-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hi

The original valgrind output was not to useful so I rebuild cppcheck
with nostrip and obtained the following log.

I have tested 1.47-3 (from snapshot.d.o) and it does not seg. fault on
this file.

~Niels

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=C2O8
-----END PGP SIGNATURE-----
==23593== Memcheck, a memory error detector
==23593== Copyright (C) 2002-2010, and GNU GPL'd, by Julian Seward et al.
==23593== Using Valgrind-3.6.0.SVN-Debian and LibVEX; rerun with -h for copyright info
==23593== Command: debian/cppcheck/usr/bin/cppcheck -f ../lilo-23.2/diagnose/cprintf.c
==23593== 
==23593== Conditional jump or move depends on uninitialised value(s)
==23593==    at 0x400B45F: _dl_relocate_object (do-rel.h:104)
==23593==    by 0x4002FCF: dl_main (rtld.c:2265)
==23593==    by 0x4014430: _dl_sysdep_start (dl-sysdep.c:244)
==23593==    by 0x4000C5C: _dl_start (rtld.c:341)
==23593==    by 0x4000846: ??? (in /lib/ld-2.13.so)
==23593== 
==23593== Conditional jump or move depends on uninitialised value(s)
==23593==    at 0x400B15A: _dl_relocate_object (do-rel.h:117)
==23593==    by 0x4002FCF: dl_main (rtld.c:2265)
==23593==    by 0x4014430: _dl_sysdep_start (dl-sysdep.c:244)
==23593==    by 0x4000C5C: _dl_start (rtld.c:341)
==23593==    by 0x4000846: ??? (in /lib/ld-2.13.so)
==23593== 
==23593== Conditional jump or move depends on uninitialised value(s)
==23593==    at 0x400B4C4: _dl_relocate_object (do-rel.h:127)
==23593==    by 0x4002FCF: dl_main (rtld.c:2265)
==23593==    by 0x4014430: _dl_sysdep_start (dl-sysdep.c:244)
==23593==    by 0x4000C5C: _dl_start (rtld.c:341)
==23593==    by 0x4000846: ??? (in /lib/ld-2.13.so)
==23593== 
==23593== Conditional jump or move depends on uninitialised value(s)
==23593==    at 0x400A86E: _dl_relocate_object (do-rel.h:65)
==23593==    by 0x4002FCF: dl_main (rtld.c:2265)
==23593==    by 0x4014430: _dl_sysdep_start (dl-sysdep.c:244)
==23593==    by 0x4000C5C: _dl_start (rtld.c:341)
==23593==    by 0x4000846: ??? (in /lib/ld-2.13.so)
==23593== 
==23593== Conditional jump or move depends on uninitialised value(s)
==23593==    at 0x400A876: _dl_relocate_object (do-rel.h:68)
==23593==    by 0x4002FCF: dl_main (rtld.c:2265)
==23593==    by 0x4014430: _dl_sysdep_start (dl-sysdep.c:244)
==23593==    by 0x4000C5C: _dl_start (rtld.c:341)
==23593==    by 0x4000846: ??? (in /lib/ld-2.13.so)
==23593== 
==23593== Conditional jump or move depends on uninitialised value(s)
==23593==    at 0x400A86E: _dl_relocate_object (do-rel.h:65)
==23593==    by 0x4003127: dl_main (rtld.c:2331)
==23593==    by 0x4014430: _dl_sysdep_start (dl-sysdep.c:244)
==23593==    by 0x4000C5C: _dl_start (rtld.c:341)
==23593==    by 0x4000846: ??? (in /lib/ld-2.13.so)
==23593== 
==23593== Conditional jump or move depends on uninitialised value(s)
==23593==    at 0x400A876: _dl_relocate_object (do-rel.h:68)
==23593==    by 0x4003127: dl_main (rtld.c:2331)
==23593==    by 0x4014430: _dl_sysdep_start (dl-sysdep.c:244)
==23593==    by 0x4000C5C: _dl_start (rtld.c:341)
==23593==    by 0x4000846: ??? (in /lib/ld-2.13.so)
==23593== 
==23593== Conditional jump or move depends on uninitialised value(s)
==23593==    at 0x400B15A: _dl_relocate_object (do-rel.h:117)
==23593==    by 0x4003127: dl_main (rtld.c:2331)
==23593==    by 0x4014430: _dl_sysdep_start (dl-sysdep.c:244)
==23593==    by 0x4000C5C: _dl_start (rtld.c:341)
==23593==    by 0x4000846: ??? (in /lib/ld-2.13.so)
==23593== 
Checking ../lilo-23.2/diagnose/cprintf.c...
==23593== Invalid read of size 4
==23593==    at 0x1C7971: Tokenizer::removeMacrosInGlobalScope() (tokenize.cpp:9674)
==23593==    by 0x1F2867: Tokenizer::tokenize(std::istream&, char const*, std::string const&, bool) (tokenize.cpp:2317)
==23593==    by 0x189681: CppCheck::checkFile(std::string const&, char const*) (cppcheck.cpp:269)
==23593==    by 0x18C847: CppCheck::check() (cppcheck.cpp:189)
==23593==  Address 0x14 is not stack'd, malloc'd or (recently) free'd
==23593== 
==23593== 
==23593== Process terminating with default action of signal 11 (SIGSEGV)
==23593==  Access not within mapped region at address 0x14
==23593==    at 0x1C7971: Tokenizer::removeMacrosInGlobalScope() (tokenize.cpp:9674)
==23593==    by 0x1F2867: Tokenizer::tokenize(std::istream&, char const*, std::string const&, bool) (tokenize.cpp:2317)
==23593==    by 0x189681: CppCheck::checkFile(std::string const&, char const*) (cppcheck.cpp:269)
==23593==    by 0x18C847: CppCheck::check() (cppcheck.cpp:189)
==23593==  If you believe this happened as a result of a stack
==23593==  overflow in your program's main thread (unlikely but
==23593==  possible), you can try to increase the size of the
==23593==  main thread stack using the --main-stacksize= flag.
==23593==  The main thread stack size used in this run was 8388608.
==23593== 
==23593== HEAP SUMMARY:
==23593==     in use at exit: 74,300 bytes in 2,140 blocks
==23593==   total heap usage: 12,607 allocs, 10,467 frees, 958,437 bytes allocated
==23593== 
==23593== LEAK SUMMARY:
==23593==    definitely lost: 0 bytes in 0 blocks
==23593==    indirectly lost: 0 bytes in 0 blocks
==23593==      possibly lost: 28,584 bytes in 1,083 blocks
==23593==    still reachable: 45,716 bytes in 1,057 blocks
==23593==         suppressed: 0 bytes in 0 blocks
==23593== Rerun with --leak-check=full to see details of leaked memory
==23593== 
==23593== For counts of detected and suppressed errors, rerun with: -v
==23593== Use --track-origins=yes to see where uninitialised values come from
==23593== ERROR SUMMARY: 24 errors from 9 contexts (suppressed: 0 from 0)
Segmentation fault

Attachment: cppcheck-segfault.log.sig
Description: Binary data

Reply via email to