public inbox for gdb-prs@sourceware.org
help / color / mirror / Atom feed
* [Bug cli/10137] New: Memory Leak's PATCH included
@ 2009-05-09 20:05 gnu-bugs at the-morg dot org
  2009-05-09 20:07 ` [Bug cli/10137] " gnu-bugs at the-morg dot org
                   ` (2 more replies)
  0 siblings, 3 replies; 5+ messages in thread
From: gnu-bugs at the-morg dot org @ 2009-05-09 20:05 UTC (permalink / raw)
  To: gdb-prs

Originally I was investigating a specific reproducible memory leak so I stuck
valgrind on GDB and fixed 3 or 4 leaks which show up clearly once you iterate
1000s of command via the MI protocol interface.

Version: 6.8.50.20090509-cvs

-- 
           Summary: Memory Leak's PATCH included
           Product: gdb
           Version: 6.8
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: cli
        AssignedTo: unassigned at sourceware dot org
        ReportedBy: gnu-bugs at the-morg dot org
                CC: gdb-prs at sourceware dot org


http://sourceware.org/bugzilla/show_bug.cgi?id=10137

------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.


^ permalink raw reply	[flat|nested] 5+ messages in thread
[parent not found: <bug-10137-4717@http.sourceware.org/bugzilla/>]

end of thread, other threads:[~2022-03-01 23:45 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2009-05-09 20:05 [Bug cli/10137] New: Memory Leak's PATCH included gnu-bugs at the-morg dot org
2009-05-09 20:07 ` [Bug cli/10137] " gnu-bugs at the-morg dot org
2009-05-11  9:05 ` jan dot kratochvil at redhat dot com
2009-08-07 19:12 ` tromey at redhat dot com
     [not found] <bug-10137-4717@http.sourceware.org/bugzilla/>
2022-03-01 23:45 ` tromey at sourceware dot org

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).