You can subscribe to this list here.
| 2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
(122) |
Nov
(152) |
Dec
(69) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2003 |
Jan
(6) |
Feb
(25) |
Mar
(73) |
Apr
(82) |
May
(24) |
Jun
(25) |
Jul
(10) |
Aug
(11) |
Sep
(10) |
Oct
(54) |
Nov
(203) |
Dec
(182) |
| 2004 |
Jan
(307) |
Feb
(305) |
Mar
(430) |
Apr
(312) |
May
(187) |
Jun
(342) |
Jul
(487) |
Aug
(637) |
Sep
(336) |
Oct
(373) |
Nov
(441) |
Dec
(210) |
| 2005 |
Jan
(385) |
Feb
(480) |
Mar
(636) |
Apr
(544) |
May
(679) |
Jun
(625) |
Jul
(810) |
Aug
(838) |
Sep
(634) |
Oct
(521) |
Nov
(965) |
Dec
(543) |
| 2006 |
Jan
(494) |
Feb
(431) |
Mar
(546) |
Apr
(411) |
May
(406) |
Jun
(322) |
Jul
(256) |
Aug
(401) |
Sep
(345) |
Oct
(542) |
Nov
(308) |
Dec
(481) |
| 2007 |
Jan
(427) |
Feb
(326) |
Mar
(367) |
Apr
(255) |
May
(244) |
Jun
(204) |
Jul
(223) |
Aug
(231) |
Sep
(354) |
Oct
(374) |
Nov
(497) |
Dec
(362) |
| 2008 |
Jan
(322) |
Feb
(482) |
Mar
(658) |
Apr
(422) |
May
(476) |
Jun
(396) |
Jul
(455) |
Aug
(267) |
Sep
(280) |
Oct
(253) |
Nov
(232) |
Dec
(304) |
| 2009 |
Jan
(486) |
Feb
(470) |
Mar
(458) |
Apr
(423) |
May
(696) |
Jun
(461) |
Jul
(551) |
Aug
(575) |
Sep
(134) |
Oct
(110) |
Nov
(157) |
Dec
(102) |
| 2010 |
Jan
(226) |
Feb
(86) |
Mar
(147) |
Apr
(117) |
May
(107) |
Jun
(203) |
Jul
(193) |
Aug
(238) |
Sep
(300) |
Oct
(246) |
Nov
(23) |
Dec
(75) |
| 2011 |
Jan
(133) |
Feb
(195) |
Mar
(315) |
Apr
(200) |
May
(267) |
Jun
(293) |
Jul
(353) |
Aug
(237) |
Sep
(278) |
Oct
(611) |
Nov
(274) |
Dec
(260) |
| 2012 |
Jan
(303) |
Feb
(391) |
Mar
(417) |
Apr
(441) |
May
(488) |
Jun
(655) |
Jul
(590) |
Aug
(610) |
Sep
(526) |
Oct
(478) |
Nov
(359) |
Dec
(372) |
| 2013 |
Jan
(467) |
Feb
(226) |
Mar
(391) |
Apr
(281) |
May
(299) |
Jun
(252) |
Jul
(311) |
Aug
(352) |
Sep
(481) |
Oct
(571) |
Nov
(222) |
Dec
(231) |
| 2014 |
Jan
(185) |
Feb
(329) |
Mar
(245) |
Apr
(238) |
May
(281) |
Jun
(399) |
Jul
(382) |
Aug
(500) |
Sep
(579) |
Oct
(435) |
Nov
(487) |
Dec
(256) |
| 2015 |
Jan
(338) |
Feb
(357) |
Mar
(330) |
Apr
(294) |
May
(191) |
Jun
(108) |
Jul
(142) |
Aug
(261) |
Sep
(190) |
Oct
(54) |
Nov
(83) |
Dec
(22) |
| 2016 |
Jan
(49) |
Feb
(89) |
Mar
(33) |
Apr
(50) |
May
(27) |
Jun
(34) |
Jul
(53) |
Aug
(53) |
Sep
(98) |
Oct
(206) |
Nov
(93) |
Dec
(53) |
| 2017 |
Jan
(65) |
Feb
(82) |
Mar
(102) |
Apr
(86) |
May
(187) |
Jun
(67) |
Jul
(23) |
Aug
(93) |
Sep
(65) |
Oct
(45) |
Nov
(35) |
Dec
(17) |
| 2018 |
Jan
(26) |
Feb
(35) |
Mar
(38) |
Apr
(32) |
May
(8) |
Jun
(43) |
Jul
(27) |
Aug
(30) |
Sep
(43) |
Oct
(42) |
Nov
(38) |
Dec
(67) |
| 2019 |
Jan
(32) |
Feb
(37) |
Mar
(53) |
Apr
(64) |
May
(49) |
Jun
(18) |
Jul
(14) |
Aug
(53) |
Sep
(25) |
Oct
(30) |
Nov
(49) |
Dec
(31) |
| 2020 |
Jan
(87) |
Feb
(45) |
Mar
(37) |
Apr
(51) |
May
(99) |
Jun
(36) |
Jul
(11) |
Aug
(14) |
Sep
(20) |
Oct
(24) |
Nov
(40) |
Dec
(23) |
| 2021 |
Jan
(14) |
Feb
(53) |
Mar
(85) |
Apr
(15) |
May
(19) |
Jun
(3) |
Jul
(14) |
Aug
(1) |
Sep
(57) |
Oct
(73) |
Nov
(56) |
Dec
(22) |
| 2022 |
Jan
(3) |
Feb
(22) |
Mar
(6) |
Apr
(55) |
May
(46) |
Jun
(39) |
Jul
(15) |
Aug
(9) |
Sep
(11) |
Oct
(34) |
Nov
(20) |
Dec
(36) |
| 2023 |
Jan
(79) |
Feb
(41) |
Mar
(99) |
Apr
(169) |
May
(48) |
Jun
(16) |
Jul
(16) |
Aug
(57) |
Sep
(19) |
Oct
|
Nov
|
Dec
|
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
|
|
|
1
(15) |
2
(12) |
3
(11) |
4
(20) |
5
(6) |
|
6
(6) |
7
(7) |
8
(8) |
9
(17) |
10
(25) |
11
(27) |
12
(6) |
|
13
(28) |
14
(16) |
15
(20) |
16
(9) |
17
(26) |
18
(7) |
19
(25) |
|
20
(7) |
21
(18) |
22
(25) |
23
(15) |
24
(21) |
25
(32) |
26
(15) |
|
27
(23) |
28
(33) |
|
|
|
|
|
|
From: Jeremy F. <je...@go...> - 2005-02-09 23:08:34
|
CVS commit by fitzhardinge:
Fix mmap-related sanity failure. If we merge segments over-eagerly (ie,
we do it, but the kernel doesn't merge the corresponding mappings),
the segment/map sanity check fails. Not merging is always safe, so
avoid merging on mappings for now.
BUGS:98966
M +24 -6 coregrind/vg_memory.c 1.89
M +2 -0 coregrind/vg_scheduler.c 1.220
M +3 -0 coregrind/vg_signals.c 1.120
M +1 -1 coregrind/vg_syscalls.c 1.244
M +1 -0 none/tests/map_unmap.vgtest 1.2
M +1 -0 none/tests/sigstackgrowth.vgtest 1.2
M +1 -0 none/tests/stackgrowth.vgtest 1.2
--- valgrind/coregrind/vg_memory.c #1.88:1.89
@@ -191,4 +191,5 @@ void VG_(unmap_range)(Addr addr, SizeT l
vg_assert((len & (VKI_PAGE_SIZE-1)) == 0);
+ /* For each segment in the range covered by the unmap... */
for(s = VG_(SkipList_Find_Before)(&sk_segments, &addr);
s != NULL && s->addr < (addr+len);
@@ -226,5 +227,5 @@ void VG_(unmap_range)(Addr addr, SizeT l
-> truncate head
*/
- Int delta = end - s->addr;
+ UInt delta = end - s->addr;
if (debug)
@@ -440,5 +441,11 @@ void VG_(map_file_segment)(Addr addr, Si
}
- /* clean up */
+ /* Don't merge for now. The problem is that if we over-merge (we
+ merge segments, but the kernel didn't merge the corresponding
+ mappings), it confuses the sanity-checking machinery.
+ Under-merging (the kernel merges but we don't) is not a problem.
+ FIXME: stack growth probably creates lots of mergable segments;
+ maybe there should be a separate segment-extending call. */
+ if (0)
merge_segments(addr, len);
}
@@ -1061,9 +1068,10 @@ const Char *VG_(prot_str)(UInt prot)
static Bool segment_maps_ok;
static Addr prevmapstart, prevmapend;
+static Bool check_verbose;
static void check_segment_maps(Addr addr, SizeT len, UInt prot,
UInt dev, UInt ino, ULong foff, const UChar *filename)
{
- static const Bool debug = 0;
+ const Bool debug = 0 || check_verbose;
Addr segend;
@@ -1269,6 +1277,7 @@ Bool VG_(sanity_check_memory)(void)
}
- next_segment = VG_(first_segment)();
+ check_verbose = False;
segment_maps_ok = True;
+ next_segment = VG_(first_segment)();
prevmapstart = prevmapend = 0;
VG_(parse_procselfmaps)(check_segment_maps);
@@ -1281,4 +1290,13 @@ Bool VG_(sanity_check_memory)(void)
}
+ if (!segment_maps_ok) {
+ VG_(printf)("\n\nvvvvv SEGMENT MAPS NOT OK vvvvv\n");
+ check_verbose = True;
+ next_segment = VG_(first_segment)();
+ prevmapstart = prevmapend = 0;
+ VG_(parse_procselfmaps)(check_segment_maps);
+ VG_(printf)("^^^^^ SEGMENT MAPS NOT OK ^^^^^\n\n");
+ }
+
ok = ok && segment_maps_ok;
--- valgrind/coregrind/vg_scheduler.c #1.219:1.220
@@ -723,4 +723,6 @@ VgSchedReturnCode VG_(scheduler) ( Threa
case VG_TRC_EBP_JMP_SYSCALL:
handle_syscall(tid);
+ if (VG_(clo_sanity_level) > 2)
+ VG_(sanity_check_general)(True); /* sanity-check every syscall */
break;
--- valgrind/coregrind/vg_signals.c #1.119:1.120
@@ -1669,4 +1669,7 @@ Bool VG_(extend_stack)(Addr addr, UInt m
base, newsize);
+ if (VG_(clo_sanity_level) > 2)
+ VG_(sanity_check_general)(False);
+
return True;
}
--- valgrind/coregrind/vg_syscalls.c #1.243:1.244
@@ -4327,5 +4327,5 @@ PRE(sys_mmap2, 0)
// - the file offset is specified in pagesize units rather than bytes,
// so that it can be used for files bigger than 2^32 bytes.
- PRINT("sys_mmap2 ( %p, %llu, %d, %d, %d, %d )",
+ PRINT("sys_mmap2 ( %p, %llu, 0x%x, 0x%x, %d, %d )",
arg1, (ULong)arg2, arg3, arg4, arg5, arg6 );
PRE_REG_READ6(long, "mmap2",
--- valgrind/none/tests/map_unmap.vgtest #1.1:1.2
@@ -1 +1,2 @@
prog: map_unmap
+vgopts: --sanity-level=3
--- valgrind/none/tests/sigstackgrowth.vgtest #1.1:1.2
@@ -1 +1,2 @@
prog: sigstackgrowth
+vgopts: --sanity-level=3
--- valgrind/none/tests/stackgrowth.vgtest #1.1:1.2
@@ -1 +1,2 @@
prog: stackgrowth
+vgopts: --sanity-level=3
|
|
From: Jeremy F. <je...@go...> - 2005-02-09 23:05:48
|
CVS commit by fitzhardinge:
Fix comments
M +3 -4 vg_main.c 1.247
--- valgrind/coregrind/vg_main.c #1.246:1.247
@@ -718,8 +718,7 @@ static Bool scan_colsep(char *colsep, Bo
/* Prepare the client's environment. This is basically a copy of our
environment, except:
- 1. LD_LIBRARY_PATH=$VALGRINDLIB:$LD_LIBRARY_PATH
- 2. LD_PRELOAD=$VALGRINDLIB/vg_inject.so:($VALGRINDLIB/vgpreload_TOOL.so:)?$LD_PRELOAD
+ LD_PRELOAD=$VALGRINDLIB/vg_inject.so:($VALGRINDLIB/vgpreload_TOOL.so:)?$LD_PRELOAD
- If any of these is missing, then it is added.
+ If this is missing, then it is added.
Yummy. String hacking in C.
@@ -1048,5 +1047,5 @@ static Addr setup_client_stack(void* ini
about LD_PRELOAD, etc. However, since stage1 (the thing
the kernel actually execve's) should never be SUID, and we
- need LD_PRELOAD/LD_LIBRARY_PATH to work for the client, we
+ need LD_PRELOAD to work for the client, we
set AT_SECURE to 0. */
auxv->u.a_val = 0;
|
|
From: Nicholas N. <nj...@cs...> - 2005-02-09 21:08:46
|
CVS commit by nethercote:
Removed a now-unused function, and also a now-unused variable.
M +0 -8 vg_main.c 1.246
--- valgrind/coregrind/vg_main.c #1.245:1.246
@@ -716,11 +716,4 @@ static Bool scan_colsep(char *colsep, Bo
}
-static Bool contains(const char *p) {
- if (VG_STREQ(p, VG_(libdir))) {
- return True;
- }
- return False;
-}
-
/* Prepare the client's environment. This is basically a copy of our
environment, except:
@@ -743,5 +736,4 @@ static char **fix_environment(char **ori
static const int valgrind_clo_len = sizeof(valgrind_clo)-1;
int ld_preload_done = 0;
- int ld_library_path_done = 0;
char *inject_path;
int inject_path_len;
|
|
From: Nicholas N. <nj...@cs...> - 2005-02-09 20:37:17
|
On Wed, 9 Feb 2005, Jeremy Fitzhardinge wrote: >> Am I right in thinking that now that we have dropped the custom >> pthread library valgrind no longer needs to add it's own library >> directory to the front of LD_LIBRARY_PATH for the target? The >> only shared objects we load into the target now are the preload >> libraries which use LD_PRELOAD to get loaded. > > Oh, good point. I hadn't really thought about it, but I was mentally > conflating the two. Yeah, I don't think we need to touch > LD_LIBRARY_PATH at all now. Well spotted, Tom. Chalk up one more point for the benefits of libpthread-removal! N |
|
From: Jeremy F. <je...@go...> - 2005-02-09 20:16:24
|
CVS commit by fitzhardinge:
Report the proper filename when complaining about execve failures. Also, just
print a message and exit rather than panicing, since the execve failure is likely
to be something the user can fix.
M +13 -8 vg_syscalls.c 1.243
--- valgrind/coregrind/vg_syscalls.c #1.242:1.243
@@ -1676,4 +1676,6 @@ void pre_argv_envp(Addr a, ThreadId tid,
PRE(sys_execve, Special)
{
+ Char *path; /* path to executable */
+
PRINT("sys_execve ( %p(%s), %p, %p )", arg1, arg1, arg2, arg3);
PRE_REG_READ3(vki_off_t, "execve",
@@ -1685,4 +1687,6 @@ PRE(sys_execve, Special)
pre_argv_envp( arg3, tid, "execve(envp)", "execve(envp[i])" );
+ path = (const Char *)arg1;
+
/* Erk. If the exec fails, then the following will have made a
mess of things which makes it hard for us to continue. The
@@ -1693,5 +1697,5 @@ PRE(sys_execve, Special)
{
struct vki_stat st;
- Int ret = VG_(stat)((Char *)arg1, &st);
+ Int ret = VG_(stat)(path, &st);
if (ret < 0) {
@@ -1735,5 +1739,5 @@ PRE(sys_execve, Special)
if (VG_(clo_trace_children)) {
- Char* optvar = VG_(build_child_VALGRINDCLO)( (Char*)arg1 );
+ Char* optvar = VG_(build_child_VALGRINDCLO)( path );
// Set VALGRINDCLO and VALGRINDLIB in arg3 (the environment)
@@ -1741,6 +1745,6 @@ PRE(sys_execve, Special)
VG_(env_setenv)( (Char***)&arg3, VALGRINDLIB, VG_(libdir));
- // Create executable name: "/proc/self/fd/<vgexecfd>", update arg1
- arg1 = (Addr)VG_(build_child_exename)();
+ // Create executable name: "/proc/self/fd/<vgexecfd>", update path
+ path = (Addr)VG_(build_child_exename)();
}
@@ -1748,5 +1752,5 @@ PRE(sys_execve, Special)
Char **cpp;
- VG_(printf)("exec: %s\n", (Char *)arg1);
+ VG_(printf)("exec: %s\n", path);
for(cpp = (Char **)arg2; cpp && *cpp; cpp++)
VG_(printf)("argv: %s\n", *cpp);
@@ -1799,5 +1803,5 @@ PRE(sys_execve, Special)
}
- set_result( VG_(do_syscall)(__NR_execve, arg1, arg2, arg3) );
+ set_result( VG_(do_syscall)(__NR_execve, path, arg2, arg3) );
/* If we got here, then the execve failed. We've already made too much of a mess
@@ -1805,6 +1809,7 @@ PRE(sys_execve, Special)
VG_(message)(Vg_UserMsg, "execve(%p(%s), %p, %p) failed, errno %d",
arg1, arg1, arg2, arg3, -SYSRES);
- VG_(core_panic)("EXEC FAILED: I can't recover from execve() failing, so I'm dying.\n"
- "Add more stringent tests in PRE(execve), or work out how to recover.");
+ VG_(message)(Vg_UserMsg, "EXEC FAILED: I can't recover from execve() failing, so I'm dying.");
+ VG_(message)(Vg_UserMsg, "Add more stringent tests in PRE(execve), or work out how to recover.");
+ VG_(exit)(101);
}
|
|
From: Jeremy F. <je...@go...> - 2005-02-09 20:15:07
|
CVS commit by fitzhardinge:
I think this will let older autotools work. Also, changes --with-pie/tls options
to --enable-pie/tls, since --with is for naming other packages, and --enable is
for feature flags.
M +4 -7 configure.in 1.148
--- valgrind/configure.in #1.147:1.148
@@ -1,4 +1,3 @@
# Process this file with autoconf to produce a configure script.
-AC_PREREQ(2.59)
AC_INIT(Valgrind, 2.3.0.CVS, val...@li...)
AC_CONFIG_SRCDIR(coregrind/vg_main.c)
@@ -255,7 +254,6 @@
# Check for TLS support in the compiler and linker
AC_CACHE_CHECK([for TLS support], vg_cv_tls,
- [AC_ARG_WITH(tls, AS_HELP_STRING([--with-tls],
- [platform does or does not support TLS]),
- [vg_cv_tls=$withval],
+ [AC_ARG_ENABLE(tls, [ --enable-tls platform supports TLS],
+ [vg_cv_tls=$enableval],
[AC_RUN_IFELSE([AC_LANG_PROGRAM([[static __thread int foo;]],
[[return foo;]])],
@@ -269,7 +267,6 @@
# Check for PIE support in the compiler and linker
AC_CACHE_CHECK([for PIE support], vg_cv_pie,
- [AC_ARG_WITH(pie, AS_HELP_STRING([--with-pie],
- [force (or --without to prevent) the use of PIE linking]),
- [vg_cv_pie=$withval],
+ [AC_ARG_ENABLE(pie, [ --enable-pie platform supports PIE linking],
+ [vg_cv_pie=$enableval],
[safe_CFLAGS=$CFLAGS
CFLAGS="$CFLAGS -fpie"
|
|
From: Jeremy F. <je...@go...> - 2005-02-09 20:14:05
|
CVS commit by fitzhardinge:
Implement stime syscall.
M +1 -0 core.h 1.80
M +8 -0 vg_syscalls.c 1.242
M +1 -1 x86-linux/syscalls.c 1.21
--- valgrind/coregrind/core.h #1.79:1.80
@@ -1442,4 +1442,5 @@ GEN_SYSCALL_WRAPPER(sys_flock); // 4
GEN_SYSCALL_WRAPPER(sys_poll); // XPG4-UNIX
GEN_SYSCALL_WRAPPER(sys_getrusage); // SVr4, 4.3BSD
+GEN_SYSCALL_WRAPPER(sys_stime); // SVr4, SVID, X/OPEN
GEN_SYSCALL_WRAPPER(sys_settimeofday); // SVr4, 4.3BSD (non-POSIX)
GEN_SYSCALL_WRAPPER(sys_getpriority); // SVr4, 4.4BSD
--- valgrind/coregrind/vg_syscalls.c #1.241:1.242
@@ -2349,4 +2349,12 @@ POST(sys_gettimeofday)
}
+PRE(sys_stime, 0)
+{
+ /* int stime(time_t *) */
+ PRINT("sys_stime ( %p )", arg1);
+ PRE_REG_READ1(long, "stime", long *, time);
+ PRE_MEM_READ( "stime(time)", arg1, sizeof(long) );
+}
+
PRE(sys_settimeofday, 0)
{
--- valgrind/coregrind/x86-linux/syscalls.c #1.20:1.21
@@ -722,5 +722,5 @@ const struct SyscallTableEntry VGA_(sysc
GENX_(__NR_getuid, sys_getuid16), // 24 ## P
- // (__NR_stime, sys_stime), // 25 * (SVr4,SVID,X/OPEN)
+ GENX_(__NR_stime, sys_stime), // 25 * (SVr4,SVID,X/OPEN)
GENXY(__NR_ptrace, sys_ptrace), // 26
GENX_(__NR_alarm, sys_alarm), // 27
|
|
From: Tom H. <th...@cy...> - 2005-02-09 19:57:53
|
CVS commit by thughes:
Don't modify LD_LIBRARY_PATH as it is no longer needed now that we are
using the system pthread library. This fixes the long standing problem
with the JVM continuously re-execing itself.
M +2 -33 vg_main.c 1.245
--- valgrind/coregrind/vg_main.c #1.244:1.245
@@ -738,8 +738,6 @@ static char **fix_environment(char **ori
{
static const char inject_so[] = "vg_inject.so";
- static const char ld_library_path[] = "LD_LIBRARY_PATH=";
static const char ld_preload[] = "LD_PRELOAD=";
static const char valgrind_clo[] = VALGRINDCLO "=";
- static const int ld_library_path_len = sizeof(ld_library_path)-1;
static const int ld_preload_len = sizeof(ld_preload)-1;
static const int valgrind_clo_len = sizeof(valgrind_clo)-1;
@@ -773,5 +771,5 @@ static char **fix_environment(char **ori
/* Allocate a new space */
- ret = malloc(sizeof(char *) * (envc+3+1)); /* 3 new entries + NULL */
+ ret = malloc(sizeof(char *) * (envc+1+1)); /* 1 new entry + NULL */
vg_assert(ret);
@@ -785,23 +783,5 @@ static char **fix_environment(char **ori
/* Walk over the new environment, mashing as we go */
for (cpp = ret; cpp && *cpp; cpp++) {
- if (memcmp(*cpp, ld_library_path, ld_library_path_len) == 0) {
- /* If the LD_LIBRARY_PATH already contains libdir, then don't
- bother adding it again, even if it isn't the first (it
- seems that the Java runtime will keep reexecing itself
- unless its paths are at the front of LD_LIBRARY_PATH) */
- if (!scan_colsep(*cpp + ld_library_path_len, contains)) {
- int len = strlen(*cpp) + vgliblen*2 + 16;
- char *cp = malloc(len);
- vg_assert(cp);
-
- snprintf(cp, len, "%s%s:%s",
- ld_library_path, VG_(libdir),
- (*cpp)+ld_library_path_len);
-
- *cpp = cp;
- }
-
- ld_library_path_done = 1;
- } else if (memcmp(*cpp, ld_preload, ld_preload_len) == 0) {
+ if (memcmp(*cpp, ld_preload, ld_preload_len) == 0) {
int len = strlen(*cpp) + inject_path_len;
char *cp = malloc(len);
@@ -820,15 +800,4 @@ static char **fix_environment(char **ori
/* Add the missing bits */
-
- if (!ld_library_path_done) {
- int len = ld_library_path_len + vgliblen*2 + 16;
- char *cp = malloc(len);
- vg_assert(cp);
-
- snprintf(cp, len, "%s%s", ld_library_path, VG_(libdir));
-
- ret[envc++] = cp;
- }
-
if (!ld_preload_done) {
int len = ld_preload_len + inject_path_len;
|
|
From: Jeremy F. <je...@go...> - 2005-02-09 19:47:13
|
On Wed, 2005-02-09 at 19:42 +0000, Tom Hughes wrote: > Am I right in thinking that now that we have dropped the custom > pthread library valgrind no longer needs to add it's own library > directory to the front of LD_LIBRARY_PATH for the target? The > only shared objects we load into the target now are the preload > libraries which use LD_PRELOAD to get loaded. Oh, good point. I hadn't really thought about it, but I was mentally conflating the two. Yeah, I don't think we need to touch LD_LIBRARY_PATH at all now. J |
|
From: Tom H. <to...@co...> - 2005-02-09 19:42:14
|
Am I right in thinking that now that we have dropped the custom pthread library valgrind no longer needs to add it's own library directory to the front of LD_LIBRARY_PATH for the target? The only shared objects we load into the target now are the preload libraries which use LD_PRELOAD to get loaded. The reason I ask is that dropping it should solve the long standing problem with the JVM re-execing itself continuously in an attempt to get itself at the front of LD_LIBRARY_PATH... I'm just testing that at the moment. Tom -- Tom Hughes (to...@co...) http://www.compton.nu/ |
|
From: <js...@ac...> - 2005-02-09 03:58:02
|
Nightly build on phoenix ( SuSE 9.1 ) started at 2005-02-09 03:50:00 GMT Checking out source tree ... done Configuring ... done Building ... done Running regression tests ... done Last 20 lines of log.verbose follow -- Finished tests in none/tests ---------------------------------------- == 195 tests, 15 stderr failures, 0 stdout failures ================= corecheck/tests/as_mmap (stderr) corecheck/tests/fdleak_fcntl (stderr) helgrind/tests/allok (stderr) helgrind/tests/deadlock (stderr) helgrind/tests/inherit (stderr) helgrind/tests/race (stderr) helgrind/tests/race2 (stderr) helgrind/tests/readshared (stderr) massif/tests/toobig-allocs (stderr) massif/tests/true_html (stderr) massif/tests/true_text (stderr) memcheck/tests/pth_once (stderr) memcheck/tests/scalar (stderr) memcheck/tests/threadederrno (stderr) memcheck/tests/writev (stderr) make: *** [regtest] Error 1 |
|
From: Tom H. <to...@co...> - 2005-02-09 03:24:27
|
Nightly build on dunsmere ( Fedora Core 3 ) started at 2005-02-09 03:20:04 GMT Checking out source tree ... done Configuring ... done Building ... done Running regression tests ... done Last 20 lines of log.verbose follow seg_override: valgrind --num-callers=4 ./seg_override -- Finished tests in none/tests/x86 ------------------------------------ yield: valgrind --num-callers=4 ./yield -- Finished tests in none/tests ---------------------------------------- == 202 tests, 12 stderr failures, 0 stdout failures ================= helgrind/tests/allok (stderr) helgrind/tests/deadlock (stderr) helgrind/tests/inherit (stderr) helgrind/tests/race (stderr) helgrind/tests/race2 (stderr) helgrind/tests/readshared (stderr) massif/tests/toobig-allocs (stderr) massif/tests/true_html (stderr) massif/tests/true_text (stderr) memcheck/tests/scalar (stderr) memcheck/tests/scalar_supp (stderr) memcheck/tests/vgtest_ume (stderr) make: *** [regtest] Error 1 |
|
From: Tom H. <th...@cy...> - 2005-02-09 03:21:18
|
Nightly build on audi ( Red Hat 9 ) started at 2005-02-09 03:15:03 GMT Checking out source tree ... done Configuring ... done Building ... done Running regression tests ... done Last 20 lines of log.verbose follow corecheck/tests/fdleak_socketpair (stderr) helgrind/tests/allok (stderr) helgrind/tests/deadlock (stderr) helgrind/tests/inherit (stderr) helgrind/tests/race (stderr) helgrind/tests/race2 (stderr) helgrind/tests/readshared (stderr) massif/tests/toobig-allocs (stderr) massif/tests/true_html (stderr) massif/tests/true_text (stderr) memcheck/tests/badpoll (stderr) memcheck/tests/buflen_check (stderr) memcheck/tests/execve (stderr) memcheck/tests/execve2 (stderr) memcheck/tests/scalar (stderr) memcheck/tests/scalar_exit_group (stderr) memcheck/tests/scalar_supp (stderr) memcheck/tests/writev (stderr) make: *** [regtest] Error 1 |
|
From: Tom H. <th...@cy...> - 2005-02-09 03:14:48
|
Nightly build on ginetta ( Red Hat 8.0 ) started at 2005-02-09 03:10:05 GMT Checking out source tree ... done Configuring ... done Building ... done Running regression tests ... done Last 20 lines of log.verbose follow seg_override: valgrind --num-callers=4 ./seg_override -- Finished tests in none/tests/x86 ------------------------------------ yield: valgrind --num-callers=4 ./yield -- Finished tests in none/tests ---------------------------------------- == 200 tests, 12 stderr failures, 0 stdout failures ================= helgrind/tests/allok (stderr) helgrind/tests/deadlock (stderr) helgrind/tests/inherit (stderr) helgrind/tests/race (stderr) helgrind/tests/race2 (stderr) helgrind/tests/readshared (stderr) massif/tests/toobig-allocs (stderr) massif/tests/true_html (stderr) massif/tests/true_text (stderr) memcheck/tests/pth_once (stderr) memcheck/tests/scalar (stderr) memcheck/tests/threadederrno (stderr) make: *** [regtest] Error 1 |
|
From: Tom H. <th...@cy...> - 2005-02-09 03:09:33
|
Nightly build on alvis ( Red Hat 7.3 ) started at 2005-02-09 03:05:02 GMT Checking out source tree ... done Configuring ... done Building ... done Running regression tests ... done Last 20 lines of log.verbose follow yield: valgrind --num-callers=4 ./yield -- Finished tests in none/tests ---------------------------------------- == 200 tests, 14 stderr failures, 0 stdout failures ================= helgrind/tests/allok (stderr) helgrind/tests/deadlock (stderr) helgrind/tests/inherit (stderr) helgrind/tests/race (stderr) helgrind/tests/race2 (stderr) helgrind/tests/readshared (stderr) massif/tests/toobig-allocs (stderr) massif/tests/true_html (stderr) massif/tests/true_text (stderr) memcheck/tests/post-syscall (stderr) memcheck/tests/pth_once (stderr) memcheck/tests/scalar (stderr) memcheck/tests/threadederrno (stderr) memcheck/tests/vgtest_ume (stderr) make: *** [regtest] Error 1 |
|
From: Tom H. <th...@cy...> - 2005-02-09 03:04:54
|
Nightly build on standard ( Red Hat 7.2 ) started at 2005-02-09 03:00:02 GMT Checking out source tree ... done Configuring ... done Building ... done Running regression tests ... done Last 20 lines of log.verbose follow -- Finished tests in none/tests ---------------------------------------- == 200 tests, 14 stderr failures, 1 stdout failure ================= helgrind/tests/allok (stderr) helgrind/tests/deadlock (stderr) helgrind/tests/inherit (stderr) helgrind/tests/race (stderr) helgrind/tests/race2 (stderr) helgrind/tests/readshared (stderr) massif/tests/toobig-allocs (stderr) massif/tests/true_html (stderr) massif/tests/true_text (stderr) memcheck/tests/pth_once (stderr) memcheck/tests/scalar (stderr) memcheck/tests/threadederrno (stderr) memcheck/tests/vgtest_ume (stderr) none/tests/async-sigs (stdout) none/tests/async-sigs (stderr) make: *** [regtest] Error 1 |
|
From: Nicholas N. <nj...@ca...> - 2005-02-09 00:15:31
|
CVS commit by nethercote: Added SLURM, Buzztard, Leptonica. M +9 -0 users.html 1.78 --- devel-home/valgrind/users.html #1.77:1.78 @@ -117,4 +117,7 @@ <dd>A widely-used data access, analysis and visualisation system. +<dt><a href="http://www.llnl.gov/linux/slurm/">SLURM</a> +<dd>A highly scalable cluster resource manager. + <dt><a href="http://www.hlrs.de/organization/pds/projects/pacx-mpi/">PACX-MPI</a> <dd>A library for running parallel application on clusters connected @@ -189,4 +192,7 @@ <dd>A fast RenderMan-compliant renderer. +<dt><a href="http://www.leptonica.com/">Leptonica</a> +<dd>An open source C library for efficient image processing and image analysis + operations. </dl> @@ -327,4 +333,7 @@ <dd>A free lossless audio codec. +<dt><a href="http://www.buzztard.org/">Buzztard</a> +<dd>A modular "Tracker"-style audio sequencer. + </dl> |