You can subscribe to this list here.
| 2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
(122) |
Nov
(152) |
Dec
(69) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 |
Jan
(6) |
Feb
(25) |
Mar
(73) |
Apr
(82) |
May
(24) |
Jun
(25) |
Jul
(10) |
Aug
(11) |
Sep
(10) |
Oct
(54) |
Nov
(203) |
Dec
(182) |
| 2004 |
Jan
(307) |
Feb
(305) |
Mar
(430) |
Apr
(312) |
May
(187) |
Jun
(342) |
Jul
(487) |
Aug
(637) |
Sep
(336) |
Oct
(373) |
Nov
(441) |
Dec
(210) |
| 2005 |
Jan
(385) |
Feb
(480) |
Mar
(636) |
Apr
(544) |
May
(679) |
Jun
(625) |
Jul
(810) |
Aug
(838) |
Sep
(634) |
Oct
(521) |
Nov
(965) |
Dec
(543) |
| 2006 |
Jan
(494) |
Feb
(431) |
Mar
(546) |
Apr
(411) |
May
(406) |
Jun
(322) |
Jul
(256) |
Aug
(401) |
Sep
(345) |
Oct
(542) |
Nov
(308) |
Dec
(481) |
| 2007 |
Jan
(427) |
Feb
(326) |
Mar
(367) |
Apr
(255) |
May
(244) |
Jun
(204) |
Jul
(223) |
Aug
(231) |
Sep
(354) |
Oct
(374) |
Nov
(497) |
Dec
(362) |
| 2008 |
Jan
(322) |
Feb
(482) |
Mar
(658) |
Apr
(422) |
May
(476) |
Jun
(396) |
Jul
(455) |
Aug
(267) |
Sep
(280) |
Oct
(253) |
Nov
(232) |
Dec
(304) |
| 2009 |
Jan
(486) |
Feb
(470) |
Mar
(458) |
Apr
(423) |
May
(696) |
Jun
(461) |
Jul
(551) |
Aug
(575) |
Sep
(134) |
Oct
(110) |
Nov
(157) |
Dec
(102) |
| 2010 |
Jan
(226) |
Feb
(86) |
Mar
(147) |
Apr
(117) |
May
(107) |
Jun
(203) |
Jul
(193) |
Aug
(238) |
Sep
(300) |
Oct
(246) |
Nov
(23) |
Dec
(75) |
| 2011 |
Jan
(133) |
Feb
(195) |
Mar
(315) |
Apr
(200) |
May
(267) |
Jun
(293) |
Jul
(353) |
Aug
(237) |
Sep
(278) |
Oct
(611) |
Nov
(274) |
Dec
(260) |
| 2012 |
Jan
(303) |
Feb
(391) |
Mar
(417) |
Apr
(441) |
May
(488) |
Jun
(655) |
Jul
(590) |
Aug
(610) |
Sep
(526) |
Oct
(478) |
Nov
(359) |
Dec
(372) |
| 2013 |
Jan
(467) |
Feb
(226) |
Mar
(391) |
Apr
(281) |
May
(299) |
Jun
(252) |
Jul
(311) |
Aug
(352) |
Sep
(481) |
Oct
(571) |
Nov
(222) |
Dec
(231) |
| 2014 |
Jan
(185) |
Feb
(329) |
Mar
(245) |
Apr
(238) |
May
(281) |
Jun
(399) |
Jul
(382) |
Aug
(500) |
Sep
(579) |
Oct
(435) |
Nov
(487) |
Dec
(256) |
| 2015 |
Jan
(338) |
Feb
(357) |
Mar
(330) |
Apr
(294) |
May
(191) |
Jun
(108) |
Jul
(142) |
Aug
(261) |
Sep
(190) |
Oct
(54) |
Nov
(83) |
Dec
(22) |
| 2016 |
Jan
(49) |
Feb
(89) |
Mar
(33) |
Apr
(50) |
May
(27) |
Jun
(34) |
Jul
(53) |
Aug
(53) |
Sep
(98) |
Oct
(206) |
Nov
(93) |
Dec
(53) |
| 2017 |
Jan
(65) |
Feb
(82) |
Mar
(102) |
Apr
(86) |
May
(187) |
Jun
(67) |
Jul
(23) |
Aug
(93) |
Sep
(65) |
Oct
(45) |
Nov
(35) |
Dec
(17) |
| 2018 |
Jan
(26) |
Feb
(35) |
Mar
(38) |
Apr
(32) |
May
(8) |
Jun
(43) |
Jul
(27) |
Aug
(30) |
Sep
(43) |
Oct
(42) |
Nov
(38) |
Dec
(67) |
| 2019 |
Jan
(32) |
Feb
(37) |
Mar
(53) |
Apr
(64) |
May
(49) |
Jun
(18) |
Jul
(14) |
Aug
(53) |
Sep
(25) |
Oct
(30) |
Nov
(49) |
Dec
(31) |
| 2020 |
Jan
(87) |
Feb
(45) |
Mar
(37) |
Apr
(51) |
May
(99) |
Jun
(36) |
Jul
(11) |
Aug
(14) |
Sep
(20) |
Oct
(24) |
Nov
(40) |
Dec
(23) |
| 2021 |
Jan
(14) |
Feb
(53) |
Mar
(85) |
Apr
(15) |
May
(19) |
Jun
(3) |
Jul
(14) |
Aug
(1) |
Sep
(57) |
Oct
(73) |
Nov
(56) |
Dec
(22) |
| 2022 |
Jan
(3) |
Feb
(22) |
Mar
(6) |
Apr
(55) |
May
(46) |
Jun
(39) |
Jul
(15) |
Aug
(9) |
Sep
(11) |
Oct
(34) |
Nov
(20) |
Dec
(36) |
| 2023 |
Jan
(79) |
Feb
(41) |
Mar
(99) |
Apr
(169) |
May
(48) |
Jun
(16) |
Jul
(16) |
Aug
(57) |
Sep
(19) |
Oct
|
Nov
|
Dec
|
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
|
|
|
|
|
1
|
2
|
3
|
|
4
(1) |
5
(1) |
6
(5) |
7
|
8
|
9
|
10
|
|
11
|
12
|
13
|
14
(3) |
15
(2) |
16
(3) |
17
|
|
18
|
19
(2) |
20
(7) |
21
(2) |
22
(7) |
23
|
24
|
|
25
(2) |
26
|
27
|
28
(1) |
29
|
30
(2) |
|
|
From: Philippe W. <phi...@so...> - 2018-11-25 20:35:38
|
https://sourceware.org/git/gitweb.cgi?p=valgrind.git;h=7c26e71c096addf193502334c69b06abe3d86766 commit 7c26e71c096addf193502334c69b06abe3d86766 Author: Philippe Waroquiers <phi...@sk...> Date: Sun Nov 25 19:51:53 2018 +0100 Always output all leak kinds in a xtree leak result file. - The option --xtree-leak=yes (to output leak result in xtree format) automatically activates the option --show-leak-kinds=all, as xtree visualisation tools such as kcachegrind can in any case select what kind of leak to visualise. Diff: --- NEWS | 6 ++++++ memcheck/docs/mc-manual.xml | 8 +++++--- memcheck/mc_main.c | 1 + 3 files changed, 12 insertions(+), 3 deletions(-) diff --git a/NEWS b/NEWS index 8b6d4b3..c311665 100644 --- a/NEWS +++ b/NEWS @@ -29,6 +29,12 @@ support for X86/macOS 10.13, AMD64/macOS 10.13. - The default value for --read-inline-info is now "yes" on Linux/Android/Solaris. It is still "no" on other OS. +* Memcheck: + - The option --xtree-leak=yes (to output leak result in xtree format) + automatically activates the option --show-leak-kinds=all, + as xtree visualisation tools such as kcachegrind can in any case + select what kind of leak to visualise. + * ==================== OTHER CHANGES ==================== diff --git a/memcheck/docs/mc-manual.xml b/memcheck/docs/mc-manual.xml index eb1dfab..a993479 100644 --- a/memcheck/docs/mc-manual.xml +++ b/memcheck/docs/mc-manual.xml @@ -888,9 +888,11 @@ is <option>--errors-for-leak-kinds=definite,possible</option> <listitem> <para>If set to yes, the results for the leak search done at exit will be output in a 'Callgrind Format' execution tree file. Note that this - automatically sets the option <option>--leak-check=full</option>. - The produced file - will contain the following events:</para> + automatically sets the options <option>--leak-check=full</option> + and <option>--show-leak-kinds=all</option>, to allow + xtree visualisation tools such as kcachegrind to select what kind + to leak to visualise. + The produced file will contain the following events:</para> <itemizedlist> <listitem><para><option>RB</option> : Reachable Bytes</para></listitem> <listitem><para><option>PB</option> : Possibly lost Bytes</para></listitem> diff --git a/memcheck/mc_main.c b/memcheck/mc_main.c index 9b2e654..3ef7cb9 100644 --- a/memcheck/mc_main.c +++ b/memcheck/mc_main.c @@ -7997,6 +7997,7 @@ static void mc_fini ( Int exitcode ) MC_(clo_xtree_leak_file)); lcp.xt_filename = xt_filename; lcp.mode = LC_Full; + lcp.show_leak_kinds = MC_(all_Reachedness)(); } else lcp.xt_filename = NULL; |
|
From: Olaf H. <ol...@ae...> - 2018-11-25 20:28:31
|
The following changes since commit ddfc274b24a1ae3b57166ada1fe97acb433b9b79: s390x: More fixes for z13 support (2018-11-22 13:45:56 +0100) are available in the Git repository at: https://github.com/olafhering/valgrind bug390553-20181125-ddfc274b2 for you to fetch changes up to 1c102a54e05843c6525f536c4844b68fafaa0955: fix whitespace in syswrap-xen.c (2018-11-25 21:11:03 +0100) This will address https://bugs.kde.org/show_bug.cgi?id=390553 Thanks. ---------------------------------------------------------------- Olaf Hering (101): Remove dead code from XEN_DOMCTL_monitor_op fix xen_sysctl_numainfo handling Expect earliest version for versioned xen domctl/sysctl fix typo in xen domctl and sysctl header remove unhelpful comments from xen domctl merge two xen domctl values for clearity mention sysctl and domctl numbers from ancient Xen versions xen: include vki-xen-physdev.h earlier in vki-xen.h xen-3.0: versioned xen_domctl_settimeoffset xen-3.0.4: versioned xen_domctl_createdomain xen-3.1: handle IOCTL_GNTDEV_MAP_GRANT_REF xen-3.1: handle IOCTL_GNTDEV_UNMAP_GRANT_REF xen-3.1: handle IOCTL_GNTDEV_GET_OFFSET_FOR_VADDR xen-3.3: handle IOCTL_GNTDEV_SET_MAX_GRANTS xen-3.4: handle XENMEM_set_pod_target/XENMEM_get_pod_target xen-3.4: versioned hvmcontext_partial xen-4.1: versioned XEN_SYSCTL_numainfo xen-4.2: handle IOCTL_GNTALLOC_ALLOC_GREF xen-4.2: handle IOCTL_GNTALLOC_DEALLOC_GREF xen-4.2: handle IOCTL_GNTALLOC_SET_UNMAP_NOTIFY xen-4.2: define sharing_op xen-4.4: define add_to_physmap_batch xen-4.5: define sysctl psr_cmt_op xen-4.5: define GNTTABOP_cache_flush xen-4.5: define domctl setvnumainfo xen-4.5: define domctl psr_cmt_op xen-4.5: define domctl arm_configure_domain xen-4.5: define XENMEM_get_vnumainfo xen-4.5: versioned XEN_SYSCTL_topologyinfo xen-4.5: handle all versioned domctl ops xen-4.6: adjust case value for VKI_XEN_DOMCTL_monitor_op xen-4.6: new sysctl value xen-4.6: versioned xen_domctl_createdomain xen-4.6: versioned xen_domctl_settimeoffset xen-4.6: define domctl psr_cat_op xen-4.6: define XENMEM_reserved_device_memory_map xen-4.6: versioned XEN_SYSCTL_numainfo xen-4.6: handle XEN_SYSCTL_cputopoinfo xen-4.6: handle XEN_SYSCTL_pcitopoinfo xen-4.6: define sysctl psr_cat_op xen-4.6: define sysctl tmem_op xen-4.6: define hypercall xenpmu_op xen-4.6: handle all versioned domctl ops xen-4.6: handle all versioned sysctl ops xen-4.7: new sysctl value xen-4.7: fix domctl value in comment xen-4.7: versioned xen_arch_domainconfig xen-4.7: define XEN_VCPUAFFINITY_FORCE xen-4.7: define SCHEDOP put/getvcpuinfo xen-4.7: handle domctl soft_reset xen-4.7: define SCHEDOP_pin_override xen-4.7: versioned XEN_SYSCTL_get_cpu_featureset xen-4.7: define sysctl get_cpu_levelling_caps xen-4.7: define sysctl livepatch_op xen-4.7: handle XENVER_build_id xen-4.7: handle all versioned sysctl ops xen-4.8: new domctl value xen-4.8: new sysctl value xen-4.8: handle IOCTL_GNTDEV_GRANT_COPY xen-4.8: versioned xen_domctl_monitor_op xen-4.8: handle all versioned domctl ops xen-4.8: handle all versioned sysctl ops xen-4.9: new domctl value xen-4.9: new sysctl value xen-4.9: define NULL scheduler xen-4.9: define monitor event INTERRUPT and DESC_ACCESS xen-4.9: define sysctl gcov_op, which replaces coverage_op xen-4.9: handle dm_op hypercall xen-4.9: handle IOCTL_PRIVCMD_DM_OP xen-4.9: handle IOCTL_PRIVCMD_RESTRICT xen-4.9: handle all versioned domctl ops xen-4.9: handle all versioned sysctl ops xen-4.10: add domctl value xen-4.10: new sysctl value xen-4.10: handle xen_domctl_assign_device xen-4.10: versioned hvmcontext_partial xen-4.10: versioned xen_domctl_monitor_op xen-4.10: define monitor event EMUL_UNIMPLEMENTED xen-4.10: support xen_domctl_set_gnttab_limits xen-4.10: define domctl vuart_op xen-4.10: versioned xen_sysctl_physinfo xen-4.10: define sysctl set_parameter xen-4.10: handle all versioned domctl ops xen-4.10: handle all versioned sysctl ops xen-4.10.1: new domctl value from shim xen-4.10.1: versioned xen_domctl_getdomaininfo xen-4.10.1: handle all versioned domctl ops xen-4.11: new domctl value xen-4.11: new sysctl value xen-4.11: versioned xen_domctl_monitor_op xen-4.11: handle IOCTL_PRIVCMD_MMAP_RESOURCE xen-4.11: handle all versioned domctl ops xen-4.11: handle all versioned sysctl ops xen-4.12: new domctl value xen-4.12: new sysctl value xen-4.12: define sysctl get_cpu_policy xen-4.12: handle IOCTL_PRIVCMD_UNIMPLEMENTED xen-4.12: versioned xen_domctl_createdomain xen-4.12: handle all versioned domctl ops xen-4.12: handle all versioned sysctl ops fix whitespace in syswrap-xen.c coregrind/m_syswrap/syswrap-linux.c | 154 ++++++ coregrind/m_syswrap/syswrap-xen.c | 1014 +++++++++++++++++++++++++++++------ include/vki/vki-linux.h | 110 ++++ include/vki/vki-xen-domctl.h | 246 ++++++++- include/vki/vki-xen-gnttab.h | 1 + include/vki/vki-xen-memory.h | 12 + include/vki/vki-xen-physdev.h | 9 + include/vki/vki-xen-schedop.h | 2 + include/vki/vki-xen-sysctl.h | 99 +++- include/vki/vki-xen-version.h | 11 + include/vki/vki-xen.h | 4 +- 11 files changed, 1469 insertions(+), 193 deletions(-) |