[plasma-browser-integration] [Bug 488653] plasma-browser-integration-host crashes in Firefox 127.0 after upgrade to Plasma 6.1

2024-07-09 Thread Shantanu Tushar
https://bugs.kde.org/show_bug.cgi?id=488653

Shantanu Tushar  changed:

   What|Removed |Added

 CC||shant...@kde.org

-- 
You are receiving this mail because:
You are watching all bug changes.

[Elisa] [Bug 474711] (in)dependent muting

2023-09-19 Thread Shantanu Tushar
https://bugs.kde.org/show_bug.cgi?id=474711

Shantanu Tushar  changed:

   What|Removed |Added

Product|plasma-mediacenter  |Elisa
   Assignee|shant...@kde.org|matthieu_gall...@yahoo.fr
  Component|MediaPlayer |general

-- 
You are receiving this mail because:
You are watching all bug changes.

[plasmashell] [Bug 448751] Media Player Closes When Switching Songs in Music Playlists

2022-01-19 Thread Shantanu Tushar
https://bugs.kde.org/show_bug.cgi?id=448751

Shantanu Tushar  changed:

   What|Removed |Added

Version|5.23.5  |5.23.4
 CC||shant...@kde.org

-- 
You are receiving this mail because:
You are watching all bug changes.

[plasmashell] [Bug 448751] Media Player Closes When Switching Songs in Music Playlists

2022-01-19 Thread Shantanu Tushar
https://bugs.kde.org/show_bug.cgi?id=448751

Shantanu Tushar  changed:

   What|Removed |Added

 CC||plasma-b...@kde.org
  Component|MediaPlayer |Media Player
Product|plasma-mediacenter  |plasmashell
   Target Milestone|--- |1.0
Version|unspecified |5.23.5
   Assignee|shant...@kde.org|k...@privat.broulik.de

-- 
You are receiving this mail because:
You are watching all bug changes.

[frameworks-kwallet] [Bug 421856] KWallet does not accept correct password

2020-06-16 Thread Shantanu Tushar
https://bugs.kde.org/show_bug.cgi?id=421856

--- Comment #11 from Shantanu Tushar  ---
I can confirm that an upgrade to libkf5wallet5 version
5.71.0-0xneon+18.04+bionic+build49u fixed the problem.

-- 
You are receiving this mail because:
You are watching all bug changes.

[frameworks-kwallet] [Bug 421856] KWallet does not accept correct password

2020-06-15 Thread Shantanu Tushar
https://bugs.kde.org/show_bug.cgi?id=421856

Shantanu Tushar  changed:

   What|Removed |Added

 CC||shant...@kde.org

--- Comment #8 from Shantanu Tushar  ---
I hit the same issue when I upgraded Neon User Edition today. I can reproduce
the issue in A VM as well:
1. Install Neon from an older ISO (I used neon-user-20190919-1119.iso)
2. Setup kdewallet with one application (chromium in my case)
3. sudo apt full-upgrade
4. kdewallet no longer accepts my password (I had used empty password for this
test)

Upgrade log (grep'd to kwallet and upgrade):

2020-06-16 10:17:54 upgrade libkf5wallet-bin:amd64
5.62.0-0xneon+18.04+bionic+build28 5.71.0-0xneon+18.04+bionic+build47
2020-06-16 10:17:55 upgrade libkf5wallet5:amd64
5.62.0-0xneon+18.04+bionic+build28 5.71.0-0xneon+18.04+bionic+build47
2020-06-16 10:17:55 upgrade libkf5wallet-data:all
5.62.0-0xneon+18.04+bionic+build28 5.71.0-0xneon+18.04+bionic+build47
2020-06-16 10:17:57 upgrade libkwalletbackend5-5:amd64
5.62.0-0xneon+18.04+bionic+build28 5.71.0-0xneon+18.04+bionic+build47

-- 
You are receiving this mail because:
You are watching all bug changes.

[Ruqola] [Bug 391425] Missing support for copying message text

2020-05-12 Thread Shantanu Tushar
https://bugs.kde.org/show_bug.cgi?id=391425

Shantanu Tushar  changed:

   What|Removed |Added

 Status|CONFIRMED   |RESOLVED
 Resolution|--- |FIXED

--- Comment #3 from Shantanu Tushar  ---
Fixed by
https://commits.kde.org/ruqola/62017fc7c778fbc549bc0343bc650761e12f5b8b

-- 
You are receiving this mail because:
You are watching all bug changes.

[Ruqola] [Bug 391425] Missing support for copying message text

2020-05-12 Thread Shantanu Tushar
https://bugs.kde.org/show_bug.cgi?id=391425

Shantanu Tushar  changed:

   What|Removed |Added

 CC||shant...@kde.org

--- Comment #2 from Shantanu Tushar  ---
I have submitted a patch for this at https://phabricator.kde.org/D29690

Has been few years since I submitted a patch to a KDE project, I hope I didn't
miss something obvious in the review request :)

-- 
You are receiving this mail because:
You are watching all bug changes.

[kdeplasma-addons] [Bug 353819] Yellow notes have barely visible icons under Breeze Dark

2019-03-12 Thread Tushar Kant
https://bugs.kde.org/show_bug.cgi?id=353819

Tushar Kant  changed:

   What|Removed |Added

 CC||tusharkan...@gmail.com

--- Comment #10 from Tushar Kant  ---
Hi! Just chiming in to say it's still here in 5.15.2

-- 
You are receiving this mail because:
You are watching all bug changes.

[kwin] [Bug 404279] New: Plasma crashed after using the show desktop button

2019-02-12 Thread Tushar Pandey
https://bugs.kde.org/show_bug.cgi?id=404279

Bug ID: 404279
   Summary: Plasma crashed after using the show desktop button
   Product: kwin
   Version: 5.14.5
  Platform: Archlinux Packages
OS: Linux
Status: REPORTED
  Keywords: drkonqi
  Severity: crash
  Priority: NOR
 Component: general
  Assignee: kwin-bugs-n...@kde.org
  Reporter: tusharpande...@gmail.com
  Target Milestone: ---

Application: kwin_x11 (5.14.5)

Qt Version: 5.12.1
Frameworks Version: 5.55.0
Operating System: Linux 4.20.7-arch1-1-ARCH x86_64
Distribution (Platform): Archlinux Packages

-- Information about the crash:
I had atom, konsole, okular open all snapped to sides and corners

The crash can be reproduced every time.

-- Backtrace:
Application: KWin (kwin_x11), signal: Aborted
Using host libthread_db library "/usr/lib/libthread_db.so.1".
[Current thread is 1 (Thread 0x7f3079a2e840 (LWP 1084))]

Thread 9 (Thread 0x7f2fc9d8f700 (LWP 20596)):
#0  0x7f3082882d16 in ppoll () at /usr/lib/libc.so.6
#1  0x7f3081428bab in qt_safe_poll(pollfd*, unsigned long, timespec const*)
() at /usr/lib/libQt5Core.so.5
#2  0x7f308142a08b in
QEventDispatcherUNIX::processEvents(QFlags) ()
at /usr/lib/libQt5Core.so.5
#3  0x7f30813d5b2c in
QEventLoop::exec(QFlags) () at
/usr/lib/libQt5Core.so.5
#4  0x7f3081219569 in QThread::exec() () at /usr/lib/libQt5Core.so.5
#5  0x7f307f9b6969 in  () at /usr/lib/libQt5Qml.so.5
#6  0x7f308121a96c in  () at /usr/lib/libQt5Core.so.5
#7  0x7f30801f9a9d in start_thread () at /usr/lib/libpthread.so.0
#8  0x7f308288db23 in clone () at /usr/lib/libc.so.6

Thread 8 (Thread 0x7f3070c59700 (LWP 16015)):
#0  0x7f3082882d16 in ppoll () at /usr/lib/libc.so.6
#1  0x7f3081428bab in qt_safe_poll(pollfd*, unsigned long, timespec const*)
() at /usr/lib/libQt5Core.so.5
#2  0x7f308142a08b in
QEventDispatcherUNIX::processEvents(QFlags) ()
at /usr/lib/libQt5Core.so.5
#3  0x7f30813d5b2c in
QEventLoop::exec(QFlags) () at
/usr/lib/libQt5Core.so.5
#4  0x7f3081219569 in QThread::exec() () at /usr/lib/libQt5Core.so.5
#5  0x7f307f9b6969 in  () at /usr/lib/libQt5Qml.so.5
#6  0x7f308121a96c in  () at /usr/lib/libQt5Core.so.5
#7  0x7f30801f9a9d in start_thread () at /usr/lib/libpthread.so.0
#8  0x7f308288db23 in clone () at /usr/lib/libc.so.6

Thread 7 (Thread 0x7f30729c4700 (LWP 7436)):
#0  0x7f3082882d16 in ppoll () at /usr/lib/libc.so.6
#1  0x7f3081428bab in qt_safe_poll(pollfd*, unsigned long, timespec const*)
() at /usr/lib/libQt5Core.so.5
#2  0x7f308142a08b in
QEventDispatcherUNIX::processEvents(QFlags) ()
at /usr/lib/libQt5Core.so.5
#3  0x7f30813d5b2c in
QEventLoop::exec(QFlags) () at
/usr/lib/libQt5Core.so.5
#4  0x7f3081219569 in QThread::exec() () at /usr/lib/libQt5Core.so.5
#5  0x7f307f9b6969 in  () at /usr/lib/libQt5Qml.so.5
#6  0x7f308121a96c in  () at /usr/lib/libQt5Core.so.5
#7  0x7f30801f9a9d in start_thread () at /usr/lib/libpthread.so.0
#8  0x7f308288db23 in clone () at /usr/lib/libc.so.6

Thread 6 (Thread 0x7f3061e58700 (LWP 1184)):
#0  0x7f30801ffafc in pthread_cond_wait@@GLIBC_2.3.2 () at
/usr/lib/libpthread.so.0
#1  0x7f3080d0428c in  () at /usr/lib/libQt5Script.so.5
#2  0x7f3080d042a9 in  () at /usr/lib/libQt5Script.so.5
#3  0x7f30801f9a9d in start_thread () at /usr/lib/libpthread.so.0
#4  0x7f308288db23 in clone () at /usr/lib/libc.so.6

Thread 5 (Thread 0x7f3062e5a700 (LWP 1174)):
#0  0x7f30801ffafc in pthread_cond_wait@@GLIBC_2.3.2 () at
/usr/lib/libpthread.so.0
#1  0x7f30633f6c84 in  () at /usr/lib/dri/i965_dri.so
#2  0x7f30633f69a8 in  () at /usr/lib/dri/i965_dri.so
#3  0x7f30801f9a9d in start_thread () at /usr/lib/libpthread.so.0
#4  0x7f308288db23 in clone () at /usr/lib/libc.so.6

Thread 4 (Thread 0x7f3071ec6700 (LWP 1140)):
#0  0x7f3082882d16 in ppoll () at /usr/lib/libc.so.6
#1  0x7f3081428bab in qt_safe_poll(pollfd*, unsigned long, timespec const*)
() at /usr/lib/libQt5Core.so.5
#2  0x7f308142a08b in
QEventDispatcherUNIX::processEvents(QFlags) ()
at /usr/lib/libQt5Core.so.5
#3  0x7f30813d5b2c in
QEventLoop::exec(QFlags) () at
/usr/lib/libQt5Core.so.5
#4  0x7f3081219569 in QThread::exec() () at /usr/lib/libQt5Core.so.5
#5  0x7f307f9b6969 in  () at /usr/lib/libQt5Qml.so.5
#6  0x7f308121a96c in  () at /usr/lib/libQt5Core.so.5
#7  0x7f30801f9a9d in start_thread () at /usr/lib/libpthread.so.0
#8  0x7f308288db23 in clone () at /usr/lib/libc.so.6

Thread 3 (Thread 0x7f3073bd5700 (LWP 1103)):
#0  0x7f3082882d16 in ppoll () at /usr/lib/libc.so.6
#1  0x7f3081428bab in qt_safe_poll(pollfd*, unsigned long, timespec const*)
() at /usr/lib/libQt5Core.so.5
#2  0x7f308142a08b in
QEventDispatcherUNIX::processEvents(QFlags) ()
at /usr/lib/libQt5Core.so.5
#3  0x7f30813d5b2c in
QEventLoop::exec(QFlags) () at
/usr/lib/libQt5Cor

[valgrind] [Bug 372861] Test pselect_alarm for Bug 359871 seg faults on RHEL 4

2017-03-06 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=372861

--- Comment #1 from Tushar  ---
The stack trace after commenting out lines 51 and 54 from the test code
pselect_alarm.c and running the compiled binary on RHEL 4 machine

cacofonix:/home/tdnair> /opt/gdb-7.9.1/bin/gdb pselect_alarm.EL4 -c
core.8357 
GNU gdb (GDB) 7.9.1
Copyright (C) 2015 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-unknown-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from pselect_alarm.EL4...done.

warning: core file may not match specified executable file.
[New LWP 8357]
[New LWP 8358]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/tls/libthread_db.so.1".
Core was generated by `./pselect_alarm.EL4'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00382b22e799 in sigprocmask () from /lib64/tls/libc.so.6
(gdb) where
#0  0x00382b22e799 in sigprocmask () from /lib64/tls/libc.so.6
#1  0x00382b2c3438 in pselect () from /lib64/tls/libc.so.6
#2  0x00400a2a in main () at pselect_alarm.c:52

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 373166] drd and helgrind will crash wth vex amd64->IR: unhandled instruction bytes 0xFF 0xFF 0x48 0x85 0xC0 0x74 0x8 0x4D 0x89 0xE7

2017-03-06 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=373166

--- Comment #13 from Tushar  ---
Julian,

Thanks for getting back. I tried to find out what is happening and didn't make
much headway.  The problem can be reliably reproduced on an RHEL 4 system.  So
if you want me to instrument something or if you have debug binary for me to
try,  I will be more than happy to do so

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 373166] drd and helgrind will crash wth vex amd64->IR: unhandled instruction bytes 0xFF 0xFF 0x48 0x85 0xC0 0x74 0x8 0x4D 0x89 0xE7

2016-12-21 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=373166

--- Comment #11 from Tushar  ---
Is the above information useful?

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 373166] drd and helgrind will crash wth vex amd64->IR: unhandled instruction bytes 0xFF 0xFF 0x48 0x85 0xC0 0x74 0x8 0x4D 0x89 0xE7

2016-12-09 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=373166

--- Comment #10 from Tushar  ---
Based on the crash information, I did disassemble the library in question
(/lib64/tls/libpthread-2.3.4.so) and looked at the instructions at the address
0x382BF0A2F0.  The instructions are

  382bf0a2d1:   e8 92 ab ff ff  callq  382bf04e68 
  382bf0a2d6:   49 83 fc ff cmp$0x,%r12
  382bf0a2da:   74 23   je 382bf0a2ff

  382bf0a2dc:   48 8d 15 3d fe ff fflea-0x1c3(%rip),%rdx#
382bf0a120 <__sem_search>
  382bf0a2e3:   48 8d 35 66 a0 10 00lea0x10a066(%rip),%rsi#
382c014350 <__sem_mappings>
  382bf0a2ea:   48 89 dfmov%rbx,%rdi
  382bf0a2ed:   e8 46 ad ff ff  callq  382bf05038 
  382bf0a2f2:   48 85 c0test   %rax,%rax
  382bf0a2f5:   74 08   je 382bf0a2ff

  382bf0a2f7:   4d 89 e7mov%r12,%r15
  382bf0a2fa:   e9 74 ff ff ff  jmpq   382bf0a273

  382bf0a2ff:   48 89 dfmov%rbx,%rdi
  382bf0a302:   e8 71 ad ff ff  callq  382bf05078 
  382bf0a307:   e9 67 ff ff ff  jmpq   382bf0a273

  382bf0a30c:   45 31 c9xor%r9d,%r9d
  382bf0a30f:   45 89 f0mov%r14d,%r8d

The thing that caught my attention is that data @ 0x382BF0A2F0 seems to be part
of  callq instruction @ 382bf0a2ed.  VEX seems to think it is the start of a
new instruction.

The disassembly of the test code (sem_open) itself at the are of interest is

  400aca:   ba f6 0d 40 00  mov$0x400df6,%edx
  400acf:   be 20 00 00 00  mov$0x20,%esi
  400ad4:   b8 00 00 00 00  mov$0x0,%eax
  400ad9:   e8 e2 fd ff ff  callq  4008c0 
  400ade:   48 8d 7d c0 lea-0x40(%rbp),%rdi
  400ae2:   b9 01 00 00 00  mov$0x1,%ecx
  400ae7:   ba 80 01 00 00  mov$0x180,%edx
  400aec:   be c0 00 00 00  mov$0xc0,%esi
  400af1:   b8 00 00 00 00  mov$0x0,%eax
  400af6:   e8 25 fe ff ff  callq  400920 
  400afb:   48 89 05 b6 07 20 00mov%rax,0x2007b6(%rip)#
6012b8 
  400b02:   48 83 3d ae 07 20 00cmpq   $0x0,0x2007ae(%rip)#
6012b8 
  400b09:   00
  400b0a:   75 24   jne400b30 
  400b0c:   48 8d 55 c0 lea-0x40(%rbp),%rdx
  400b10:   be 10 0e 40 00  mov$0x400e10,%esi
  400b15:   48 8b 3d 7c 07 20 00mov0x20077c(%rip),%rdi#
601298 
  400b1c:   b8 00 00 00 00  mov$0x0,%eax
  400b21:   e8 ea fd ff ff  callq  400910 



I hope this information helps

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 373166] drd and helgrind will crash wth vex amd64->IR: unhandled instruction bytes 0xFF 0xFF 0x48 0x85 0xC0 0x74 0x8 0x4D 0x89 0xE7

2016-12-08 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=373166

--- Comment #8 from Tushar  ---
Our computers are part of a $20+ million semiconductor capital equipment whose
annual maintenance contract itself runs into hundreds of thousands of dollars a
year.  So we can't drop support for legacy systems easily.  So it is very
relevant to us.

I can help with investigation and testing but some pointers would definitely
help.

To summarize my findings are

The crash only happens with 64 bit drd and helgrind test case.  memcheck is OK.
32 bit test cases have not problem with either of the checkers.

so I'm wondering if  this issue contained inside VEX or do the checkers also
have a role to play.  Am I on the right track with my thought process?

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 373166] drd and helgrind will crash wth vex amd64->IR: unhandled instruction bytes 0xFF 0xFF 0x48 0x85 0xC0 0x74 0x8 0x4D 0x89 0xE7

2016-12-07 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=373166

--- Comment #6 from Tushar  ---
Any help/suggestions on how to proceed?

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 373166] drd and helgrind will crash wth vex amd64->IR: unhandled instruction bytes 0xFF 0xFF 0x48 0x85 0xC0 0x74 0x8 0x4D 0x89 0xE7

2016-12-02 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=373166

--- Comment #5 from Tushar  ---
When running memcheck, this error does NOT occur.  Does VEX instrument
libraries differently depending on the checker used?  

The same problem persists in version 3.8.0 and 3.11.0

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 373166] drd and helgrind will crash wth vex amd64->IR: unhandled instruction bytes 0xFF 0xFF 0x48 0x85 0xC0 0x74 0x8 0x4D 0x89 0xE7

2016-12-01 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=373166

Tushar  changed:

   What|Removed |Added

  Component|drd |vex

--- Comment #4 from Tushar  ---
Thank you for pointing to the right component.  Since the error was happening
in the context of drd and helgrind, I picked those.

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 373166] drd and helgrind will crash wth vex amd64->IR: unhandled instruction bytes 0xFF 0xFF 0x48 0x85 0xC0 0x74 0x8 0x4D 0x89 0xE7

2016-12-01 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=373166

--- Comment #2 from Tushar  ---
This problem only seems to be happening with glibc 2.3.4 which is part of
RHEL4.
glibc 2.5 (RHEL5) and glibc 2.12 (RHEL 6) don't exhibit this problem

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 373166] drd and helgrind will crash wth vex amd64->IR: unhandled instruction bytes 0xFF 0xFF 0x48 0x85 0xC0 0x74 0x8 0x4D 0x89 0xE7

2016-12-01 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=373166

--- Comment #1 from Tushar  ---
cpuinfo

processor   : 0
vendor_id   : GenuineIntel
cpu family  : 6
model   : 15
model name  : Intel(R) Xeon(R) CPU   X5355  @ 2.66GHz
stepping: 7
cpu MHz : 2660.004
cache size  : 4096 KB
physical id : 0
siblings: 4
core id : 0
cpu cores   : 4
fpu : yes
fpu_exception   : yes
cpuid level : 10
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm syscall nx lm pni monitor
ds_cpl est tm2 cx16 xtpr lahf_lm
bogomips: 5323.68
clflush size: 64
cache_alignment : 64
address sizes   : 36 bits physical, 48 bits virtual
power management:

glibc version

glibc-2.3.4-2.57.x86_64

Running the tests outside valgrind produces no errors

Context form  /lib64/tls/libpthread-2.3.4.so

  382bf0a2d1:   e8 92 ab ff ff  callq  382bf04e68 
  382bf0a2d6:   49 83 fc ff cmp$0x,%r12
  382bf0a2da:   74 23   je 382bf0a2ff

  382bf0a2dc:   48 8d 15 3d fe ff fflea-0x1c3(%rip),%rdx#
382bf0a120 <__sem_search>
  382bf0a2e3:   48 8d 35 66 a0 10 00lea0x10a066(%rip),%rsi#
382c014350 <__sem_mappings>
  382bf0a2ea:   48 89 dfmov%rbx,%rdi
  382bf0a2ed:   e8 46 ad ff ff  callq  382bf05038 
  382bf0a2f2:   48 85 c0test   %rax,%rax
  382bf0a2f5:   74 08   je 382bf0a2ff

  382bf0a2f7:   4d 89 e7mov%r12,%r15
  382bf0a2fa:   e9 74 ff ff ff  jmpq   382bf0a273

  382bf0a2ff:   48 89 dfmov%rbx,%rdi
  382bf0a302:   e8 71 ad ff ff  callq  382bf05078 
  382bf0a307:   e9 67 ff ff ff  jmpq   382bf0a273

  382bf0a30c:   45 31 c9xor%r9d,%r9d
  382bf0a30f:   45 89 f0mov%r14d,%r8d

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 373166] New: drd and helgrind will crash wth vex amd64->IR: unhandled instruction bytes 0xFF 0xFF 0x48 0x85 0xC0 0x74 0x8 0x4D 0x89 0xE7

2016-12-01 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=373166

Bug ID: 373166
   Summary: drd and helgrind will crash wth vex amd64->IR:
unhandled instruction bytes 0xFF 0xFF 0x48 0x85 0xC0
0x74 0x8 0x4D 0x89 0xE7
   Product: valgrind
   Version: 3.12.0
  Platform: RedHat RPMs
OS: Linux
Status: UNCONFIRMED
  Severity: crash
  Priority: NOR
 Component: drd
  Assignee: bvanass...@acm.org
  Reporter: ntus...@yahoo.com
  Target Milestone: ---

The tests drd/tests/sem_open, sem_open2, sem_open3 and sem_open_traced all
crash with unhandled instruction error

==14999== drd, a thread error detector
==14999== Copyright (C) 2006-2015, and GNU GPL'd, by Bart Van Assche.
==14999== Using Valgrind-3.12.0 and LibVEX; rerun with -h for copyright info
==14999== Command: ./sem_open -m
==14999== 
vex amd64->IR: unhandled instruction bytes: 0xFF 0xFF 0x48 0x85 0xC0 0x74 0x8
0x4D 0x89 0xE7
vex amd64->IR:   REX=0 REX.W=0 REX.R=0 REX.X=0 REX.B=0
vex amd64->IR:   VEX=0 VEX.L=0 VEX.n=0x0 ESC=NONE
vex amd64->IR:   PFX.66=0 PFX.F2=0 PFX.F3=0
==14999== valgrind: Unrecognised instruction at address 0x382bf0a2f0.
==14999==at 0x382BF0A2F0: check_add_mapping (in
/lib64/tls/libpthread-2.3.4.so)
==14999==by 0x4A14EDF: sem_open_intercept (drd_pthread_intercepts.c:1391)
==14999==by 0x4A14EDF: sem_open (drd_pthread_intercepts.c:1398)
==14999==by 0x400AFA: main (sem_open.c:63)
==14999== Your program just tried to execute an instruction that Valgrind
==14999== did not recognise.  There are two possible reasons for this.
==14999== 1. Your program has a bug and erroneously jumped to a non-code
==14999==location.  If you are running Memcheck and you just saw a
==14999==warning about a bad jump, it's probably your program's fault.
==14999== 2. The instruction is legitimate but Valgrind doesn't handle it,
==14999==i.e. it's Valgrind's fault.  If you think this is the case or
==14999==you are not sure, please let us know and we'll try to fix it.
==14999== Either way, Valgrind will now raise a SIGILL signal which will
==14999== probably kill your program.
==14999== 
==14999== Process terminating with default action of signal 4 (SIGILL): dumping
core
==14999==  Illegal opcode at address 0x382BF0A2F0
==14999==at 0x382BF0A2F0: check_add_mapping (in
/lib64/tls/libpthread-2.3.4.so)
==14999==by 0x4A14EDF: sem_open_intercept (drd_pthread_intercepts.c:1391)
==14999==by 0x4A14EDF: sem_open (drd_pthread_intercepts.c:1398)
==14999==by 0x400AFA: main (sem_open.c:63)
==14999== 
==14999== For counts of detected and suppressed errors, rerun with: -v
==14999== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
Illegal instruction

-- 
You are receiving this mail because:
You are watching all bug changes.

[valgrind] [Bug 372861] New: Test pselect_alarm for Bug 359871 seg faults on RHEL 4

2016-11-23 Thread Tushar
https://bugs.kde.org/show_bug.cgi?id=372861

Bug ID: 372861
   Summary: Test pselect_alarm for Bug 359871 seg faults on RHEL 4
   Product: valgrind
   Version: 3.12 SVN
  Platform: Other
OS: Linux
Status: UNCONFIRMED
  Severity: normal
  Priority: NOR
 Component: general
  Assignee: jsew...@acm.org
  Reporter: ntus...@yahoo.com
  Target Milestone: ---

Linux cacofonix 2.6.9-89.0.9.ELsmp #1 SMP Wed Aug 19 08:06:10 EDT 2009 x86_64
x86_64 x86_64 GNU/Linux

The crash occurs at line

assert(pselect(0, NULL, NULL, NULL, NULL, (sigset_t *)12) == -1);

RHEL 4 does not handle bad address by returning EFAULT

If the goal is to have pselect fail, can the test be replace with 

assert(pselect(-1, NULL, NULL, NULL, NULL, NULL) == -1);
assert(errno == EINVAL);

These changes work on RHEL 4, 5 and 6.

-- 
You are receiving this mail because:
You are watching all bug changes.