These valgrind logs are taken also without compiler optimizations.

Jussi



On Sat, Jan 8, 2011 at 22:33, Jussi Lahtinen <jussi.lahti...@gmail.com>wrote:

> With compiler optimizations removed:
>
>
> Starting program: /usr/local/bin/gbx3 -p
> [Thread debugging using libthread_db enabled]
> [New Thread 0x7fffef2ba700 (LWP 19548)]
>
> warning: unable to load Qt translation: en_GB.utf8
>
> Program received signal SIGSEGV, Segmentation fault.
> 0x000000000042420f in SUBR_leave (nparam=2) at gbx_subr.c:42
> 42      BORROW(RP);
> (gdb) f 1
> #1  0x000000000042600b in SUBR_read (code=32000) at gbx_subr_file.c:441
> 441        SUBR_LEAVE();
> (gdb) bt
> #0  0x000000000042420f in SUBR_leave (nparam=2) at gbx_subr.c:42
> #1  0x000000000042600b in SUBR_read (code=32000) at gbx_subr_file.c:441
> #2  0x00000000004513f7 in EXEC_loop () at gbx_exec_loop.c:480
> #3  0x000000000040f69e in EXEC_function_loop () at gbx_exec.c:861
> #4  0x000000000040f601 in EXEC_function_real () at gbx_exec.c:848
> #5  0x0000000000411f63 in EXEC_public_desc (class=0x731148, object=0x0,
>     desc=0x8faae8, nparam=0) at gbx_exec.c:1497
> #6  0x000000000043d428 in main (argc=1, argv=0x7fffffffe338) at gbx.c:362
>
> Jussi
>
>
>
>
>
>
> On Thu, Jan 6, 2011 at 17:43, Jussi Lahtinen <jussi.lahti...@gmail.com>wrote:
>
>> Hi!
>> I cannot really isolate my problem, but in this case it happens when
>> loading string data from file to object
>> (something like "someobject.sStr = Read #hFile As String").
>>
>> Gambas 3 rev 3447 @ Ubuntu 10.10 64bit
>>
>> $ gbc3 -agpmt
>> OK
>> $ gdb gbx3
>> GNU gdb (GDB) 7.2-ubuntu
>> Copyright (C) 2010 Free Software Foundation, Inc.
>> License GPLv3+: GNU GPL version 3 or later <
>> http://gnu.org/licenses/gpl.html>
>> This is free software: you are free to change and redistribute it.
>> There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
>> and "show warranty" for details.
>> This GDB was configured as "x86_64-linux-gnu".
>> For bug reporting instructions, please see:
>> <http://www.gnu.org/software/gdb/bugs/>...
>> Reading symbols from /usr/local/bin/gbx3...done.
>> (gdb) set args -p
>> (gdb) run
>> Starting program: /usr/local/bin/gbx3 -p
>> [Thread debugging using libthread_db enabled]
>> [New Thread 0x7fffef2ba700 (LWP 3790)]
>> warning: unable to load Qt translation: en_GB.utf8
>>
>> Program received signal SIGSEGV, Segmentation fault.
>> 0x0000000000414b91 in SUBR_leave (nparam=2) at gbx_subr.c:42
>> 42      BORROW(RP);
>> (gdb) bt
>> #0  0x0000000000414b91 in SUBR_leave (nparam=2) at gbx_subr.c:42
>> #1  0x0000000000430132 in EXEC_loop () at gbx_exec_loop.c:480
>> #2  0x0000000000409a75 in EXEC_function_loop () at gbx_exec.c:861
>> #3  0x000000000040a4c5 in EXEC_function_real () at gbx_exec.c:848
>> #4  0x00000000004227e5 in main (argc=1, argv=<value optimised out>)
>>     at gbx.c:362
>>
>> (gdb) f 1
>> #1  0x0000000000430132 in EXEC_loop () at gbx_exec_loop.c:480
>> 480      (*(EXEC_FUNC_CODE)SubrTable[(code >> 8) - 0x28])(code);
>>
>>
>> Also see attached valgrind log.
>>
>> Jussi
>>
>>
>
==25393== Memcheck, a memory error detector
==25393== Copyright (C) 2002-2010, and GNU GPL'd, by Julian Seward et al.
==25393== Using Valgrind-3.6.0.SVN-Debian and LibVEX; rerun with -h for copyright info
==25393== Command: gbx3 -p
==25393== Parent PID: 25348
==25393== 
==25393== Conditional jump or move depends on uninitialised value(s)
==25393==    at 0x88E2E40: inflateReset2 (in /lib/libz.so.1.2.3.4)
==25393==    by 0x88E2F2F: inflateInit2_ (in /lib/libz.so.1.2.3.4)
==25393==    by 0x94AF4AF: png_create_read_struct_2 (in /lib/libpng12.so.0.44.0)
==25393==    by 0x94AF646: png_create_read_struct (in /lib/libpng12.so.0.44.0)
==25393==    by 0x72B5C7D: ??? (in /usr/lib/libQtGui.so.4.7.0)
==25393==    by 0x72B66BC: ??? (in /usr/lib/libQtGui.so.4.7.0)
==25393==    by 0x7283752: QImageReader::read(QImage*) (in /usr/lib/libQtGui.so.4.7.0)
==25393==    by 0x7283D1B: QImageReader::read() (in /usr/lib/libQtGui.so.4.7.0)
==25393==    by 0x726F827: QImage::fromData(unsigned char const*, int, char const*) (in /usr/lib/libQtGui.so.4.7.0)
==25393==    by 0x72736FD: QImage::loadFromData(unsigned char const*, int, char const*) (in /usr/lib/libQtGui.so.4.7.0)
==25393==    by 0x60D3DCF: CPICTURE_load_image(QImage**, char const*, int) (gb.form.picture.h:124)
==25393==    by 0x60D46AA: get_picture(char const*, int) (gb.form.picture.h:168)
==25393==    by 0x60D478F: CPICTURE_get(void*, void*) (CPicture.cpp:189)
==25393==    by 0x41112B: EXEC_native (gbx_exec.c:1243)
==25393==    by 0x412118: EXEC_special (gbx_exec.c:1555)
==25393==    by 0x4149D4: EXEC_push_array (gbx_exec_push.c:567)
==25393==    by 0x4516DB: EXEC_loop (gbx_exec_loop.c:521)
==25393==    by 0x40F6A9: EXEC_function_loop (gbx_exec.c:861)
==25393==    by 0x40F60C: EXEC_function_real (gbx_exec.c:848)
==25393==    by 0x412549: EXEC_special_inheritance (gbx_exec.c:1745)
==25393==    by 0x41304A: EXEC_new (gbx_exec.c:1910)
==25393==    by 0x452569: EXEC_loop (gbx_exec_loop.c:823)
==25393==    by 0x40F6A9: EXEC_function_loop (gbx_exec.c:861)
==25393==    by 0x40F60C: EXEC_function_real (gbx_exec.c:848)
==25393==    by 0x41C79E: CLASS_load_without_init (gbx_class_load.c:1181)
==25393==    by 0x41C82F: CLASS_load_real (gbx_class_load.c:1199)
==25393==    by 0x431A64: GB_GetFunction (gbx_api.c:655)
==25393==    by 0x60BACBF: QT_Init() (main.cpp:635)
==25393==    by 0x60BAD7F: hook_main(int*, char**) (main.cpp:707)
==25393==    by 0x43D213: main (gbx.c:325)
==25393== 
==25393== Invalid read of size 4
==25393==    at 0x42421B: SUBR_leave (gbx_subr.c:42)
==25393==    by 0x426016: SUBR_read (gbx_subr_file.c:441)
==25393==    by 0x45141A: EXEC_loop (gbx_exec_loop.c:480)
==25393==    by 0x40F6A9: EXEC_function_loop (gbx_exec.c:861)
==25393==    by 0x40F60C: EXEC_function_real (gbx_exec.c:848)
==25393==    by 0x411F6E: EXEC_public_desc (gbx_exec.c:1497)
==25393==    by 0x43D447: main (gbx.c:362)
==25393==  Address 0xfffffff7 is not stack'd, malloc'd or (recently) free'd
==25393== 
==25393== 
==25393== Process terminating with default action of signal 11 (SIGSEGV)
==25393==  Access not within mapped region at address 0xFFFFFFF7
==25393==    at 0x42421B: SUBR_leave (gbx_subr.c:42)
==25393==    by 0x426016: SUBR_read (gbx_subr_file.c:441)
==25393==    by 0x45141A: EXEC_loop (gbx_exec_loop.c:480)
==25393==    by 0x40F6A9: EXEC_function_loop (gbx_exec.c:861)
==25393==    by 0x40F60C: EXEC_function_real (gbx_exec.c:848)
==25393==    by 0x411F6E: EXEC_public_desc (gbx_exec.c:1497)
==25393==    by 0x43D447: main (gbx.c:362)
==25393==  If you believe this happened as a result of a stack
==25393==  overflow in your program's main thread (unlikely but
==25393==  possible), you can try to increase the size of the
==25393==  main thread stack using the --main-stacksize= flag.
==25393==  The main thread stack size used in this run was 8388608.
==25393== 
==25393== HEAP SUMMARY:
==25393==     in use at exit: 7,533,555 bytes in 35,200 blocks
==25393==   total heap usage: 322,702 allocs, 287,502 frees, 199,197,940 bytes allocated
==25393== 
==25393== LEAK SUMMARY:
==25393==    definitely lost: 174,496 bytes in 1,869 blocks
==25393==    indirectly lost: 702,991 bytes in 8,438 blocks
==25393==      possibly lost: 5,093,848 bytes in 15,567 blocks
==25393==    still reachable: 1,562,220 bytes in 9,326 blocks
==25393==         suppressed: 0 bytes in 0 blocks
==25393== Rerun with --leak-check=full to see details of leaked memory
==25393== 
==25393== For counts of detected and suppressed errors, rerun with: -v
==25393== Use --track-origins=yes to see where uninitialised values come from
==25393== ERROR SUMMARY: 917 errors from 2 contexts (suppressed: 18 from 8)
==25451== Callgrind, a call-graph generating cache profiler
==25451== Copyright (C) 2002-2010, and GNU GPL'd, by Josef Weidendorfer et al.
==25451== Using Valgrind-3.6.0.SVN-Debian and LibVEX; rerun with -h for copyright info
==25451== Command: gbx3 -p
==25451== Parent PID: 25348
==25451== 
==25451== For interactive control, run 'callgrind_control -h'.
==25451== 
==25451== Process terminating with default action of signal 11 (SIGSEGV)
==25451==  Access not within mapped region at address 0xFFFFFFF7
==25451==    at 0x42421B: SUBR_leave (gbx_subr.c:42)
==25451==    by 0x426016: SUBR_read (gbx_subr_file.c:441)
==25451==    by 0x45141A: EXEC_loop (gbx_exec_loop.c:480)
==25451==    by 0x40F6A9: EXEC_function_loop (gbx_exec.c:861)
==25451==    by 0x40F60C: EXEC_function_real (gbx_exec.c:848)
==25451==    by 0x411F6E: EXEC_public_desc (gbx_exec.c:1497)
==25451==    by 0x43D447: main (gbx.c:362)
==25451==  If you believe this happened as a result of a stack
==25451==  overflow in your program's main thread (unlikely but
==25451==  possible), you can try to increase the size of the
==25451==  main thread stack using the --main-stacksize= flag.
==25451==  The main thread stack size used in this run was 8388608.
==25451== 
==25451== Events    : Ir
==25451== Collected : 4878639172
==25451== 
==25451== I   refs:      4,878,639,172
------------------------------------------------------------------------------
Protect Your Site and Customers from Malware Attacks
Learn about various malware tactics and how to avoid them. Understand 
malware threats, the impact they can have on your business, and how you 
can protect your company and customers by using code signing.
http://p.sf.net/sfu/oracle-sfdevnl
_______________________________________________
Gambas-user mailing list
Gambas-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/gambas-user

Reply via email to