Re: Tutorial about the coupling simulation with SYRTHES
Posted: Fri Oct 31, 2014 2:51 pm
Hello:
I found the cmd executed prior to the crash (from the syrthes.py script) and I ran valgrind on it as follows:
The output:
Any ideas?
Thanks,
Stefan
I found the cmd executed prior to the crash (from the syrthes.py script) and I ran valgrind on it as follows:
Code: Select all
valgrind --leak-check=full ./syrthes -d tmp.data --log /home/stefan/test/3disks2D/solid/listing_syrthes
Code: Select all
==13130== Memcheck, a memory error detector
==13130== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==13130== Using Valgrind-3.10.0.SVN and LibVEX; rerun with -h for copyright info
==13130== Command: ./syrthes -d tmp.data --log /home/stefan/test/3disks2D/solid/listing_syrthes
==13130==
==13130== Invalid read of size 1
==13130== at 0x442994: rep_listint (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== by 0x437A19: decode_prophy (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== by 0x43B563: lire_donnees (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== by 0x402157: syrthes (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== by 0x401611: main (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== Address 0x6d9000 is not stack'd, malloc'd or (recently) free'd
==13130==
==13130==
==13130== Process terminating with default action of signal 11 (SIGSEGV)
==13130== Access not within mapped region at address 0x6D9000
==13130== at 0x442994: rep_listint (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== by 0x437A19: decode_prophy (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== by 0x43B563: lire_donnees (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== by 0x402157: syrthes (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== by 0x401611: main (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== If you believe this happened as a result of a stack
==13130== overflow in your program's main thread (unlikely but
==13130== possible), you can try to increase the size of the
==13130== main thread stack using the --main-stacksize= flag.
==13130== The main thread stack size used in this run was 8388608.
==13130==
==13130== HEAP SUMMARY:
==13130== in use at exit: 198,726 bytes in 36 blocks
==13130== total heap usage: 4,574 allocs, 4,538 frees, 284,926 bytes allocated
==13130==
==13130== 16 bytes in 1 blocks are definitely lost in loss record 6 of 27
==13130== at 0x4C2AB80: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==13130== by 0x43340A: verif_maill (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== by 0x43388C: lire_maill (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== by 0x402020: syrthes (in /home/stefan/test/3disks2D/solid/syrthes)
==13130== by 0x401611: main (in /home/stefan/test/3disks2D/solid/syrthes)
==13130==
==13130== LEAK SUMMARY:
==13130== definitely lost: 16 bytes in 1 blocks
==13130== indirectly lost: 0 bytes in 0 blocks
==13130== possibly lost: 0 bytes in 0 blocks
==13130== still reachable: 198,710 bytes in 35 blocks
==13130== suppressed: 0 bytes in 0 blocks
==13130== Reachable blocks (those to which a pointer was found) are not shown.
==13130== To see them, rerun with: --leak-check=full --show-leak-kinds=all
==13130==
==13130== For counts of detected and suppressed errors, rerun with: -v
==13130== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
Segmentation fault (core dumped)
Thanks,
Stefan