You can subscribe to this list here.
| 2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
(122) |
Nov
(152) |
Dec
(69) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 |
Jan
(6) |
Feb
(25) |
Mar
(73) |
Apr
(82) |
May
(24) |
Jun
(25) |
Jul
(10) |
Aug
(11) |
Sep
(10) |
Oct
(54) |
Nov
(203) |
Dec
(182) |
| 2004 |
Jan
(307) |
Feb
(305) |
Mar
(430) |
Apr
(312) |
May
(187) |
Jun
(342) |
Jul
(487) |
Aug
(637) |
Sep
(336) |
Oct
(373) |
Nov
(441) |
Dec
(210) |
| 2005 |
Jan
(385) |
Feb
(480) |
Mar
(636) |
Apr
(544) |
May
(679) |
Jun
(625) |
Jul
(810) |
Aug
(838) |
Sep
(634) |
Oct
(521) |
Nov
(965) |
Dec
(543) |
| 2006 |
Jan
(494) |
Feb
(431) |
Mar
(546) |
Apr
(411) |
May
(406) |
Jun
(322) |
Jul
(256) |
Aug
(401) |
Sep
(345) |
Oct
(542) |
Nov
(308) |
Dec
(481) |
| 2007 |
Jan
(427) |
Feb
(326) |
Mar
(367) |
Apr
(255) |
May
(244) |
Jun
(204) |
Jul
(223) |
Aug
(231) |
Sep
(354) |
Oct
(374) |
Nov
(497) |
Dec
(362) |
| 2008 |
Jan
(322) |
Feb
(482) |
Mar
(658) |
Apr
(422) |
May
(476) |
Jun
(396) |
Jul
(455) |
Aug
(267) |
Sep
(280) |
Oct
(253) |
Nov
(232) |
Dec
(304) |
| 2009 |
Jan
(486) |
Feb
(470) |
Mar
(458) |
Apr
(423) |
May
(696) |
Jun
(461) |
Jul
(551) |
Aug
(575) |
Sep
(134) |
Oct
(110) |
Nov
(157) |
Dec
(102) |
| 2010 |
Jan
(226) |
Feb
(86) |
Mar
(147) |
Apr
(117) |
May
(107) |
Jun
(203) |
Jul
(193) |
Aug
(238) |
Sep
(300) |
Oct
(246) |
Nov
(23) |
Dec
(75) |
| 2011 |
Jan
(133) |
Feb
(195) |
Mar
(315) |
Apr
(200) |
May
(267) |
Jun
(293) |
Jul
(353) |
Aug
(237) |
Sep
(278) |
Oct
(611) |
Nov
(274) |
Dec
(260) |
| 2012 |
Jan
(303) |
Feb
(391) |
Mar
(417) |
Apr
(441) |
May
(488) |
Jun
(655) |
Jul
(590) |
Aug
(610) |
Sep
(526) |
Oct
(478) |
Nov
(359) |
Dec
(372) |
| 2013 |
Jan
(467) |
Feb
(226) |
Mar
(391) |
Apr
(281) |
May
(299) |
Jun
(252) |
Jul
(311) |
Aug
(352) |
Sep
(481) |
Oct
(571) |
Nov
(222) |
Dec
(231) |
| 2014 |
Jan
(185) |
Feb
(329) |
Mar
(245) |
Apr
(238) |
May
(281) |
Jun
(399) |
Jul
(382) |
Aug
(500) |
Sep
(579) |
Oct
(435) |
Nov
(487) |
Dec
(256) |
| 2015 |
Jan
(338) |
Feb
(357) |
Mar
(330) |
Apr
(294) |
May
(191) |
Jun
(108) |
Jul
(142) |
Aug
(261) |
Sep
(190) |
Oct
(54) |
Nov
(83) |
Dec
(22) |
| 2016 |
Jan
(49) |
Feb
(89) |
Mar
(33) |
Apr
(50) |
May
(27) |
Jun
(34) |
Jul
(53) |
Aug
(53) |
Sep
(98) |
Oct
(206) |
Nov
(93) |
Dec
(53) |
| 2017 |
Jan
(65) |
Feb
(82) |
Mar
(102) |
Apr
(86) |
May
(187) |
Jun
(67) |
Jul
(23) |
Aug
(93) |
Sep
(65) |
Oct
(45) |
Nov
(35) |
Dec
(17) |
| 2018 |
Jan
(26) |
Feb
(35) |
Mar
(38) |
Apr
(32) |
May
(8) |
Jun
(43) |
Jul
(27) |
Aug
(30) |
Sep
(43) |
Oct
(42) |
Nov
(38) |
Dec
(67) |
| 2019 |
Jan
(32) |
Feb
(37) |
Mar
(53) |
Apr
(64) |
May
(49) |
Jun
(18) |
Jul
(14) |
Aug
(53) |
Sep
(25) |
Oct
(30) |
Nov
(49) |
Dec
(31) |
| 2020 |
Jan
(87) |
Feb
(45) |
Mar
(37) |
Apr
(51) |
May
(99) |
Jun
(36) |
Jul
(11) |
Aug
(14) |
Sep
(20) |
Oct
(24) |
Nov
(40) |
Dec
(23) |
| 2021 |
Jan
(14) |
Feb
(53) |
Mar
(85) |
Apr
(15) |
May
(19) |
Jun
(3) |
Jul
(14) |
Aug
(1) |
Sep
(57) |
Oct
(73) |
Nov
(56) |
Dec
(22) |
| 2022 |
Jan
(3) |
Feb
(22) |
Mar
(6) |
Apr
(55) |
May
(46) |
Jun
(39) |
Jul
(15) |
Aug
(9) |
Sep
(11) |
Oct
(34) |
Nov
(20) |
Dec
(36) |
| 2023 |
Jan
(79) |
Feb
(41) |
Mar
(99) |
Apr
(169) |
May
(48) |
Jun
(16) |
Jul
(16) |
Aug
(57) |
Sep
(19) |
Oct
|
Nov
|
Dec
|
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
|
|
|
1
(8) |
2
(11) |
3
(21) |
4
(15) |
5
(10) |
|
6
(7) |
7
(7) |
8
(5) |
9
(7) |
10
(5) |
11
(1) |
12
(21) |
|
13
(8) |
14
(17) |
15
(6) |
16
(10) |
17
(7) |
18
(6) |
19
(15) |
|
20
(12) |
21
(16) |
22
(25) |
23
(14) |
24
(10) |
25
(7) |
26
(6) |
|
27
(34) |
28
(13) |
29
(10) |
30
(8) |
|
|
|
|
From: Tom H. <th...@cy...> - 2004-06-26 11:28:05
|
CVS commit by thughes:
Implement an emulated soft limit for file descriptors in addition to
the current reserved area, which effectively acts as a hard limit. The
setrlimit system call now simply updates the emulated limits as best
as possible - the hard limit is not allowed to move at all and just
returns EPERM if you try and change it.
This should stop reductions in the soft limit causing assertions when
valgrind tries to allocate descriptors from the reserved area.
A none/tests/rlimit_nofile.c 1.1 [POSSIBLY UNSAFE: printf] [no copyright]
A none/tests/rlimit_nofile.stderr.exp 1.1
A none/tests/rlimit_nofile.stdout.exp 1.1
A none/tests/rlimit_nofile.vgtest 1.1
M +3 -2 coregrind/vg_include.h 1.197
M +7 -5 coregrind/vg_main.c 1.164
M +3 -3 coregrind/vg_mylibc.c 1.74
M +40 -26 coregrind/vg_syscalls.c 1.103
M +1 -0 none/tests/.cvsignore 1.17
M +4 -2 none/tests/Makefile.am 1.39
--- valgrind/coregrind/vg_include.h #1.196:1.197
@@ -178,6 +178,7 @@ extern Int VG_(main_pid);
extern Int VG_(main_pgrp);
-/* Maximum allowed application-visible file descriptor */
-extern Int VG_(max_fd);
+/* Application-visible file descriptor limits */
+extern Int VG_(fd_soft_limit);
+extern Int VG_(fd_hard_limit);
/* Should we stop collecting errors if too many appear? default: YES */
--- valgrind/coregrind/vg_main.c #1.163:1.164
@@ -144,6 +144,7 @@ Int VG_(main_pid);
Int VG_(main_pgrp);
-/* Maximum allowed application-visible file descriptor */
-Int VG_(max_fd) = -1;
+/* Application-visible file descriptor limits */
+Int VG_(fd_soft_limit) = -1;
+Int VG_(fd_hard_limit) = -1;
/* As deduced from esp_at_startup, the client's argc, argv[] and
@@ -1906,5 +1907,5 @@ static void process_cmd_line_options( UI
/* Move log_fd into the safe range, so it doesn't conflict with any app fds */
- eventually_log_fd = VG_(fcntl)(VG_(clo_log_fd), VKI_F_DUPFD, VG_(max_fd)+1);
+ eventually_log_fd = VG_(fcntl)(VG_(clo_log_fd), VKI_F_DUPFD, VG_(fd_hard_limit));
if (eventually_log_fd < 0)
VG_(message)(Vg_UserMsg, "valgrind: failed to move logfile fd into safe range");
@@ -2025,5 +2026,6 @@ static void setup_file_descriptors(void)
/* Reserve some file descriptors for our use. */
- VG_(max_fd) = rl.rlim_cur - VG_N_RESERVED_FDS;
+ VG_(fd_soft_limit) = rl.rlim_cur - VG_N_RESERVED_FDS;
+ VG_(fd_hard_limit) = rl.rlim_cur - VG_N_RESERVED_FDS;
/* Update the soft limit. */
@@ -2800,5 +2802,5 @@ int main(int argc, char **argv)
// Process Valgrind's + tool's command-line options
// p: load_tool() [for 'tool']
- // p: setup_file_descriptors() [for 'VG_(max_fd)']
+ // p: setup_file_descriptors() [for 'VG_(fd_xxx_limit)']
// p: sk_pre_clo_init [to set 'command_line_options' need]
//--------------------------------------------------------------
--- valgrind/coregrind/vg_mylibc.c #1.73:1.74
@@ -1264,7 +1264,7 @@ Int VG_(safe_fd)(Int oldfd)
Int newfd;
- vg_assert(VG_(max_fd) != -1);
+ vg_assert(VG_(fd_hard_limit) != -1);
- newfd = VG_(fcntl)(oldfd, VKI_F_DUPFD, VG_(max_fd)+1);
+ newfd = VG_(fcntl)(oldfd, VKI_F_DUPFD, VG_(fd_hard_limit));
if (newfd != -1)
VG_(close)(oldfd);
@@ -1272,5 +1272,5 @@ Int VG_(safe_fd)(Int oldfd)
VG_(fcntl)(newfd, VKI_F_SETFD, VKI_FD_CLOEXEC);
- vg_assert(newfd > VG_(max_fd));
+ vg_assert(newfd >= VG_(fd_hard_limit));
return newfd;
}
--- valgrind/coregrind/vg_syscalls.c #1.102:1.103
@@ -514,5 +514,5 @@ void record_fd_close(Int tid, Int fd)
OpenFd *i = allocated_fds;
- if (fd > VG_(max_fd))
+ if (fd >= VG_(fd_hard_limit))
return; /* Valgrind internal */
@@ -547,5 +547,5 @@ void record_fd_open(Int tid, Int fd, cha
OpenFd *i;
- if (fd > VG_(max_fd))
+ if (fd >= VG_(fd_hard_limit))
return; /* Valgrind internal */
@@ -1056,7 +1056,7 @@ static Addr do_brk(Addr newbrk)
/* Return true if we're allowed to use or create this fd */
-static Bool fd_allowed(Int fd, const Char *syscall, ThreadId tid)
+static Bool fd_allowed(Int fd, const Char *syscall, ThreadId tid, Bool soft)
{
- if (fd < 0 || fd > VG_(max_fd) || fd == VG_(clo_log_fd)) {
+ if (fd < 0 || fd >= VG_(fd_hard_limit) || fd == VG_(clo_log_fd)) {
VG_(message)(Vg_UserMsg,
"Warning: invalid file descriptor %d in syscall %s()",
@@ -1071,4 +1071,7 @@ static Bool fd_allowed(Int fd, const Cha
return False;
}
+ else if (soft && fd >= VG_(fd_soft_limit)) {
+ return False;
+ }
return True;
}
@@ -2100,5 +2103,5 @@ PRE(close)
MAYBE_PRINTF("close ( %d )\n",arg1);
/* Detect and negate attempts by the client to close Valgrind's log fd */
- if (!fd_allowed(arg1, "close", tid))
+ if (!fd_allowed(arg1, "close", tid, False))
res = -VKI_EBADF;
}
@@ -2118,5 +2121,5 @@ POST(dup)
{
MAYBE_PRINTF("%d\n", res);
- if (!fd_allowed(res, "dup", tid)) {
+ if (!fd_allowed(res, "dup", tid, True)) {
VG_(close)(res);
res = -VKI_EMFILE;
@@ -2131,5 +2134,5 @@ PRE(dup2)
/* int dup2(int oldfd, int newfd); */
MAYBE_PRINTF("dup2 ( %d, %d ) ...\n", arg1,arg2);
- if (!fd_allowed(arg2, "dup2", tid))
+ if (!fd_allowed(arg2, "dup2", tid, True))
res = -VKI_EBADF;
}
@@ -2153,5 +2156,5 @@ POST(fcntl)
{
if (arg2 == VKI_F_DUPFD) {
- if (!fd_allowed(res, "fcntl(DUPFD)", tid)) {
+ if (!fd_allowed(res, "fcntl(DUPFD)", tid, True)) {
VG_(close)(res);
res = -VKI_EMFILE;
@@ -2192,5 +2195,5 @@ POST(fcntl64)
{
if (arg2 == VKI_F_DUPFD) {
- if (!fd_allowed(res, "fcntl64(DUPFD)", tid)) {
+ if (!fd_allowed(res, "fcntl64(DUPFD)", tid, True)) {
VG_(close)(res);
res = -VKI_EMFILE;
@@ -2513,5 +2516,6 @@ POST(getrlimit)
switch(arg1) {
case VKI_RLIMIT_NOFILE:
- ((vki_rlimit *)arg2)->rlim_cur = VG_(max_fd);
+ ((vki_rlimit *)arg2)->rlim_cur = VG_(fd_soft_limit);
+ ((vki_rlimit *)arg2)->rlim_max = VG_(fd_hard_limit);
break;
@@ -4146,5 +4150,5 @@ PRE(open)
POST(open)
{
- if (!fd_allowed(res, "open", tid)) {
+ if (!fd_allowed(res, "open", tid, True)) {
VG_(close)(res);
res = -VKI_EMFILE;
@@ -4161,5 +4165,5 @@ PRE(read)
MAYBE_PRINTF("read ( %d, %p, %d )\n", arg1, arg2, arg3);
- if (!fd_allowed(arg1, "read", tid))
+ if (!fd_allowed(arg1, "read", tid, False))
res = -VKI_EBADF;
}
@@ -4175,5 +4179,5 @@ PRE(write)
/* size_t write(int fd, const void *buf, size_t count); */
MAYBE_PRINTF("write ( %d, %p, %d )\n", arg1, arg2, arg3);
- if (!fd_allowed(arg1, "write", tid))
+ if (!fd_allowed(arg1, "write", tid, False))
res = -VKI_EBADF;
else
@@ -4190,5 +4194,5 @@ PRE(creat)
POST(creat)
{
- if (!fd_allowed(res, "creat", tid)) {
+ if (!fd_allowed(res, "creat", tid, True)) {
VG_(close)(res);
res = -VKI_EMFILE;
@@ -4212,6 +4216,6 @@ POST(pipe)
Int *p = (Int *)arg1;
- if (!fd_allowed(p[0], "pipe", tid) ||
- !fd_allowed(p[1], "pipe", tid)) {
+ if (!fd_allowed(p[0], "pipe", tid, True) ||
+ !fd_allowed(p[1], "pipe", tid, True)) {
VG_(close)(p[0]);
VG_(close)(p[1]);
@@ -4266,5 +4270,5 @@ PRE(epoll_create)
POST(epoll_create)
{
- if (!fd_allowed(res, "open", tid)) {
+ if (!fd_allowed(res, "open", tid, True)) {
VG_(close)(res);
res = -VKI_EMFILE;
@@ -4323,5 +4327,5 @@ PRE(readv)
struct iovec * vec;
MAYBE_PRINTF("readv ( %d, %p, %d )\n",arg1,arg2,arg3);
- if (!fd_allowed(arg1, "readv", tid)) {
+ if (!fd_allowed(arg1, "readv", tid, False)) {
res = -VKI_EBADF;
} else {
@@ -4528,5 +4532,15 @@ PRE(setrlimit)
arg2, sizeof(struct vki_rlimit) );
- if (arg1 == VKI_RLIMIT_DATA) {
+ if (arg1 == VKI_RLIMIT_NOFILE) {
+ if (((vki_rlimit *)arg2)->rlim_cur > VG_(fd_hard_limit) ||
+ ((vki_rlimit *)arg2)->rlim_max != VG_(fd_hard_limit)) {
+ res = -VKI_EPERM;
+ }
+ else {
+ VG_(fd_soft_limit) = ((vki_rlimit *)arg2)->rlim_cur;
+ res = 0;
+ }
+ }
+ else if (arg1 == VKI_RLIMIT_DATA) {
VG_(client_rlimit_data) = *(vki_rlimit *)arg2;
res = 0;
@@ -4772,6 +4786,6 @@ POST(socketcall)
Int fd2 = ((UInt*)((UInt*)arg2)[3])[1];
VG_TRACK( post_mem_write, ((UInt*)arg2)[3], 2*sizeof(int) );
- if (!fd_allowed(fd1, "socketcall.socketpair", tid) ||
- !fd_allowed(fd2, "socketcall.socketpair", tid)) {
+ if (!fd_allowed(fd1, "socketcall.socketpair", tid, True) ||
+ !fd_allowed(fd2, "socketcall.socketpair", tid, True)) {
VG_(close)(fd1);
VG_(close)(fd2);
@@ -4788,5 +4802,5 @@ POST(socketcall)
case SYS_SOCKET:
- if (!fd_allowed(res, "socket", tid)) {
+ if (!fd_allowed(res, "socket", tid, True)) {
VG_(close)(res);
res = -VKI_EMFILE;
@@ -4808,5 +4822,5 @@ POST(socketcall)
case SYS_ACCEPT: {
/* int accept(int s, struct sockaddr *addr, int *addrlen); */
- if (!fd_allowed(res, "accept", tid)) {
+ if (!fd_allowed(res, "accept", tid, True)) {
VG_(close)(res);
res = -VKI_EMFILE;
@@ -5125,5 +5139,5 @@ PRE(writev)
struct iovec * vec;
MAYBE_PRINTF("writev ( %d, %p, %d )\n",arg1,arg2,arg3);
- if (!fd_allowed(arg1, "writev", tid)) {
+ if (!fd_allowed(arg1, "writev", tid, False)) {
res = -VKI_EBADF;
} else {
@@ -5215,7 +5229,7 @@ POST(futex)
VG_TRACK( post_mem_write, arg1, sizeof(int) );
if (arg2 == VKI_FUTEX_FD) {
- if (!fd_allowed(res, "futex", tid)) {
+ if (!fd_allowed(res, "futex", tid, True)) {
VG_(close)(res);
- res = -VKI_ENFILE;
+ res = -VKI_EMFILE;
} else {
if (VG_(clo_track_fds))
--- valgrind/none/tests/.cvsignore #1.16:1.17
@@ -43,4 +43,5 @@
readline1
resolv
+rlimit_nofile
seg_override
sem
--- valgrind/none/tests/Makefile.am #1.38:1.39
@@ -51,4 +51,5 @@
readline1.vgtest \
resolv.stderr.exp resolv.stdout.exp resolv.vgtest \
+ rlimit_nofile.stderr.exp rlimit_nofile.stdout.exp rlimit_nofile.vgtest \
seg_override.stderr.exp \
seg_override.stdout.exp seg_override.vgtest \
@@ -70,6 +71,6 @@
cpuid dastest discard exec-sigmask execve floored fork \
fpu_lazy_eflags fucomip $(INSN_TESTS) \
- int munmap_exe map_unmap mremap rcl_assert \
- rcrl readline1 resolv seg_override sem semlimit sha1_test \
+ int munmap_exe map_unmap mremap rcl_assert rcrl readline1 \
+ resolv rlimit_nofile seg_override sem semlimit sha1_test \
shortpush shorts smc1 susphello pth_blockedsig pushpopseg \
syscall-restart1 syscall-restart2 system \
@@ -120,4 +121,5 @@
readline1_SOURCES = readline1.c
resolv_SOURCES = resolv.c
+rlimit_nofile_SOURCES = rlimit_nofile.c
seg_override_SOURCES = seg_override.c
sem_SOURCES = sem.c
|
|
From: Tom H. <to...@co...> - 2004-06-26 02:25:15
|
Nightly build on dunsmere ( Fedora Core 2 ) started at 2004-06-26 03:20:02 BST Checking out source tree ... done Configuring ... done Building ... done Running regression tests ... done Last 20 lines of log.verbose follow shorts: valgrind ./shorts smc1: valgrind ./smc1 susphello: valgrind ./susphello syscall-restart1: valgrind ./syscall-restart1 syscall-restart2: valgrind ./syscall-restart2 system: valgrind ./system yield: valgrind ./yield -- Finished tests in none/tests ---------------------------------------- == 168 tests, 7 stderr failures, 1 stdout failure ================= corecheck/tests/fdleak_cmsg (stderr) corecheck/tests/fdleak_fcntl (stderr) corecheck/tests/fdleak_ipv4 (stderr) corecheck/tests/fdleak_socketpair (stderr) memcheck/tests/buflen_check (stderr) memcheck/tests/execve (stderr) memcheck/tests/writev (stderr) none/tests/exec-sigmask (stdout) make: *** [regtest] Error 1 |
|
From: Tom H. <th...@cy...> - 2004-06-26 02:19:19
|
Nightly build on audi ( Red Hat 9 ) started at 2004-06-26 03:15:02 BST Checking out source tree ... done Configuring ... done Building ... done Running regression tests ... done Last 20 lines of log.verbose follow shortpush: valgrind ./shortpush shorts: valgrind ./shorts smc1: valgrind ./smc1 susphello: valgrind ./susphello syscall-restart1: valgrind ./syscall-restart1 syscall-restart2: valgrind ./syscall-restart2 system: valgrind ./system yield: valgrind ./yield -- Finished tests in none/tests ---------------------------------------- == 168 tests, 7 stderr failures, 0 stdout failures ================= corecheck/tests/fdleak_cmsg (stderr) corecheck/tests/fdleak_fcntl (stderr) corecheck/tests/fdleak_ipv4 (stderr) corecheck/tests/fdleak_socketpair (stderr) memcheck/tests/buflen_check (stderr) memcheck/tests/execve (stderr) memcheck/tests/writev (stderr) make: *** [regtest] Error 1 |
|
From: Tom H. <th...@cy...> - 2004-06-26 02:13:28
|
Nightly build on ginetta ( Red Hat 8.0 ) started at 2004-06-26 03:10:02 BST Checking out source tree ... done Configuring ... done Building ... done Running regression tests ... done Last 20 lines of log.verbose follow sem: valgrind ./sem semlimit: valgrind ./semlimit sha1_test: valgrind ./sha1_test shortpush: valgrind ./shortpush shorts: valgrind ./shorts smc1: valgrind ./smc1 susphello: valgrind ./susphello syscall-restart1: valgrind ./syscall-restart1 syscall-restart2: valgrind ./syscall-restart2 system: valgrind ./system yield: valgrind ./yield -- Finished tests in none/tests ---------------------------------------- == 168 tests, 4 stderr failures, 0 stdout failures ================= helgrind/tests/deadlock (stderr) helgrind/tests/race (stderr) helgrind/tests/race2 (stderr) memcheck/tests/writev (stderr) make: *** [regtest] Error 1 |
|
From: Tom H. <th...@cy...> - 2004-06-26 02:08:09
|
Nightly build on alvis ( Red Hat 7.3 ) started at 2004-06-26 03:05:01 BST Checking out source tree ... done Configuring ... done Building ... done Running regression tests ... done Last 20 lines of log.verbose follow smc1: valgrind ./smc1 susphello: valgrind ./susphello syscall-restart1: valgrind ./syscall-restart1 syscall-restart2: valgrind ./syscall-restart2 system: valgrind ./system yield: valgrind ./yield -- Finished tests in none/tests ---------------------------------------- == 168 tests, 8 stderr failures, 1 stdout failure ================= helgrind/tests/deadlock (stderr) helgrind/tests/race (stderr) helgrind/tests/race2 (stderr) memcheck/tests/badfree-2trace (stderr) memcheck/tests/badjump (stderr) memcheck/tests/brk (stderr) memcheck/tests/error_counts (stdout) memcheck/tests/new_nothrow (stderr) memcheck/tests/writev (stderr) make: *** [regtest] Error 1 |
|
From: Tom H. <th...@cy...> - 2004-06-26 02:06:40
|
Nightly build on standard ( Red Hat 7.2 ) started at 2004-06-26 03:00:01 BST Checking out source tree ... done Configuring ... done Building ... done Running regression tests ... done Last 20 lines of log.verbose follow readline1: valgrind ./readline1 resolv: valgrind ./resolv seg_override: valgrind ./seg_override sem: valgrind ./sem semlimit: valgrind ./semlimit sha1_test: valgrind ./sha1_test shortpush: valgrind ./shortpush shorts: valgrind ./shorts smc1: valgrind ./smc1 susphello: valgrind ./susphello syscall-restart1: valgrind ./syscall-restart1 syscall-restart2: valgrind ./syscall-restart2 system: valgrind ./system yield: valgrind ./yield -- Finished tests in none/tests ---------------------------------------- == 168 tests, 1 stderr failure, 0 stdout failures ================= memcheck/tests/badfree-2trace (stderr) make: *** [regtest] Error 1 |