[valgrind] [Bug 455168] New: want/need more 'const' in Valgrind source code

2022-06-11 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=455168 Bug ID: 455168 Summary: want/need more 'const' in Valgrind source code Product: valgrind Version: 3.20 GIT Platform: Other OS: Linux Status: REPORTED Severity: n

[valgrind] [Bug 455168] want/need more 'const' in Valgrind source code

2022-06-13 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=455168 --- Comment #2 from John Reiser --- (In reply to Paul Floyd from comment #1) > I get quite a few new warnings (there were perhaps 5 before, mostly void > abuse and for x86) Please specify the compiler name and version, and the command-line para

[valgrind] [Bug 455168] want/need more 'const' in Valgrind source code

2022-06-14 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=455168 --- Comment #4 from John Reiser --- (In reply to Paul Floyd from comment #1) > I get quite a few new warnings (there were perhaps 5 before, mostly void > abuse and for x86) When I process those warning lines using the shell pipeline sort |

[valgrind] [Bug 381326] recognize re-convergent fanout before complaining about Uninitialized

2024-06-23 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381326 --- Comment #11 from John Reiser --- This comment is to confirm that the bug still exists today 2024-06-24, 7 years after original filing. Actually there are two bugs: 1) In the True branch after a test for Equality (==) then the Defined bits

[valgrind] [Bug 487862] New: memcheck does not believe that bytes on new pages are Defined by brk() system call

2024-05-31 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=487862 Bug ID: 487862 Summary: memcheck does not believe that bytes on new pages are Defined by brk() system call Classification: Developer tools Product: valgrind Version: 3.23.0 Pl

[valgrind] [Bug 487862] memcheck does not believe that bytes on new pages are Defined by brk() system call

2024-06-06 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=487862 --- Comment #2 from John Reiser --- (In reply to Paul Floyd from comment #1) > brk() is fairly old, removed from posix accordingly to the Linux manpage. > Increasingly I see it getting removed from platforms. In this case "old"

[valgrind] [Bug 487862] memcheck does not believe that bytes on new pages are Defined by brk() system call

2024-06-07 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=487862 --- Comment #5 from John Reiser --- (In reply to Mark Wielaard from comment #4) > So it seems reasonable for memcheck to assume the area exposed by brk() is > undefined. That assumption is incorrect for new pages on Linux, and there are applic

[valgrind] [Bug 487862] memcheck does not believe that bytes on new pages are Defined by brk() system call

2024-06-09 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=487862 --- Comment #8 from John Reiser --- (In reply to Mark Wielaard from comment #6) > BTW it seems this whole discussion is duplicated in the comments of > memcheck/mc_main.c mc_post_clo_init () >// - The current inaccuracy has caused

[valgrind] [Bug 384729] __libc_freeres inhibits cross-platform valgrind

2020-11-09 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=384729 --- Comment #9 from John Reiser --- Yes, the patch works, just like the handling of __gnu_cxx::__freeres(). Tested on armv7hl. -- You are receiving this mail because: You are watching all bug changes.

[valgrind] [Bug 472402] memcheck "make tests" build fails: filter_sized_delete missing

2023-07-20 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=472402 --- Comment #6 from John Reiser --- (In reply to Paul Floyd from comment #5) > I always run autogen.sh whenever a Makefile.am changes So the Makefile has two missing dependencies: all: Makefile Makefile: Makefile.am ./autogen.sh and t

[valgrind] [Bug 472402] memcheck "make tests" build fails: filter_sized_delete missing

2023-07-24 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=472402 --- Comment #8 from John Reiser --- (In reply to Paul Floyd from comment #7) > Here is what GCC's Makefile contains Yes, valgrind should use essentially the same setup. In ancient times (pre-git) there was a conceptual barrier that Makefil

[valgrind] [Bug 476277] valgrind not able to startup in arm 64board using 32bit tool chain

2023-11-04 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=476277 John Reiser changed: What|Removed |Added CC||jrei...@bitwagon.com --- Comment #1 from John

[valgrind] [Bug 472402] New: memcheck "make tests" build fails: filter_sized_delete missing

2023-07-19 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=472402 Bug ID: 472402 Summary: memcheck "make tests" build fails: filter_sized_delete missing Classification: Developer tools Product: valgrind Version: unspecified Platform: Compile

[valgrind] [Bug 472405] New: RFE: give Note about instructions on current hardware that are not supported by VEX

2023-07-19 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=472405 Bug ID: 472405 Summary: RFE: give Note about instructions on current hardware that are not supported by VEX Classification: Developer tools Product: valgrind Version: unspecified

[valgrind] [Bug 472402] memcheck "make tests" build fails: filter_sized_delete missing

2023-07-19 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=472402 --- Comment #2 from John Reiser --- Yes, this is part of a persistent local git clone, and I did run "./autogen.sh" when I did the original clone. I have run several successful "git pull; make -j4" since then, over a span of seve

[valgrind] [Bug 472402] memcheck "make tests" build fails: filter_sized_delete missing

2023-07-19 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=472402 --- Comment #3 from John Reiser --- The problem no longer appears in: commit cb684b50e7d4d845b56abea72fd9b9925fed644e (HEAD -> master, origin/master, origin/HEAD) Date: Mon May 22 19:49:08 2023 +0200 after explicit "./autogen.sh"

[valgrind] [Bug 472402] memcheck "make tests" build fails: filter_sized_delete missing

2023-07-19 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=472402 --- Comment #4 from John Reiser --- (In reply to John Reiser from comment #3) > The problem no longer appears in: >commit cb684b50e7d4d845b56abea72fd9b9925fed644e (HEAD -> master, > origin/master, origin/HEAD) >Date: Mon May 2

[valgrind] [Bug 461855] New: (wine xsavec64) vex amd64->IR: unhandled instruction bytes: 0x48 0xF 0xC7 0xA1 0xC0 0x0 0x0 0x0 0x48 0xF

2022-11-14 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=461855 Bug ID: 461855 Summary: (wine xsavec64) vex amd64->IR: unhandled instruction bytes: 0x48 0xF 0xC7 0xA1 0xC0 0x0 0x0 0x0 0x48 0xF Classification: Developer tools Product: valgrind Versio

[valgrind] [Bug 461855] (wine xsavec64) vex amd64->IR: unhandled instruction bytes: 0x48 0xF 0xC7 0xA1 0xC0 0x0 0x0 0x0 0x48 0xF

2022-11-15 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=461855 --- Comment #2 from John Reiser --- Further investigation reveals that this bug may be invalid. Also, the original poster on the [valgrind-developers] mailing list omitted or did not emphasize important details. First, the OP used valgrind-3.15.0

[valgrind] [Bug 384729] __libc_freeres inhibits cross-platform valgrind

2019-05-11 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=384729 --- Comment #3 from John Reiser --- I hit this again today using valgrind-3.15.0 when the default libc on the target platform is glibc-2.29-12.fc30.aarch64 but the actual libc in the target application is from Android 28. __libc_freeres is not defined

[valgrind] [Bug 377006] valgrind/memcheck segfaults under certain kernel versions (amd64) but not others.

2019-10-31 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=377006 --- Comment #12 from John Reiser --- Please run "uname -a" then copy+paste the entire output, and label with the circumstances (3 cases: normal user, logged-in root, su from normal user to root). It's not obvious which kernels are b

[valgrind] [Bug 406349] New: Android runtime linker ignores DF_1_INTERPOSE in vgpreload_core-*

2019-04-08 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=406349 Bug ID: 406349 Summary: Android runtime linker ignores DF_1_INTERPOSE in vgpreload_core-* Product: valgrind Version: 3.14.0 Platform: Android OS: Linux

[valgrind] [Bug 368923] WARNING: unhandled arm64-linux syscall: 268 (setns)

2019-05-05 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=368923 John Reiser changed: What|Removed |Added CC||jrei...@bitwagon.com --- Comment #4 from John

[valgrind] [Bug 416436] Unrecognised instruction at address 0x1006037BD (__pthread_init.cold.2) macOS 10.15

2020-01-19 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=416436 John Reiser changed: What|Removed |Added CC||jrei...@bitwagon.com --- Comment #1 from John

[valgrind] [Bug 396001] New: unhandled instruction: 0xEC51 0x0F1E; ARMv7 libcrypto 'mrrc'

2018-06-29 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=396001 Bug ID: 396001 Summary: unhandled instruction: 0xEC51 0x0F1E; ARMv7 libcrypto 'mrrc' Product: valgrind Version: 3.13.0 Platform: Fedora RPMs OS: Linux

[valgrind] [Bug 344802] disInstr(arm): unhandled instruction: 0xEC510F1E

2018-06-29 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=344802 John Reiser changed: What|Removed |Added CC||jrei...@bitwagon.com --- Comment #15 from John

[valgrind] [Bug 396001] unhandled instruction: 0xEC51 0x0F1E; ARMv7 libcrypto 'mrrc'

2018-06-29 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=396001 John Reiser changed: What|Removed |Added Resolution|--- |DUPLICATE Status|UNCONFIRMED

[valgrind] [Bug 344802] disInstr(arm): unhandled instruction: 0xEC510F1E

2018-07-01 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=344802 --- Comment #16 from John Reiser --- (In reply to Matt Cowell from comment #13) > Created attachment 101694 [details] > Add decode for CNTVCT, CNTPCT, and CNTFRQ Today the patch now lives at https://bugsfiles.kde.org/attachment.cgi?id=101694 an

[valgrind] [Bug 344802] disInstr(arm): unhandled instruction: 0xEC510F1E

2018-07-01 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=344802 John Reiser changed: What|Removed |Added Attachment #101694|0 |1 is obsolete

[valgrind] [Bug 344802] disInstr(arm): unhandled instruction: 0xEC510F1E

2018-07-03 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=344802 John Reiser changed: What|Removed |Added Attachment #113695|0 |1 is obsolete

[valgrind] [Bug 390871] ELF debug info reader confused with multiple .rodata* sections

2018-07-16 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=390871 --- Comment #4 from John Reiser --- Created attachment 113979 --> https://bugs.kde.org/attachment.cgi?id=113979&action=edit .rodata*: aggregate multiple adjacent sections after alignment Revise (and obsolete) the previous patch because

[valgrind] [Bug 390871] ELF debug info reader confused with multiple .rodata* sections

2018-08-06 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=390871 --- Comment #6 from John Reiser --- I believe that this bug and revised patch still are valid. The intervening https://bugs.kde.org/show_bug.cgi?id=395682#c9 is a distinct issue regarding .rodata for multiple segments. That bug does not address the

[valgrind] [Bug 384230] vex x86->IR: unhandled instruction bytes: 0x67 0xE8 0xAB 0x68

2018-03-16 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=384230 John Reiser changed: What|Removed |Added CC||jrei...@bitwagon.com --- Comment #10 from John

[valgrind] [Bug 388084] New: armv7l Unrecognised instruction "bkpt" 0xE1200070

2017-12-20 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=388084 Bug ID: 388084 Summary: armv7l Unrecognised instruction "bkpt" 0xE1200070 Product: valgrind Version: 3.13.0 Platform: Fedora RPMs OS: Linux Status: UNCONFIRMED S

[valgrind] [Bug 388664] New: unhandled arm64-linux syscall: 117 (ptrace)

2018-01-07 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=388664 Bug ID: 388664 Summary: unhandled arm64-linux syscall: 117 (ptrace) Product: valgrind Version: 3.13.0 Platform: Fedora RPMs OS: Linux Status: UNCONFIRMED Severi

[valgrind] [Bug 388664] unhandled arm64-linux syscall: 117 (ptrace)

2018-01-07 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=388664 --- Comment #1 from John Reiser --- THe complete complaint is = (gdb) run Starting program: /usr/bin/date --2479-- WARNING: unhandled arm64-linux syscall: 117 --2479-- You may be able to write your own handler. --2479-- Read the file

[valgrind] [Bug 393023] New: callgrind_control risks using the wrong vgdb

2018-04-11 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=393023 Bug ID: 393023 Summary: callgrind_control risks using the wrong vgdb Product: valgrind Version: 3.13 SVN Platform: unspecified OS: Linux Status: UNCONFIRMED Seve

[valgrind] [Bug 353802] ELF debug info reader confused with multiple .rodata sections

2018-02-13 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=353802 --- Comment #10 from John Reiser --- This problem has re-appeared using GCC 8.x on Solaris 11.3 under valgrind git tip: commit dcb83cf846b529104cd528cd749b61f35deda476 Author: Rhys Kidd Date: Sun Feb 11 17:16:38 2018 -0500 The re-appearance

[valgrind] [Bug 353802] ELF debug info reader confused with multiple .rodata sections

2018-02-13 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=353802 --- Comment #11 from John Reiser --- Created attachment 110638 --> https://bugs.kde.org/attachment.cgi?id=110638&action=edit proposed workaround patch: read_elf_debug_info accepts contiguous .rodata* This patch compiles but is UNTESTED. --

[valgrind] [Bug 390871] New: ELF debug info reader confused with multiple .rodata* sections

2018-02-21 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=390871 Bug ID: 390871 Summary: ELF debug info reader confused with multiple .rodata* sections Product: valgrind Version: unspecified Platform: Other OS: Linux

[valgrind] [Bug 353802] ELF debug info reader confused with multiple .rodata sections

2018-02-21 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=353802 --- Comment #12 from John Reiser --- The re-appearance has been entered as separate bug report https://bugs.kde.org/show_bug.cgi?id=390871 at the request of Ivo Raisr. -- You are receiving this mail because: You are watching all bug changes.

[valgrind] [Bug 399087] memcheck escape from user code into memcheck itself via computed goto

2018-09-25 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=399087 --- Comment #1 from John Reiser --- Created attachment 115239 --> https://bugs.kde.org/attachment.cgi?id=115239&action=edit target program, compressed by upx -- You are receiving this mail because: You are watching all bug changes.

[valgrind] [Bug 399087] memcheck escape from user code into memcheck itself via computed goto

2018-09-25 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=399087 --- Comment #2 from John Reiser --- Created attachment 115240 --> https://bugs.kde.org/attachment.cgi?id=115240&action=edit console output of plain memcheck Note parameter --smc-check=all as an attempt to check carefully for non-stat

[valgrind] [Bug 399087] memcheck escape from user code into memcheck itself via computed goto

2018-09-25 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=399087 --- Comment #3 from John Reiser --- Created attachment 115241 --> https://bugs.kde.org/attachment.cgi?id=115241&action=edit console output with --trace-flags valgrind --trace-flags=1001 --trace-notbelow=108 ./foo 2>&1 | mor

[valgrind] [Bug 399087] New: memcheck escape from user code into memcheck itself via computed goto

2018-09-25 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=399087 Bug ID: 399087 Summary: memcheck escape from user code into memcheck itself via computed goto Product: valgrind Version: 3.13.0 Platform: Fedora RPMs OS: Linux

[valgrind] [Bug 399087] memcheck escape from user code into memcheck itself via computed goto

2018-09-25 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=399087 --- Comment #4 from John Reiser --- Executions were on Fedora 29 beta using valgrind-3.13.0-28.fc29.armv7hl.rpm. The same result was obtained using Fedora 28 (released, prior version of OS) with the same valgrind rpm. -- You are receiving this mail

[valgrind] [Bug 399087] memcheck escape from user code into memcheck itself via computed goto

2018-09-26 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=399087 --- Comment #7 from John Reiser --- The root cause is a symlink vulnerability! coregrind fails to do the right thing when the target executes int fd_i_am = open("/proc/self/exe", O_RDONLY); upx uses mmap(fd_i_am,) to replicate porti

[valgrind] [Bug 395434] New: valgrind XML output should setlinebuf() to facilitate online use

2018-06-15 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=395434 Bug ID: 395434 Summary: valgrind XML output should setlinebuf() to facilitate online use Product: valgrind Version: 3.14 SVN Platform: unspecified OS: Linux

[valgrind] [Bug 377006] valgrind/memcheck segfaults under certain kernel versions (amd64) but not others.

2017-03-06 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=377006 John Reiser changed: What|Removed |Added CC||jrei...@bitwagon.com --- Comment #5 from John

[valgrind] [Bug 385868] glibc ld.so _dl_runtime_resolve_avx_slow conditional jump warning

2017-10-20 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=385868 John Reiser changed: What|Removed |Added CC||jrei...@bitwagon.com --- Comment #4 from John

[valgrind] [Bug 384681] New: PUT(pc, ) should specialize to help debugging

2017-09-13 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=384681 Bug ID: 384681 Summary: PUT(pc, ) should specialize to help debugging Product: valgrind Version: 3.13 SVN Platform: Compiled Sources OS: Linux Status:

[valgrind] [Bug 384729] New: __libc_freeres inhibits cross-platform valgrind

2017-09-14 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=384729 Bug ID: 384729 Summary: __libc_freeres inhibits cross-platform valgrind Product: valgrind Version: 3.13.0 Platform: Fedora RPMs OS: Linux Status: UNCONFIRMED Sev

[valgrind] [Bug 384729] __libc_freeres inhibits cross-platform valgrind

2017-09-14 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=384729 --- Comment #1 from John Reiser --- If __libc_freeres is used by some library function that is invoked by vgpreload_core-arm-linux.so then vgpreload should implement such a function itself, with an implementation that does the explicit lookup and

[valgrind] [Bug 377006] valgrind/memcheck segfaults under certain kernel versions (amd64) but not others.

2017-03-12 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=377006 --- Comment #9 from John Reiser --- It looks to me like some part of the problem arises when memcheck is working on the driver for the video graphics card. This suggests a cause for non-determinism, and also a reason for different behavior on

[valgrind] [Bug 377966] New: disInstr(arm64): unhandled instruction 0xD50B7425

2017-03-22 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=377966 Bug ID: 377966 Summary: disInstr(arm64): unhandled instruction 0xD50B7425 Product: valgrind Version: 3.12.0 Platform: Fedora RPMs OS: Linux Status: UNCONFIRMED S

[valgrind] [Bug 377966] disInstr(arm64): unhandled instruction 0xD50B7425 (dc zva,)

2017-03-22 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=377966 John Reiser changed: What|Removed |Added Summary|disInstr(arm64): unhandled |disInstr(arm64): unhandled

[valgrind] [Bug 377966] disInstr(arm64): unhandled instruction 0xD50B7425 (dc zva,)

2017-03-23 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=377966 --- Comment #3 from John Reiser --- (In reply to Julian Seward from comment #1) > The main difficulty is to know how big the cache line is. The value (and validity) is reported by the instruction "mrs reg, dczid_el0". So valgrind coul

[valgrind] [Bug 383723] MacOS 10.12.x: UNKNOWN workq_ops option 128, and ud2 opcode

2017-08-21 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=383723 John Reiser changed: What|Removed |Added CC||jrei...@bitwagon.com --- Comment #1 from John

[valgrind] [Bug 383723] MacOS 10.12.x: UNKNOWN workq_ops option 128, and ud2 opcode

2017-09-01 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=383723 --- Comment #3 from John Reiser --- On 09/01/2017 09:18 AM, Andy wrote: > https://bugs.kde.org/show_bug.cgi?id=383723 > > --- Comment #2 from Andy --- > Is there anything else I can provide to help with this? I'm afraid actually >

[valgrind] [Bug 383723] MacOS 10.12.x: UNKNOWN workq_ops option 128, and ud2 opcode

2017-09-01 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=383723 --- Comment #5 from John Reiser --- The crash looks very similar to the 'ud2' diagnosed in the original Description. In particular, the offset 0xb50 is the same. This probably indicates that valgrind has more-or-less completely missed s

[valgrind] [Bug 383723] MacOS 10.12.x: UNKNOWN workq_ops option 128, and ud2 opcode

2017-09-02 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=383723 --- Comment #7 from John Reiser --- > dtrace: system integrity protection is on, some features will not be > available You must disable that system integrity protection (that's why the spawn/"execve"/whatever failed.) It'

[valgrind] [Bug 383723] MacOS 10.12.x: UNKNOWN workq_ops option 128, and ud2 opcode

2017-09-02 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=383723 --- Comment #9 from John Reiser --- > #if DARWIN_VERS >= DARWIN_10_11 > // NYI kevent_qos // 374 > #endif /* DARWIN_VERS >= DARWIN_10_11 */ Yes, that looks like a promising clue. You have now reached the p

[valgrind] [Bug 384442] New: ARM: bad pc in complaint if instruction changes pc

2017-09-06 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=384442 Bug ID: 384442 Summary: ARM: bad pc in complaint if instruction changes pc Product: valgrind Version: 3.13 SVN Platform: Compiled Sources OS: Linux Status: UNCONFIRMED

[valgrind] [Bug 384442] ARM: bad pc in complaint if instruction changes pc

2017-09-07 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=384442 --- Comment #1 from John Reiser --- Both problems can be solved by a special case for 'ldmdb' (LoaD Multiple registers, Decrementing the address Before each fetch). If either r15(==pc) or r13(==sp) is to be loaded, then assign the new

[valgrind] [Bug 384442] ARM: bad pc in complaint if instruction changes pc

2017-09-07 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=384442 --- Comment #2 from John Reiser --- Context: [valgrind-users] by Kacper Kowalski on 2017-08-31 and replies through the following week. * processor: 0 model name: ARMv7 Processor rev 10 (v7l) BogoMIPS: 132.00 Features: half thumb

[valgrind] [Bug 384442] ARM: bad pc in complaint if instruction changes pc

2017-09-07 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=384442 --- Comment #3 from John Reiser --- Here is the output from "--trace-flags=1000", condensed and commented: = (arm) 0x49BD90C: mov r12, r13 (arm) 0x49BD910: stmdb r13!, {0xDFF0} (arm) 0x49BD914: sub r11,

[valgrind] [Bug 381299] New: false uninit on new page via sbrk(n)

2017-06-16 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381299 Bug ID: 381299 Summary: false uninit on new page via sbrk(n) Product: valgrind Version: 3.13 SVN Platform: Compiled Sources OS: Linux Status: UNCONFIRMED Severit

[valgrind] [Bug 381299] false uninit on new page via sbrk(n)

2017-06-16 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381299 --- Comment #2 from John Reiser --- I believe that the test case takes appropriate care so that the memory read access via "*(int *)p2" is to a new page. The "rounded up", and always incrementing the brk(), and never decrementi

[valgrind] [Bug 381299] false uninit on new page via sbrk(n)

2017-06-16 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381299 John Reiser changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution

[valgrind] [Bug 381304] New: RFE: --track-origins=yes identifies system call source of Uninitialized value

2017-06-16 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381304 Bug ID: 381304 Summary: RFE: --track-origins=yes identifies system call source of Uninitialized value Product: valgrind Version: 3.13 SVN Platform: Other OS: Linux

[valgrind] [Bug 381326] New: recognize re-convergent fanout before complaining about Uninitialized

2017-06-17 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381326 Bug ID: 381326 Summary: recognize re-convergent fanout before complaining about Uninitialized Product: valgrind Version: 3.13 SVN Platform: Other OS: Linux

[valgrind] [Bug 381326] recognize re-convergent fanout before complaining about Uninitialized

2017-06-21 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381326 --- Comment #1 from John Reiser --- Using reasoning that is similar to that the NOT_EQUAL operator (not_equal in any bit position that is initialized, implies not_equal in the whole word, regardless of uninit bits in other positions), then the "

[valgrind] [Bug 381326] recognize re-convergent fanout before complaining about Uninitialized

2017-06-22 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381326 --- Comment #3 from John Reiser --- (In reply to Julian Seward from comment #2) > for (z=p; n; n--, z++) if (*z) *z=0; > > What is the point of this? Why not just assign zeroes unconditionally? > Is this some game w

[valgrind] [Bug 381326] recognize re-convergent fanout before complaining about Uninitialized

2017-06-22 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381326 --- Comment #4 from John Reiser --- (In reply to John Reiser from comment #1) More generally, when memcheck complains about uninit in a test for equality between variables, then the Valid bits should "cross-pollinate": if (a == b) { //

[valgrind] [Bug 381304] RFE: --track-origins=yes identifies system call source of Uninitialized value

2017-06-22 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381304 --- Comment #2 from John Reiser --- The system routines in musl libc (https://www.musl-libc.org/) are coded with the system call instruction as a common tail. The system call which produces uninit values is brk()/sbrk(), which libmusl invokes from

[valgrind] [Bug 381304] RFE: --track-origins=yes identifies system call source of Uninitialized value

2017-06-22 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381304 --- Comment #3 from John Reiser --- Another syscall that produces uninit is readlink(). The portion of the result buffer that is beyond the returned length, should be regarded as Uninit. There is no guarantee that the kernel avoids writing into any

[valgrind] [Bug 381304] RFE: --track-origins=yes identifies system call source of Uninitialized value

2017-06-22 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381304 --- Comment #4 from John Reiser --- read_length = read(fd, buf, buflen) should regard buf[read_length, buflen) as Uninit when there is no error. When there is an error, then ALL of buf[0, buflen) should be regarded as Uninit. This is particularly

[valgrind] [Bug 381304] RFE: --track-origins=yes identifies system call source of Uninitialized value

2017-06-22 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381304 --- Comment #5 from John Reiser --- (In reply to John Reiser from comment #3) > There is no guarantee that the kernel avoids writing into any > portion of the whole buffer, although all known implementations write only > an initial st

[valgrind] [Bug 382099] New: valgrind release archive is not maintained

2017-07-07 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=382099 Bug ID: 382099 Summary: valgrind release archive is not maintained Product: valgrind Version: 3.13 SVN Platform: Other OS: Linux Status: UNCONFIRMED Severity: no

[valgrind] [Bug 381326] recognize re-convergent fanout before complaining about Uninitialized

2017-07-23 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381326 --- Comment #7 from John Reiser --- (In reply to Julian Seward from comment #6) > In particular I am trying to figure out if this can somehow be used to avoid > the problems shown at > https://bugs.llvm.org//show_bug.cgi?id=12319 >

[valgrind] [Bug 381326] recognize re-convergent fanout before complaining about Uninitialized

2017-07-23 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381326 --- Comment #8 from John Reiser --- (In reply to Julian Seward from comment #5) > What's the underlying insight > here? In particular, why is it the case that knowing the two operands are > equal allows us to mark the operands as mor

[valgrind] [Bug 381326] recognize re-convergent fanout before complaining about Uninitialized

2017-07-23 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381326 --- Comment #9 from John Reiser --- (In reply to John Reiser from comment #8) > The underlying principle is that it can be useful to view "a bit is > initialized" as equivalent to "the cardinality of the set of possible

[valgrind] [Bug 381326] recognize re-convergent fanout before complaining about Uninitialized

2017-07-23 Thread John Reiser
https://bugs.kde.org/show_bug.cgi?id=381326 --- Comment #10 from John Reiser --- (In reply to John Reiser from comment #8) > The underlying principle is that it can be useful to view "a bit is > initialized" as equivalent to "the cardinality of the set of possible

[valgrind] [Bug 360752] raise the number of reserved fds in m_main.c from 10 to 12

2016-03-23 Thread John Reiser via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360752 John Reiser changed: What|Removed |Added CC||jrei...@bitwagon.com --- Comment #3 from John

[valgrind] [Bug 360752] raise the number of reserved fds in m_main.c from 10 to 12

2016-03-23 Thread John Reiser via KDE Bugzilla
https://bugs.kde.org/show_bug.cgi?id=360752 --- Comment #5 from John Reiser --- For psinfo, I see that it changes, so I guess that needs a permanent fd. For cmdline and auxv, it still looks to me as if the separate fd could be avoided nearly all the time, because the vast majority of processes