[sirrom@Scrapyard ~/Projects/asclay]$ valgrind ./asclay ~/dave.txt
==669== Memcheck, a memory error detector
==669== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==669== Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright info
==669== Command: ./asclay /home/sirrom/dave.txt
==669==
file path: '/home/sirrom/dave.txt'
file size: '588'
#####################################################
##+-----------------------------------------------+##
##|I  agree with these things,  and I like the way|##
##|last time we "ruined" each                     |##
##|other' s  work.   I  found  it  quite  shocking|##
##|actually, when I spent ages                    |##
##|carefully   making   a  drawing   then  someone|##
##|deliberately hacked it up. It took             |##
##|the preciousness out my work, which at the time|##
##|was upsetting, but soon                        |##
##|after  I realised  the new  collaborative piece|##
##|was often far more interesting                 |##
##|and  took on a new life.  Richer in that others|##
##|were part of it, and a                         |##
##|privilege that  they'd taken  and used it.  The|##
##|shared energy and excitement                   |##
##|creates much more  than me  sitting alone  in a|##
##|corner on a private creation.                  |##
##|                                               |##
##|dave                                           |##
==669== Invalid read of size 1
==669== at 0x400C71: get_line(char const*, char*, int, char const**, bool, int*) (strings.cc:73)
==669==    by 0x401997: frame::fill(char const*, char const**) (frame.cc:99)
==669==    by 0x400B65: main (main.cc:32)
==669==  Address 0x0 is not stack'd, malloc'd or (recently) free'd
==669==
==669==
==669== Process terminating with default action of signal 11 (SIGSEGV)
==669==  Access not within mapped region at address 0x0
==669== at 0x400C71: get_line(char const*, char*, int, char const**, bool, int*) (strings.cc:73)
==669==    by 0x401997: frame::fill(char const*, char const**) (frame.cc:99)
==669==    by 0x400B65: main (main.cc:32)
==669==  If you believe this happened as a result of a stack
==669==  overflow in your program's main thread (unlikely but
==669==  possible), you can try to increase the size of the
==669==  main thread stack using the --main-stacksize= flag.
==669==  The main thread stack size used in this run was 8388608.
==669==
==669== HEAP SUMMARY:
==669==     in use at exit: 3,997 bytes in 54 blocks
==669==   total heap usage: 54 allocs, 0 frees, 3,997 bytes allocated
==669==
==669== LEAK SUMMARY:
==669==    definitely lost: 0 bytes in 0 blocks
==669==    indirectly lost: 0 bytes in 0 blocks
==669==      possibly lost: 0 bytes in 0 blocks
==669==    still reachable: 3,997 bytes in 54 blocks
==669==         suppressed: 0 bytes in 0 blocks
==669== Rerun with --leak-check=full to see details of leaked memory
==669==
==669== For counts of detected and suppressed errors, rerun with: -v
==669== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)
Segmentation fault (core dumped)
[sirrom@Scrapyard ~/Projects/asclay]$
_______________________________________________
NetBehaviour mailing list
[email protected]
http://www.netbehaviour.org/mailman/listinfo/netbehaviour

Reply via email to