You can ignore that. If you care that much about the epoll error then
just bzero() the data being passed into epoll_ctl() before its called.



adrian

On Mon, Mar 24, 2008, Amos Jeffries wrote:
> Just doing a quick check with valgrind I'm seeing a lot of errors in the 
> event system.
> 
> "Syscall param epoll_ctl(event) points to uninitialised byte(s)"
> 
> with a wide range of events like:
> 
> ==25761==    at 0x4559A59: epoll_ctl (in /lib/libc-2.7.so)
> ==25761==    by 0x8171C2F: comm_read(int, char*, int, 
> RefCount<AsyncCall>&) (comm.cc:346)
> ==25761==    by 0x814B50C: StoreEntry::delayAwareRead(int, char*, int, 
> RefCount<AsyncCall>) (store.cc:261)
> ==25761==    by 0x80FB573: HttpStateData::maybeReadVirginBody() 
> (http.cc:1290)
> ==25761==    by 0x80F9C36: HttpStateData::sendRequest() (http.cc:1782)
> ==25761==    by 0x80FA594: httpStart (http.cc:1845)
> ==25761==    by 0x817AF86: CommConnectCbPtrFun::dial() (CommCalls.cc:127)
> ==25761==    by 0x8069A27: AsyncCall::make() (AsyncCall.cc:34)
> ==25761==    by 0x8068EAC: AsyncCallQueue::fireNext() (AsyncCallQueue.cc:53)
> ==25761==    by 0x8068FAD: AsyncCallQueue::fire() (AsyncCallQueue.cc:39)
> ==25761==    by 0x80CF392: EventLoop::dispatchCalls() (EventLoop.cc:156)
> ==25761==    by 0x80CF58C: EventLoop::runOnce() (EventLoop.cc:133)
> ==25761==  Address 0xbef187d8 is on thread 1's stack
> 
> 
> All sharing the root:
>       comm_read(int, char*, int, RefCount<AsyncCall>&) (comm.cc:346)
> 
> Anyone want to attack this one?
> 
> Amos
> -- 
> Please use Squid 2.6STABLE17+ or 3.0STABLE1+
> There are serious security advisories out on all earlier releases.

-- 
- Xenion - http://www.xenion.com.au/ - VPS Hosting - Commercial Squid Support -
- $25/pm entry-level VPSes w/ capped bandwidth charges available in WA -

Reply via email to