[Daca-general] How did cppcheck catch a dma memleak? :)

Niels Thykier niels at thykier.net
Fri Dec 24 19:44:30 UTC 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 2010-12-24 19:40, Peter Pentchev wrote:
> Hi,
> 

Hey,

Sorry for the short email, but I am pressed for time :)

> [...]
>
> Now, here's the question.  What version of cppcheck is run to produce
> the reports at http://qa.debian.org/daca/cppcheck/ and, if it is 1.44-1
> as available in both unstable and testing right now, is there something
> special about its environment that would make it catch the memory leak
> at http://qa.debian.org/daca/cppcheck/sid/dma_0.0.2010.06.17-6.html ? :)
> 

It says in the bottom of the package which version daca used (in this
case cppcheck 1.46), which is not available in unstable as I recall.

~Niels

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=XLLP
-----END PGP SIGNATURE-----



More information about the Daca-general mailing list