Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 883872 Details for
Bug 923425
dev-libs/isa-l-2.30.0-r1 fails tests on x86: igzip/igzip_rand_test: Segmentation fault
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
valgrind report
file_923425.txt (text/plain), 6.35 KB, created by
matoro
on 2024-01-31 17:36:57 UTC
(
hide
)
Description:
valgrind report
Filename:
MIME Type:
Creator:
matoro
Created:
2024-01-31 17:36:57 UTC
Size:
6.35 KB
patch
obsolete
>$ LD_LIBRARY_PATH=.libs valgrind --leak-check=no --track-origins=yes igzip/.libs/igzip_rand_test >==188019== Memcheck, a memory error detector >==188019== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al. >==188019== Using Valgrind-3.21.0 and LibVEX; rerun with -h for copyright info >==188019== Command: igzip/.libs/igzip_rand_test >==188019== >Window Size: 32 K >Test Seed : 4660 >Randoms : 64 >igzip_rand_test stateless: ==188019== Use of uninitialised value of size 4 >==188019== at 0x485F00F: load_u64 (unaligned.h:50) >==188019== by 0x485F450: compare (huffman.h:318) >==188019== by 0x485F770: set_long_icf_fg_base (igzip_icf_body.c:50) >==188019== by 0x486A1A1: set_long_icf_fg (igzip_base_aliases.c:146) >==188019== by 0x485FFC7: icf_body_hash1_fillgreedy_lazy (igzip_icf_body.c:258) >==188019== by 0x4869F79: isal_deflate_icf_body_lvl3 (igzip_base_aliases.c:78) >==188019== by 0x48601F2: isal_deflate_icf_body (igzip_icf_body.c:317) >==188019== by 0x4859001: isal_deflate_icf_pass (igzip.c:512) >==188019== by 0x4859982: isal_deflate_int_stateless (igzip.c:771) >==188019== by 0x485AE67: isal_deflate_stateless (igzip.c:1429) >==188019== by 0x10D784: compress_stateless (igzip_rand_test.c:1559) >==188019== by 0x10E7CF: test_compress_stateless (igzip_rand_test.c:2028) >==188019== Uninitialised value was created by a stack allocation >==188019== at 0x10D77F: compress_stateless (igzip_rand_test.c:1559) >==188019== >==188019== Invalid read of size 4 >==188019== at 0x485F00F: load_u64 (unaligned.h:50) >==188019== by 0x485F450: compare (huffman.h:318) >==188019== by 0x485F770: set_long_icf_fg_base (igzip_icf_body.c:50) >==188019== by 0x486A1A1: set_long_icf_fg (igzip_base_aliases.c:146) >==188019== by 0x485FFC7: icf_body_hash1_fillgreedy_lazy (igzip_icf_body.c:258) >==188019== by 0x4869F79: isal_deflate_icf_body_lvl3 (igzip_base_aliases.c:78) >==188019== by 0x48601F2: isal_deflate_icf_body (igzip_icf_body.c:317) >==188019== by 0x4859001: isal_deflate_icf_pass (igzip.c:512) >==188019== by 0x4859982: isal_deflate_int_stateless (igzip.c:771) >==188019== by 0x485AE67: isal_deflate_stateless (igzip.c:1429) >==188019== by 0x10D784: compress_stateless (igzip_rand_test.c:1559) >==188019== by 0x10E7CF: test_compress_stateless (igzip_rand_test.c:2028) >==188019== Address 0x4bd5938 is 180,960 bytes inside a block of size 296,567 free'd >==188019== at 0x4843039: free (in /usr/libexec/valgrind/vgpreload_memcheck-x86-linux.so) >==188019== by 0x10D7A4: compress_stateless (igzip_rand_test.c:1562) >==188019== by 0x10E7CF: test_compress_stateless (igzip_rand_test.c:2028) >==188019== by 0x1105CA: main (igzip_rand_test.c:2805) >==188019== Block was alloc'd at >==188019== at 0x4840670: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-x86-linux.so) >==188019== by 0x10D721: compress_stateless (igzip_rand_test.c:1550) >==188019== by 0x10E7CF: test_compress_stateless (igzip_rand_test.c:2028) >==188019== by 0x1105CA: main (igzip_rand_test.c:2805) >==188019== >==188019== Invalid read of size 4 >==188019== at 0x485F012: load_u64 (unaligned.h:50) >==188019== by 0x485F450: compare (huffman.h:318) >==188019== by 0x485F770: set_long_icf_fg_base (igzip_icf_body.c:50) >==188019== by 0x486A1A1: set_long_icf_fg (igzip_base_aliases.c:146) >==188019== by 0x485FFC7: icf_body_hash1_fillgreedy_lazy (igzip_icf_body.c:258) >==188019== by 0x4869F79: isal_deflate_icf_body_lvl3 (igzip_base_aliases.c:78) >==188019== by 0x48601F2: isal_deflate_icf_body (igzip_icf_body.c:317) >==188019== by 0x4859001: isal_deflate_icf_pass (igzip.c:512) >==188019== by 0x4859982: isal_deflate_int_stateless (igzip.c:771) >==188019== by 0x485AE67: isal_deflate_stateless (igzip.c:1429) >==188019== by 0x10D784: compress_stateless (igzip_rand_test.c:1559) >==188019== by 0x10E7CF: test_compress_stateless (igzip_rand_test.c:2028) >==188019== Address 0x4bd5934 is 180,956 bytes inside a block of size 296,567 free'd >==188019== at 0x4843039: free (in /usr/libexec/valgrind/vgpreload_memcheck-x86-linux.so) >==188019== by 0x10D7A4: compress_stateless (igzip_rand_test.c:1562) >==188019== by 0x10E7CF: test_compress_stateless (igzip_rand_test.c:2028) >==188019== by 0x1105CA: main (igzip_rand_test.c:2805) >==188019== Block was alloc'd at >==188019== at 0x4840670: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-x86-linux.so) >==188019== by 0x10D721: compress_stateless (igzip_rand_test.c:1550) >==188019== by 0x10E7CF: test_compress_stateless (igzip_rand_test.c:2028) >==188019== by 0x1105CA: main (igzip_rand_test.c:2805) >==188019== >==188019== >==188019== Process terminating with default action of signal 11 (SIGSEGV): dumping core >==188019== Access not within mapped region at address 0xE3AD877C >==188019== at 0x485F00F: load_u64 (unaligned.h:50) >==188019== by 0x485F450: compare (huffman.h:318) >==188019== by 0x485F770: set_long_icf_fg_base (igzip_icf_body.c:50) >==188019== by 0x486A1A1: set_long_icf_fg (igzip_base_aliases.c:146) >==188019== by 0x485FFC7: icf_body_hash1_fillgreedy_lazy (igzip_icf_body.c:258) >==188019== by 0x4869F79: isal_deflate_icf_body_lvl3 (igzip_base_aliases.c:78) >==188019== by 0x48601F2: isal_deflate_icf_body (igzip_icf_body.c:317) >==188019== by 0x4859001: isal_deflate_icf_pass (igzip.c:512) >==188019== by 0x4859982: isal_deflate_int_stateless (igzip.c:771) >==188019== by 0x485AE67: isal_deflate_stateless (igzip.c:1429) >==188019== by 0x10D784: compress_stateless (igzip_rand_test.c:1559) >==188019== by 0x10E7CF: test_compress_stateless (igzip_rand_test.c:2028) >==188019== If you believe this happened as a result of a stack >==188019== overflow in your program's main thread (unlikely but >==188019== possible), you can try to increase the size of the >==188019== main thread stack using the --main-stacksize= flag. >==188019== The main thread stack size used in this run was 8388608. >==188019== >==188019== HEAP SUMMARY: >==188019== in use at exit: 2,400,898 bytes in 5 blocks >==188019== total heap usage: 31 allocs, 26 frees, 3,715,550 bytes allocated >==188019== >==188019== For a detailed leak analysis, rerun with: --leak-check=full >==188019== >==188019== For lists of detected and suppressed errors, rerun with: -s >==188019== ERROR SUMMARY: 4 errors from 3 contexts (suppressed: 0 from 0) >Segmentation fault
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 923425
:
883870
|
883871
| 883872