valgrind lscpu ==11863== Memcheck, a memory error detector ==11863== Copyright (C) 2002-2024, and GNU GPL'd, by Julian Seward et al. ==11863== Using Valgrind-3.24.0 and LibVEX; rerun with -h for copyright info ==11863== Command: lscpu ==11863== ==11863== Invalid read of size 8 ==11863== at 0x191128: ??? (in /usr/bin/lscpu) ==11863== by 0x186D1B: ??? (in /usr/bin/lscpu) ==11863== by 0x4986C43: (below main) (libc_start_call_main.h:58) ==11863== Address 0x4c7a7c0 is 0 bytes inside a block of size 256 free'd ==11863== at 0x48A9A20: free (in /usr/libexec/valgrind/vgpreload_memcheck-ppc64le-linux.so) ==11863== by 0x4AA5307: __sched_cpufree (sched_cpufree.c:25) ==11863== by 0x18EE17: ??? (in /usr/bin/lscpu) ==11863== by 0x18F13B: ??? (in /usr/bin/lscpu) ==11863== by 0x19100F: ??? (in /usr/bin/lscpu) ==11863== by 0x186D1B: ??? (in /usr/bin/lscpu) ==11863== by 0x4986C43: (below main) (libc_start_call_main.h:58) ==11863== Block was alloc'd at ==11863== at 0x48A5698: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-ppc64le-linux.so) ==11863== by 0x4AA50A3: __sched_cpualloc (sched_cpualloc.c:25) ==11863== by 0x18EB17: ??? (in /usr/bin/lscpu) ==11863== by 0x18F13B: ??? (in /usr/bin/lscpu) ==11863== by 0x19100F: ??? (in /usr/bin/lscpu) ==11863== by 0x186D1B: ??? (in /usr/bin/lscpu) ==11863== by 0x4986C43: (below main) (libc_start_call_main.h:58) ==11863== ==11863== Invalid free() / delete / delete[] / realloc() ==11863== at 0x48A9A20: free (in /usr/libexec/valgrind/vgpreload_memcheck-ppc64le-linux.so) ==11863== by 0x1FFF00DCEF: ??? ==11863== by 0x1877E3: ??? (in /usr/bin/lscpu) ==11863== by 0x4986C43: (below main) (libc_start_call_main.h:58) ==11863== Address 0x4c7a7c0 is 0 bytes inside a block of size 256 free'd ==11863== at 0x48A9A20: free (in /usr/libexec/valgrind/vgpreload_memcheck-ppc64le-linux.so) ==11863== by 0x4AA5307: __sched_cpufree (sched_cpufree.c:25) ==11863== by 0x18EE17: ??? (in /usr/bin/lscpu) ==11863== by 0x18F13B: ??? (in /usr/bin/lscpu) ==11863== by 0x19100F: ??? (in /usr/bin/lscpu) ==11863== by 0x186D1B: ??? (in /usr/bin/lscpu) ==11863== by 0x4986C43: (below main) (libc_start_call_main.h:58) ==11863== Block was alloc'd at ==11863== at 0x48A5698: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-ppc64le-linux.so) ==11863== by 0x4AA50A3: __sched_cpualloc (sched_cpualloc.c:25) ==11863== by 0x18EB17: ??? (in /usr/bin/lscpu) ==11863== by 0x18F13B: ??? (in /usr/bin/lscpu) ==11863== by 0x19100F: ??? (in /usr/bin/lscpu) ==11863== by 0x186D1B: ??? (in /usr/bin/lscpu) ==11863== by 0x4986C43: (below main) (libc_start_call_main.h:58) ==11863== Architecture: ppc64le Byte Order: Little Endian CPU(s): 4 On-line CPU(s) list: 0-3 Model name: POWER9 (architected), altivec supported Model: 2.3 (pvr 004e 1203) Thread(s) per core: 1 Core(s) per socket: 1 Socket(s): 4 Hypervisor vendor: KVM Virtualization type: para L1d cache: 128 KiB (4 instances) L1i cache: 128 KiB (4 instances) NUMA node(s): 1 NUMA node0 CPU(s): 0-3 Vulnerability Gather data sampling: Not affected Vulnerability Itlb multihit: Not affected Vulnerability L1tf: Mitigation; RFI Flush, L1D private per thread Vulnerability Mds: Not affected Vulnerability Meltdown: Mitigation; RFI Flush, L1D private per thread Vulnerability Mmio stale data: Not affected Vulnerability Retbleed: Not affected Vulnerability Spec store bypass: Mitigation; Kernel entry/exit barrier (eieio) Vulnerability Spectre v1: Mitigation; __user pointer sanitization, ori31 speculation barrier enabled Vulnerability Spectre v2: Mitigation; Software count cache flush (hardware accelerated), Software link stack flush Vulnerability Srbds: Not affected Vulnerability Tsx async abort: Not affected ==11863== ==11863== HEAP SUMMARY: ==11863== in use at exit: 0 bytes in 0 blocks ==11863== total heap usage: 640 allocs, 648 frees, 996,165 bytes allocated ==11863== ==11863== All heap blocks were freed -- no leaks are possible ==11863== ==11863== For lists of detected and suppressed errors, rerun with: -s ==11863== ERROR SUMMARY: 20 errors from 2 contexts (suppressed: 0 from 0)
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2115636 Title: python-psutil 7.0.0-2 fails to build on ppc64el with util-linux 2.41-4ubuntu2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-psutil/+bug/2115636/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
