Home | History | Annotate | only in /external/valgrind/main
Up to higher level directory
NameDateSize
aclocal.m415-Nov-201143K
aix5libc.supp15-Nov-201120K
Android.mk15-Nov-201116.3K
AUTHORS15-Nov-20112.4K
auxprogs/15-Nov-2011
bionic.supp15-Nov-2011314
cachegrind/15-Nov-2011
callgrind/15-Nov-2011
clean-targets.sh15-Nov-20111.1K
compile15-Nov-20113.7K
config.guess15-Nov-201144.5K
config.h15-Nov-20119.4K
config.h.in15-Nov-20118.7K
config.sub15-Nov-201133.3K
configure15-Nov-2011311.1K
configure.in15-Nov-201157K
COPYING15-Nov-201117.6K
COPYING.DOCS15-Nov-201119.9K
coregrind/15-Nov-2011
darwin10-drd.supp15-Nov-201165
darwin10.supp15-Nov-20111.2K
darwin9-drd.supp15-Nov-201110K
darwin9.supp15-Nov-20117K
depcomp15-Nov-201118.2K
docs/15-Nov-2011
drd/15-Nov-2011
exp-bbv/15-Nov-2011
exp-dhat/15-Nov-2011
exp-ptrcheck/15-Nov-2011
exp-ptrcheck.supp15-Nov-20111.8K
FAQ.txt15-Nov-201119.5K
glibc-2.2-LinuxThreads-helgrind.supp15-Nov-20111.2K
glibc-2.2.supp15-Nov-20119.3K
glibc-2.3.supp15-Nov-201111K
glibc-2.34567-NPTL-helgrind.supp15-Nov-20115.6K
glibc-2.4.supp15-Nov-20114.7K
glibc-2.5.supp15-Nov-20113.8K
glibc-2.6.supp15-Nov-20114.7K
glibc-2.7.supp15-Nov-2011695
glibc-2.X-drd.supp15-Nov-20116.4K
glibc-2.X.supp.in15-Nov-20115.1K
glibc-X.X.supp.in15-Nov-20115K
helgrind/15-Nov-2011
include/15-Nov-2011
install-sh15-Nov-201113.3K
lackey/15-Nov-2011
Makefile.all.am15-Nov-20118.2K
Makefile.am15-Nov-20112.6K
Makefile.in15-Nov-201137.5K
Makefile.tool-tests.am15-Nov-2011819
Makefile.tool.am15-Nov-20114.7K
Makefile.vex.am15-Nov-20113.7K
Makefile.vex.in15-Nov-2011190.8K
massif/15-Nov-2011
memcheck/15-Nov-2011
missing15-Nov-201111.2K
MODULE_LICENSE_GPL15-Nov-20110
mpi/15-Nov-2011
NEWS15-Nov-2011135.5K
none/15-Nov-2011
perf/15-Nov-2011
README15-Nov-20113.1K
README_DEVELOPERS15-Nov-20115.5K
README_MISSING_SYSCALL_OR_IOCTL15-Nov-20116.8K
README_PACKAGERS15-Nov-20114.4K
tests/15-Nov-2011
valgrind.pc.in15-Nov-2011443
valgrind.spec15-Nov-20111.2K
valgrind.spec.in15-Nov-20111.2K
VEX/15-Nov-2011
vg-in-place15-Nov-2011615
xfree-3.supp15-Nov-20112.9K
xfree-4.supp15-Nov-20118.8K

README

      1 
      2 Release notes for Valgrind
      3 ~~~~~~~~~~~~~~~~~~~~~~~~~~
      4 If you are building a binary package of Valgrind for distribution,
      5 please read README_PACKAGERS.  It contains some important information.
      6 
      7 If you are developing Valgrind, please read README_DEVELOPERS.  It contains
      8 some useful information.
      9 
     10 For instructions on how to build/install, see the end of this file.
     11 
     12 If you have problems, consult the FAQ to see if there are workarounds.
     13 
     14 
     15 Executive Summary
     16 ~~~~~~~~~~~~~~~~~
     17 Valgrind is a framework for building dynamic analysis tools. There are
     18 Valgrind tools that can automatically detect many memory management
     19 and threading bugs, and profile your programs in detail. You can also
     20 use Valgrind to build new tools.
     21 
     22 The Valgrind distribution currently includes six production-quality
     23 tools: a memory error detector, two thread error detectors, a cache
     24 and branch-prediction profiler, a call-graph generating cache abd
     25 branch-prediction profiler, and a heap profiler. It also includes
     26 three experimental tools: a heap/stack/global array overrun detector,
     27 a different kind of heap profiler, and a SimPoint basic block vector
     28 generator.
     29 
     30 Valgrind is closely tied to details of the CPU, operating system and to
     31 a lesser extent, compiler and basic C libraries. This makes it difficult
     32 to make it portable.  Nonetheless, it is available for the following
     33 platforms: 
     34 
     35 - x86/Linux
     36 - AMD64/Linux
     37 - PPC32/Linux
     38 - PPC64/Linux
     39 - ARM/Linux
     40 - x86/MacOSX
     41 - AMD64/MacOSX
     42 
     43 Note that AMD64 is just another name for x86-64, and Valgrind runs fine
     44 on Intel processors.  Also note that the core of MacOSX is called
     45 "Darwin" and this name is used sometimes.
     46 
     47 Valgrind is licensed under the GNU General Public License, version 2. 
     48 Read the file COPYING in the source distribution for details.
     49 
     50 However: if you contribute code, you need to make it available as GPL
     51 version 2 or later, and not 2-only.
     52 
     53 
     54 Documentation
     55 ~~~~~~~~~~~~~
     56 A comprehensive user guide is supplied.  Point your browser at
     57 $PREFIX/share/doc/valgrind/manual.html, where $PREFIX is whatever you
     58 specified with --prefix= when building.
     59 
     60 
     61 Building and installing it
     62 ~~~~~~~~~~~~~~~~~~~~~~~~~~
     63 To install from the Subversion repository :
     64 
     65   0. Check out the code from SVN, following the instructions at
     66      http://www.valgrind.org/downloads/repository.html.
     67 
     68   1. cd into the source directory.
     69 
     70   2. Run ./autogen.sh to setup the environment (you need the standard
     71      autoconf tools to do so).
     72 
     73   3. Continue with the following instructions...
     74 
     75 To install from a tar.bz2 distribution:
     76 
     77   4. Run ./configure, with some options if you wish.  The only interesting
     78      one is the usual --prefix=/where/you/want/it/installed.
     79 
     80   5. Run "make".
     81 
     82   6. Run "make install", possibly as root if the destination permissions
     83      require that.
     84 
     85   7. See if it works.  Try "valgrind ls -l".  Either this works, or it
     86      bombs out with some complaint.  In that case, please let us know
     87      (see www.valgrind.org).
     88 
     89 Important!  Do not move the valgrind installation into a place
     90 different from that specified by --prefix at build time.  This will
     91 cause things to break in subtle ways, mostly when Valgrind handles
     92 fork/exec calls.
     93 
     94 
     95 The Valgrind Developers
     96 

README_DEVELOPERS

      1 
      2 Building and not installing it
      3 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      4 To run Valgrind without having to install it, run coregrind/valgrind
      5 with the VALGRIND_LIB environment variable set, where <dir> is the root
      6 of the source tree (and must be an absolute path).  Eg:
      7 
      8   VALGRIND_LIB=~/grind/head4/.in_place ~/grind/head4/coregrind/valgrind 
      9 
     10 This allows you to compile and run with "make" instead of "make install",
     11 saving you time.
     12 
     13 Or, you can use the 'vg-in-place' script which does that for you.
     14 
     15 I recommend compiling with "make --quiet" to further reduce the amount of
     16 output spewed out during compilation, letting you actually see any errors,
     17 warnings, etc.
     18 
     19 
     20 Running the regression tests
     21 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     22 To build and run all the regression tests, run "make [--quiet] regtest".
     23 
     24 To run a subset of the regression tests, execute:
     25 
     26   perl tests/vg_regtest <name>
     27 
     28 where <name> is a directory (all tests within will be run) or a single
     29 .vgtest test file, or the name of a program which has a like-named .vgtest
     30 file.  Eg:
     31 
     32   perl tests/vg_regtest memcheck
     33   perl tests/vg_regtest memcheck/tests/badfree.vgtest
     34   perl tests/vg_regtest memcheck/tests/badfree
     35 
     36 
     37 Running the performance tests
     38 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     39 To build and run all the performance tests, run "make [--quiet] perf".
     40 
     41 To run a subset of the performance suite, execute:
     42 
     43   perl perf/vg_perf <name>
     44 
     45 where <name> is a directory (all tests within will be run) or a single
     46 .vgperf test file, or the name of a program which has a like-named .vgperf
     47 file.  Eg:
     48 
     49   perl perf/vg_perf perf/
     50   perl perf/vg_perf perf/bz2.vgperf
     51   perl perf/vg_perf perf/bz2
     52 
     53 To compare multiple versions of Valgrind, use the --vg= option multiple
     54 times.  For example, if you have two Valgrinds next to each other, one in
     55 trunk1/ and one in trunk2/, from within either trunk1/ or trunk2/ do this to
     56 compare them on all the performance tests:
     57 
     58   perl perf/vg_perf --vg=../trunk1 --vg=../trunk2 perf/
     59 
     60 
     61 Debugging Valgrind with GDB
     62 ~~~~~~~~~~~~~~~~~~~~~~~~~~~
     63 To debug the valgrind launcher program (<prefix>/bin/valgrind) just
     64 run it under gdb in the normal way.
     65 
     66 Debugging the main body of the valgrind code (and/or the code for
     67 a particular tool) requires a bit more trickery but can be achieved
     68 without too much problem by following these steps:
     69 
     70 (1) Set VALGRIND_LAUNCHER to point to the valgrind executable.  Eg:
     71 
     72       export VALGRIND_LAUNCHER=/usr/local/bin/valgrind
     73 
     74     or for an uninstalled version in a source directory $DIR:
     75 
     76       export VALGRIND_LAUNCHER=$DIR/coregrind/valgrind
     77 
     78 (2) Run gdb on the tool executable.  Eg:
     79 
     80       gdb /usr/local/lib/valgrind/ppc32-linux/lackey
     81 
     82     or
     83 
     84       gdb $DIR/.in_place/x86-linux/memcheck
     85 
     86 (3) Do "handle SIGSEGV SIGILL nostop noprint" in GDB to prevent GDB from
     87     stopping on a SIGSEGV or SIGILL:
     88 
     89     (gdb) handle SIGILL SIGSEGV nostop noprint
     90 
     91 (4) Set any breakpoints you want and proceed as normal for gdb. The
     92     macro VG_(FUNC) is expanded to vgPlain_FUNC, so If you want to set
     93     a breakpoint VG_(do_exec), you could do like this in GDB:
     94 
     95     (gdb) b vgPlain_do_exec
     96 
     97 (5) Run the tool with required options:
     98 
     99     (gdb) run pwd
    100 
    101 Steps (1)--(3) can be put in a .gdbinit file, but any directory names must
    102 be fully expanded (ie. not an environment variable).
    103 
    104 A different and possibly easier way is as follows:
    105 
    106 (1) Run Valgrind as normal, but add the flag --wait-for-gdb=yes.  This
    107     puts the tool executable into a wait loop soon after it gains
    108     control.  This delays startup for a few seconds.
    109 
    110 (2) In a different shell, do "gdb /proc/<pid>/exe <pid>", where
    111     <pid> you read from the output printed by (1).  This attaches
    112     GDB to the tool executable, which should be in the abovementioned
    113     wait loop.
    114 
    115 (3) Do "cont" to continue.  After the loop finishes spinning, startup
    116     will continue as normal.  Note that comment (3) above re passing
    117     signals applies here too.
    118 
    119 
    120 Self-hosting
    121 ~~~~~~~~~~~~
    122 To run Valgrind under Valgrind:
    123 
    124 (1) Check out 2 trees, "Inner" and "Outer".  Inner runs the app
    125     directly.  Outer runs Inner.
    126 
    127 (2) Configure inner with --enable-inner and build/install as
    128     usual.
    129 
    130 (3) Configure Outer normally and build/install as usual.
    131 
    132 (4) Choose a very simple program (date) and try
    133 
    134     outer/.../bin/valgrind --sim-hints=enable-outer --trace-children=yes  \
    135        --tool=cachegrind -v inner/.../bin/valgrind --tool=none -v prog
    136 
    137 If you omit the --trace-children=yes, you'll only monitor Inner's launcher
    138 program, not its stage2.
    139 
    140 The whole thing is fragile, confusing and slow, but it does work well enough
    141 for you to get some useful performance data.  Inner has most of
    142 its output (ie. those lines beginning with "==<pid>==") prefixed with a '>',
    143 which helps a lot.
    144 
    145 At the time of writing the allocator is not annotated with client requests
    146 so Memcheck is not as useful as it could be.  It also has not been tested
    147 much, so don't be surprised if you hit problems.
    148 
    149 When using self-hosting with an outer Callgrind tool, use '--pop-on-jump'
    150 (on the outer). Otherwise, Callgrind has much higher memory requirements. 
    151 
    152 
    153 Printing out problematic blocks
    154 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    155 If you want to print out a disassembly of a particular block that
    156 causes a crash, do the following.
    157 
    158 Try running with "--vex-guest-chase-thresh=0 --trace-flags=10000000
    159 --trace-notbelow=999999".  This should print one line for each block
    160 translated, and that includes the address.
    161 
    162 Then re-run with 999999 changed to the highest bb number shown.
    163 This will print the one line per block, and also will print a
    164 disassembly of the block in which the fault occurred.
    165 

README_MISSING_SYSCALL_OR_IOCTL

      1 
      2 Dealing with missing system call or ioctl wrappers in Valgrind
      3 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      4 You're probably reading this because Valgrind bombed out whilst
      5 running your program, and advised you to read this file.  The good
      6 news is that, in general, it's easy to write the missing syscall or
      7 ioctl wrappers you need, so that you can continue your debugging.  If
      8 you send the resulting patches to me, then you'll be doing a favour to
      9 all future Valgrind users too.
     10 
     11 Note that an "ioctl" is just a special kind of system call, really; so
     12 there's not a lot of need to distinguish them (at least conceptually)
     13 in the discussion that follows.
     14 
     15 All this machinery is in coregrind/m_syswrap.
     16 
     17 
     18 What are syscall/ioctl wrappers?  What do they do?
     19 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     20 Valgrind does what it does, in part, by keeping track of everything your
     21 program does.  When a system call happens, for example a request to read
     22 part of a file, control passes to the Linux kernel, which fulfills the
     23 request, and returns control to your program.  The problem is that the
     24 kernel will often change the status of some part of your program's memory
     25 as a result, and tools (instrumentation plug-ins) may need to know about
     26 this.
     27 
     28 Syscall and ioctl wrappers have two jobs: 
     29 
     30 1. Tell a tool what's about to happen, before the syscall takes place.  A
     31    tool could perform checks beforehand, eg. if memory about to be written
     32    is actually writeable.  This part is useful, but not strictly
     33    essential.
     34 
     35 2. Tell a tool what just happened, after a syscall takes place.  This is
     36    so it can update its view of the program's state, eg. that memory has
     37    just been written to.  This step is essential.
     38 
     39 The "happenings" mostly involve reading/writing of memory.
     40 
     41 So, let's look at an example of a wrapper for a system call which
     42 should be familiar to many Unix programmers.
     43 
     44 
     45 The syscall wrapper for time()
     46 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     47 The wrapper for the time system call looks like this:
     48 
     49   PRE(sys_time)
     50   {
     51      /* time_t time(time_t *t); */
     52      PRINT("sys_time ( %p )",ARG1);
     53      PRE_REG_READ1(long, "time", int *, t);
     54      if (ARG1 != 0) {
     55         PRE_MEM_WRITE( "time(t)", ARG1, sizeof(vki_time_t) );
     56      }
     57   }
     58 
     59   POST(sys_time)
     60   {  
     61      if (ARG1 != 0) {
     62         POST_MEM_WRITE( ARG1, sizeof(vki_time_t) );
     63      }
     64   }
     65 
     66 The first thing we do happens before the syscall occurs, in the PRE() function.
     67 The PRE() function typically starts with invoking to the PRINT() macro. This
     68 PRINT() macro implements support for the --trace-syscalls command line option.
     69 Next, the tool is told the return type of the syscall, that the syscall has
     70 one argument, the type of the syscall argument and that the argument is being
     71 read from a register:
     72 
     73      PRE_REG_READ1(long, "time", int *, t);
     74 
     75 Next, if a non-NULL buffer is passed in as the argument, tell the tool that the
     76 buffer is about to be written to:
     77 
     78      if (ARG1 != 0) {
     79         PRE_MEM_WRITE( "time", ARG1, sizeof(vki_time_t) );
     80      }
     81 
     82 Finally, the really important bit, after the syscall occurs, in the POST()
     83 function:  if, and only if, the system call was successful, tell the tool that
     84 the memory was written:
     85 
     86      if (ARG1 != 0) {
     87         POST_MEM_WRITE( ARG1, sizeof(vki_time_t) );
     88      }
     89 
     90 The POST() function won't be called if the syscall failed, so you
     91 don't need to worry about checking that in the POST() function.
     92 (Note: this is sometimes a bug; some syscalls do return results when
     93 they "fail" - for example, nanosleep returns the amount of unslept
     94 time if interrupted. TODO: add another per-syscall flag for this
     95 case.)
     96 
     97 Note that we use the type 'vki_time_t'.  This is a copy of the kernel
     98 type, with 'vki_' prefixed.  Our copies of such types are kept in the
     99 appropriate vki*.h file(s).  We don't include kernel headers or glibc headers
    100 directly.
    101 
    102 
    103 Writing your own syscall wrappers (see below for ioctl wrappers)
    104 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    105 If Valgrind tells you that system call NNN is unimplemented, do the 
    106 following:
    107 
    108 1.  Find out the name of the system call:
    109 
    110        grep NNN /usr/include/asm/unistd*.h
    111 
    112     This should tell you something like  __NR_mysyscallname.
    113     Copy this entry to include/vki/vki-scnums-$(VG_PLATFORM).h.
    114 
    115 
    116 2.  Do 'man 2 mysyscallname' to get some idea of what the syscall
    117     does.  Note that the actual kernel interface can differ from this,
    118     so you might also want to check a version of the Linux kernel
    119     source.
    120 
    121     NOTE: any syscall which has something to do with signals or
    122     threads is probably "special", and needs more careful handling.
    123     Post something to valgrind-developers if you aren't sure.
    124 
    125 
    126 3.  Add a case to the already-huge collection of wrappers in 
    127     the coregrind/m_syswrap/syswrap-*.c files. 
    128     For each in-memory parameter which is read or written by
    129     the syscall, do one of
    130     
    131       PRE_MEM_READ( ... )
    132       PRE_MEM_RASCIIZ( ... ) 
    133       PRE_MEM_WRITE( ... ) 
    134       
    135     for  that parameter.  Then do the syscall.  Then, if the syscall
    136     succeeds, issue suitable POST_MEM_WRITE( ... ) calls.
    137     (There's no need for POST_MEM_READ calls.)
    138 
    139     Also, add it to the syscall_table[] array; use one of GENX_, GENXY
    140     LINX_, LINXY, PLAX_, PLAXY.
    141     GEN* for generic syscalls (in syswrap-generic.c), LIN* for linux
    142     specific ones (in syswrap-linux.c) and PLA* for the platform
    143     dependant ones (in syswrap-$(PLATFORM)-linux.c).
    144     The *XY variant if it requires a PRE() and POST() function, and
    145     the *X_ variant if it only requires a PRE()
    146     function.  
    147     
    148     If you find this difficult, read the wrappers for other syscalls
    149     for ideas.  A good tip is to look for the wrapper for a syscall
    150     which has a similar behaviour to yours, and use it as a 
    151     starting point.
    152 
    153     If you need structure definitions and/or constants for your syscall,
    154     copy them from the kernel headers into include/vki.h and co., with
    155     the appropriate vki_*/VKI_* name mangling.  Don't #include any
    156     kernel headers.  And certainly don't #include any glibc headers.
    157 
    158     Test it.
    159 
    160     Note that a common error is to call POST_MEM_WRITE( ... )
    161     with 0 (NULL) as the first (address) argument.  This usually means
    162     your logic is slightly inadequate.  It's a sufficiently common bug
    163     that there's a built-in check for it, and you'll get a "probably
    164     sanity check failure" for the syscall wrapper you just made, if this
    165     is the case.
    166 
    167 
    168 4.  Once happy, send us the patch.  Pretty please.
    169 
    170 
    171 
    172 
    173 Writing your own ioctl wrappers
    174 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    175 
    176 Is pretty much the same as writing syscall wrappers, except that all
    177 the action happens within PRE(ioctl) and POST(ioctl).
    178 
    179 There's a default case, sometimes it isn't correct and you have to write a
    180 more specific case to get the right behaviour.
    181 
    182 As above, please create a bug report and attach the patch as described
    183 on http://www.valgrind.org.
    184 
    185 

README_PACKAGERS

      1 
      2 Greetings, packaging person!  This information is aimed at people
      3 building binary distributions of Valgrind.
      4 
      5 Thanks for taking the time and effort to make a binary distribution of
      6 Valgrind.  The following notes may save you some trouble.
      7 
      8 
      9 -- Do not ship your Linux distro with a completely stripped
     10    /lib/ld.so.  At least leave the debugging symbol names on -- line
     11    number info isn't necessary.  If you don't want to leave symbols on
     12    ld.so, alternatively you can have your distro install ld.so's
     13    debuginfo package by default, or make ld.so.debuginfo be a
     14    requirement of your Valgrind RPM/DEB/whatever.
     15 
     16    Reason for this is that Valgrind's Memcheck tool needs to intercept
     17    calls to, and provide replacements for, some symbols in ld.so at
     18    startup (most importantly strlen).  If it cannot do that, Memcheck
     19    shows a large number of false positives due to the highly optimised
     20    strlen (etc) routines in ld.so.  This has caused some trouble in
     21    the past.  As of version 3.3.0, on some targets (ppc32-linux,
     22    ppc64-linux), Memcheck will simply stop at startup (and print an
     23    error message) if such symbols are not present, because it is
     24    infeasible to continue.
     25 
     26    It's not like this is going to cost you much space.  We only need
     27    the symbols for ld.so (a few K at most).  Not the debug info and
     28    not any debuginfo or extra symbols for any other libraries.
     29 
     30 
     31 -- (Unfortunate but true) When you configure to build with the 
     32    --prefix=/foo/bar/xyzzy option, the prefix /foo/bar/xyzzy gets
     33    baked into valgrind.  The consequence is that you _must_ install
     34    valgrind at the location specified in the prefix.  If you don't,
     35    it may appear to work, but will break doing some obscure things,
     36    particularly doing fork() and exec().
     37 
     38    So you can't build a relocatable RPM / whatever from Valgrind.
     39 
     40 
     41 -- Don't strip the debug info off lib/valgrind/$platform/vgpreload*.so
     42    in the installation tree.  Either Valgrind won't work at all, or it
     43    will still work if you do, but will generate less helpful error
     44    messages.  Here's an example:
     45 
     46    Mismatched free() / delete / delete []
     47       at 0x40043249: free (vg_clientfuncs.c:171)
     48       by 0x4102BB4E: QGArray::~QGArray(void) (tools/qgarray.cpp:149)
     49       by 0x4C261C41: PptDoc::~PptDoc(void) (include/qmemarray.h:60)
     50       by 0x4C261F0E: PptXml::~PptXml(void) (pptxml.cc:44)
     51       Address 0x4BB292A8 is 0 bytes inside a block of size 64 alloc'd
     52       at 0x4004318C: __builtin_vec_new (vg_clientfuncs.c:152)
     53       by 0x4C21BC15: KLaola::readSBStream(int) const (klaola.cc:314)
     54       by 0x4C21C155: KLaola::stream(KLaola::OLENode const *) (klaola.cc:416)
     55       by 0x4C21788F: OLEFilter::convert(QCString const &) (olefilter.cc:272)
     56 
     57    This tells you that some memory allocated with new[] was freed with
     58    free().
     59 
     60    Mismatched free() / delete / delete []
     61       at 0x40043249: (inside vgpreload_memcheck.so)
     62       by 0x4102BB4E: QGArray::~QGArray(void) (tools/qgarray.cpp:149)
     63       by 0x4C261C41: PptDoc::~PptDoc(void) (include/qmemarray.h:60)
     64       by 0x4C261F0E: PptXml::~PptXml(void) (pptxml.cc:44)
     65       Address 0x4BB292A8 is 0 bytes inside a block of size 64 alloc'd
     66       at 0x4004318C: (inside vgpreload_memcheck.so)
     67       by 0x4C21BC15: KLaola::readSBStream(int) const (klaola.cc:314)
     68       by 0x4C21C155: KLaola::stream(KLaola::OLENode const *) (klaola.cc:416)
     69       by 0x4C21788F: OLEFilter::convert(QCString const &) (olefilter.cc:272)
     70 
     71    This isn't so helpful.  Although you can tell there is a mismatch, 
     72    the names of the allocating and deallocating functions are no longer
     73    visible.  The same kind of thing occurs in various other messages 
     74    from valgrind.
     75 
     76 
     77 -- Don't strip symbols from lib/valgrind/* in the installation tree.
     78    Doing so will likely cause problems.  Removing the line number info is
     79    probably OK (at least for some of the files in that directory), although
     80    that has not been tested by the Valgrind developers.
     81 
     82 
     83 -- Please test the final installation works by running it on something
     84    huge.  I suggest checking that it can start and exit successfully
     85    both Firefox and OpenOffice.org.  I use these as test programs, and I
     86    know they fairly thoroughly exercise Valgrind.  The command lines to use
     87    are:
     88 
     89    valgrind -v --trace-children=yes firefox
     90 
     91    valgrind -v --trace-children=yes soffice
     92 
     93 
     94 If you find any more hints/tips for packaging, please report
     95 it as a bugreport. See http://www.valgrind.org for details.
     96