[Gambas-user] [Gambas Bug Tracker] Bug #885: Arch Linux Raspberry Pi 2 IDE Segmentation fault

bugtracker at ...3416... bugtracker at ...3416...
Mon Jan 18 18:16:30 CET 2016


http://gambaswiki.org/bugtracker/edit?object=BUG.885&from=L21haW4-

Comment #3 by Joris ALDERS:

Here is the valgrind output :

==842== Memcheck, a memory error detector
==842== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==842== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info
==842== Command: gbx3
==842== 
disInstr(arm): unhandled instruction: 0xEC510F1E
                 cond=14(0xE) 27:20=197(0xC5) 4:4=1 3:0=14(0xE)
==842== valgrind: Unrecognised instruction at address 0x979c288.
==842==    at 0x979C288: _armv7_tick (in /usr/lib/libcrypto.so.1.0.0)
==842== Your program just tried to execute an instruction that Valgrind
==842== did not recognise.  There are two possible reasons for this.
==842== 1. Your program has a bug and erroneously jumped to a non-code
==842==    location.  If you are running Memcheck and you just saw a
==842==    warning about a bad jump, it's probably your program's fault.
==842== 2. The instruction is legitimate but Valgrind doesn't handle it,
==842==    i.e. it's Valgrind's fault.  If you think this is the case or
==842==    you are not sure, please let us know and we'll try to fix it.
==842== Either way, Valgrind will now raise a SIGILL signal which will
==842== probably kill your program.
==842== Invalid read of size 4
==842==    at 0x4019E74: index (in /usr/lib/ld-2.22.so)
==842==    by 0x401497F: dl_open_worker (in /usr/lib/ld-2.22.so)
==842==  Address 0x4cee47c is 3 bytes after a block of size 49 alloc'd
==842==    at 0x48467A8: malloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so)
==842== 
==842== Conditional jump or move depends on uninitialised value(s)
==842==    at 0x4019E74: index (in /usr/lib/ld-2.22.so)
==842==    by 0x401497F: dl_open_worker (in /usr/lib/ld-2.22.so)
==842== 
==842== Conditional jump or move depends on uninitialised value(s)
==842==    at 0x4019E78: index (in /usr/lib/ld-2.22.so)
==842==    by 0x401497F: dl_open_worker (in /usr/lib/ld-2.22.so)
==842== 
==842== Conditional jump or move depends on uninitialised value(s)
==842==    at 0x4014984: dl_open_worker (in /usr/lib/ld-2.22.so)
==842== 
==842== Conditional jump or move depends on uninitialised value(s)
==842==    at 0x4019E74: index (in /usr/lib/ld-2.22.so)
==842==    by 0x4007E73: expand_dynamic_string_token (in /usr/lib/ld-2.22.so)
==842== 
==842== Conditional jump or move depends on uninitialised value(s)
==842==    at 0x4019E78: index (in /usr/lib/ld-2.22.so)
==842==    by 0x4007E73: expand_dynamic_string_token (in /usr/lib/ld-2.22.so)
==842== 
==842== Conditional jump or move depends on uninitialised value(s)
==842==    at 0x4007E78: expand_dynamic_string_token (in /usr/lib/ld-2.22.so)
==842== 
==842== Invalid read of size 4
==842==    at 0x4019E34: index (in /usr/lib/ld-2.22.so)
==842==    by 0x401497F: dl_open_worker (in /usr/lib/ld-2.22.so)
==842==  Address 0x4cf6a9c is 0 bytes after a block of size 36 alloc'd
==842==    at 0x48467A8: malloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so)
==842== 
==842== Invalid read of size 4
==842==    at 0x4019E34: index (in /usr/lib/ld-2.22.so)
==842==    by 0x4008ACF: _dl_map_object (in /usr/lib/ld-2.22.so)
==842==  Address 0x4cf6a9c is 0 bytes after a block of size 36 alloc'd
==842==    at 0x48467A8: malloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so)
==842== 
==842== Conditional jump or move depends on uninitialised value(s)
==842==    at 0x4019E74: index (in /usr/lib/ld-2.22.so)
==842==    by 0x4008ACF: _dl_map_object (in /usr/lib/ld-2.22.so)
==842== 
==842== Conditional jump or move depends on uninitialised value(s)
==842==    at 0x4019E78: index (in /usr/lib/ld-2.22.so)
==842==    by 0x4008ACF: _dl_map_object (in /usr/lib/ld-2.22.so)
==842== 
==842== Conditional jump or move depends on uninitialised value(s)
==842==    at 0x4008AD4: _dl_map_object (in /usr/lib/ld-2.22.so)
==842== 
==842== 
==842== Process terminating with default action of signal 2 (SIGINT)
==842==    at 0x66632C0: g_signal_connect_data (in /usr/lib/libgobject-2.0.so.0.4600.2)
==842== 
==842== HEAP SUMMARY:
==842==     in use at exit: 2,616,211 bytes in 24,214 blocks
==842==   total heap usage: 54,309 allocs, 30,095 frees, 4,475,616 bytes allocated
==842== 
==842== LEAK SUMMARY:
==842==    definitely lost: 1,280 bytes in 4 blocks
==842==    indirectly lost: 10,771 bytes in 431 blocks
==842==      possibly lost: 1,344,974 bytes in 2,629 blocks
==842==    still reachable: 1,133,994 bytes in 20,060 blocks
==842==                       of which reachable via heuristic:
==842==                         newarray           : 4,352 bytes in 114 blocks
==842==                         multipleinheritance: 12 bytes in 1 blocks
==842==         suppressed: 0 bytes in 0 blocks
==842== Rerun with --leak-check=full to see details of leaked memory
==842== 
==842== For counts of detected and suppressed errors, rerun with: -v
==842== Use --track-origins=yes to see where uninitialised values come from
==842== ERROR SUMMARY: 59 errors from 12 contexts (suppressed: 1 from 1)






More information about the User mailing list