SHARE
TWEET

mark_v_sdl_gl_gcc

a guest Jan 10th, 2017 32 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. xxxxxx:/usr/local/games/Quake> LIBGL_ALWAYS_INDIRECT=1 valgrind ./mark_v_sdl_gl_gcc -window
  2. ==12365== Memcheck, a memory error detector
  3. ==12365== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
  4. ==12365== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
  5. ==12365== Command: ./mark_v_sdl_gl_gcc -window
  6. ==12365==
  7. ==12365== Warning: set address range perms: large range [0x93ca040, 0x293ca040) (undefined)
  8. ==12365== Invalid read of size 4
  9. ==12365==    at 0x6100431: pthread_join (in /lib64/libpthread-2.19.so)
  10. ==12365==    by 0x4781BF: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  11. ==12365==    by 0x4CD7AF: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  12. ==12365==    by 0x49C6D6: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  13. ==12365==    by 0x4A7594: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  14. ==12365==    by 0x406C33: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  15. ==12365==    by 0x6335B24: (below main) (in /lib64/libc-2.19.so)
  16. ==12365==  Address 0x2d0 is not stack'd, malloc'd or (recently) free'd
  17. ==12365==
  18. ==12365==
  19. ==12365== Process terminating with default action of signal 11 (SIGSEGV)
  20. ==12365==  Access not within mapped region at address 0x2D0
  21. ==12365==    at 0x6100431: pthread_join (in /lib64/libpthread-2.19.so)
  22. ==12365==    by 0x4781BF: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  23. ==12365==    by 0x4CD7AF: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  24. ==12365==    by 0x49C6D6: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  25. ==12365==    by 0x4A7594: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  26. ==12365==    by 0x406C33: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  27. ==12365==    by 0x6335B24: (below main) (in /lib64/libc-2.19.so)
  28. ==12365==  If you believe this happened as a result of a stack
  29. ==12365==  overflow in your program's main thread (unlikely but
  30. ==12365==  possible), you can try to increase the size of the
  31. ==12365==  main thread stack using the --main-stacksize= flag.
  32. ==12365==  The main thread stack size used in this run was 8388608.
  33. ==12365==
  34. ==12365== HEAP SUMMARY:
  35. ==12365==     in use at exit: 537,095,298 bytes in 1,521 blocks
  36. ==12365==   total heap usage: 1,626 allocs, 105 frees, 539,509,133 bytes allocated
  37. ==12365==
  38. ==12365== LEAK SUMMARY:
  39. ==12365==    definitely lost: 0 bytes in 0 blocks
  40. ==12365==    indirectly lost: 0 bytes in 0 blocks
  41. ==12365==      possibly lost: 0 bytes in 0 blocks
  42. ==12365==    still reachable: 537,095,298 bytes in 1,521 blocks
  43. ==12365==         suppressed: 0 bytes in 0 blocks
  44. ==12365== Rerun with --leak-check=full to see details of leaked memory
  45. ==12365==
  46. ==12365== For counts of detected and suppressed errors, rerun with: -v
  47. ==12365== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
  48. Segmentation fault
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top