sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

608
active users

#valgrind

0 posts0 participants0 posts today
Felix Palmen :freebsd: :c64:<p>I just stress-tested the current dev state of <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>swad</span></a> on <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>. The first attempt failed miserably, got a lot of errors accepting a connection. Well, this lead to another little improvement, I added another static method to my logging interface that mimics <a href="https://mastodon.bsd.cafe/tags/perror" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>perror</span></a>: Also print the description of the system errno. With that in place, I could see the issue was "too many open files". Checking <a href="https://mastodon.bsd.cafe/tags/ulimit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ulimit</span></a> -n gave me 1024. Seriously? 🤯 On my <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> machine, as a regular user, it's 226755. Ok, bumped that up to 8192 and then the stress test ran through without issues.</p><p>On a side note, this also made creating new timers (using <a href="https://mastodon.bsd.cafe/tags/timerfd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>timerfd</span></a> on Linux) fail, which ultimately made swad crash. I have to redesign my timer interface so that creating a timer may explicitly fail and I can react on that, aborting whatever would need that timer.</p><p>Anyways, the same test gave somewhat acceptable results: throughput of roughly 3000 req/s, response times around 500ms. Not great, but okayish, and not directly comparable because this test ran in a <a href="https://mastodon.bsd.cafe/tags/bhyve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bhyve</span></a> vm and the requests had to pass the virtual networking.</p><p>One major issue is still the <a href="https://mastodon.bsd.cafe/tags/RAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAM</span></a> consumption. The test left swad with a resident set of &gt; 540 MiB. I have no idea what to do about that. 😞 The code makes heavy use of "allocated objects" (every connection object with metadata and buffers, every event handler registered, every timer, and so on), so, uses the <a href="https://mastodon.bsd.cafe/tags/heap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>heap</span></a> a lot, but according to <a href="https://mastodon.bsd.cafe/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a>, correctly frees everything. Still the resident set just keeps growing. I guess it's the classic <a href="https://mastodon.bsd.cafe/tags/fragmentation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fragmentation</span></a> issue...</p>
Felix Palmen :freebsd: :c64:<p>Hm, is <a href="https://mastodon.bsd.cafe/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a>'s <a href="https://mastodon.bsd.cafe/tags/helgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>helgrind</span></a> useless for code using <a href="https://mastodon.bsd.cafe/tags/atomic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>atomic</span></a> operations? Example, it complains about this:</p><p>==9505== Possible data race during read of size 4 at 0xADD57F4 by thread #14<br>==9505== Locks held: none<br>==9505== at 0x23D0F1: PSC_ThreadPool_cancel (threadpool.c:761)<br>[....]<br>==9505== This conflicts with a previous write of size 4 by thread #6<br>==9505== Locks held: none<br>==9505== at 0x23CDDE: worker (threadpool.c:373)</p><p>so, here's threadpool.c:761:</p><p> if ((pthrno = atomic_load_explicit(<br> &amp;job-&gt;pthrno, memory_order_consume)) &gt;= 0)</p><p>and here's threadpool.c:373:</p><p> atomic_store_explicit(&amp;currentJob-&gt;pthrno, -1,<br> memory_order_release);</p><p>Ok, I *think* this should be fine? Do I miss something?</p><p>(screenshots for readability ...)</p><p><a href="https://mastodon.bsd.cafe/tags/c" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>c</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coding</span></a> <a href="https://mastodon.bsd.cafe/tags/c11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>c11</span></a> <a href="https://mastodon.bsd.cafe/tags/atomics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>atomics</span></a></p>
Sourceware<p>Sourceware Survey 2025 Results</p><p>In the end we got 103 (!) responses with a nice mix of developers, users and maintainers from various hosted projects.</p><p><a href="https://sourceware.org/survey-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sourceware.org/survey-2025</span><span class="invisible"></span></a></p><p><a href="https://fosstodon.org/tags/binutils" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>binutils</span></a> <a href="https://fosstodon.org/tags/cygwin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cygwin</span></a> <a href="https://fosstodon.org/tags/dwarfstd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dwarfstd</span></a> <a href="https://fosstodon.org/tags/elfutils" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>elfutils</span></a> <a href="https://fosstodon.org/tags/gcc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gcc</span></a> <a href="https://fosstodon.org/tags/gdb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gdb</span></a> <a href="https://fosstodon.org/tags/glibc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>glibc</span></a> <a href="https://fosstodon.org/tags/libabigail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libabigail</span></a> <a href="https://fosstodon.org/tags/newlib" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newlib</span></a> <a href="https://fosstodon.org/tags/systemTap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemTap</span></a> <a href="https://fosstodon.org/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> <a href="https://fosstodon.org/tags/bzip2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bzip2</span></a> <a href="https://fosstodon.org/tags/libffi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libffi</span></a> <a href="https://fosstodon.org/tags/dwz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dwz</span></a> <a href="https://fosstodon.org/tags/debugedit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debugedit</span></a> <a href="https://fosstodon.org/tags/gnupoke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gnupoke</span></a> <a href="https://fosstodon.org/tags/bunsen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bunsen</span></a> <a href="https://fosstodon.org/tags/lvm2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lvm2</span></a> <a href="https://fosstodon.org/tags/annobin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>annobin</span></a> <a href="https://fosstodon.org/tags/gnu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gnu</span></a>-gabi <a href="https://fosstodon.org/tags/cgen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cgen</span></a> <a href="https://fosstodon.org/tags/kawa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kawa</span></a> <a href="https://fosstodon.org/tags/insight" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>insight</span></a> <a href="https://fosstodon.org/tags/pacme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pacme</span></a></p>
mjw<p>Please help test <a href="https://mastodon.nl/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> 3.25.0-RC1</p><p><a href="https://sourceforge.net/p/valgrind/mailman/message/59174627/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sourceforge.net/p/valgrind/mai</span><span class="invisible">lman/message/59174627/</span></a></p><p>Initial RISCV64/Linux support. Valgrind gdbserver supports 'x' packets. Bug fixes for Illumos. --track-fds=yes treats inherited file descriptors like stdin/out/err (0,1,2). There is --modify-fds=high. s390x support for new instructions (BPP, BPRP and NIAI). New linux syscalls supported (landlock*, open_tree, move_mount, fsopen, fsconfig, fsmount, fspick, userfaultfd). The Linux Test Project (ltp) is integrated in the testsuite.</p>
Felix Palmen :freebsd: :c64:<p>Nice, <a href="https://mastodon.bsd.cafe/tags/threadpool" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threadpool</span></a> overhaul done. Removed two locks (<a href="https://mastodon.bsd.cafe/tags/mutex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mutex</span></a>) and two condition variables, replaced by a single lock and a single <a href="https://mastodon.bsd.cafe/tags/semaphore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>semaphore</span></a>. 😎 Simplifies the overall structure a lot, and it's probably safe to assume slightly better performance in contended situations as well. And so far, <a href="https://mastodon.bsd.cafe/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a>'s helgrind tool doesn't find anything to complain about. 🙃</p><p>Looking at the screenshot, I should probably make <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>swad</span></a> default to *two* threads per CPU and expose the setting in the configuration file. When some thread jobs are expected to block, having more threads than CPUs is probably better.</p><p><a href="https://github.com/Zirias/poser/commit/995c27352615a65723fbd1833b2d36781cbeff4d" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Zirias/poser/commit</span><span class="invisible">/995c27352615a65723fbd1833b2d36781cbeff4d</span></a></p>
ariels<p>Friend <span class="h-card" translate="no"><a href="https://dice.camp/@Computer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Computer</span></a></span> I streamlined multiple levels of security by trouble shooting them. Our new security posture eliminates treacherous "defense in depth" wasted and disloyal effort. (This repeats earlier work that fixed <a href="https://hachyderm.io/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> runs on <a href="https://hachyderm.io/tags/openssl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openssl</span></a>, and of course recent similar improvements carried out by <a href="https://hachyderm.io/tags/doge_doofus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doge_doofus</span></a>)</p>
mjw<p>Monitor <a href="https://mastodon.nl/tags/GCC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GCC</span></a> compile time by Andrew MacLeod.</p><p><a href="https://developers.redhat.com/articles/2025/01/22/monitor-gcc-compile-time" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">developers.redhat.com/articles</span><span class="invisible">/2025/01/22/monitor-gcc-compile-time</span></a></p><p>Explaining how to use <a href="https://mastodon.nl/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> callgrind for profiling and analyzing your program runtime behavior.</p>
mjw<p>Debuginfod project update 2024 by Aaron Merey</p><p><a href="https://developers.redhat.com/articles/2025/01/14/debuginfod-project-update-2024" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">developers.redhat.com/articles</span><span class="invisible">/2025/01/14/debuginfod-project-update-2024</span></a></p><p>- Metrics and scale of debuginfod servers <a href="https://mastodon.nl/tags/prometheus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>prometheus</span></a><br>- New tools and features in debuginfod <a href="https://mastodon.nl/tags/elfutils" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>elfutils</span></a><br>- IMA verification support<br>- Addressing kernel VDSO extraction bottlenecks <span class="h-card" translate="no"><a href="https://fosstodon.org/@osandov" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>osandov</span></a></span> <br>- Lazy debug info downloading in <a href="https://mastodon.nl/tags/Valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Valgrind</span></a> and <a href="https://mastodon.nl/tags/GDB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GDB</span></a></p>
Mai :v_trans:<p>Built my <a href="https://codearq.net/mai-lapyst/sexpr-zig" rel="nofollow noopener" target="_blank">first lisp</a> (after already having started writing two compilers xD) in <a href="https://soc.saiyajin.space/tags/zig" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zig</span></a>! Mainly to test out the language, but it was much fun anyway.</p><p>It also got a few ideas for my own language for a few functional programming things :D</p><p>I enoyied the most the memory checking zig does, be it leaks, use-after-free or double-free, which makes this project the most easy to be memory-safe out of all my native (c-like) projects whithout multiple days using <a href="https://soc.saiyajin.space/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> xD</p><p><a href="https://soc.saiyajin.space/tags/foss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>foss</span></a> <a href="https://soc.saiyajin.space/tags/oss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oss</span></a> <a href="https://soc.saiyajin.space/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://soc.saiyajin.space/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://soc.saiyajin.space/tags/langdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>langdev</span></a> <a href="https://soc.saiyajin.space/tags/lisp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lisp</span></a> <a href="https://soc.saiyajin.space/tags/coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coding</span></a> <a href="https://soc.saiyajin.space/tags/c" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>c</span></a> <a href="https://soc.saiyajin.space/tags/c" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>c</span></a>++ <a href="https://soc.saiyajin.space/tags/zig" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zig</span></a> <a href="https://soc.saiyajin.space/tags/functionalprograming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>functionalprograming</span></a> <a href="https://soc.saiyajin.space/tags/compilerdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>compilerdev</span></a></p>
mjw<p><a href="https://mastodon.nl/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> 3.24.0 released!</p><p><a href="https://valgrind.org/docs/manual/dist.news.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">valgrind.org/docs/manual/dist.</span><span class="invisible">news.html</span></a></p><p>Sourceware download: <a href="https://valgrind.org/downloads/current.html#current" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">valgrind.org/downloads/current</span><span class="invisible">.html#current</span></a></p>
mjw<p>Some of the tricks that were needed to support x86-64-v3 in <a href="https://mastodon.nl/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> memcheck:</p><p><a href="https://developers.redhat.com/articles/2024/10/24/preparing-valgrind-memcheck-x86-64-v3" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">developers.redhat.com/articles</span><span class="invisible">/2024/10/24/preparing-valgrind-memcheck-x86-64-v3</span></a></p>
benwebb<p>Just used valgrind for the first time in a while. And it's great! But I wonder if there are any alternatives in use today? Address Sanitizer?</p><p><a href="https://mstdn.social/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> <a href="https://mstdn.social/tags/c" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>c</span></a> <a href="https://mstdn.social/tags/clang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>clang</span></a> <a href="https://mstdn.social/tags/debuggers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debuggers</span></a></p>
Felix Palmen :freebsd: :c64:<p><span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@matuzalem" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>matuzalem</span></a></span> here's a release to test 😉 I'm pretty sure it won't crash, but can't guarantee. It's been examined a lot, also with <a href="https://mastodon.bsd.cafe/tags/lldb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lldb</span></a> and <a href="https://mastodon.bsd.cafe/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a>, but doesn't have any automated tests so far. I'm still undecided about investing the time and effort to change that, would need to pick a library/framework first (C doesn't offer any testing capabilities in the language) and then, while a few modules like the unicode string functions are perfectly unit-testable, the whole project is a large "event processor" (like any GUI application) and depends on these external events, so a *lot* of tedious mocking would be required for better test coverage ...</p><p>edit: btw, fixed a weird bug before releasing this, it was possible to enter a state where processing X11 events stopped (requesting to minimize with the WM ignoring the request). Not a crash, but a bug 😅</p>
André Machado :debian:<p>Valgrind is an open-source programming tool used primarily for memory debugging, memory leak detection, and profiling. Developed by Julian Seward and first released in 2002, Valgrind is a suite of simulation-based debugging and profiling tools that help developers improve the performance and correctness of their programs. It supports various programming languages.</p><p>More about this introduction to Valgrind, check: <a href="https://machaddr.substack.com/p/introduction-to-valgrind" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">machaddr.substack.com/p/introd</span><span class="invisible">uction-to-valgrind</span></a></p><p><a href="https://mastodon.sdf.org/tags/Valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Valgrind</span></a> <a href="https://mastodon.sdf.org/tags/overflow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>overflow</span></a> <a href="https://mastodon.sdf.org/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://mastodon.sdf.org/tags/language" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>language</span></a> <a href="https://mastodon.sdf.org/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
you╭👺+300╭🐈x5╭⁂+3╭(Ⓐ+a<p>So, having hacked together some <a href="https://mastodon.social/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> bindings for <a href="https://mastodon.social/tags/suil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>suil</span></a> that compile, apparently now I gotta <a href="https://mastodon.social/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> the hell out of that stuff.</p><p>Shout out to <span class="h-card" translate="no"><a href="https://social.jvns.ca/@b0rk" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>b0rk</span></a></span> for <a href="https://jvns.ca/blog/2017/12/23/segfault-debugging/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">jvns.ca/blog/2017/12/23/segfau</span><span class="invisible">lt-debugging/</span></a> - I would've been completely lost without this guide! Instead I will now proceed to load me some <a href="https://mastodon.social/tags/lv2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lv2</span></a> plugins and kick me some tunes</p><p>At least I didn't have to package suil myself, it's on <a href="https://mastodon.social/tags/nixpkgs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nixpkgs</span></a>! yay nixpkgs</p>
mjw<p>The <a href="https://mastodon.nl/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> project closed 110 bugs these last 6 months, but there were also 85 new bugs opened. So the good news is that we are closing bugs faster than they are filed now and we dropped under 1000 open bugs. The bad news is that there are still 975 open bugs. Which is still a slightly intimidating number of bugs.</p><p><a href="https://sourceforge.net/p/valgrind/mailman/message/58787822/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sourceforge.net/p/valgrind/mai</span><span class="invisible">lman/message/58787822/</span></a></p>
Sourceware<p><a href="https://fosstodon.org/tags/Sourceware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sourceware</span></a> @ <a href="https://fosstodon.org/tags/Fosdem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fosdem</span></a> 2024</p><p>Various Sourceware projects will give presentations at <span class="h-card" translate="no"><a href="https://fosstodon.org/@fosdem" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fosdem</span></a></span> next weekend, Feb 3 and 4, in Brussels.</p><p>Guinevere, Dodji, Jose, David and Thomas organized some great devroom talks:</p><p><a href="https://inbox.sourceware.org/20240128203842.GE15739@gnu.wildebeest.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">inbox.sourceware.org/202401282</span><span class="invisible">03842.GE15739@gnu.wildebeest.org/</span></a></p><p>Various Sourceware volunteers, overseers, PLC members and <span class="h-card" translate="no"><a href="https://social.sfconservancy.org/users/conservancy" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>conservancy</span></a></span> staff will also be around.</p><p><a href="https://fosstodon.org/tags/gdb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gdb</span></a> <a href="https://fosstodon.org/tags/libabigail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libabigail</span></a> <a href="https://fosstodon.org/tags/systemtap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemtap</span></a> <a href="https://fosstodon.org/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> <a href="https://fosstodon.org/tags/binutils" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>binutils</span></a> <a href="https://fosstodon.org/tags/elfutils" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>elfutils</span></a> <a href="https://fosstodon.org/tags/gcc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gcc</span></a> <a href="https://fosstodon.org/tags/newlib" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newlib</span></a> <a href="https://fosstodon.org/tags/glibc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>glibc</span></a> <a href="https://fosstodon.org/tags/gnupoke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gnupoke</span></a></p>
Howard Chu @ Symas<p><span class="h-card" translate="no"><a href="https://mas.to/@zekjur" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>zekjur</span></a></span> sounds cool. It'd be a good addition to <a href="https://mastodon.social/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a>. It also reminds me of a modification of qemu (called temu) that did execution tracing, done at UC Berkeley a long time ago.</p>
mjw<p>A thousand bugs. That is how many open <a href="https://mastodon.nl/tags/Valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Valgrind</span></a> bugs there are at the moment. Wondering what the best method is to deal with this.</p><p><a href="https://sourceforge.net/p/valgrind/mailman/message/51809032/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sourceforge.net/p/valgrind/mai</span><span class="invisible">lman/message/51809032/</span></a></p>
Jim Ramsay<p>No! As usual, the reviews and IRC chats with <span class="h-card" translate="no"><a href="https://mastodon.social/@andriyngvason" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>andriyngvason</span></a></span> were extremely kind and valuable.</p><p>First of all, wayvncctl needed a better human-friendly pretty-printer for the json responses. Sure!</p><p>More importantly, we were using libjansson for the json library which uses a refcount system for memory management. <a href="https://fosstodon.org/tags/valgrind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>valgrind</span></a> pointed out a number of mistakes I made on both the server and the client that required more refactoring.</p><p>Finally, it was ready: <a href="https://github.com/any1/wayvnc/pull/171" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/any1/wayvnc/pull/17</span><span class="invisible">1</span></a></p>