From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 20842 invoked by alias); 2 Jan 2019 18:54:28 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 20832 invoked by uid 89); 2 Jan 2019 18:54:27 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_NONE,SPF_HELO_PASS autolearn=ham version=3.3.2 spammy= X-HELO: gateway32.websitewelcome.com Received: from gateway32.websitewelcome.com (HELO gateway32.websitewelcome.com) (192.185.145.171) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Wed, 02 Jan 2019 18:54:25 +0000 Received: from cm11.websitewelcome.com (cm11.websitewelcome.com [100.42.49.5]) by gateway32.websitewelcome.com (Postfix) with ESMTP id 75BE7730A4 for ; Wed, 2 Jan 2019 12:54:24 -0600 (CST) Received: from box5379.bluehost.com ([162.241.216.53]) by cmsmtp with SMTP id eleqgH5vddnCeeleqgOFvb; Wed, 02 Jan 2019 12:54:24 -0600 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=tromey.com; s=default; h=Content-Type:MIME-Version:Message-ID:In-Reply-To:Date: References:Subject:Cc:To:From:Sender:Reply-To:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=7WTn9MvIeBfGKPkFUioYH+Z7SV1vOiFgcnoUsQE4CoE=; b=w8qI4arCBgGDcIi5mzPB06AkVh ctrBzCG05Gs5eUlMQ/SwbvzWGHHc1u0Ye7dt5cKebuj2K7BLT5D5OfKR0RkPnm1Jlk/vODr523pUR pVaBA99wZ9+xl5zLiaAVihmrl; Received: from [50.236.237.38] (port=37370 helo=bapiya) by box5379.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.91) (envelope-from ) id 1geleq-004MUE-4O; Wed, 02 Jan 2019 12:54:24 -0600 From: Tom Tromey To: Philippe Waroquiers Cc: gdb-patches@sourceware.org Subject: Re: [RFA] Fix leak of struct call_thread_fsm in call_function_by_hand_dummy. References: <20190102171435.20402-1-philippe.waroquiers@skynet.be> Date: Wed, 02 Jan 2019 18:54:00 -0000 In-Reply-To: <20190102171435.20402-1-philippe.waroquiers@skynet.be> (Philippe Waroquiers's message of "Wed, 2 Jan 2019 18:14:35 +0100") Message-ID: <87pntex540.fsf@tromey.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1.90 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-SW-Source: 2019-01/txt/msg00041.txt.bz2 >>>>> "Philippe" == Philippe Waroquiers writes: Philippe> Fix the leak by similarly doing cleanup/destroy when restoring Philippe> previous state machine. Philippe> Tested on debian/amd64, natively and under valgrind. Philippe> 2019-01-02 Philippe Waroquiers Philippe> * infcall.c (call_function_by_hand_dummy): cleanup/destroy sm Philippe> in case of call that did not complete. This is ok. Thanks. Tom