You can ignore that. If you care that much about the epoll error then just bzero() the data being passed into epoll_ctl() before its called.
adrian On Mon, Mar 24, 2008, Amos Jeffries wrote: > Just doing a quick check with valgrind I'm seeing a lot of errors in the > event system. > > "Syscall param epoll_ctl(event) points to uninitialised byte(s)" > > with a wide range of events like: > > ==25761== at 0x4559A59: epoll_ctl (in /lib/libc-2.7.so) > ==25761== by 0x8171C2F: comm_read(int, char*, int, > RefCount<AsyncCall>&) (comm.cc:346) > ==25761== by 0x814B50C: StoreEntry::delayAwareRead(int, char*, int, > RefCount<AsyncCall>) (store.cc:261) > ==25761== by 0x80FB573: HttpStateData::maybeReadVirginBody() > (http.cc:1290) > ==25761== by 0x80F9C36: HttpStateData::sendRequest() (http.cc:1782) > ==25761== by 0x80FA594: httpStart (http.cc:1845) > ==25761== by 0x817AF86: CommConnectCbPtrFun::dial() (CommCalls.cc:127) > ==25761== by 0x8069A27: AsyncCall::make() (AsyncCall.cc:34) > ==25761== by 0x8068EAC: AsyncCallQueue::fireNext() (AsyncCallQueue.cc:53) > ==25761== by 0x8068FAD: AsyncCallQueue::fire() (AsyncCallQueue.cc:39) > ==25761== by 0x80CF392: EventLoop::dispatchCalls() (EventLoop.cc:156) > ==25761== by 0x80CF58C: EventLoop::runOnce() (EventLoop.cc:133) > ==25761== Address 0xbef187d8 is on thread 1's stack > > > All sharing the root: > comm_read(int, char*, int, RefCount<AsyncCall>&) (comm.cc:346) > > Anyone want to attack this one? > > Amos > -- > Please use Squid 2.6STABLE17+ or 3.0STABLE1+ > There are serious security advisories out on all earlier releases. -- - Xenion - http://www.xenion.com.au/ - VPS Hosting - Commercial Squid Support - - $25/pm entry-level VPSes w/ capped bandwidth charges available in WA -