You can subscribe to this list here.
| 2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
(122) |
Nov
(152) |
Dec
(69) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 |
Jan
(6) |
Feb
(25) |
Mar
(73) |
Apr
(82) |
May
(24) |
Jun
(25) |
Jul
(10) |
Aug
(11) |
Sep
(10) |
Oct
(54) |
Nov
(203) |
Dec
(182) |
| 2004 |
Jan
(307) |
Feb
(305) |
Mar
(430) |
Apr
(312) |
May
(187) |
Jun
(342) |
Jul
(487) |
Aug
(637) |
Sep
(336) |
Oct
(373) |
Nov
(441) |
Dec
(210) |
| 2005 |
Jan
(385) |
Feb
(480) |
Mar
(636) |
Apr
(544) |
May
(679) |
Jun
(625) |
Jul
(810) |
Aug
(838) |
Sep
(634) |
Oct
(521) |
Nov
(965) |
Dec
(543) |
| 2006 |
Jan
(494) |
Feb
(431) |
Mar
(546) |
Apr
(411) |
May
(406) |
Jun
(322) |
Jul
(256) |
Aug
(401) |
Sep
(345) |
Oct
(542) |
Nov
(308) |
Dec
(481) |
| 2007 |
Jan
(427) |
Feb
(326) |
Mar
(367) |
Apr
(255) |
May
(244) |
Jun
(204) |
Jul
(223) |
Aug
(231) |
Sep
(354) |
Oct
(374) |
Nov
(497) |
Dec
(362) |
| 2008 |
Jan
(322) |
Feb
(482) |
Mar
(658) |
Apr
(422) |
May
(476) |
Jun
(396) |
Jul
(455) |
Aug
(267) |
Sep
(280) |
Oct
(253) |
Nov
(232) |
Dec
(304) |
| 2009 |
Jan
(486) |
Feb
(470) |
Mar
(458) |
Apr
(423) |
May
(696) |
Jun
(461) |
Jul
(551) |
Aug
(575) |
Sep
(134) |
Oct
(110) |
Nov
(157) |
Dec
(102) |
| 2010 |
Jan
(226) |
Feb
(86) |
Mar
(147) |
Apr
(117) |
May
(107) |
Jun
(203) |
Jul
(193) |
Aug
(238) |
Sep
(300) |
Oct
(246) |
Nov
(23) |
Dec
(75) |
| 2011 |
Jan
(133) |
Feb
(195) |
Mar
(315) |
Apr
(200) |
May
(267) |
Jun
(293) |
Jul
(353) |
Aug
(237) |
Sep
(278) |
Oct
(611) |
Nov
(274) |
Dec
(260) |
| 2012 |
Jan
(303) |
Feb
(391) |
Mar
(417) |
Apr
(441) |
May
(488) |
Jun
(655) |
Jul
(590) |
Aug
(610) |
Sep
(526) |
Oct
(478) |
Nov
(359) |
Dec
(372) |
| 2013 |
Jan
(467) |
Feb
(226) |
Mar
(391) |
Apr
(281) |
May
(299) |
Jun
(252) |
Jul
(311) |
Aug
(352) |
Sep
(481) |
Oct
(571) |
Nov
(222) |
Dec
(231) |
| 2014 |
Jan
(185) |
Feb
(329) |
Mar
(245) |
Apr
(238) |
May
(281) |
Jun
(399) |
Jul
(382) |
Aug
(500) |
Sep
(579) |
Oct
(435) |
Nov
(487) |
Dec
(256) |
| 2015 |
Jan
(338) |
Feb
(357) |
Mar
(330) |
Apr
(294) |
May
(191) |
Jun
(108) |
Jul
(142) |
Aug
(261) |
Sep
(190) |
Oct
(54) |
Nov
(83) |
Dec
(22) |
| 2016 |
Jan
(49) |
Feb
(89) |
Mar
(33) |
Apr
(50) |
May
(27) |
Jun
(34) |
Jul
(53) |
Aug
(53) |
Sep
(98) |
Oct
(206) |
Nov
(93) |
Dec
(53) |
| 2017 |
Jan
(65) |
Feb
(82) |
Mar
(102) |
Apr
(86) |
May
(187) |
Jun
(67) |
Jul
(23) |
Aug
(93) |
Sep
(65) |
Oct
(45) |
Nov
(35) |
Dec
(17) |
| 2018 |
Jan
(26) |
Feb
(35) |
Mar
(38) |
Apr
(32) |
May
(8) |
Jun
(43) |
Jul
(27) |
Aug
(30) |
Sep
(43) |
Oct
(42) |
Nov
(38) |
Dec
(67) |
| 2019 |
Jan
(32) |
Feb
(37) |
Mar
(53) |
Apr
(64) |
May
(49) |
Jun
(18) |
Jul
(14) |
Aug
(53) |
Sep
(25) |
Oct
(30) |
Nov
(49) |
Dec
(31) |
| 2020 |
Jan
(87) |
Feb
(45) |
Mar
(37) |
Apr
(51) |
May
(99) |
Jun
(36) |
Jul
(11) |
Aug
(14) |
Sep
(20) |
Oct
(24) |
Nov
(40) |
Dec
(23) |
| 2021 |
Jan
(14) |
Feb
(53) |
Mar
(85) |
Apr
(15) |
May
(19) |
Jun
(3) |
Jul
(14) |
Aug
(1) |
Sep
(57) |
Oct
(73) |
Nov
(56) |
Dec
(22) |
| 2022 |
Jan
(3) |
Feb
(22) |
Mar
(6) |
Apr
(55) |
May
(46) |
Jun
(39) |
Jul
(15) |
Aug
(9) |
Sep
(11) |
Oct
(34) |
Nov
(20) |
Dec
(36) |
| 2023 |
Jan
(79) |
Feb
(41) |
Mar
(99) |
Apr
(169) |
May
(48) |
Jun
(16) |
Jul
(16) |
Aug
(57) |
Sep
(19) |
Oct
|
Nov
|
Dec
|
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
|
|
|
|
1
(6) |
2
(4) |
3
(4) |
4
(4) |
|
5
(6) |
6
(9) |
7
(4) |
8
(15) |
9
(6) |
10
(6) |
11
(22) |
|
12
(12) |
13
(9) |
14
(4) |
15
(11) |
16
(8) |
17
(4) |
18
(6) |
|
19
(6) |
20
(15) |
21
(9) |
22
(9) |
23
(14) |
24
(7) |
25
(7) |
|
26
(8) |
27
(11) |
28
(4) |
29
(4) |
30
(12) |
31
(7) |
|
|
From: <sv...@va...> - 2008-10-12 22:32:02
|
Author: sewardj
Date: 2008-10-12 23:31:51 +0100 (Sun, 12 Oct 2008)
New Revision: 8668
Log:
Add a caching mechanism for searches of the DebugInfo.cfsi array.
This speeds up stack unwinding on amd64-linux by about 50%.
Modified:
branches/YARD/coregrind/m_debuginfo/debuginfo.c
branches/YARD/coregrind/m_debuginfo/misc.c
branches/YARD/coregrind/m_debuginfo/priv_storage.h
branches/YARD/coregrind/m_debuginfo/storage.c
Modified: branches/YARD/coregrind/m_debuginfo/debuginfo.c
===================================================================
--- branches/YARD/coregrind/m_debuginfo/debuginfo.c 2008-10-12 19:53:28 UTC (rev 8667)
+++ branches/YARD/coregrind/m_debuginfo/debuginfo.c 2008-10-12 22:31:51 UTC (rev 8668)
@@ -171,8 +171,8 @@
di->memname = memname ? ML_(dinfo_strdup)("di.debuginfo.aDI.3", memname)
: NULL;
- /* Everything else -- pointers, sizes, arrays -- is zeroed by calloc.
- Now set up the debugging-output flags. */
+ /* Everything else -- pointers, sizes, arrays -- is zeroed by
+ ML_(dinfo_zalloc). Now set up the debugging-output flags. */
traceme
= VG_(string_match)( VG_(clo_trace_symtab_patt), filename )
|| (memname && VG_(string_match)( VG_(clo_trace_symtab_patt),
Modified: branches/YARD/coregrind/m_debuginfo/misc.c
===================================================================
--- branches/YARD/coregrind/m_debuginfo/misc.c 2008-10-12 19:53:28 UTC (rev 8667)
+++ branches/YARD/coregrind/m_debuginfo/misc.c 2008-10-12 22:31:51 UTC (rev 8668)
@@ -42,6 +42,8 @@
#include "priv_misc.h" /* self */
+/* Various functions rely on this returning zeroed memory.
+ alloc_DebugInfo is one of them. */
void* ML_(dinfo_zalloc) ( HChar* cc, SizeT szB ) {
void* v;
vg_assert(szB > 0);
Modified: branches/YARD/coregrind/m_debuginfo/priv_storage.h
===================================================================
--- branches/YARD/coregrind/m_debuginfo/priv_storage.h 2008-10-12 19:53:28 UTC (rev 8667)
+++ branches/YARD/coregrind/m_debuginfo/priv_storage.h 2008-10-12 22:31:51 UTC (rev 8668)
@@ -241,6 +241,8 @@
#define SEGINFO_STRCHUNKSIZE (64*1024)
+#define N_CFSI_SEARCH_CACHE 8
+
struct _DebugInfo {
/* Admin stuff */
@@ -362,11 +364,20 @@
records require any expression nodes, they are stored in
cfsi_exprs. */
DiCfSI* cfsi;
- UInt cfsi_used;
- UInt cfsi_size;
+ UWord cfsi_used;
+ UWord cfsi_size;
Addr cfsi_minavma;
Addr cfsi_maxavma;
XArray* cfsi_exprs; /* XArray of CfiExpr */
+ /* Stack unwinding on amd64 causes a lot of searching in .cfsi to
+ find the DiCfSI record that covers a particular address. To
+ speed up the searches we add a small (8-entry) cache containing
+ cached results from ML_(search_one_cfitab). This speeds up the
+ searching by about a factor of 3 and overall increases the stack
+ unwind speed by about 50% on amd64-linux on large C++ apps. */
+ UWord cfsi_search_cache_used; /* 0 .. N_CFSI_SEARCH_CACHE */
+ struct { Addr aMin; Addr aMax; Word ix; }
+ cfsi_search_cache[N_CFSI_SEARCH_CACHE];
/* Expandable arrays of characters -- the string table. Pointers
into this are stable (the arrays are not reallocated). */
@@ -464,7 +475,7 @@
/* Find a CFI-table index containing the specified pointer, or -1 if
not found. Binary search. */
-extern Int ML_(search_one_cfitab) ( struct _DebugInfo* di, Addr ptr );
+extern Word ML_(search_one_cfitab) ( struct _DebugInfo* di, Addr ptr );
/* ------ Misc ------ */
Modified: branches/YARD/coregrind/m_debuginfo/storage.c
===================================================================
--- branches/YARD/coregrind/m_debuginfo/storage.c 2008-10-12 19:53:28 UTC (rev 8667)
+++ branches/YARD/coregrind/m_debuginfo/storage.c 2008-10-12 22:31:51 UTC (rev 8668)
@@ -365,6 +365,9 @@
ML_(ppDiCfSI)(di->cfsi_exprs, cfsi);
}
+ /* invalidate the lookup cache */
+ di->cfsi_search_cache_used = 0;
+
/* sanity */
vg_assert(cfsi->len > 0);
/* If this fails, the implication is you have a single procedure
@@ -1285,8 +1288,11 @@
di->cfsi_maxavma = here_max;
}
+ /* invalidate the lookup cache */
+ di->cfsi_search_cache_used = 0;
+
if (di->trace_cfi)
- VG_(printf)("canonicaliseCfiSI: %d entries, %#lx .. %#lx\n",
+ VG_(printf)("canonicaliseCfiSI: %ld entries, %#lx .. %#lx\n",
di->cfsi_used,
di->cfsi_minavma, di->cfsi_maxavma);
@@ -1420,11 +1426,12 @@
/* Find a CFI-table index containing the specified pointer, or -1
if not found. Binary search. */
-
-Int ML_(search_one_cfitab) ( struct _DebugInfo* di, Addr ptr )
+__attribute__((noinline))
+static
+Word search_one_cfitab_WRK ( struct _DebugInfo* di, Addr ptr )
{
Addr a_mid_lo, a_mid_hi;
- Int mid, size,
+ Word mid, size,
lo = 0,
hi = di->cfsi_used-1;
while (True) {
@@ -1442,7 +1449,57 @@
}
}
+/* Find the CFI-table index containing the specified pointer,
+ or -1 if not found. It uses search_one_cfitab_WRK to do the
+ real work, but caches the results so as to avoid calling
+ search_one_cfitab_WRK nost of the time. */
+Word ML_(search_one_cfitab) ( struct _DebugInfo* di, Addr ptr )
+{
+ static UWord nq = 0;
+ static UWord nm = 0;
+ Word i, w;
+
+ if (0 && 0 == (nq & 0x3FFFF))
+ VG_(printf)("ZZZZZ %lu qs %lu misses\n", nq,nm);
+
+ nq++;
+ /* Check the cache first */
+ for (i = 0; i < di->cfsi_search_cache_used; i++) {
+ if (di->cfsi_search_cache[i].aMin <= ptr
+ && ptr <= di->cfsi_search_cache[i].aMax) {
+ /* found it. Once in every 16 searches, move the found element
+ one step closer to the front. */
+ if (i > 0 && 0 == (nq & 0xF)) {
+ __typeof__(di->cfsi_search_cache[0]) tmp;
+ tmp = di->cfsi_search_cache[i-1];
+ di->cfsi_search_cache[i-1] = di->cfsi_search_cache[i];
+ di->cfsi_search_cache[i] = tmp;
+ i--;
+ }
+ return di->cfsi_search_cache[i].ix;
+ }
+ }
+ /* not found in the cache; do slow search */
+ nm++;
+ w = search_one_cfitab_WRK(di, ptr);
+ if (w >= 0) {
+ /* We got a result, so update the cache. Slide all entries
+ along one and insert new one at [0]. */
+ for (i = N_CFSI_SEARCH_CACHE-1; i >= 1; i--) {
+ di->cfsi_search_cache[i] = di->cfsi_search_cache[i-1];
+ }
+ if (di->cfsi_search_cache_used < N_CFSI_SEARCH_CACHE)
+ di->cfsi_search_cache_used++;
+ tl_assert(di->cfsi[w].len > 0);
+ di->cfsi_search_cache[0].aMin = di->cfsi[w].base;
+ di->cfsi_search_cache[0].aMax = di->cfsi[w].base + di->cfsi[w].len - 1;
+ di->cfsi_search_cache[0].ix = w;
+ }
+ return w;
+}
+
+
/*--------------------------------------------------------------------*/
/*--- end ---*/
/*--------------------------------------------------------------------*/
|
|
From: <sv...@va...> - 2008-10-12 19:53:34
|
Author: njn
Date: 2008-10-12 20:53:28 +0100 (Sun, 12 Oct 2008)
New Revision: 8667
Log:
Patch from Robert O'Callahan:
create and expose 'dup2'
Modified:
trunk/coregrind/m_libcfile.c
trunk/include/pub_tool_libcfile.h
Modified: trunk/coregrind/m_libcfile.c
===================================================================
--- trunk/coregrind/m_libcfile.c 2008-10-12 19:51:41 UTC (rev 8666)
+++ trunk/coregrind/m_libcfile.c 2008-10-12 19:53:28 UTC (rev 8667)
@@ -260,6 +260,11 @@
return VG_(do_syscall1)(__NR_dup, oldfd);
}
+SysRes VG_(dup2) ( Int oldfd, Int newfd )
+{
+ return VG_(do_syscall2)(__NR_dup2, oldfd, newfd);
+}
+
/* Returns -1 on error. */
Int VG_(fcntl) ( Int fd, Int cmd, Int arg )
{
Modified: trunk/include/pub_tool_libcfile.h
===================================================================
--- trunk/include/pub_tool_libcfile.h 2008-10-12 19:51:41 UTC (rev 8666)
+++ trunk/include/pub_tool_libcfile.h 2008-10-12 19:53:28 UTC (rev 8667)
@@ -73,6 +73,7 @@
extern SysRes VG_(stat) ( Char* file_name, struct vg_stat* buf );
extern Int VG_(fstat) ( Int fd, struct vg_stat* buf );
extern SysRes VG_(dup) ( Int oldfd );
+extern SysRes VG_(dup2) ( Int oldfd, Int newfd );
extern Int VG_(rename) ( Char* old_name, Char* new_name );
extern Int VG_(unlink) ( Char* file_name );
|
|
From: <sv...@va...> - 2008-10-12 19:51:47
|
Author: njn
Date: 2008-10-12 20:51:41 +0100 (Sun, 12 Oct 2008)
New Revision: 8666
Log:
Patch from Robert O'Callahan:
make realloc(NULL, size) behave like malloc(size), and make
realloc(ptr, 0) behave like free(ptr), as the real libc realloc does.
Modified:
trunk/coregrind/m_mallocfree.c
Modified: trunk/coregrind/m_mallocfree.c
===================================================================
--- trunk/coregrind/m_mallocfree.c 2008-10-12 19:50:51 UTC (rev 8665)
+++ trunk/coregrind/m_mallocfree.c 2008-10-12 19:51:41 UTC (rev 8666)
@@ -1770,6 +1770,15 @@
vg_assert(req_pszB < MAX_PSZB);
+ if (NULL == ptr) {
+ return VG_(arena_malloc)(aid, cc, req_pszB);
+ }
+
+ if (req_pszB == 0) {
+ VG_(arena_free)(aid, ptr);
+ return NULL;
+ }
+
b = get_payload_block(a, ptr);
vg_assert(blockSane(a, b));
|
|
From: <sv...@va...> - 2008-10-12 19:51:03
|
Author: njn
Date: 2008-10-12 20:50:51 +0100 (Sun, 12 Oct 2008)
New Revision: 8665
Log:
Avoid warnings caused by mixed decls and code.
Modified:
trunk/exp-ptrcheck/tests/unaligned.c
Modified: trunk/exp-ptrcheck/tests/unaligned.c
===================================================================
--- trunk/exp-ptrcheck/tests/unaligned.c 2008-10-11 23:32:26 UTC (rev 8664)
+++ trunk/exp-ptrcheck/tests/unaligned.c 2008-10-12 19:50:51 UTC (rev 8665)
@@ -10,11 +10,16 @@
char c0[8], c1[8], c2[8], c3[8], c4[8];
// Each of these pointers has a different alignment
- char** p0 = (char**)&c0[0]; *p0 = x;
- char** p1 = (char**)&c1[1]; *p1 = x;
- char** p2 = (char**)&c2[2]; *p2 = x;
- char** p3 = (char**)&c3[3]; *p3 = x;
- char** p4 = (char**)&c4[4]; *p4 = x;
+ char** p0 = (char**)&c0[0];
+ char** p1 = (char**)&c1[1];
+ char** p2 = (char**)&c2[2];
+ char** p3 = (char**)&c3[3];
+ char** p4 = (char**)&c4[4];
+ *p0 = x;
+ *p1 = x;
+ *p2 = x;
+ *p3 = x;
+ *p4 = x;
// These 10 are ok
c = (*p0)[0];
|
|
From: Julian S. <js...@ac...> - 2008-10-12 17:43:10
|
On Sunday 12 October 2008, Bart Van Assche wrote: > On Sun, Oct 12, 2008 at 10:48 AM, Julian Seward <js...@ac...> wrote: > > That would be a better solution. The function intercepting is complex > > (to implement) and fragile, especially on ppc64-linux. The problem is > > how to deduce, from observing the atomic instructions and sys_futex > > calls, what the resulting inter-thread synchronisations are. I have > > considered this problem a bit but cannot see any solution that does not > > require a very large runtime overhead, and a lot of complexity. > > Another question is whether it is even possible to deduce the > inter-thread synchronization information from the executed > instructions alone. Valgrind only sees the executed instructions. IMHO > the complete algorithm is needed in order to deduce information about > which inter-thread synchronization operation is being executed. Yes, I agree. The wording in my previous message was poor. I am not claiming that this is even possible in the general case. I just don't know. I guess any attempt to solve this would need to look at all the data dependencies and how they effect the control flow. Definitely a research level question. J |
|
From: Bart V. A. <bar...@gm...> - 2008-10-12 17:29:45
|
On Sun, Oct 12, 2008 at 10:48 AM, Julian Seward <js...@ac...> wrote: > That would be a better solution. The function intercepting is complex > (to implement) and fragile, especially on ppc64-linux. The problem is how > to deduce, from observing the atomic instructions and sys_futex calls, what > the resulting inter-thread synchronisations are. I have considered this > problem a bit but cannot see any solution that does not require a very large > runtime overhead, and a lot of complexity. Another question is whether it is even possible to deduce the inter-thread synchronization information from the executed instructions alone. Valgrind only sees the executed instructions. IMHO the complete algorithm is needed in order to deduce information about which inter-thread synchronization operation is being executed. Bart. |
|
From: Julian S. <js...@ac...> - 2008-10-12 09:04:43
|
On Sunday 12 October 2008, Bart Van Assche wrote:
> Both Helgrind and DRD obtain information about loads and stores by
> instrumenting the executable code. And information about
> synchronization operations is gathered through "redirection":
> recognizing function names and replacing a call to a (library)
> function by a call to an instrumented function.
>
> If you have a look at the libgomp source code, you will see that in
> the "linux" version functions like gomp_mutex_lock() and
> gomp_mutex_unlock() have been declared inline. Which makes it
> impossible to intercept these functions. This difficulty does not
> exist in in the "posix" version of libgomp. That is why gcc has to be
> recompiled with the flag --disable-linux-futex.
Sérgio could legitimately ask, why do we need to intercept these
functions at all? Is it possible for DRD and Helgrind to work
without intercepting them?
Intercepting functions (basically, lock/unlock functions, barrier
functions, and other stuff like pthread_cond_{wait,signal}) is necessary
so that DRD and Helgrind can "see" the inter-thread synchronisation
events.
An alternative approach is to not intercept those functions. All such
functions (at least on Linux) appear to be implemented using a combination
of atomic instructions (lock-prefixed, or lwarx/stwcx) together with calls
to sys_futex to resolve contended cases.
That would be a better solution. The function intercepting is complex
(to implement) and fragile, especially on ppc64-linux. The problem is how
to deduce, from observing the atomic instructions and sys_futex calls, what
the resulting inter-thread synchronisations are. I have considered this
problem a bit but cannot see any solution that does not require a very large
runtime overhead, and a lot of complexity.
Here's a simplified example:
(global) volatile char c = 0;
(thread1) while (c == 0) { }; /*spinlock*/
(thread2) ...
c = 1
...
thread1 will not advance past the loop until thread2 sets c to 1. So there's
an inter-thread dependency here. (I'm not saying that the real threading
primitives, pthread_mutex_lock, etc, are implemented like this, but I do
believe that a general solution to the problem should also work for this
particular example).
So how do we know that there's an inter-thread dependency? We have to observe
that (a) thread1 is in a loop, (b) thread1 is reading a memory location which
it does not write in the loop, (c) the loop exit condition depends on the
value read from memory, (d) thread2 writes a value to that same memory
location, and (e) that the written value causes the loop to exit.
Which all sounds very complicated and difficult to me. Hence at the moment
we rely on intercepting pthread_mutex_lock, gomp_mutex_lock, etc, to see
such inter-thread dependencies.
If you can think of a solution to this ...
J
|
|
From: Bart V. A. <bar...@gm...> - 2008-10-12 06:58:25
|
On Sun, Oct 12, 2008 at 12:07 AM, Sérgio Durigan Júnior <ser...@li...> wrote: > So, could you explain a little more why do I have to recompile gcc using > the --disable-linux-futex parameter? Any thread checking tool needs at least the following information: * Which memory accesses have been performed by each thread. * Which synchronization operations have been performed by each thread. Both Helgrind and DRD obtain information about loads and stores by instrumenting the executable code. And information about synchronization operations is gathered through "redirection": recognizing function names and replacing a call to a (library) function by a call to an instrumented function. If you have a look at the libgomp source code, you will see that in the "linux" version functions like gomp_mutex_lock() and gomp_mutex_unlock() have been declared inline. Which makes it impossible to intercept these functions. This difficulty does not exist in in the "posix" version of libgomp. That is why gcc has to be recompiled with the flag --disable-linux-futex. Bart. |
|
From: Tom H. <th...@cy...> - 2008-10-12 03:31:59
|
Nightly build on alvis ( i686, Red Hat 7.3 ) started at 2008-10-12 03:15:02 BST Results unchanged from 24 hours ago Checking out valgrind source tree ... done Configuring valgrind ... done Building valgrind ... done Running regression tests ... failed Regression test results follow == 366 tests, 80 stderr failures, 2 stdout failures, 29 post failures == exp-ptrcheck/tests/bad_percentify (stderr) exp-ptrcheck/tests/base (stderr) exp-ptrcheck/tests/ccc (stderr) exp-ptrcheck/tests/fp (stderr) exp-ptrcheck/tests/globalerr (stderr) exp-ptrcheck/tests/hackedbz2 (stderr) exp-ptrcheck/tests/hp_bounds (stderr) exp-ptrcheck/tests/hp_dangle (stderr) exp-ptrcheck/tests/justify (stderr) exp-ptrcheck/tests/partial_bad (stderr) exp-ptrcheck/tests/partial_good (stderr) exp-ptrcheck/tests/pth_create (stderr) exp-ptrcheck/tests/pth_specific (stderr) exp-ptrcheck/tests/realloc (stderr) exp-ptrcheck/tests/stackerr (stderr) exp-ptrcheck/tests/strcpy (stderr) exp-ptrcheck/tests/supp (stderr) exp-ptrcheck/tests/tricky (stderr) exp-ptrcheck/tests/unaligned (stderr) exp-ptrcheck/tests/zero (stderr) helgrind/tests/hg01_all_ok (stderr) helgrind/tests/hg02_deadlock (stderr) helgrind/tests/hg03_inherit (stderr) helgrind/tests/hg04_race (stderr) helgrind/tests/hg05_race2 (stderr) helgrind/tests/hg06_readshared (stderr) helgrind/tests/tc01_simple_race (stderr) helgrind/tests/tc02_simple_tls (stderr) helgrind/tests/tc03_re_excl (stderr) helgrind/tests/tc05_simple_race (stderr) helgrind/tests/tc06_two_races (stderr) helgrind/tests/tc07_hbl1 (stderr) helgrind/tests/tc08_hbl2 (stderr) helgrind/tests/tc09_bad_unlock (stderr) helgrind/tests/tc11_XCHG (stderr) helgrind/tests/tc12_rwl_trivial (stderr) helgrind/tests/tc14_laog_dinphils (stderr) helgrind/tests/tc16_byterace (stderr) helgrind/tests/tc17_sembar (stderr) helgrind/tests/tc18_semabuse (stderr) helgrind/tests/tc19_shadowmem (stderr) helgrind/tests/tc20_verifywrap (stderr) helgrind/tests/tc21_pthonce (stderr) helgrind/tests/tc22_exit_w_lock (stderr) helgrind/tests/tc23_bogus_condwait (stderr) helgrind/tests/tc24_nonzero_sem (stderr) massif/tests/alloc-fns-A (post) massif/tests/alloc-fns-B (post) massif/tests/basic (post) massif/tests/basic2 (post) massif/tests/big-alloc (post) massif/tests/culling1 (stderr) massif/tests/culling2 (stderr) massif/tests/custom_alloc (post) massif/tests/deep-A (post) massif/tests/deep-B (stderr) massif/tests/deep-B (post) massif/tests/deep-C (stderr) massif/tests/deep-C (post) massif/tests/deep-D (post) massif/tests/ignoring (post) massif/tests/insig (post) massif/tests/long-names (post) massif/tests/long-time (post) massif/tests/new-cpp (post) massif/tests/null (post) massif/tests/one (post) massif/tests/overloaded-new (post) massif/tests/peak (post) massif/tests/peak2 (stderr) massif/tests/peak2 (post) massif/tests/realloc (stderr) massif/tests/realloc (post) massif/tests/thresholds_0_0 (post) massif/tests/thresholds_0_10 (post) massif/tests/thresholds_10_0 (post) massif/tests/thresholds_10_10 (post) massif/tests/thresholds_5_0 (post) massif/tests/thresholds_5_10 (post) massif/tests/zero1 (post) massif/tests/zero2 (post) memcheck/tests/file_locking (stderr) memcheck/tests/leak-0 (stderr) memcheck/tests/leak-cycle (stderr) memcheck/tests/leak-regroot (stderr) memcheck/tests/leak-tree (stderr) memcheck/tests/long_namespace_xml (stderr) memcheck/tests/malloc_free_fill (stderr) memcheck/tests/origin1-yes (stderr) memcheck/tests/origin4-many (stderr) memcheck/tests/origin5-bz2 (stderr) memcheck/tests/pointer-trace (stderr) memcheck/tests/stack_changes (stderr) memcheck/tests/varinfo1 (stderr) memcheck/tests/varinfo2 (stderr) memcheck/tests/varinfo3 (stderr) memcheck/tests/varinfo4 (stderr) memcheck/tests/varinfo5 (stderr) memcheck/tests/varinfo6 (stderr) memcheck/tests/x86/bug152022 (stderr) memcheck/tests/x86/scalar (stderr) memcheck/tests/x86/scalar_supp (stderr) memcheck/tests/x86/xor-undef-x86 (stderr) memcheck/tests/xml1 (stderr) none/tests/blockfault (stderr) none/tests/cmdline2 (stdout) none/tests/mremap2 (stdout) none/tests/shell (stderr) none/tests/shell_valid1 (stderr) none/tests/shell_valid2 (stderr) none/tests/shell_valid3 (stderr) |
|
From: Tom H. <th...@cy...> - 2008-10-12 03:04:37
|
Nightly build on lloyd ( x86_64, Fedora 7 ) started at 2008-10-12 03:05:06 BST Results differ from 24 hours ago Checking out valgrind source tree ... done Configuring valgrind ... done Building valgrind ... done Running regression tests ... failed Regression test results follow == 460 tests, 11 stderr failures, 3 stdout failures, 0 post failures == exp-ptrcheck/tests/base (stderr) exp-ptrcheck/tests/ccc (stderr) exp-ptrcheck/tests/pth_create (stderr) exp-ptrcheck/tests/pth_specific (stderr) helgrind/tests/tc20_verifywrap (stderr) helgrind/tests/tc22_exit_w_lock (stderr) memcheck/tests/file_locking (stderr) memcheck/tests/malloc_free_fill (stderr) memcheck/tests/pointer-trace (stderr) memcheck/tests/vcpu_fnfns (stdout) memcheck/tests/x86/scalar (stderr) none/tests/blockfault (stderr) none/tests/cmdline2 (stdout) none/tests/mremap2 (stdout) ================================================= == Results from 24 hours ago == ================================================= Checking out valgrind source tree ... done Configuring valgrind ... done Building valgrind ... done Running regression tests ... failed Regression test results follow == 460 tests, 11 stderr failures, 4 stdout failures, 0 post failures == drd/tests/pth_detached2 (stdout) exp-ptrcheck/tests/base (stderr) exp-ptrcheck/tests/ccc (stderr) exp-ptrcheck/tests/pth_create (stderr) exp-ptrcheck/tests/pth_specific (stderr) helgrind/tests/tc20_verifywrap (stderr) helgrind/tests/tc22_exit_w_lock (stderr) memcheck/tests/file_locking (stderr) memcheck/tests/malloc_free_fill (stderr) memcheck/tests/pointer-trace (stderr) memcheck/tests/vcpu_fnfns (stdout) memcheck/tests/x86/scalar (stderr) none/tests/blockfault (stderr) none/tests/cmdline2 (stdout) none/tests/mremap2 (stdout) ================================================= == Difference between 24 hours ago and now == ================================================= *** old.short Sun Oct 12 03:32:42 2008 --- new.short Sun Oct 12 04:04:23 2008 *************** *** 8,11 **** ! == 460 tests, 11 stderr failures, 4 stdout failures, 0 post failures == ! drd/tests/pth_detached2 (stdout) exp-ptrcheck/tests/base (stderr) --- 8,10 ---- ! == 460 tests, 11 stderr failures, 3 stdout failures, 0 post failures == exp-ptrcheck/tests/base (stderr) |
|
From: Tom H. <th...@cy...> - 2008-10-12 02:47:23
|
Nightly build on trojan ( x86_64, Fedora Core 6 ) started at 2008-10-12 03:25:05 BST Results unchanged from 24 hours ago Checking out valgrind source tree ... done Configuring valgrind ... done Building valgrind ... done Running regression tests ... failed Regression test results follow == 464 tests, 13 stderr failures, 5 stdout failures, 0 post failures == exp-ptrcheck/tests/ccc (stderr) exp-ptrcheck/tests/pth_create (stderr) exp-ptrcheck/tests/pth_specific (stderr) helgrind/tests/tc17_sembar (stderr) helgrind/tests/tc20_verifywrap (stderr) helgrind/tests/tc21_pthonce (stderr) helgrind/tests/tc22_exit_w_lock (stderr) memcheck/tests/file_locking (stderr) memcheck/tests/malloc_free_fill (stderr) memcheck/tests/pointer-trace (stderr) memcheck/tests/vcpu_fnfns (stdout) memcheck/tests/x86/bug133694 (stdout) memcheck/tests/x86/bug133694 (stderr) memcheck/tests/x86/scalar (stderr) none/tests/blockfault (stderr) none/tests/cmdline1 (stdout) none/tests/cmdline2 (stdout) none/tests/mremap2 (stdout) |
|
From: Tom H. <th...@cy...> - 2008-10-12 02:27:46
|
Nightly build on gill ( x86_64, Fedora Core 2 ) started at 2008-10-12 03:00:02 BST Results unchanged from 24 hours ago Checking out valgrind source tree ... done Configuring valgrind ... done Building valgrind ... done Running regression tests ... failed Regression test results follow == 466 tests, 34 stderr failures, 4 stdout failures, 0 post failures == drd/tests/pth_cancel_locked (stderr) exp-ptrcheck/tests/ccc (stderr) exp-ptrcheck/tests/hackedbz2 (stderr) helgrind/tests/hg01_all_ok (stderr) helgrind/tests/hg02_deadlock (stderr) helgrind/tests/hg03_inherit (stderr) helgrind/tests/hg04_race (stderr) helgrind/tests/hg05_race2 (stderr) helgrind/tests/tc01_simple_race (stderr) helgrind/tests/tc05_simple_race (stderr) helgrind/tests/tc06_two_races (stderr) helgrind/tests/tc09_bad_unlock (stderr) helgrind/tests/tc14_laog_dinphils (stderr) helgrind/tests/tc16_byterace (stderr) helgrind/tests/tc17_sembar (stderr) helgrind/tests/tc19_shadowmem (stderr) helgrind/tests/tc20_verifywrap (stderr) helgrind/tests/tc21_pthonce (stderr) helgrind/tests/tc22_exit_w_lock (stderr) helgrind/tests/tc23_bogus_condwait (stderr) memcheck/tests/file_locking (stderr) memcheck/tests/malloc_free_fill (stderr) memcheck/tests/origin5-bz2 (stderr) memcheck/tests/pointer-trace (stderr) memcheck/tests/stack_switch (stderr) memcheck/tests/varinfo6 (stderr) memcheck/tests/x86/scalar (stderr) memcheck/tests/x86/scalar_supp (stderr) none/tests/amd64/insn_ssse3 (stdout) none/tests/amd64/insn_ssse3 (stderr) none/tests/amd64/ssse3_misaligned (stderr) none/tests/blockfault (stderr) none/tests/cmdline2 (stdout) none/tests/fdleak_fcntl (stderr) none/tests/mremap2 (stdout) none/tests/x86/insn_ssse3 (stdout) none/tests/x86/insn_ssse3 (stderr) none/tests/x86/ssse3_misaligned (stderr) |