From patchwork Wed Apr 12 05:04:41 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Glenn Enright X-Patchwork-Id: 9676477 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 33E2560381 for ; Wed, 12 Apr 2017 05:07:59 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 1F6A028565 for ; Wed, 12 Apr 2017 05:07:59 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 141EC285A3; Wed, 12 Apr 2017 05:07:59 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 5FF7828565 for ; Wed, 12 Apr 2017 05:07:57 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1cyASY-0005m3-UM; Wed, 12 Apr 2017 05:04:50 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1cyASX-0005lx-J6 for xen-devel@lists.xen.org; Wed, 12 Apr 2017 05:04:49 +0000 Received: from [85.158.139.211] by server-17.bemta-5.messagelabs.com id C2/63-15567-075BDE85; Wed, 12 Apr 2017 05:04:48 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrFIsWRWlGSWpSXmKPExsVyrjqNVTd369s Ig2MveS2WfFzM4sDocXT3b6YAxijWzLyk/IoE1oynH0+yFzzjrLgydxZLA+MX9i5GLg4hgb2M El82nWfqYuTgkBDwl/j5J7uLkRPI5JO4+OIHE4RdKnHl4RNGiPpbjBLX5q9mBkkICchLHOg4x wZiiwhIS1z7fJkRxGYT0JZYu/g4K4gtLKAqsW3ZbbB6XgEnid4nO9lBbBag+MHGcywgtqhAuM TbxiMsEDWCEidnPgGzmQXMJOZtfsgMYctLbH87h3kCI/8sJGWzkJTNQlK2gJF5FaNGcWpRWWq RrpGpXlJRZnpGSW5iZo6uoYGpXm5qcXFiempOYlKxXnJ+7iZGYBjWMzAw7mDc1e53iFGSg0lJ lPeywtsIIb6k/JTKjMTijPii0pzU4kOMMhwcShK8RzcD5QSLUtNTK9Iyc4ARAZOW4OBREuH9C JLmLS5IzC3OTIdInWJUlBLnPQySEABJZJTmwbXBovASo6yUMC8jAwODEE9BalFuZgmq/CtGcQ 5GJWHewi1AU3gy80rgpr8CWswEtPjMrpcgi0sSEVJSDYyyzQzSngk/Jyeoscv0vb8pHr0rXii m4+jh1ZIhl9Ys22L9qZ3RN63stlKe9h2m9YIT+Vf3LStWXdVvxbzn0crl15/UH5iveMnO5p1Z /ou7a/a2Gsh75b68oDHjyhyhx5x+nZtzRR7qz819anPUb+WbZfz84k15MyXVXG8n7nzksjwrI taZy1CJpTgj0VCLuag4EQDV1xEVvQIAAA== X-Env-Sender: glenn@rimuhosting.com X-Msg-Ref: server-2.tower-206.messagelabs.com!1491973484!72452391!1 X-Originating-IP: [206.123.102.5] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 9.4.12; banners=-,-,- X-VirusChecked: Checked Received: (qmail 51303 invoked from network); 12 Apr 2017 05:04:45 -0000 Received: from mail.rimuhosting.com (HELO mail.rimuhosting.com) (206.123.102.5) by server-2.tower-206.messagelabs.com with SMTP; 12 Apr 2017 05:04:45 -0000 Received: from mail.rimuhosting.com (localhost [127.0.0.1]) by mail.rimuhosting.com (Postfix) with ESMTP id A0B04609DE for ; Wed, 12 Apr 2017 05:04:43 +0000 (UTC) Received: from [192.168.1.71] (125-238-208-116.jetstream.xtra.co.nz [125.238.208.116]) by mail.rimuhosting.com (Postfix) with ESMTPSA id 2F2F260507 for ; Wed, 12 Apr 2017 05:04:42 +0000 (UTC) To: xen-devel@lists.xen.org From: Glenn Enright Message-ID: Date: Wed, 12 Apr 2017 17:04:41 +1200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 Subject: [Xen-devel] valgrind support for xen4.7+ X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Reply-To: glenn@rimuhosting.com Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP Hi there Has anyone seen or been working on patches for valgrind for recent versions of xen? I was trying 3.13 from SVN against xen 4.7.2 and see that support for that version is not present. Per https://blog.xenproject.org/2013/01/18/using-valgrind-to-debug-xen-toolstacks/ A starter patch is below, but its probably wrong or incomplete. It does let me run If valgrind is not the way any more, can anyone suggest any alternatives on testing for memory leaks? Regards, Glenn http://rimuhosting.com Index: coregrind/m_syswrap/syswrap-xen.c =================================================================== --- coregrind/m_syswrap/syswrap-xen.c (revision 16301) +++ coregrind/m_syswrap/syswrap-xen.c (working copy) @@ -584,6 +584,7 @@ case 0x00000009: case 0x0000000a: case 0x0000000b: + case 0x0000000d: break; default: bad_intf_version(tid, layout, arrghs, status, flags, @@ -626,6 +627,7 @@ break; case 0x0000000a: case 0x0000000b: + case 0x0000000d: PRE_XEN_SYSCTL_READ(getdomaininfolist_0000000a, first_domain); PRE_XEN_SYSCTL_READ(getdomaininfolist_0000000a, max_domains); PRE_XEN_SYSCTL_READ(getdomaininfolist_0000000a, buffer);