44:36 2021 +0100
|
||||
|
||||
Only process clone results in the parent thread
|
||||
|
||||
Fixes BZ#423963
|
||||
|
||||
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
|
||||
index 5ae4e6613..c59d8ee26 100644
|
||||
--- a/coregrind/m_syswrap/syswrap-linux.c
|
||||
+++ b/coregrind/m_syswrap/syswrap-linux.c
|
||||
@@ -940,7 +940,7 @@ PRE(sys_clone)
|
||||
("Valgrind does not support general clone().");
|
||||
}
|
||||
|
||||
- if (SUCCESS) {
|
||||
+ if (SUCCESS && RES != 0) {
|
||||
if (ARG_FLAGS & (VKI_CLONE_PARENT_SETTID | VKI_CLONE_PIDFD))
|
||||
POST_MEM_WRITE(ARG3, sizeof(Int));
|
||||
if (ARG_FLAGS & (VKI_CLONE_CHILD_SETTID | VKI_CLONE_CHILD_CLEARTID))
|
30
SOURCES/valgrind-3.17.0-debuginfod.patch
Normal file
30
SOURCES/valgrind-3.17.0-debuginfod.patch
Normal file
@ -0,0 +1,30 @@
|
||||
commit 93104368952c37268da724231487058ea3eaf1dc
|
||||
Author: Tom Hughes <tom@compton.nu>
|
||||
Date: Thu May 20 17:16:06 2021 +0100
|
||||
|
||||
Don't look for separate debuginfo if the image has a .debug_info section
|
||||
|
||||
Fixes BZ#435908
|
||||
|
||||
diff --git a/coregrind/m_debuginfo/readelf.c b/coregrind/m_debuginfo/readelf.c
|
||||
index b0f062ddc..e424e3e7e 100644
|
||||
--- a/coregrind/m_debuginfo/readelf.c
|
||||
+++ b/coregrind/m_debuginfo/readelf.c
|
||||
@@ -2879,13 +2879,15 @@ Bool ML_(read_elf_debug_info) ( struct _DebugInfo* di )
|
||||
/* Look for a build-id */
|
||||
HChar* buildid = find_buildid(mimg, False, False);
|
||||
|
||||
- /* Look for a debug image that matches either the build-id or
|
||||
+ /* If we don't have a .debug_info section in the main image then
|
||||
+ look for a debug image that matches either the build-id or
|
||||
the debuglink-CRC32 in the main image. If the main image
|
||||
doesn't contain either of those then this won't even bother
|
||||
to try looking. This looks in all known places, including
|
||||
the --extra-debuginfo-path if specified and on the
|
||||
--debuginfo-server if specified. */
|
||||
- if (buildid != NULL || debuglink_escn.img != NULL) {
|
||||
+ if (debug_info_escn.img == NULL &&
|
||||
+ (buildid != NULL || debuglink_escn.img != NULL)) {
|
||||
/* Do have a debuglink section? */
|
||||
if (debuglink_escn.img != NULL) {
|
||||
UInt crc_offset
|
1712
SOURCES/valgrind-3.17.0-ppc64-isa-3.1-tests.patch
Normal file
1712
SOURCES/valgrind-3.17.0-ppc64-isa-3.1-tests.patch
Normal file
File diff suppressed because it is too large
Load Diff
1720
SOURCES/valgrind-3.17.0-ppc64-isa-3.1.patch
Normal file
1720
SOURCES/valgrind-3.17.0-ppc64-isa-3.1.patch
Normal file
File diff suppressed because it is too large
Load Diff
2283
SOURCES/valgrind-3.17.0-s390-prep.patch
Normal file
2283
SOURCES/valgrind-3.17.0-s390-prep.patch
Normal file
File diff suppressed because it is too large
Load Diff
46
SOURCES/valgrind-3.17.0-s390-z13-vec-fix.patch
Normal file
46
SOURCES/valgrind-3.17.0-s390-z13-vec-fix.patch
Normal file
@ -0,0 +1,46 @@
|
||||
commit 124ae6cfa303f0cc71ffd685620cb57c4f8f02bb
|
||||
Author: Andreas Arnez <arnez@linux.ibm.com>
|
||||
Date: Mon Jun 7 14:01:53 2021 +0200
|
||||
|
||||
s390x: Don't emit "vector or with complement" on z13
|
||||
|
||||
The z/Architecture instruction "vector or with complement" (VOC) can be
|
||||
used as an optimization to combine "vector or" with "vector nor". This is
|
||||
exploited in Valgrind since commit 6c1cb1a0128b00858b973e. However, VOC
|
||||
requires the vector-enhancements facility 1, which is not installed on a
|
||||
z13 CPU. Thus Valgrind can now run into SIGILL on z13 when trying to
|
||||
execute vector string instructions.
|
||||
|
||||
Fix this by suppressing the VOC optimization unless the
|
||||
vector-enhancements facility 1 is recognized on the host.
|
||||
|
||||
diff --git a/VEX/priv/host_s390_isel.c b/VEX/priv/host_s390_isel.c
|
||||
index ee20c6711..15ca92a6b 100644
|
||||
--- a/VEX/priv/host_s390_isel.c
|
||||
+++ b/VEX/priv/host_s390_isel.c
|
||||
@@ -4102,14 +4102,17 @@ s390_isel_vec_expr_wrk(ISelEnv *env, IRExpr *expr)
|
||||
case Iop_OrV128:
|
||||
size = 16;
|
||||
vec_binop = S390_VEC_OR;
|
||||
- if (arg1->tag == Iex_Unop && arg1->Iex.Unop.op == Iop_NotV128) {
|
||||
- IRExpr* orig_arg1 = arg1;
|
||||
- arg1 = arg2;
|
||||
- arg2 = orig_arg1->Iex.Unop.arg;
|
||||
- vec_binop = S390_VEC_ORC;
|
||||
- } else if (arg2->tag == Iex_Unop && arg2->Iex.Unop.op == Iop_NotV128) {
|
||||
- arg2 = arg2->Iex.Unop.arg;
|
||||
- vec_binop = S390_VEC_ORC;
|
||||
+ if (s390_host_has_vxe) {
|
||||
+ if (arg1->tag == Iex_Unop && arg1->Iex.Unop.op == Iop_NotV128) {
|
||||
+ IRExpr* orig_arg1 = arg1;
|
||||
+ arg1 = arg2;
|
||||
+ arg2 = orig_arg1->Iex.Unop.arg;
|
||||
+ vec_binop = S390_VEC_ORC;
|
||||
+ } else if (arg2->tag == Iex_Unop &&
|
||||
+ arg2->Iex.Unop.op == Iop_NotV128) {
|
||||
+ arg2 = arg2->Iex.Unop.arg;
|
||||
+ vec_binop = S390_VEC_ORC;
|
||||
+ }
|
||||
}
|
||||
goto Iop_VV_wrk;
|
||||
|
2413
SOURCES/valgrind-3.17.0-s390-z15.patch
Normal file
2413
SOURCES/valgrind-3.17.0-s390-z15.patch
Normal file
File diff suppressed because it is too large
Load Diff
54
SOURCES/valgrind-3.17.0-s390_insn_as_string.patch
Normal file
54
SOURCES/valgrind-3.17.0-s390_insn_as_string.patch
Normal file
@ -0,0 +1,54 @@
|
||||
commit 45873298ff2d17accc65654d64758360616aade5
|
||||
Author: Andreas Arnez <arnez@linux.ibm.com>
|
||||
Date: Tue Mar 30 18:10:43 2021 +0200
|
||||
|
||||
s390x: Add missing UNOP insns to s390_insn_as_string
|
||||
|
||||
Some unary operator insns are not handled by s390_insn_as_string(). If
|
||||
they are encountered while the appropriate trace flag is set, a vpanic
|
||||
occurs. Fix this: add handling for the missing insns.
|
||||
|
||||
diff --git a/VEX/priv/host_s390_defs.c b/VEX/priv/host_s390_defs.c
|
||||
index 8762975b2..6e0734ae0 100644
|
||||
--- a/VEX/priv/host_s390_defs.c
|
||||
+++ b/VEX/priv/host_s390_defs.c
|
||||
@@ -7860,12 +7860,24 @@ s390_insn_as_string(const s390_insn *insn)
|
||||
op = "v-vunpacku";
|
||||
break;
|
||||
|
||||
- case S390_VEC_FLOAT_NEG:
|
||||
- op = "v-vfloatneg";
|
||||
+ case S390_VEC_ABS:
|
||||
+ op = "v-vabs";
|
||||
break;
|
||||
|
||||
- case S390_VEC_FLOAT_SQRT:
|
||||
- op = "v-vfloatsqrt";
|
||||
+ case S390_VEC_COUNT_LEADING_ZEROES:
|
||||
+ op = "v-vclz";
|
||||
+ break;
|
||||
+
|
||||
+ case S390_VEC_COUNT_TRAILING_ZEROES:
|
||||
+ op = "v-vctz";
|
||||
+ break;
|
||||
+
|
||||
+ case S390_VEC_COUNT_ONES:
|
||||
+ op = "v-vpopct";
|
||||
+ break;
|
||||
+
|
||||
+ case S390_VEC_FLOAT_NEG:
|
||||
+ op = "v-vfloatneg";
|
||||
break;
|
||||
|
||||
case S390_VEC_FLOAT_ABS:
|
||||
@@ -7876,6 +7888,10 @@ s390_insn_as_string(const s390_insn *insn)
|
||||
op = "v-vfloatnabs";
|
||||
break;
|
||||
|
||||
+ case S390_VEC_FLOAT_SQRT:
|
||||
+ op = "v-vfloatsqrt";
|
||||
+ break;
|
||||
+
|
||||
default:
|
||||
goto fail;
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
|
||||
Summary: Tool for finding memory management bugs in programs
|
||||
Name: %{?scl_prefix}valgrind
|
||||
Version: 3.16.0
|
||||
Release: 4%{?dist}
|
||||
Version: 3.17.0
|
||||
Release: 5%{?dist}
|
||||
Epoch: 1
|
||||
License: GPLv2+
|
||||
URL: http://www.valgrind.org/
|
||||
@ -83,42 +83,74 @@ Patch2: valgrind-3.9.0-helgrind-race-supp.patch
|
||||
# Make ld.so supressions slightly less specific.
|
||||
Patch3: valgrind-3.9.0-ldso-supp.patch
|
||||
|
||||
# We want all executables and libraries in libexec instead of lib
|
||||
# so they are only available for valgrind usage itself and so the
|
||||
# same directory is used independent of arch.
|
||||
Patch4: valgrind-3.16.0-pkglibexecdir.patch
|
||||
|
||||
# Add some stack-protector
|
||||
Patch5: valgrind-3.16.0-some-stack-protector.patch
|
||||
Patch4: valgrind-3.16.0-some-stack-protector.patch
|
||||
|
||||
# Add some -Wl,z,now.
|
||||
Patch6: valgrind-3.16.0-some-Wl-z-now.patch
|
||||
Patch5: valgrind-3.16.0-some-Wl-z-now.patch
|
||||
|
||||
# KDE#422677 PPC sync instruction L field should only be 2 bits in ISA 3.0
|
||||
Patch7: valgrind-3.16.0-ppc-L-field.patch
|
||||
# Upstream commits that provide additional ppc64le ISA 3.1 support
|
||||
# commit 3cc0232c46a5905b4a6c2fbd302b58bf5f90b3d5
|
||||
# PPC64: ISA 3.1 VSX PCV Generate Operations
|
||||
# commit 078f89e99b6f62e043f6138c6a7ae238befc1f2a
|
||||
# PPC64: Reduced-Precision bfloat16 Outer Product & Format Conversion Operations
|
||||
# commit e09fdaf569b975717465ed8043820d0198d4d47d
|
||||
# PPC64: Reduced-Precision: Missing Integer-based Outer Product Operations
|
||||
Patch6: valgrind-3.17.0-ppc64-isa-3.1.patch
|
||||
|
||||
# KDE#422715 x86: vex: the `impossible' happened: expr_is_guardable
|
||||
Patch8: valgrind-3.16.0-387-float.patch
|
||||
# Upstream commits that provide extra tests for ppc64le ISA 3.1 support
|
||||
# commit c8fa838be405d7ac43035dcf675bf490800c26ec
|
||||
# Reduced Precision bfloat16 outer product tests
|
||||
# commit 4bcc6c8a97c10c4dd41b35bd3b3035ec4037d524
|
||||
# VSX Permute Control Vector Generate Operation tests.
|
||||
# commit c589b652939655090c005a982a71f50c489fb5ce
|
||||
# Reduced precision Missing Integer based outer tests
|
||||
Patch7: valgrind-3.17.0-ppc64-isa-3.1-tests.patch
|
||||
|
||||
# KDE#422174 unhandled instruction bytes: 0x48 0xE9 (REX prefix JMP instr)
|
||||
Patch9: valgrind-3.16.1-REX-prefix-JMP.patch
|
||||
# commit 45873298ff2d17accc65654d64758360616aade5
|
||||
# s390x: Add missing UNOP insns to s390_insn_as_string
|
||||
Patch8: valgrind-3.17.0-s390_insn_as_string.patch
|
||||
|
||||
# KDE#422623 epoll_ctl warns for uninit padding on non-amd64 64bit arches
|
||||
Patch10: valgrind-3.16.1-epoll.patch
|
||||
# KDE#435908 Don't look for separate debuginfo if image already has .debug_info
|
||||
Patch9: valgrind-3.17.0-debuginfod.patch
|
||||
|
||||
# KDE#369029 handle linux syscalls sched_getattr and sched_setattr
|
||||
Patch11: valgrind-3.16.1-sched_getsetattr.patch
|
||||
# KDE#423963 Only process clone results in the parent thread
|
||||
Patch10: valgrind-3.17.0-clone-parent-res.patch
|
||||
|
||||
# KDE#415293 Incorrect call-graph tracking due to new _dl_runtime_resolve*
|
||||
Patch12: valgrind-3.16.1-dl_runtime_resolve.patch
|
||||
# commit d74a637206ef5532ccd2ccb2e31ee2762f184e60
|
||||
# Bug 433863 - s390x: Remove memcheck test cases for cs, cds, and csg
|
||||
# commit 18ddcc47c951427efd3b790ba2481159b9bd1598
|
||||
# s390x: Support "expensive" comparisons Iop_ExpCmpNE32/64
|
||||
# commit 5db3f929c43bf46f4707178706cfe90f43acdd19
|
||||
# s390x: Add convenience function mkV128()
|
||||
# commit e78bd78d3043729033b426218ab8c6dae9c51e96
|
||||
# Bug 434296 - s390x: Rework IR conversion of VSTRC, VFAE, and VFEE
|
||||
# commit 4f17a067c4f8245c05611d6e8aa36e8841bab376
|
||||
# Bug 434296 - s390x: Rework IR conversion of VFENE
|
||||
# commit 9bd78ebd8bb5cd4ebb3f081ceba46836cc485551
|
||||
# Bug 434296 - s390x: Rework IR conversion of VISTR
|
||||
# commit 32312d588b77c5b5b5a0145bb0cc6f795b447790
|
||||
# Bug 434296 - s390x: Add memcheck test cases for vector string insns
|
||||
# commit a0bb049ace14ab52d386bb1d49a399f39eec4986
|
||||
# s390x: Improve handling of amodes without base register
|
||||
# commit fd935e238d907d9c523a311ba795077d95ad6912
|
||||
# s390x: Rework insn "v-vdup" and add "v-vrep"
|
||||
# commit 6c1cb1a0128b00858b973ef9344e12d6ddbaaf57
|
||||
# s390x: Add support for emitting "vector or with complement"
|
||||
# commit 0bd4263326b2d48f782339a9bbe1a069c7de45c7
|
||||
# s390x: Fix/optimize Iop_64HLtoV128
|
||||
# commit cae5062b05b95e0303b1122a0ea9aadc197e4f0a
|
||||
# s390x: Add missing stdout.exp for vector string memcheck test
|
||||
Patch11: valgrind-3.17.0-s390-prep.patch
|
||||
|
||||
# KDE#432387 - s390x: z15 instructions support
|
||||
Patch12: valgrind-3.17.0-s390-z15.patch
|
||||
|
||||
# KDE#428648 s390_emit_load_mem panics due to 20-bit offset for vector load
|
||||
Patch15: valgrind-3.16.1-s390_emit_load_mem.patch
|
||||
|
||||
# KDE#133812 s390x: z14 vector instructions not implemented
|
||||
Patch16: valgrind-3.16.1-s390x-z14-vector.patch
|
||||
# commit 124ae6cfa303f0cc71ffd685620cb57c4f8f02bb
|
||||
# s390x: Don't emit "vector or with complement" on z13
|
||||
Patch13: valgrind-3.17.0-s390-z13-vec-fix.patch
|
||||
|
||||
BuildRequires: make
|
||||
BuildRequires: glibc-devel
|
||||
|
||||
%if %{build_openmpi}
|
||||
@ -148,6 +180,16 @@ BuildRequires: autoconf
|
||||
# For make check validating the documentation
|
||||
BuildRequires: docbook-dtds
|
||||
|
||||
# configure might use which
|
||||
BuildRequires: which
|
||||
|
||||
# For testing debuginfod-find
|
||||
%if 0%{?fedora} > 29 || 0%{?rhel} > 7
|
||||
BuildRequires: elfutils-debuginfod-client
|
||||
# For using debuginfod at runtime
|
||||
Recommends: elfutils-debuginfod-client
|
||||
%endif
|
||||
|
||||
%{?scl:Requires:%scl_runtime}
|
||||
|
||||
# We need to fixup selinux file context when doing a scl build.
|
||||
@ -245,23 +287,24 @@ Valgrind User Manual for details.
|
||||
%patch1 -p1
|
||||
%patch2 -p1
|
||||
%patch3 -p1
|
||||
%patch4 -p1
|
||||
|
||||
# Old rhel gcc doesn't have -fstack-protector-strong.
|
||||
%if 0%{?fedora} || 0%{?rhel} >= 7
|
||||
%patch4 -p1
|
||||
%patch5 -p1
|
||||
%patch6 -p1
|
||||
%endif
|
||||
|
||||
%patch6 -p1
|
||||
%patch7 -p1
|
||||
|
||||
%patch8 -p1
|
||||
%patch9 -p1
|
||||
%patch10 -p1
|
||||
%patch11 -p1
|
||||
%patch12 -p1
|
||||
|
||||
%patch15 -p1
|
||||
%patch16 -p1
|
||||
%patch11 -p1
|
||||
touch memcheck/tests/s390x/vistr.stdout.exp
|
||||
%patch12 -p1
|
||||
%patch13 -p1
|
||||
|
||||
%build
|
||||
|
||||
@ -450,6 +493,7 @@ echo ===============END TESTING===============
|
||||
%{_includedir}/valgrind/drd.h
|
||||
%{_includedir}/valgrind/helgrind.h
|
||||
%{_includedir}/valgrind/memcheck.h
|
||||
%{_includedir}/valgrind/dhat.h
|
||||
%{_libdir}/pkgconfig/valgrind.pc
|
||||
|
||||
%if %{build_tools_devel}
|
||||
@ -482,6 +526,18 @@ fi
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Thu Jun 24 2021 Mark Wielaard <mjw@redhat.com> - 3.17.0-5
|
||||
- Add valgrind-3.17.0-s390-prep.patch
|
||||
- Add valgrind-3.17.0-s390-z15.patch
|
||||
- Add valgrind-3.17.0-s390-z13-vec-fix.patch
|
||||
|
||||
* Thu Jun 3 2021 Mark Wielaard <mjw@redhat.com> - 3.17.0-4
|
||||
- Update to upstream 3.17.0 final.
|
||||
- Add valgrind-3.17.0-ppc64-isa-3.1{,tests}.patch
|
||||
- Add valgrind-3.17.0-s390_insn_as_string.patch
|
||||
- Add valgrind-3.17.0-debuginfod.patch
|
||||
- Add valgrind-3.17.0-clone-parent-res.patch
|
||||
|
||||
* Fri Dec 4 2020 Mark Wielaard <mjw@redhat.com> - 3.16.0-4
|
||||
- Add valgrind-3.16.1-s390_emit_load_mem.patch
|
||||
- Add valgrind-3.16.1-s390x-z14-vector.patch
|
||||
|
Loading…
Reference in New Issue
Block a user