Skip to content

Instantly share code, notes, and snippets.

@boxofrox
Created June 8, 2017 18:16
Show Gist options
  • Save boxofrox/1f20dadb37fc565249c9889f6f9aa877 to your computer and use it in GitHub Desktop.
Save boxofrox/1f20dadb37fc565249c9889f6f9aa877 to your computer and use it in GitHub Desktop.
report - valgrind --tool=memcheck target/debug/bug-test-01
▶ DSN=mysql://testbot:testbot@192.168.70.162/fake_data RUST_BACKTRACE=1 RUST_LOG=bug_test_01=debug valgrind -v --tool=memcheck target/debug/bug-test-01
==31827== Memcheck, a memory error detector
==31827== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al.
==31827== Using Valgrind-3.12.0 and LibVEX; rerun with -h for copyright info
==31827== Command: target/debug/bug-test-01
==31827==
--31827-- Valgrind options:
--31827-- -v
--31827-- --tool=memcheck
--31827-- Contents of /proc/version:
--31827-- Linux version 4.10.11-1-ARCH (builduser@tobias) (gcc version 6.3.1 20170306 (GCC) ) #1 SMP PREEMPT Tue Apr 18 08:39:42 CEST 2017
--31827--
--31827-- Arch and hwcaps: AMD64, LittleEndian, amd64-cx16-rdtscp-sse3
--31827-- Page sizes: currently 4096, max supported 4096
--31827-- Valgrind library directory: /usr/lib/valgrind
--31827-- Reading syms from /home/boxofrox/files/development/phreebooks-search/work/bugs/001 - spurious packet out of order/unit-test-01/target/debug/bug-test-01
--31827-- Reading syms from /usr/lib/ld-2.25.so
--31827-- Reading syms from /usr/lib/valgrind/memcheck-amd64-linux
--31827-- object doesn't have a symbol table
--31827-- object doesn't have a dynamic symbol table
--31827-- Scheduler: using generic scheduler lock implementation.
--31827-- Reading suppressions file: /usr/lib/valgrind/default.supp
==31827== embedded gdbserver: reading from /tmp/boxofrox/vgdb-pipe-from-vgdb-to-31827-by-boxofrox-on-???
==31827== embedded gdbserver: writing to /tmp/boxofrox/vgdb-pipe-to-vgdb-from-31827-by-boxofrox-on-???
==31827== embedded gdbserver: shared mem /tmp/boxofrox/vgdb-pipe-shared-mem-vgdb-31827-by-boxofrox-on-???
==31827==
==31827== TO CONTROL THIS PROCESS USING vgdb (which you probably
==31827== don't want to do, unless you know exactly what you're doing,
==31827== or are doing some strange experiment):
==31827== /usr/lib/valgrind/../../bin/vgdb --pid=31827 ...command...
==31827==
==31827== TO DEBUG THIS PROCESS USING GDB: start GDB like this
==31827== /path/to/gdb target/debug/bug-test-01
==31827== and then give GDB the following command
==31827== target remote | /usr/lib/valgrind/../../bin/vgdb --pid=31827
==31827== --pid is optional if only one valgrind process is running
==31827==
--31827-- REDIR: 0x401ae20 (ld-linux-x86-64.so.2:strlen) redirected to 0x3809fc91 (???)
--31827-- REDIR: 0x4019770 (ld-linux-x86-64.so.2:index) redirected to 0x3809fcab (???)
--31827-- Reading syms from /usr/lib/valgrind/vgpreload_core-amd64-linux.so
--31827-- object doesn't have a symbol table
--31827-- Reading syms from /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so
--31827-- object doesn't have a symbol table
==31827== WARNING: new redirection conflicts with existing -- ignoring it
--31827-- old: 0x0401ae20 (strlen ) R-> (0000.0) 0x3809fc91 ???
--31827-- new: 0x0401ae20 (strlen ) R-> (2007.0) 0x04c2e1d0 strlen
--31827-- REDIR: 0x4019990 (ld-linux-x86-64.so.2:strcmp) redirected to 0x4c2f2d0 (strcmp)
--31827-- REDIR: 0x401b940 (ld-linux-x86-64.so.2:mempcpy) redirected to 0x4c326a0 (mempcpy)
--31827-- Reading syms from /usr/lib/libdl-2.25.so
--31827-- object doesn't have a symbol table
--31827-- Reading syms from /usr/lib/librt-2.25.so
--31827-- object doesn't have a symbol table
--31827-- Reading syms from /usr/lib/libpthread-2.25.so
--31827-- Reading syms from /usr/lib/libgcc_s.so.1
--31827-- Reading syms from /usr/lib/libc-2.25.so
--31827-- Reading syms from /usr/lib/libm-2.25.so
--31827-- object doesn't have a symbol table
--31827-- REDIR: 0x56fddd0 (libc.so.6:strcasecmp) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x56f9860 (libc.so.6:strcspn) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x57000c0 (libc.so.6:strncasecmp) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x56fbce0 (libc.so.6:strpbrk) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x56fc070 (libc.so.6:strspn) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x56fd450 (libc.so.6:memmove) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x56fdb00 (libc.so.6:mempcpy) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x56f8060 (libc.so.6:index) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x56fd900 (libc.so.6:memset) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x56f82b0 (libc.so.6:strcmp) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x57027c0 (libc.so.6:memcpy@@GLIBC_2.14) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x56f9740 (libc.so.6:strcpy) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x56fb9f0 (libc.so.6:rindex) redirected to 0x4c2db60 (rindex)
--31827-- REDIR: 0x56f9d10 (libc.so.6:strlen) redirected to 0x4c2e110 (strlen)
--31827-- REDIR: 0x56fa160 (libc.so.6:__GI_strncmp) redirected to 0x4c2e8c0 (__GI_strncmp)
--31827-- REDIR: 0x56fd9c0 (libc.so.6:__GI_memset) redirected to 0x4c31830 (memset)
--31827-- REDIR: 0x56fccb0 (libc.so.6:memchr) redirected to 0x4c2f370 (memchr)
--31827-- REDIR: 0x56fd560 (libc.so.6:memcpy@GLIBC_2.2.5) redirected to 0x4c2f430 (memcpy@GLIBC_2.2.5)
--31827-- REDIR: 0x415440 (NONE:malloc) redirected to 0x4c2aeb0 (malloc)
--31827-- REDIR: 0x56fc610 (libc.so.6:__GI_strstr) redirected to 0x4c32900 (__strstr_sse2)
--31827-- REDIR: 0x414df0 (NONE:realloc) redirected to 0x4c2d0c0 (realloc)
--31827-- REDIR: 0x5703c20 (libc.so.6:rawmemchr) redirected to 0x4c32200 (rawmemchr)
--31827-- REDIR: 0x413d60 (NONE:free) redirected to 0x4c2c0e0 (free)
--31827-- REDIR: 0x56fd010 (libc.so.6:bcmp) redirected to 0x4a25750 (_vgnU_ifunc_wrapper)
--31827-- REDIR: 0x57c23b0 (libc.so.6:__memcmp_sse4_1) redirected to 0x4c31010 (__memcmp_sse4_1)
--31827-- REDIR: 0x415b40 (NONE:calloc) redirected to 0x4c2ce80 (calloc)
DEBUG:bug_test_01: running
--31827-- REDIR: 0x5708cc0 (libc.so.6:__strcmp_sse2_unaligned) redirected to 0x4c2f190 (strcmp)
--31827-- REDIR: 0x56f9eb0 (libc.so.6:strnlen) redirected to 0x4c2e0b0 (strnlen)
DEBUG:bug_test_01: done
==31827==
==31827== HEAP SUMMARY:
==31827== in use at exit: 32 bytes in 1 blocks
==31827== total heap usage: 7 allocs, 6 frees, 2,032 bytes allocated
==31827==
==31827== Searching for pointers to 1 not-freed blocks
==31827== Checked 37,880,936 bytes
==31827==
==31827== LEAK SUMMARY:
==31827== definitely lost: 0 bytes in 0 blocks
==31827== indirectly lost: 0 bytes in 0 blocks
==31827== possibly lost: 0 bytes in 0 blocks
==31827== still reachable: 32 bytes in 1 blocks
==31827== suppressed: 0 bytes in 0 blocks
==31827== Rerun with --leak-check=full to see details of leaked memory
==31827==
==31827== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
==31827== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment