VirtualBox

Ticket #8363: valgrind-raffaellod-segfault.log

File valgrind-raffaellod-segfault.log, 4.7 KB (added by Raffaello D. Di Napoli, 13 years ago)

valgrind VBoxSVC session with segfault and backtrace

Line 
1$ sudo valgrind /usr/lib/virtualbox/VBoxSVC
2Password:
3==15664== Memcheck, a memory error detector
4==15664== Copyright (C) 2002-2010, and GNU GPL'd, by Julian Seward et al.
5==15664== Using Valgrind-3.6.1 and LibVEX; rerun with -h for copyright info
6==15664== Command: /usr/lib/virtualbox/VBoxSVC
7==15664==
8==15667==
9==15667== HEAP SUMMARY:
10==15667== in use at exit: 200,046 bytes in 388 blocks
11==15667== total heap usage: 519 allocs, 131 frees, 238,419 bytes allocated
12==15667==
13==15667== LEAK SUMMARY:
14==15667== definitely lost: 36 bytes in 1 blocks
15==15667== indirectly lost: 120 bytes in 10 blocks
16==15667== possibly lost: 406 bytes in 10 blocks
17==15667== still reachable: 199,484 bytes in 367 blocks
18==15667== suppressed: 0 bytes in 0 blocks
19==15667== Rerun with --leak-check=full to see details of leaked memory
20==15667==
21==15667== For counts of detected and suppressed errors, rerun with: -v
22==15667== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 7 from 7)
23******************************************************
24Oracle VM VirtualBox XPCOM Server Version 4.0.8-Gentoo
25(C) 2008-2011 Oracle Corporation
26All rights reserved.
27
28Starting event loop....
29[press Ctrl-C to quit]
30VBoxNetAdpCtl: ioctl failed for /dev/vboxnetctl: Invalid argument
31Informational: VirtualBox object created (rc=NS_OK).
32==15664== Thread 6:
33==15664== Syscall param semctl(arg) points to uninitialised byte(s)
34==15664== at 0x44CF94F: semctl@@GLIBC_2.2 (in /lib/libc-2.12.2.so)
35==15664== by 0x8152821: VirtualBox::ClientWatcher(RTTHREADINT*, void*) (VirtualBoxImpl.cpp:4354)
36==15664== by 0x41086FD: rtThreadMain (thread.cpp:680)
37==15664== by 0x4152991: rtThreadNativeMain(void*) (thread-posix.cpp:258)
38==15664== by 0x4098C42: start_thread (in /lib/libpthread-2.12.2.so)
39==15664== by 0x44CC7FD: clone (clone.S:133)
40==15664== Address 0x535a19c is on thread 6's stack
41==15664==
42==15664== Thread 12:
43==15664== Invalid read of size 4
44==15664== at 0x8137BB2: std::list<ComObjPtr<MediumAttachment>, std::allocator<ComObjPtr<MediumAttachment> > >::remove(ComObjPtr<MediumAttachment> const&) (stl_list.h:690)
45==15664== by 0x81330F2: SessionMachine::restoreSnapshotHandler(SessionMachine::RestoreSnapshotTask&) (SnapshotImpl.cpp:1980)
46==15664== by 0x8138CE7: SessionMachine::RestoreSnapshotTask::handler() (SnapshotImpl.cpp:1263)
47==15664== by 0x812CDB5: SessionMachine::taskHandler(RTTHREADINT*, void*) (SnapshotImpl.cpp:1301)
48==15664== by 0x41086FD: rtThreadMain (thread.cpp:680)
49==15664== by 0x4152991: rtThreadNativeMain(void*) (thread-posix.cpp:258)
50==15664== by 0x4098C42: start_thread (in /lib/libpthread-2.12.2.so)
51==15664== by 0x44CC7FD: clone (clone.S:133)
52==15664== Address 0x0 is not stack'd, malloc'd or (recently) free'd
53==15664==
54==15664==
55==15664== Process terminating with default action of signal 11 (SIGSEGV)
56==15664== Access not within mapped region at address 0x0
57==15664== at 0x8137BB2: std::list<ComObjPtr<MediumAttachment>, std::allocator<ComObjPtr<MediumAttachment> > >::remove(ComObjPtr<MediumAttachment> const&) (stl_list.h:690)
58==15664== by 0x81330F2: SessionMachine::restoreSnapshotHandler(SessionMachine::RestoreSnapshotTask&) (SnapshotImpl.cpp:1980)
59==15664== by 0x8138CE7: SessionMachine::RestoreSnapshotTask::handler() (SnapshotImpl.cpp:1263)
60==15664== by 0x812CDB5: SessionMachine::taskHandler(RTTHREADINT*, void*) (SnapshotImpl.cpp:1301)
61==15664== by 0x41086FD: rtThreadMain (thread.cpp:680)
62==15664== by 0x4152991: rtThreadNativeMain(void*) (thread-posix.cpp:258)
63==15664== by 0x4098C42: start_thread (in /lib/libpthread-2.12.2.so)
64==15664== by 0x44CC7FD: clone (clone.S:133)
65==15664== If you believe this happened as a result of a stack
66==15664== overflow in your program's main thread (unlikely but
67==15664== possible), you can try to increase the size of the
68==15664== main thread stack using the --main-stacksize= flag.
69==15664== The main thread stack size used in this run was 8388608.
70==15664==
71==15664== HEAP SUMMARY:
72==15664== in use at exit: 692,544 bytes in 4,073 blocks
73==15664== total heap usage: 410,297 allocs, 406,224 frees, 19,854,207 bytes allocated
74==15664==
75==15664== LEAK SUMMARY:
76==15664== definitely lost: 1,444 bytes in 27 blocks
77==15664== indirectly lost: 1,304 bytes in 42 blocks
78==15664== possibly lost: 2,483 bytes in 29 blocks
79==15664== still reachable: 687,313 bytes in 3,975 blocks
80==15664== suppressed: 0 bytes in 0 blocks
81==15664== Rerun with --leak-check=full to see details of leaked memory
82==15664==
83==15664== For counts of detected and suppressed errors, rerun with: -v
84==15664== Use --track-origins=yes to see where uninitialised values come from
85==15664== ERROR SUMMARY: 857 errors from 2 contexts (suppressed: 17 from 12)
86$

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy