summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Release 3.1.23.1.2Nathan Scott2021-11-302-1/+2
|
* Merge branch 'release_action' of https://github.com/rofl0r/htop into ↵Nathan Scott2021-11-301-0/+51
|\ | | | | | | rofl0r-release_action
| * add github workflow to build release tarballrofl0r2021-11-231-0/+51
| |
* | Minor typo fix and wordsmith-ing in the changelogNathan Scott2021-11-301-4/+4
| |
* | Update changelog to include recent changesBenny Baumann2021-11-281-0/+14
| |
* | Add a fix to use gettimeofday if monotonic is not available.Lutz Mader2021-11-281-2/+6
| |
* | Get file size using stat() for OpenFilesScreen if missing from lsofPeter VandeHaar2021-11-281-0/+26
| |
* | Strip prefix "0t" from OFFSET column of OpenFilesScreenPeter VandeHaar2021-11-281-2/+10
| |
* | Add OFFSET column to OpenFilesScreenPeter VandeHaar2021-11-281-6/+9
| |
* | Include support for legacy LXC cgroup namingBenny Baumann2021-11-281-0/+30
| |
* | Use helpers for parsing of cgroup labelsBenny Baumann2021-11-281-9/+21
| |
* | Document CCGROUP columnBenny Baumann2021-11-281-1/+17
| |
* | Extract string writing/buffer handling into some callbackBenny Baumann2021-11-283-131/+121
| |
* | Compress cgroup names based on some heuristicsBenny Baumann2021-11-287-1/+331
| |
* | Filter leading colons in CGROUP nameBenny Baumann2021-11-281-3/+10
| |
* | Ensure maximum width for CGROUP columnBenny Baumann2021-11-281-2/+2
|/
* Reduce allocation size of cp_time_n and cp_time_o on FreeBSD and DragonFlyBSDGuillaume Gomez2021-11-192-4/+4
|
* Linux: use proper way to detect kernel threadsRin Cat (鈴猫)2021-11-092-15/+23
| | | | | | Use PF_KTHREAD flag in /proc/[pid]/stat to detect kernel threads. This fixed an issue when a process's cmdline is empty, htop think it is a kernel thread.
* Correct the order of xCalloc parameters in a couple of placesNathan Scott2021-11-052-2/+2
| | | | No functional change. Thanks to @BenBE for pointing these out.
* Cleanup: Fix misc styleguide issuesSohaib Mohamed2021-11-044-4/+4
| | | | Signed-off-by: Sohaib Mohamed <sohaib.amhmd@gmail.com>
* Fix process state handling compiler warning on PCP platformNathan Scott2021-11-031-1/+1
|
* Tidy up process state handlingmarcluque2021-11-0211-137/+189
|
* Drop unicode whitespaceChristian Göttsche2021-11-011-1/+1
|
* Early program termination only from main()Volodymyr Vasiutyk2021-10-3120-90/+123
|
* Discard stale information from DiskIO and NetworkIO metersBenny Baumann2021-10-302-0/+12
| | | | | | | This ensures the initial read of the data is not misinterpreted as arbitrarily large values. Also this forces the maximum update interval between two subsequent reads to within 30s. Fixes #860
* Dynamically scale the ST_UID size to support 32-bit UIDsSilke Hofstra2021-10-2713-29/+71
| | | | | | | | | | | | | | | | | | While most Unix-like systems use 16-bit user IDs, Linux supports 32-bit UIDs since version 2.6. UIDs above 65535 are used for UID namespacing of containers, where a container has its own set of 16-bit user IDs. Processes in such containers will have (much) larger UIDs than 65535. Because the current format strings for `ST_UID` and `USER` are `%5d` and `%9d` respectively, processes with such UIDs lead to misaligned columns. Dynamically scale the `ST_UID` column and increase the size of `USER` to 10 characters (length of UINT32_MAX) to ensure that the user ID always fits. Additionally: clean up how the titlebuffer size calculation and ensure the PID column has a minimum size of 5.
* Linux: restore battery state with numbered AC'sChristian Göttsche2021-10-261-1/+1
|
* Code clean up for reading battery infoaninsen2021-10-251-152/+86
|
* Linux: ignore mapped /dev/zeroChristian Hesse2021-10-251-0/+5
| | | | | Virtualbox maps /dev/zero for memory allocation. That results in false positive, so ignore.
* Allow -u UIDнаб2021-10-242-3/+8
| | | | Defaults to username, of course, like all POSIX utilities do
* Fix Security Attributes column header widthLucas Werkmeister2021-10-201-2/+2
| | | | | | | | | Limit the maximum width (instead of only the minimum width), pad the header width accordingly, and also remove extra stray spaces from the format string (the main spacing should just come from the alignment of the value). Fixes #850.
* Merge branch 'del-exe-lib-docs' of BenBE/htop into mainDaniel Lange2021-10-192-6/+18
|\
| * Elaborate the highlighting of outdated/deleted executables and librariesBenny Baumann2021-10-192-6/+18
|/
* FreeBSD: add comment for memory leak workaroundChristian Göttsche2021-10-151-0/+1
| | | | | | Follow-up of #841 [ci skip]
* Header: allocate memory for terminating entryChristian Göttsche2021-10-151-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | The names array is terminated by a NULL entry, thus allocate space for one more than entries. Fixes: #844 ==6708==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6060000045b8 at pc 0x000000589ee1 bp 0x7ffcd1dee220 sp 0x7ffcd1dee218 READ of size 8 at 0x6060000045b8 thread T0 #0 0x589ee0 in String_freeArray ./XUtils.c:157:23 #1 0x56c9af in Settings_delete ./Settings.c:31:7 #2 0x4ee44b in CommandLine_run ./CommandLine.c:395:4 #3 0x4d6fb2 in main ./htop.c:15:11 #4 0x7ff3b8154e49 in __libc_start_main csu/../csu/libc-start.c:314:16 #5 0x428aa9 in _start (./htop+0x428aa9) 0x6060000045b8 is located 0 bytes to the right of 56-byte region [0x606000004580,0x6060000045b8) allocated by thread T0 here: #0 0x4a53f2 in __interceptor_calloc (./htop+0x4a53f2) #1 0x5890ba in xCalloc ./XUtils.c:55:17 #2 0x50a044 in Header_writeBackToSettings ./Header.c:148:34 #3 0x4de861 in Action_runSetup ./Action.c:91:7 #4 0x4de861 in actionSetup ./Action.c:386:4 #5 0x515caf in MainPanel_eventHandler ./MainPanel.c:106:19 #6 0x56a5c1 in ScreenManager_run ./ScreenManager.c:235:19 #7 0x4ee13b in CommandLine_run ./CommandLine.c:364:4 #8 0x4d6fb2 in main ./htop.c:15:11 #9 0x7ff3b8154e49 in __libc_start_main csu/../csu/libc-start.c:314:16
* Update version number to 3.2.0-dev to identify git repo buildsBenny Baumann2021-10-141-1/+1
|
* Release 3.1.13.1.1Benny Baumann2021-10-141-1/+1
|
* Suppress reporting memory leaks originating from libdevstatXimalas2021-10-141-0/+10
| | | | | | | | | | Based on https://cgit.freebsd.org/src/tree/lib/libdevstat/devstat.c the following four functions call memory allocation functions: - devstat_getdevs() - devstat_selectdevs() - devstat_buildmatch() - get_devstat_kvm()
* Updates to the ChangeLog for 3.1.1 releaseNathan Scott2021-10-131-0/+8
|
* Plug the memory leak for the Disk I/O meterXimalas2021-10-121-1/+1
| | | There are no functions in libdevstat to initialise or clean up memory. The simplest change is to mark the local variable info as static.
* Merge branch 'revert-used-memory'Nathan Scott2021-10-121-1/+1
|\
| * Ensure consistent reporting of MemoryMeter used memoryNathan Scott2021-10-121-1/+1
| | | | | | | | Resolves #821
* | Report hugepage memory as real and used memory (as before)Nathan Scott2021-10-121-2/+2
|/ | | | | | This is real, physical memory available for applications to use. We should not try to pretend otherwise; its confusing for users and inconsistent with all other tools.
* Handle procExeDeleted & usesDeletedLib without mergedCommandline modeBenny Baumann2021-10-071-0/+6
|
* Validate meter configuration before proceedingBenny Baumann2021-10-061-1/+24
|
* Properly release memory on partially read configurationBenny Baumann2021-10-061-6/+14
|
* Handle interrupted sampling from within libpcp PDU transfersNathan Scott2021-10-052-2/+6
| | | | | | | | | This situation can arise if pcp-htop screen is resized right at the same time sampling from pmcd(1) is happening. Have a couple more goes at it before giving up entirely; once there is no data available though we cannot proceed into accessing the sample result data structure (segv will result) so a new short-circuit guard is added there also.
* Memory leak on OpenBSD when querying full command lineBenny Baumann2021-10-031-0/+2
|
* Memory leak on NetBSD when querying full command lineBenny Baumann2021-10-031-0/+2
|
* Memory leak on DragonFlyBSD when querying full command lineBenny Baumann2021-10-031-0/+3
|

© 2014-2024 Faster IT GmbH | imprint | privacy policy