Valgrind results

From: Amos Jeffries <squid3@dont-contact.us>
Date: Mon, 24 Mar 2008 00:08:25 +1300

Just doing a quick check with valgrind I'm seeing a lot of errors in the
event system.

"Syscall param epoll_ctl(event) points to uninitialised byte(s)"

with a wide range of events like:

==25761== at 0x4559A59: epoll_ctl (in /lib/libc-2.7.so)
==25761== by 0x8171C2F: comm_read(int, char*, int,
RefCount<AsyncCall>&) (comm.cc:346)
==25761== by 0x814B50C: StoreEntry::delayAwareRead(int, char*, int,
RefCount<AsyncCall>) (store.cc:261)
==25761== by 0x80FB573: HttpStateData::maybeReadVirginBody()
(http.cc:1290)
==25761== by 0x80F9C36: HttpStateData::sendRequest() (http.cc:1782)
==25761== by 0x80FA594: httpStart (http.cc:1845)
==25761== by 0x817AF86: CommConnectCbPtrFun::dial() (CommCalls.cc:127)
==25761== by 0x8069A27: AsyncCall::make() (AsyncCall.cc:34)
==25761== by 0x8068EAC: AsyncCallQueue::fireNext() (AsyncCallQueue.cc:53)
==25761== by 0x8068FAD: AsyncCallQueue::fire() (AsyncCallQueue.cc:39)
==25761== by 0x80CF392: EventLoop::dispatchCalls() (EventLoop.cc:156)
==25761== by 0x80CF58C: EventLoop::runOnce() (EventLoop.cc:133)
==25761== Address 0xbef187d8 is on thread 1's stack

All sharing the root:
        comm_read(int, char*, int, RefCount<AsyncCall>&) (comm.cc:346)

Anyone want to attack this one?

Amos

-- 
Please use Squid 2.6STABLE17+ or 3.0STABLE1+
There are serious security advisories out on all earlier releases.
Received on Sun Mar 23 2008 - 05:08:30 MDT

This archive was generated by hypermail pre-2.1.9 : Tue Apr 01 2008 - 13:00:10 MDT