Advertisement
Guest User

mark_v_sdl_gl_gcc

a guest
Jan 10th, 2017
166
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.76 KB | None | 0 0
  1. xxxxxx:/usr/local/games/Quake> LIBGL_ALWAYS_INDIRECT=1 valgrind ./mark_v_sdl_gl_gcc -window
  2. ==12365== Memcheck, a memory error detector
  3. ==12365== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
  4. ==12365== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
  5. ==12365== Command: ./mark_v_sdl_gl_gcc -window
  6. ==12365==
  7. ==12365== Warning: set address range perms: large range [0x93ca040, 0x293ca040) (undefined)
  8. ==12365== Invalid read of size 4
  9. ==12365== at 0x6100431: pthread_join (in /lib64/libpthread-2.19.so)
  10. ==12365== by 0x4781BF: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  11. ==12365== by 0x4CD7AF: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  12. ==12365== by 0x49C6D6: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  13. ==12365== by 0x4A7594: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  14. ==12365== by 0x406C33: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  15. ==12365== by 0x6335B24: (below main) (in /lib64/libc-2.19.so)
  16. ==12365== Address 0x2d0 is not stack'd, malloc'd or (recently) free'd
  17. ==12365==
  18. ==12365==
  19. ==12365== Process terminating with default action of signal 11 (SIGSEGV)
  20. ==12365== Access not within mapped region at address 0x2D0
  21. ==12365== at 0x6100431: pthread_join (in /lib64/libpthread-2.19.so)
  22. ==12365== by 0x4781BF: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  23. ==12365== by 0x4CD7AF: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  24. ==12365== by 0x49C6D6: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  25. ==12365== by 0x4A7594: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  26. ==12365== by 0x406C33: ??? (in /usr/local/games/Quake/mark_v_sdl_gl_gcc)
  27. ==12365== by 0x6335B24: (below main) (in /lib64/libc-2.19.so)
  28. ==12365== If you believe this happened as a result of a stack
  29. ==12365== overflow in your program's main thread (unlikely but
  30. ==12365== possible), you can try to increase the size of the
  31. ==12365== main thread stack using the --main-stacksize= flag.
  32. ==12365== The main thread stack size used in this run was 8388608.
  33. ==12365==
  34. ==12365== HEAP SUMMARY:
  35. ==12365== in use at exit: 537,095,298 bytes in 1,521 blocks
  36. ==12365== total heap usage: 1,626 allocs, 105 frees, 539,509,133 bytes allocated
  37. ==12365==
  38. ==12365== LEAK SUMMARY:
  39. ==12365== definitely lost: 0 bytes in 0 blocks
  40. ==12365== indirectly lost: 0 bytes in 0 blocks
  41. ==12365== possibly lost: 0 bytes in 0 blocks
  42. ==12365== still reachable: 537,095,298 bytes in 1,521 blocks
  43. ==12365== suppressed: 0 bytes in 0 blocks
  44. ==12365== Rerun with --leak-check=full to see details of leaked memory
  45. ==12365==
  46. ==12365== For counts of detected and suppressed errors, rerun with: -v
  47. ==12365== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
  48. Segmentation fault
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement