OLDER NEWS
72643
Improve support for SSE/SSE2 instructions
72484
valgrind leaves it’s own signal mask in place when execing
72650
Signal Handling always seems to restart system calls
72006
The mmap system call turns all errors in ENOMEM
71781
gdb attach is pretty useless
71180
unhandled instruction bytes: 0xF 0xAE 0x85 0xE8
69886
writes to zero page cause valgrind to assert on exit
71791
crash when valgrinding gimp 1.3 (stabs reader problem)
69783
unhandled syscall: 218
69782
unhandled instruction bytes: 0x66 0xF 0x2B 0x80
70385
valgrind fails if the soft file descriptor limit is less
than about 828
69529
"rep; nop" should do a yield
70827
programs with lots of shared libraries report "mmap failed"
for some of them when reading symbols
71028
glibc’s strnlen is optimised enough to confuse valgrind
Unstable (cvs head) release 2.1.0 (15 December 2003)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For whatever it’s worth, 2.1.0 actually seems pretty darn stable to me
(Julian).
It looks eminently usable, and given that it fixes some
significant bugs, may well be worth using on a day-to-day basis.
2.1.0 is known to build and pass regression tests on: SuSE 9, SuSE
8.2, RedHat 8.
2.1.0 most notably includes Jeremy Fitzhardinge’s complete overhaul of
handling of system calls and signals, and their interaction with
threads.
In general, the accuracy of the system call, thread and
signal simulations is much improved.
Specifically:
- Blocking system calls behave exactly as they do when running
natively (not on valgrind).
That is, if a syscall blocks only the
calling thread when running natively, than it behaves the same on
valgrind.
No more mysterious hangs because V doesn’t know that some
syscall or other, should block only the calling thread.
- Interrupted syscalls should now give more faithful results.
- Finally, signal contexts in signal handlers are supported.
As a
result, konqueror on SuSE 9 no longer segfaults when notified of
file changes in directories it is watching.
Other changes:
- Robert Walsh’s file descriptor leakage checks.
When enabled,
Valgrind will print out a list of open file descriptors on
exit.
Along with each file descriptor, Valgrind prints out a stack
backtrace of where the file was opened and any details relating to the
file descriptor such as the file name or socket details.
To use, give: --track-fds=yes
65