-
-
Save FROGGS/700836ddc1a131acc8c5 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Program received signal SIGSEGV, Segmentation fault. | |
0x00007ffff79c9877 in MVM_load_bytecode (tc=0x6033b0, filename=0x7ffff7dd8ca0 <default_loop_struct+32>) at src/core/loadbytecode.c:67 | |
67 MVM_HASH_GET(tc, tc->instance->loaded_compunits, filename, loaded_name); | |
(gdb) bt full | |
#0 0x00007ffff79c9877 in MVM_load_bytecode (tc=0x6033b0, filename=0x7ffff7dd8ca0 <default_loop_struct+32>) at src/core/loadbytecode.c:67 | |
_hj_i = 2654435769 | |
_hj_j = 2654435769 | |
_hj_k = 172089632 | |
_hj_key = 0x9 <Address 0x9 out of bounds> | |
_hf_bkt = 4294954400 | |
_hf_hashv = 4276993775 | |
cu = 0x7ffff79cd4f3 <MVM_coerce_smart_stringify+503> | |
loaded_name = 0x0 | |
#1 0x00007ffff79b2aa7 in MVM_interp_run (tc=0x6033b0, initial_invoke=0x7ffff7a2cefe <toplevel_initial_invoke>, invoke_data=0x648790) at src/core/interp.c:3211 | |
filename = 0x7ffff6829988 | |
op = 413 | |
cur_op = 0x7ffff7fd5ab0 "c\001\002" | |
bytecode_start = 0x7ffff7fd58b2 "\214" | |
reg_base = 0x13b1740 | |
cu = 0x146b160 | |
cur_callsite = 0x14a6fa0 | |
#2 0x00007ffff7a2d022 in MVM_vm_run_file (instance=0x603010, filename=0x7fffffffe1f0 "perl6.moarvm") at src/moar.c:144 | |
start_frame = 0x648790 | |
tc = 0x6033b0 | |
cu = 0x7ffff67e7ea0 | |
#3 0x0000000000400d89 in main (argc=9, argv=0x7fffffffdde8) at src/main.c:137 | |
instance = 0x603010 | |
input_file = 0x7fffffffe1f0 "perl6.moarvm" | |
lib_path = 0x7fffffffe1cf "../nqp/install/languages/nqp/lib" | |
dump = 0 | |
argi = 3 | |
flag = -2 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
../nqp/install/bin/moar --libpath="../nqp/install/languages/nqp/lib" perl6.moarvm --setting=NULL --optimize=3 --target=mbc --stagestats --output=CORE.setting.moarvm src/gen/m-CORE.setting | |
Stage start : 0.000 | |
Segmentation fault (core dumped) | |
make: *** [CORE.setting.moarvm] Fehler 139 | |
froggs@TL02L-R8RXTCW-linux:~/dev/rakudo$ valgrind ../nqp/install/bin/moar --libpath="../nqp/install/languages/nqp/lib" perl6.moarvm --setting=NULL --optimize=3 --target=mbc --stagestats --output=CORE.setting.moarvm src/gen/m-CORE.setting | |
==30968== Memcheck, a memory error detector | |
==30968== Copyright (C) 2002-2012, and GNU GPL'd, by Julian Seward et al. | |
==30968== Using Valgrind-3.8.1 and LibVEX; rerun with -h for copyright info | |
==30968== Command: ../nqp/install/bin/moar --libpath=../nqp/install/languages/nqp/lib perl6.moarvm --setting=NULL --optimize=3 --target=mbc --stagestats --output=CORE.setting.moarvm src/gen/m-CORE.setting | |
==30968== | |
Stage start : 0.000 | |
==30968== Invalid read of size 1 | |
==30968== at 0x4F22877: MVM_load_bytecode (in /home/froggs/dev/nqp/install/lib/libmoar.so) | |
==30968== by 0x4F0BAA6: MVM_interp_run (interp.c:3211) | |
==30968== by 0x4F86021: MVM_vm_run_file (moar.c:144) | |
==30968== by 0x400D88: main (main.c:137) | |
==30968== Address 0x5 is not stack'd, malloc'd or (recently) free'd | |
==30968== | |
==30968== | |
==30968== Process terminating with default action of signal 11 (SIGSEGV) | |
==30968== Access not within mapped region at address 0x5 | |
==30968== at 0x4F22877: MVM_load_bytecode (in /home/froggs/dev/nqp/install/lib/libmoar.so) | |
==30968== by 0x4F0BAA6: MVM_interp_run (interp.c:3211) | |
==30968== by 0x4F86021: MVM_vm_run_file (moar.c:144) | |
==30968== by 0x400D88: main (main.c:137) | |
==30968== If you believe this happened as a result of a stack | |
==30968== overflow in your program's main thread (unlikely but | |
==30968== possible), you can try to increase the size of the | |
==30968== main thread stack using the --main-stacksize= flag. | |
==30968== The main thread stack size used in this run was 8388608. | |
==30968== | |
==30968== HEAP SUMMARY: | |
==30968== in use at exit: 88,882,711 bytes in 184,642 blocks | |
==30968== total heap usage: 199,623 allocs, 14,981 frees, 189,970,307 bytes allocated | |
==30968== | |
==30968== LEAK SUMMARY: | |
==30968== definitely lost: 17,756 bytes in 463 blocks | |
==30968== indirectly lost: 0 bytes in 0 blocks | |
==30968== possibly lost: 0 bytes in 0 blocks | |
==30968== still reachable: 88,864,955 bytes in 184,179 blocks | |
==30968== suppressed: 0 bytes in 0 blocks | |
==30968== Rerun with --leak-check=full to see details of leaked memory | |
==30968== | |
==30968== For counts of detected and suppressed errors, rerun with: -v | |
==30968== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 2 from 2) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment