summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2018-07-12Update PgoData to release-20180712-0122 (#18883)dotnet-maestro-bot1-2/+2
2018-07-11Merge pull request #18811 from dotnet-maestro-bot/release/2.1-UpdateDependenciesWes Haggard3-11/+11
Update BuildTools, CoreClr, CoreFx, PgoData to rc1-03006-01, servicing-26708-02, servicing-26708-02, release-20180711-0041, respectively (release/2.1)
2018-07-11Update BuildTools, CoreClr, CoreFx, PgoData to rc1-03006-01, ↵dotnet-maestro-bot3-11/+11
servicing-26708-02, servicing-26708-02, release-20180711-0041, respectively
2018-07-10Merge commit 'c6e7fbc5516842945b9b375f7724438dece10627' into release/2.1Matt Mitchell0-0/+0
2018-07-10Merge pull request #18757 from CarolEidt/Fix17969in2.1Carol Eidt1-8/+11
Port the fix for Issue 17969 to Rel/2.1
2018-07-06Update BuildTools, CoreClr, CoreFx, PgoData to rc1-02913-01, ↵dotnet-maestro-bot3-10/+10
servicing-26606-02, servicing-26703-08, release-20180706-0055, respectively
2018-07-02Port the fix for Issue 17969 to Rel/2.1Carol Eidt1-8/+11
2018-06-28Port to 2.1: Fix alternate stack cleanup on MUSL (#18687)Jan Vorlicek1-0/+4
The MUSL implementation of sigaltstack checks that the ss.ss_size is larger or equal than the MINSIGSTKSZ even when the ss_flags is set to SS_DISABLE even though Linux man page for sigaltstack states that when this flag is set, all other ss fields are ignored. We were not setting the ss_size in this case and it was causing a memory leak for each thread that has terminated on MUSL based Linux distros like Alpine. Glibc implementation doesn't check the ss_size when the SS_DISABLE is set so the problem was really MUSL specific.
2018-06-28Merge 'v2.1.1'Wes Haggard6-27/+42
.NET Core 2.1.1
2018-06-28Port to 2.1: Fix alternate stack cleanup on MUSL (#18687)Jan Vorlicek1-0/+4
The MUSL implementation of sigaltstack checks that the ss.ss_size is larger or equal than the MINSIGSTKSZ even when the ss_flags is set to SS_DISABLE even though Linux man page for sigaltstack states that when this flag is set, all other ss fields are ignored. We were not setting the ss_size in this case and it was causing a memory leak for each thread that has terminated on MUSL based Linux distros like Alpine. Glibc implementation doesn't check the ss_size when the SS_DISABLE is set so the problem was really MUSL specific.
2018-06-27JIT: Fix bug in finally cloning caused by unsound callfinally reorderingAndy Ayers3-17/+122
Port of #18348 to release/2.1 We need to make sure that if we reorder a callfinally during finally cloning that the callfinally is actually the one being targeted by the last block in the try range. Closes #18332. Linked issue has some more detailed notes.
2018-06-27Fix SpanHelpers.ClearWithoutReferences alignment detection (#18222)Pent Ploompuu1-5/+5
2018-06-27Optimize Array.Clear using SpanHelpers (#18101)Jan Kotas4-36/+41
Reimplement most of Array.Clear in managed code using Span Clear helpers. Fixes dotnet/corefx#29848
2018-06-26Fix number formatting exception with empty NumberGroupSizes array (#18221) ↵Stephen Toub1-1/+2
(#18667)
2018-06-26Allow ILCodeVersion to fallback to default IL (#18502)Noah Falk2-14/+35
* Allow ILCodeVersion to fallback to default IL For compat with profilers that used our APIs in unexpected ways we can allow the ILCodeVersion to fallback to the default IL code when no IL was explicitly given. * Fix incorrect usage of ILCodeVersion::AsNode (issue #18602) When the debugger is querying the active rejit IL for an IL method that has not been rejitted it incorrectly creates a VMPTR_ILCodeVersionNode for a code version that shouldn't have one.
2018-06-26AssemblyName parsing with unicode/emoji crashes (#18309)Luqun Lou1-3/+3
2018-06-26Fix handling of generating relative path to parent (#18460)Jeremy Kuhne1-6/+16
Fixes #30263
2018-06-26Update branding to 2.1.3 (#18651)William Godbe1-1/+1
2018-06-26mach_absolute_time as the primary clock source on macOS (corefx#30391) ↵Stephen Toub1-20/+20
(#18505) (#18526) macOS 10.12+ supports clock_gettime (HAVE_CLOCK_MONOTONIC is defined) However, mach_absolute_time has better resolution and should be used as the primary clock source.
2018-06-15Update SDK used to build jitutils to 2.1 RC (#18290)Andy Ayers1-3/+7
In anticipation of taking a dependence on netcoreapp2.1 for the forthcoming PMI work from jitutils. Also make sure to shut down build servers before cleaning up the SDK.
2018-06-04Update PgoData to release-20180604-0043 (#18275)dotnet-maestro-bot1-2/+2
2018-06-03Update PgoData to release-20180603-0040 (#18265)dotnet-maestro-bot1-2/+2
2018-06-02Update PgoData to release-20180602-0037 (#18250)dotnet-maestro-bot1-2/+2
2018-06-01Fix alternate stack for Alpine docker on SELinux (#17936) (#17975)kasper31-12/+6
For some reason, the Alpine docker container running on a SELinux host maps heap as RWX. When we allocate alternate stack from the heap, we also change the protection of the first page to PROT_NONE so that it can serve as a guard page to catch stack overflow. And when we free the alternate stack, we restore the protection back to PROT_READ | PROT_WRITE. The restoration fails in Alpine docker container running on a SELinux host with EPROT failure and the SELinux log reports that an attempt to change heap to executable was made. So it looks like the kernel has added the PERM_EXEC to the permissions we have passed to the mprotect call. There is a code in the mprotect implementation that can do that, although I don't fully understand the conditions under which it happens. This is driven by the VM_MAYEXEC flag in the internal VMA block structure. To fix that, I've modified the alternate stack allocation to use mmap / munmap instead of C heap allocation.
2018-05-31Update g_highest_address and g_lowest_address in ↵Egor Chesakov1-1/+8
StompWriteBarrier(WriteBarrierOp::StompResize) on ARM (#18107)
2018-05-31Use sysconf(_SC_NPROCESSORS_CONF) instead of sysconf(_SC_NPROCESSORS_ONLN) ↵Egor Chesakov2-3/+17
in PAL and GC on ARM and ARM64
2018-05-31Update PgoData to release-20180531-0037 (#18214)dotnet-maestro-bot1-2/+2
2018-05-30Update PgoData to release-20180530-0051 (#18194)dotnet-maestro-bot1-2/+2
2018-05-29Update branding to 2.1.1 (#18161)Matt Mitchell1-2/+2
2018-05-29Merge pull request #17998 from dotnet-maestro-bot/release/2.1-UpdateDependenciesWes Haggard2-9/+9
Update CoreClr, CoreFx, PgoData to rtm-26515-07, rtm, release-20180529-0037, respectively (release/2.1)
2018-05-29Update dependencies to rtmWes Haggard1-3/+3
2018-05-29Update CoreClr, CoreFx, PgoData to rtm-26515-07, rtm, release-20180529-0037, ↵dotnet-maestro-bot2-8/+8
respectively
2018-05-14Update CoreClr, CoreFx, PgoData to rtm-26514-02, rtm-26514-02, ↵dotnet-maestro-bot2-8/+8
release-20180514-0049, respectively (#17987)
2018-05-11Merge pull request #17965 from jashook/port_build_test_sh_changesJarret Shook2-59/+93
Port build-test.sh changes from master to release/2.1
2018-05-11Split unix test builds in slices (#17785)Steve MacLean2-45/+88
* Split unix test builds in slices Ports #17161 to linux * Address review feedback
2018-05-11Merge pull request #17725 from dotnetrt/FixNixTestBuildJarret Shook2-15/+6
Fix unix test build by removing unnecessary 'managed_test_build' semafore file
2018-05-09Update CoreClr, CoreFx to rtm-26508-04, rtm-26508-03, respectively (#17927)dotnet-maestro-bot2-6/+6
2018-05-07Update CoreClr, CoreFx to rtm-26505-03, rtm-26505-03, respectively (#17892)dotnet-maestro-bot2-6/+6
2018-05-04Update BuildTools to rc1-02804-05 (#17885)dotnet-maestro-bot2-3/+3
2018-05-04Fix for ARM secure delegate non-standard register argBruce Forstall2-9/+34
For ARM, doing a secure delegate call requires adding a custom calling convention argument R4 as the address of the secure delegate invoke indirection cell. This is done using the fgMorphArgs nonStandardArgs mechanism, and the argument is added at the end. For calls with 4 or more register arguments, this didn't work: we would initially set the non-standard arg as a non-register argument, and the nonStandardArgs check didn't consider converting an argument from a stack argument back to a register argument. The fix allows nonStandardArgs to be either stack or register arguments, no matter what their place in the argument list would imply. Fixes #17738
2018-05-04Update CoreClr, CoreFx to rtm-26504-02, rtm-26504-02, respectively (#17883)dotnet-maestro-bot2-6/+6
2018-05-04Update BuildTools, CoreClr, CoreFx to rc1-02803-01, rtm-26502-03, ↵dotnet-maestro-bot3-9/+9
rtm-26502-02, respectively (#17874)
2018-05-03Merge pull request #17875 from ↵Ricardo Arenas1-4/+2
riarenas/riarenas/revert-private-intermediate-containers Revert "Make blobfeed containers private. (#17792)"
2018-05-03Revert "Make blobfeed containers private. (#17792)"Ricardo Arenas1-4/+2
This reverts commit 4950b038c84c223ddd9fc198dcf5722d46e21552.
2018-05-02Update BuildTools, PgoData to rc1-02801-02, release-20180502-0048, ↵dotnet-maestro-bot2-5/+5
respectively (#17860)
2018-05-02Make blobfeed containers private. (#17792)Ricardo Arenas1-2/+4
2018-05-01Add runtimeconfig.json support for tiered compilation (#17839)Noah Falk3-138/+52
2018-05-01Update PgoData to release-20180501-0050 (#17849)dotnet-maestro-bot1-2/+2
2018-05-01Merge pull request #17846 from weshaggard/FixSourceBuildWes Haggard1-5/+5
Switch source build property to DotNetBuildFromSource
2018-05-01Disable GC Coop mode switching during fatal error handling during GC ↵Sung Yoon Whang3-5/+69
exception (#17710) (#17844)