-
-
Save krlmlr/501043e57573abe9d47d13be69fb88ff to your computer and use it in GitHub Desktop.
valgrind output
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
==27839== Invalid read of size 1 | |
==27839== at 0x4F4C4E0: getSrcref (eval.c:1452) | |
==27839== by 0x4F4C4E0: do_begin (eval.c:2185) | |
==27839== by 0x4F4991F: Rf_eval (eval.c:700) | |
==27839== by 0x4F4B93E: R_execClosure (eval.c:1614) | |
==27839== by 0x4F42117: bcEval (eval.c:6400) | |
==27839== by 0x4F4951F: Rf_eval (eval.c:624) | |
==27839== by 0x4F4B93E: R_execClosure (eval.c:1614) | |
==27839== by 0x4F496E5: Rf_eval (eval.c:747) | |
==27839== by 0x4F4C5A3: do_begin (eval.c:2191) | |
==27839== by 0x4F4991F: Rf_eval (eval.c:700) | |
==27839== by 0x4F49E58: forcePromise (eval.c:520) | |
==27839== by 0x4F49BA5: Rf_eval (eval.c:647) | |
==27839== by 0x4F49E58: forcePromise (eval.c:520) | |
==27839== Address 0x233d4930 is 0 bytes inside a block of size 46 free'd | |
==27839== at 0x4C2E26B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) | |
==27839== by 0x40EEF5C: Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> > std::transform<char**, Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (*)(char const*)>(char**, char**, Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (*)(char const*)) (stl_algo.h:4177) | |
==27839== by 0x40EE87B: stack_trace(char const*, int) (api.cpp:296) | |
==27839== by 0x287E42CF: stack_trace(char const*, int) (routines.h:149) | |
==27839== by 0x287E44CB: Rcpp::exception::exception(char const*, bool) (exceptions.h:34) | |
==27839== by 0x287E911E: void Rcpp::stop<>(char const*) (exceptions.h:52) | |
==27839== by 0x2881AB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39) | |
==27839== by 0x28815D14: dplyr::order_visitor(SEXPREC*, bool, int) (OrderVisitorImpl.h:217) | |
==27839== by 0x28815E3C: dplyr::OrderVisitors::OrderVisitors(Rcpp::Vector<19, Rcpp::PreserveStorage>, Rcpp::Vector<10, Rcpp::PreserveStorage>, int) (Order.h:19) | |
==27839== by 0x288110BB: arrange_impl(Rcpp::DataFrame_Impl<Rcpp::PreserveStorage>, dplyr::QuosureList) (arrange.cpp:67) | |
==27839== by 0x287D7D58: dplyr_arrange_impl (RcppExports.cpp:85) | |
==27839== by 0x4F0BE86: do_dotcall (dotcode.c:1252) | |
==27839== Block was alloc'd at | |
==27839== at 0x4C2D1AF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) | |
==27839== by 0xB7772AC: void std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::_M_construct<char*>(char*, char*, std::forward_iterator_tag) (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.22) | |
==27839== by 0xB77730E: std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::basic_string(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.22) | |
==27839== by 0x40EDE18: demangler_one(char const*) (api.cpp:58) | |
==27839== by 0x40EEF32: Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> > std::transform<char**, Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (*)(char const*)>(char**, char**, Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (*)(char const*)) (stl_algo.h:4177) | |
==27839== by 0x40EE87B: stack_trace(char const*, int) (api.cpp:296) | |
==27839== by 0x287E42CF: stack_trace(char const*, int) (routines.h:149) | |
==27839== by 0x287E44CB: Rcpp::exception::exception(char const*, bool) (exceptions.h:34) | |
==27839== by 0x287E911E: void Rcpp::stop<>(char const*) (exceptions.h:52) | |
==27839== by 0x2881AB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39) | |
==27839== by 0x28815D14: dplyr::order_visitor(SEXPREC*, bool, int) (OrderVisitorImpl.h:217) | |
==27839== by 0x28815E3C: dplyr::OrderVisitors::OrderVisitors(Rcpp::Vector<19, Rcpp::PreserveStorage>, Rcpp::Vector<10, Rcpp::PreserveStorage>, int) (Order.h:19) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
==13637== Invalid read of size 1 | |
==13637== at 0x4F799BA: RunGenCollect (memory.c:1680) | |
==13637== by 0x4F799BA: R_gc_internal (memory.c:2957) | |
==13637== by 0x4F7BC32: CONS_NR (memory.c:2305) | |
==13637== by 0x4F74A56: Rf_matchArgs (match.c:198) | |
==13637== by 0x4F4BB23: Rf_applyClosure (eval.c:1504) | |
==13637== by 0x4F42117: bcEval (eval.c:6400) | |
==13637== by 0x4F4951F: Rf_eval (eval.c:624) | |
==13637== by 0x4F4B93E: R_execClosure (eval.c:1614) | |
==13637== by 0x4F42117: bcEval (eval.c:6400) | |
==13637== by 0x4F4951F: Rf_eval (eval.c:624) | |
==13637== by 0x4F4B93E: R_execClosure (eval.c:1614) | |
==13637== by 0x4F42117: bcEval (eval.c:6400) | |
==13637== by 0x4F4951F: Rf_eval (eval.c:624) | |
==13637== Address 0x1e806af3 is 3 bytes inside a block of size 832 free'd | |
==13637== at 0x4C2DD6B: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) | |
==13637== by 0x4F7B89A: ReleaseLargeFreeVectors (memory.c:1046) | |
==13637== by 0x4F7B89A: RunGenCollect (memory.c:1789) | |
==13637== by 0x4F7B89A: R_gc_internal (memory.c:2957) | |
==13637== by 0x4F7CBCC: Rf_allocVector3 (memory.c:2642) | |
==13637== by 0x4F6B767: Rf_mkString (Rinlinedfuns.h:696) | |
==13637== by 0x4180BD3: get_rcpp_cache() (barrier.cpp:98) | |
==13637== by 0x4180D2F: rcpp_set_stack_trace(SEXPREC*) (barrier.cpp:124) | |
==13637== by 0xFB26161: rcpp_set_stack_trace(SEXPREC*) (routines.h:131) | |
==13637== by 0xFB264D3: Rcpp::exception::exception(char const*, bool) (exceptions.h:34) | |
==13637== by 0xFB2B11E: void Rcpp::stop<>(char const*) (exceptions.h:52) | |
==13637== by 0xFB5CB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39) | |
==13637== by 0xFB70F87: rbind_vector_check(SEXPREC*, long, int) (bind.cpp:98) | |
==13637== by 0xFB713D9: rbind_type_check(SEXPREC*, int, int) (bind.cpp:127) | |
==13637== Block was alloc'd at | |
==13637== at 0x4C2CB3F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) | |
==13637== by 0x4F7D0EC: Rf_allocVector3 (memory.c:2671) | |
==13637== by 0x414EE1D: Rcpp::Vector<16, Rcpp::PreserveStorage>::Vector(int const&) (Vector.h:129) | |
==13637== by 0x414E819: stack_trace(char const*, int) (api.cpp:295) | |
==13637== by 0xFB262CF: stack_trace(char const*, int) (routines.h:149) | |
==13637== by 0xFB264CB: Rcpp::exception::exception(char const*, bool) (exceptions.h:34) | |
==13637== by 0xFB2B11E: void Rcpp::stop<>(char const*) (exceptions.h:52) | |
==13637== by 0xFB5CB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39) | |
==13637== by 0xFB70F87: rbind_vector_check(SEXPREC*, long, int) (bind.cpp:98) | |
==13637== by 0xFB713D9: rbind_type_check(SEXPREC*, int, int) (bind.cpp:127) | |
==13637== by 0xFB71B1F: rbind__impl(Rcpp::Vector<19, Rcpp::PreserveStorage>, dplyr::SymbolString const&) (bind.cpp:215) | |
==13637== by 0xFB72AA9: bind_rows_(Rcpp::Vector<19, Rcpp::PreserveStorage>, SEXPREC*) (bind.cpp:327) | |
==13637== | |
==13637== Invalid read of size 8 | |
==13637== at 0x4F799C7: RunGenCollect (memory.c:1680) | |
==13637== by 0x4F799C7: R_gc_internal (memory.c:2957) | |
==13637== by 0x4F7BC32: CONS_NR (memory.c:2305) | |
==13637== by 0x4F74A56: Rf_matchArgs (match.c:198) | |
==13637== by 0x4F4BB23: Rf_applyClosure (eval.c:1504) | |
==13637== by 0x4F42117: bcEval (eval.c:6400) | |
==13637== by 0x4F4951F: Rf_eval (eval.c:624) | |
==13637== by 0x4F4B93E: R_execClosure (eval.c:1614) | |
==13637== by 0x4F42117: bcEval (eval.c:6400) | |
==13637== by 0x4F4951F: Rf_eval (eval.c:624) | |
==13637== by 0x4F4B93E: R_execClosure (eval.c:1614) | |
==13637== by 0x4F42117: bcEval (eval.c:6400) | |
==13637== by 0x4F4951F: Rf_eval (eval.c:624) | |
==13637== Address 0x1e806b08 is 24 bytes inside a block of size 832 free'd | |
==13637== at 0x4C2DD6B: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) | |
==13637== by 0x4F7B89A: ReleaseLargeFreeVectors (memory.c:1046) | |
==13637== by 0x4F7B89A: RunGenCollect (memory.c:1789) | |
==13637== by 0x4F7B89A: R_gc_internal (memory.c:2957) | |
==13637== by 0x4F7CBCC: Rf_allocVector3 (memory.c:2642) | |
==13637== by 0x4F6B767: Rf_mkString (Rinlinedfuns.h:696) | |
==13637== by 0x4180BD3: get_rcpp_cache() (barrier.cpp:98) | |
==13637== by 0x4180D2F: rcpp_set_stack_trace(SEXPREC*) (barrier.cpp:124) | |
==13637== by 0xFB26161: rcpp_set_stack_trace(SEXPREC*) (routines.h:131) | |
==13637== by 0xFB264D3: Rcpp::exception::exception(char const*, bool) (exceptions.h:34) | |
==13637== by 0xFB2B11E: void Rcpp::stop<>(char const*) (exceptions.h:52) | |
==13637== by 0xFB5CB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39) | |
==13637== by 0xFB70F87: rbind_vector_check(SEXPREC*, long, int) (bind.cpp:98) | |
==13637== by 0xFB713D9: rbind_type_check(SEXPREC*, int, int) (bind.cpp:127) | |
==13637== Block was alloc'd at | |
==13637== at 0x4C2CB3F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) | |
==13637== by 0x4F7D0EC: Rf_allocVector3 (memory.c:2671) | |
==13637== by 0x414EE1D: Rcpp::Vector<16, Rcpp::PreserveStorage>::Vector(int const&) (Vector.h:129) | |
==13637== by 0x414E819: stack_trace(char const*, int) (api.cpp:295) | |
==13637== by 0xFB262CF: stack_trace(char const*, int) (routines.h:149) | |
==13637== by 0xFB264CB: Rcpp::exception::exception(char const*, bool) (exceptions.h:34) | |
==13637== by 0xFB2B11E: void Rcpp::stop<>(char const*) (exceptions.h:52) | |
==13637== by 0xFB5CB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39) | |
==13637== by 0xFB70F87: rbind_vector_check(SEXPREC*, long, int) (bind.cpp:98) | |
==13637== by 0xFB713D9: rbind_type_check(SEXPREC*, int, int) (bind.cpp:127) | |
==13637== by 0xFB71B1F: rbind__impl(Rcpp::Vector<19, Rcpp::PreserveStorage>, dplyr::SymbolString const&) (bind.cpp:215) | |
==13637== by 0xFB72AA9: bind_rows_(Rcpp::Vector<19, Rcpp::PreserveStorage>, SEXPREC*) (bind.cpp:327) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment