==1469== Memcheck, a memory error detector ==1469== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==1469== Using Valgrind-3.9.0 and LibVEX; rerun with -h for copyright info ==1469== Command: dhcpcd -dB ==1469== dhcpcd[1469]: version 6.4.3 starting dhcpcd[1469]: udev: starting dhcpcd[1469]: dev: loaded udev ==1469== Conditional jump or move depends on uninitialised value(s) ==1469== at 0x410ADB: ??? (in /sbin/dhcpcd) ==1469== by 0x41082E: ??? (in /sbin/dhcpcd) ==1469== by 0x410C0F: ??? (in /sbin/dhcpcd) ==1469== by 0x411736: ??? (in /sbin/dhcpcd) ==1469== by 0x408B92: ??? (in /sbin/dhcpcd) ==1469== by 0x4036C4: ??? (in /sbin/dhcpcd) ==1469== by 0x505BDB4: (below main) (in /lib64/libc-2.19.so) ==1469== ==1469== Use of uninitialised value of size 8 ==1469== at 0x410ADD: ??? (in /sbin/dhcpcd) ==1469== by 0x41082E: ??? (in /sbin/dhcpcd) ==1469== by 0x410C0F: ??? (in /sbin/dhcpcd) ==1469== by 0x411736: ??? (in /sbin/dhcpcd) ==1469== by 0x408B92: ??? (in /sbin/dhcpcd) ==1469== by 0x4036C4: ??? (in /sbin/dhcpcd) ==1469== by 0x505BDB4: (below main) (in /lib64/libc-2.19.so) ==1469== ==1469== Invalid read of size 2 ==1469== at 0x410ADD: ??? (in /sbin/dhcpcd) ==1469== by 0x41082E: ??? (in /sbin/dhcpcd) ==1469== by 0x410C0F: ??? (in /sbin/dhcpcd) ==1469== by 0x411736: ??? (in /sbin/dhcpcd) ==1469== by 0x408B92: ??? (in /sbin/dhcpcd) ==1469== by 0x4036C4: ??? (in /sbin/dhcpcd) ==1469== by 0x505BDB4: (below main) (in /lib64/libc-2.19.so) ==1469== Address 0xffffffff is not stack'd, malloc'd or (recently) free'd ==1469== ==1469== ==1469== Process terminating with default action of signal 11 (SIGSEGV) ==1469== Access not within mapped region at address 0xFFFFFFFF ==1469== at 0x410ADD: ??? (in /sbin/dhcpcd) ==1469== by 0x41082E: ??? (in /sbin/dhcpcd) ==1469== by 0x410C0F: ??? (in /sbin/dhcpcd) ==1469== by 0x411736: ??? (in /sbin/dhcpcd) ==1469== by 0x408B92: ??? (in /sbin/dhcpcd) ==1469== by 0x4036C4: ??? (in /sbin/dhcpcd) ==1469== by 0x505BDB4: (below main) (in /lib64/libc-2.19.so) ==1469== If you believe this happened as a result of a stack ==1469== overflow in your program's main thread (unlikely but ==1469== possible), you can try to increase the size of the ==1469== main thread stack using the --main-stacksize= flag. ==1469== The main thread stack size used in this run was 8388608. ==1469== ==1469== HEAP SUMMARY: ==1469== in use at exit: 58,390 bytes in 363 blocks ==1469== total heap usage: 665 allocs, 302 frees, 164,668 bytes allocated ==1469== ==1469== LEAK SUMMARY: ==1469== definitely lost: 0 bytes in 0 blocks ==1469== indirectly lost: 0 bytes in 0 blocks ==1469== possibly lost: 89 bytes in 1 blocks ==1469== still reachable: 58,301 bytes in 362 blocks ==1469== suppressed: 0 bytes in 0 blocks ==1469== Rerun with --leak-check=full to see details of leaked memory ==1469== ==1469== For counts of detected and suppressed errors, rerun with: -v ==1469== Use --track-origins=yes to see where uninitialised values come from ==1469== ERROR SUMMARY: 3 errors from 3 contexts (suppressed: 1 from 1)