Skip to content

Instantly share code, notes, and snippets.

@krlmlr
Created June 4, 2017 22:13
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save krlmlr/501043e57573abe9d47d13be69fb88ff to your computer and use it in GitHub Desktop.
Save krlmlr/501043e57573abe9d47d13be69fb88ff to your computer and use it in GitHub Desktop.
valgrind output
==27839== Invalid read of size 1
==27839== at 0x4F4C4E0: getSrcref (eval.c:1452)
==27839== by 0x4F4C4E0: do_begin (eval.c:2185)
==27839== by 0x4F4991F: Rf_eval (eval.c:700)
==27839== by 0x4F4B93E: R_execClosure (eval.c:1614)
==27839== by 0x4F42117: bcEval (eval.c:6400)
==27839== by 0x4F4951F: Rf_eval (eval.c:624)
==27839== by 0x4F4B93E: R_execClosure (eval.c:1614)
==27839== by 0x4F496E5: Rf_eval (eval.c:747)
==27839== by 0x4F4C5A3: do_begin (eval.c:2191)
==27839== by 0x4F4991F: Rf_eval (eval.c:700)
==27839== by 0x4F49E58: forcePromise (eval.c:520)
==27839== by 0x4F49BA5: Rf_eval (eval.c:647)
==27839== by 0x4F49E58: forcePromise (eval.c:520)
==27839== Address 0x233d4930 is 0 bytes inside a block of size 46 free'd
==27839== at 0x4C2E26B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==27839== by 0x40EEF5C: Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> > std::transform<char**, Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (*)(char const*)>(char**, char**, Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (*)(char const*)) (stl_algo.h:4177)
==27839== by 0x40EE87B: stack_trace(char const*, int) (api.cpp:296)
==27839== by 0x287E42CF: stack_trace(char const*, int) (routines.h:149)
==27839== by 0x287E44CB: Rcpp::exception::exception(char const*, bool) (exceptions.h:34)
==27839== by 0x287E911E: void Rcpp::stop<>(char const*) (exceptions.h:52)
==27839== by 0x2881AB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39)
==27839== by 0x28815D14: dplyr::order_visitor(SEXPREC*, bool, int) (OrderVisitorImpl.h:217)
==27839== by 0x28815E3C: dplyr::OrderVisitors::OrderVisitors(Rcpp::Vector<19, Rcpp::PreserveStorage>, Rcpp::Vector<10, Rcpp::PreserveStorage>, int) (Order.h:19)
==27839== by 0x288110BB: arrange_impl(Rcpp::DataFrame_Impl<Rcpp::PreserveStorage>, dplyr::QuosureList) (arrange.cpp:67)
==27839== by 0x287D7D58: dplyr_arrange_impl (RcppExports.cpp:85)
==27839== by 0x4F0BE86: do_dotcall (dotcode.c:1252)
==27839== Block was alloc'd at
==27839== at 0x4C2D1AF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==27839== by 0xB7772AC: void std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::_M_construct<char*>(char*, char*, std::forward_iterator_tag) (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.22)
==27839== by 0xB77730E: std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::basic_string(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.22)
==27839== by 0x40EDE18: demangler_one(char const*) (api.cpp:58)
==27839== by 0x40EEF32: Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> > std::transform<char**, Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (*)(char const*)>(char**, char**, Rcpp::internal::Proxy_Iterator<Rcpp::internal::string_proxy<16> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (*)(char const*)) (stl_algo.h:4177)
==27839== by 0x40EE87B: stack_trace(char const*, int) (api.cpp:296)
==27839== by 0x287E42CF: stack_trace(char const*, int) (routines.h:149)
==27839== by 0x287E44CB: Rcpp::exception::exception(char const*, bool) (exceptions.h:34)
==27839== by 0x287E911E: void Rcpp::stop<>(char const*) (exceptions.h:52)
==27839== by 0x2881AB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39)
==27839== by 0x28815D14: dplyr::order_visitor(SEXPREC*, bool, int) (OrderVisitorImpl.h:217)
==27839== by 0x28815E3C: dplyr::OrderVisitors::OrderVisitors(Rcpp::Vector<19, Rcpp::PreserveStorage>, Rcpp::Vector<10, Rcpp::PreserveStorage>, int) (Order.h:19)
==13637== Invalid read of size 1
==13637== at 0x4F799BA: RunGenCollect (memory.c:1680)
==13637== by 0x4F799BA: R_gc_internal (memory.c:2957)
==13637== by 0x4F7BC32: CONS_NR (memory.c:2305)
==13637== by 0x4F74A56: Rf_matchArgs (match.c:198)
==13637== by 0x4F4BB23: Rf_applyClosure (eval.c:1504)
==13637== by 0x4F42117: bcEval (eval.c:6400)
==13637== by 0x4F4951F: Rf_eval (eval.c:624)
==13637== by 0x4F4B93E: R_execClosure (eval.c:1614)
==13637== by 0x4F42117: bcEval (eval.c:6400)
==13637== by 0x4F4951F: Rf_eval (eval.c:624)
==13637== by 0x4F4B93E: R_execClosure (eval.c:1614)
==13637== by 0x4F42117: bcEval (eval.c:6400)
==13637== by 0x4F4951F: Rf_eval (eval.c:624)
==13637== Address 0x1e806af3 is 3 bytes inside a block of size 832 free'd
==13637== at 0x4C2DD6B: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==13637== by 0x4F7B89A: ReleaseLargeFreeVectors (memory.c:1046)
==13637== by 0x4F7B89A: RunGenCollect (memory.c:1789)
==13637== by 0x4F7B89A: R_gc_internal (memory.c:2957)
==13637== by 0x4F7CBCC: Rf_allocVector3 (memory.c:2642)
==13637== by 0x4F6B767: Rf_mkString (Rinlinedfuns.h:696)
==13637== by 0x4180BD3: get_rcpp_cache() (barrier.cpp:98)
==13637== by 0x4180D2F: rcpp_set_stack_trace(SEXPREC*) (barrier.cpp:124)
==13637== by 0xFB26161: rcpp_set_stack_trace(SEXPREC*) (routines.h:131)
==13637== by 0xFB264D3: Rcpp::exception::exception(char const*, bool) (exceptions.h:34)
==13637== by 0xFB2B11E: void Rcpp::stop<>(char const*) (exceptions.h:52)
==13637== by 0xFB5CB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39)
==13637== by 0xFB70F87: rbind_vector_check(SEXPREC*, long, int) (bind.cpp:98)
==13637== by 0xFB713D9: rbind_type_check(SEXPREC*, int, int) (bind.cpp:127)
==13637== Block was alloc'd at
==13637== at 0x4C2CB3F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==13637== by 0x4F7D0EC: Rf_allocVector3 (memory.c:2671)
==13637== by 0x414EE1D: Rcpp::Vector<16, Rcpp::PreserveStorage>::Vector(int const&) (Vector.h:129)
==13637== by 0x414E819: stack_trace(char const*, int) (api.cpp:295)
==13637== by 0xFB262CF: stack_trace(char const*, int) (routines.h:149)
==13637== by 0xFB264CB: Rcpp::exception::exception(char const*, bool) (exceptions.h:34)
==13637== by 0xFB2B11E: void Rcpp::stop<>(char const*) (exceptions.h:52)
==13637== by 0xFB5CB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39)
==13637== by 0xFB70F87: rbind_vector_check(SEXPREC*, long, int) (bind.cpp:98)
==13637== by 0xFB713D9: rbind_type_check(SEXPREC*, int, int) (bind.cpp:127)
==13637== by 0xFB71B1F: rbind__impl(Rcpp::Vector<19, Rcpp::PreserveStorage>, dplyr::SymbolString const&) (bind.cpp:215)
==13637== by 0xFB72AA9: bind_rows_(Rcpp::Vector<19, Rcpp::PreserveStorage>, SEXPREC*) (bind.cpp:327)
==13637==
==13637== Invalid read of size 8
==13637== at 0x4F799C7: RunGenCollect (memory.c:1680)
==13637== by 0x4F799C7: R_gc_internal (memory.c:2957)
==13637== by 0x4F7BC32: CONS_NR (memory.c:2305)
==13637== by 0x4F74A56: Rf_matchArgs (match.c:198)
==13637== by 0x4F4BB23: Rf_applyClosure (eval.c:1504)
==13637== by 0x4F42117: bcEval (eval.c:6400)
==13637== by 0x4F4951F: Rf_eval (eval.c:624)
==13637== by 0x4F4B93E: R_execClosure (eval.c:1614)
==13637== by 0x4F42117: bcEval (eval.c:6400)
==13637== by 0x4F4951F: Rf_eval (eval.c:624)
==13637== by 0x4F4B93E: R_execClosure (eval.c:1614)
==13637== by 0x4F42117: bcEval (eval.c:6400)
==13637== by 0x4F4951F: Rf_eval (eval.c:624)
==13637== Address 0x1e806b08 is 24 bytes inside a block of size 832 free'd
==13637== at 0x4C2DD6B: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==13637== by 0x4F7B89A: ReleaseLargeFreeVectors (memory.c:1046)
==13637== by 0x4F7B89A: RunGenCollect (memory.c:1789)
==13637== by 0x4F7B89A: R_gc_internal (memory.c:2957)
==13637== by 0x4F7CBCC: Rf_allocVector3 (memory.c:2642)
==13637== by 0x4F6B767: Rf_mkString (Rinlinedfuns.h:696)
==13637== by 0x4180BD3: get_rcpp_cache() (barrier.cpp:98)
==13637== by 0x4180D2F: rcpp_set_stack_trace(SEXPREC*) (barrier.cpp:124)
==13637== by 0xFB26161: rcpp_set_stack_trace(SEXPREC*) (routines.h:131)
==13637== by 0xFB264D3: Rcpp::exception::exception(char const*, bool) (exceptions.h:34)
==13637== by 0xFB2B11E: void Rcpp::stop<>(char const*) (exceptions.h:52)
==13637== by 0xFB5CB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39)
==13637== by 0xFB70F87: rbind_vector_check(SEXPREC*, long, int) (bind.cpp:98)
==13637== by 0xFB713D9: rbind_type_check(SEXPREC*, int, int) (bind.cpp:127)
==13637== Block was alloc'd at
==13637== at 0x4C2CB3F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==13637== by 0x4F7D0EC: Rf_allocVector3 (memory.c:2671)
==13637== by 0x414EE1D: Rcpp::Vector<16, Rcpp::PreserveStorage>::Vector(int const&) (Vector.h:129)
==13637== by 0x414E819: stack_trace(char const*, int) (api.cpp:295)
==13637== by 0xFB262CF: stack_trace(char const*, int) (routines.h:149)
==13637== by 0xFB264CB: Rcpp::exception::exception(char const*, bool) (exceptions.h:34)
==13637== by 0xFB2B11E: void Rcpp::stop<>(char const*) (exceptions.h:52)
==13637== by 0xFB5CB93: void dplyr::bad_pos_arg<char const*>(int, char const*) (bad.h:39)
==13637== by 0xFB70F87: rbind_vector_check(SEXPREC*, long, int) (bind.cpp:98)
==13637== by 0xFB713D9: rbind_type_check(SEXPREC*, int, int) (bind.cpp:127)
==13637== by 0xFB71B1F: rbind__impl(Rcpp::Vector<19, Rcpp::PreserveStorage>, dplyr::SymbolString const&) (bind.cpp:215)
==13637== by 0xFB72AA9: bind_rows_(Rcpp::Vector<19, Rcpp::PreserveStorage>, SEXPREC*) (bind.cpp:327)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment