{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":96925629,"defaultBranch":"master","name":"glibc","ownerLogin":"ceseo","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2017-07-11T18:46:55.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/7077164?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1711392421.0","currentOid":""},"activityList":{"items":[{"before":"4d0fe291aed3a476a3b59c4ecfae9d35ac0f15e8","after":"96d1b9ac2321b565f340ba8f3674597141e3450d","ref":"refs/heads/master","pushedAt":"2024-03-25T18:47:42.000Z","pushType":"push","commitsCount":844,"pusher":{"login":"ceseo","name":"Carlos Seo","path":"/ceseo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7077164?s=80&v=4"},"commit":{"message":"RISC-V: Fix the static-PIE non-relocated object check\n\nThe value of l_scope is only valid post relocation, so this original\ncheck was triggering undefined behavior. Instead just directly check to\nsee if the object has been relocated, at which point using l_scope is\nsafe.\n\nReported-by: Andreas Schwab \nCloses: BZ #31317\nFixes: e0590f41fe (\"RISC-V: Enable static-pie.\")\nSigned-off-by: Palmer Dabbelt ","shortMessageHtmlLink":"RISC-V: Fix the static-PIE non-relocated object check"}},{"before":null,"after":"33cb9de5cba0e3b428a2bab4bd8368bf55806430","ref":"refs/heads/arm/morello/main","pushedAt":"2024-03-25T18:47:01.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ceseo","name":"Carlos Seo","path":"/ceseo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7077164?s=80&v=4"},"commit":{"message":"cheri: malloc: exact capability check in free/realloc\n\nCapability narrowing uses a lookup table from an address to the\ninternally used wide capability. Keep the narrow capability in the\ntable instead of just the address and check it. This allows free\nand realloc to check their input and only accept capabilities\nexactly matching what was returned by malloc.\n\nWhen a user adds restrictions on top of malloc returned capabilities\n(e.g. narrower bounds), realloc could bypass those restrictions when\nit simply looked up the internal wide capability for the address.","shortMessageHtmlLink":"cheri: malloc: exact capability check in free/realloc"}},{"before":"7eb918cd688f455f132ec5d7f3ed59332bcaffd5","after":"9810277ed19f55c476196d0def9c319432c7284f","ref":"refs/heads/clang","pushedAt":"2023-05-30T22:44:06.975Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ceseo","name":"Carlos Seo","path":"/ceseo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7077164?s=80&v=4"},"commit":{"message":"malloc: Disable tst-aligned-alloc for clang\n\nclang issue: tst-aligned-alloc doesn't build due to the\n-Wnon-power-of-two-alignment flag.","shortMessageHtmlLink":"malloc: Disable tst-aligned-alloc for clang"}},{"before":"eeaef670b64335642d43b9e6c5c6466424e27f87","after":"7eb918cd688f455f132ec5d7f3ed59332bcaffd5","ref":"refs/heads/clang","pushedAt":"2023-05-30T20:49:23.769Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ceseo","name":"Carlos Seo","path":"/ceseo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7077164?s=80&v=4"},"commit":{"message":"malloc: Disable tst-aligned-alloc for clang\n\nclang issue: tst-aligned-alloc doesn't build due to the\n-Wnon-power-of-two-alignment flag.","shortMessageHtmlLink":"malloc: Disable tst-aligned-alloc for clang"}},{"before":"ab5aa2ee3d3f978e474803cbbc5fe805ad30e293","after":"4d0fe291aed3a476a3b59c4ecfae9d35ac0f15e8","ref":"refs/heads/master","pushedAt":"2023-05-30T18:16:19.661Z","pushType":"push","commitsCount":100,"pusher":{"login":"ceseo","name":"Carlos Seo","path":"/ceseo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7077164?s=80&v=4"},"commit":{"message":"io: Fix record locking contants on 32 bit arch with 64 bit default time_t (BZ#30477)\n\nFor architecture with default 64 bit time_t support, the kernel\ndoes not provide LFS and non-LFS values for F_GETLK, F_GETLK, and\nF_GETLK (the default value used for 64 bit architecture are used).\n\nThis is might be considered an ABI break, but the currenct exported\nvalues is bogus anyway.\n\nThe POSIX lockf is not affected since it is aliased to lockf64,\nwhich already uses the LFS values.\n\nChecked on i686-linux-gnu and the new tests on a riscv32.\n\nReviewed-by: Carlos O'Donell ","shortMessageHtmlLink":"io: Fix record locking contants on 32 bit arch with 64 bit default ti…"}},{"before":null,"after":"eeaef670b64335642d43b9e6c5c6466424e27f87","ref":"refs/heads/clang","pushedAt":"2023-05-09T20:30:56.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ceseo","name":"Carlos Seo","path":"/ceseo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7077164?s=80&v=4"},"commit":{"message":"malloc: Disable tst-aligned-alloc for clang\n\nclang issue: tst-aligned-alloc doesn't build due to the\n-Wnon-power-of-two-alignment flag.","shortMessageHtmlLink":"malloc: Disable tst-aligned-alloc for clang"}},{"before":"af16a59ee1f72392b88d439d8f802c9844f86f4f","after":"ab5aa2ee3d3f978e474803cbbc5fe805ad30e293","ref":"refs/heads/master","pushedAt":"2023-05-09T15:58:22.000Z","pushType":"push","commitsCount":56,"pusher":{"login":"ceseo","name":"Carlos Seo","path":"/ceseo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7077164?s=80&v=4"},"commit":{"message":"dlopen: skip debugger notification for DSO loaded from sprof (bug 30258)\n\nAvoid inconsistent state in the debugger interface.","shortMessageHtmlLink":"dlopen: skip debugger notification for DSO loaded from sprof (bug 30258)"}},{"before":"533deafbdf189f5fbb280c28562dd43ace2f4b0f","after":"af16a59ee1f72392b88d439d8f802c9844f86f4f","ref":"refs/heads/master","pushedAt":"2023-04-27T13:26:11.000Z","pushType":"push","commitsCount":14,"pusher":{"login":"ceseo","name":"Carlos Seo","path":"/ceseo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7077164?s=80&v=4"},"commit":{"message":"Fix Hurd getcwd build with GCC >= 13\n\nThe build of glibc for i686-gnu has been failing for a while with GCC\nmainline / GCC 13:\n\n../sysdeps/mach/hurd/getcwd.c: In function '__hurd_canonicalize_directory_name_internal':\n../sysdeps/mach/hurd/getcwd.c:242:48: error: pointer 'file_name' may be used after 'realloc' [-Werror=use-after-free]\n 242 | file_namep = &buf[file_namep - file_name + size / 2];\n | ~~~~~~~~~~~^~~~~~~~~~~\n../sysdeps/mach/hurd/getcwd.c:236:25: note: call to 'realloc' here\n 236 | buf = realloc (file_name, size);\n | ^~~~~~~~~~~~~~~~~~~~~~~~~\n\nFix by doing the subtraction before the reallocation.\n\nTested with build-many-glibcs.py for i686-gnu.\n\n[samuel.thibault@ens-lyon.rg: Removed mention of this being a bug]\n\nMessage-Id: <18587337-7815-4056-ebd0-724df262d591@codesourcery.com>","shortMessageHtmlLink":"Fix Hurd getcwd build with GCC >= 13"}},{"before":"bb557fff2ec20e0926932684f69835f90626bb06","after":"533deafbdf189f5fbb280c28562dd43ace2f4b0f","ref":"refs/heads/master","pushedAt":"2023-04-24T11:45:06.000Z","pushType":"push","commitsCount":116,"pusher":{"login":"ceseo","name":"Carlos Seo","path":"/ceseo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7077164?s=80&v=4"},"commit":{"message":"Use O_CLOEXEC in more places (BZ #15722)\n\nWhen opening a temporary file without O_CLOEXEC we risk leaking the\nfile descriptor if another thread calls (fork and then) exec while we\nhave the fd open. Fix this by consistently passing O_CLOEXEC everywhere\nwhere we open a file for internal use (and not to return it to the user,\nin which case the API defines whether or not the close-on-exec flag\nshall be set on the returned fd).\n\nReviewed-by: Adhemerval Zanella \nSigned-off-by: Sergey Bugaev \nMessage-Id: <20230419160207.65988-4-bugaevc@gmail.com>","shortMessageHtmlLink":"Use O_CLOEXEC in more places (BZ #15722)"}},{"before":null,"after":"47e61ba7720c1c646077318e079dcb75224b1001","ref":"refs/heads/cseo-morello","pushedAt":"2023-03-27T21:50:02.739Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ceseo","name":"Carlos Seo","path":"/ceseo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7077164?s=80&v=4"},"commit":{"message":"TODO(vdso): aarch64: morello: disable VDSO loading\n\nOnce the kernel starts providing a VDSO, old binaries should continue\nto work (without using the new VDSO). For this we set the vdso to 0\nindependently of auxv, otherwise glibc attempts to load it even if the\ntarget has no vdso symbols specified and the load can crash since the\nsetup code is not purecap compatible.","shortMessageHtmlLink":"TODO(vdso): aarch64: morello: disable VDSO loading"}},{"before":"2f39e44a8417b4186a7f15bfeac5d0b557e63e03","after":"bb557fff2ec20e0926932684f69835f90626bb06","ref":"refs/heads/master","pushedAt":"2023-03-27T21:48:23.561Z","pushType":"push","commitsCount":207,"pusher":{"login":"ceseo","name":"Carlos Seo","path":"/ceseo","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/7077164?s=80&v=4"},"commit":{"message":"elf: Take into account ${sysconfdir} in elf/tst-ldconfig-p.sh\n\nTake into account ${sysconfdir} in elf/tst-ldconfig-p.sh.\n\nReviewed-by: Adhemerval Zanella ","shortMessageHtmlLink":"elf: Take into account ${sysconfdir} in elf/tst-ldconfig-p.sh"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEHuVrMgA","startCursor":null,"endCursor":null}},"title":"Activity · ceseo/glibc"}