==12079== Memcheck, a memory error detector ==12079== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al. ==12079== Using Valgrind-3.11.0.SVN and LibVEX; rerun with -h for copyright info ==12079== Command: ./ufo ==12079== Parent PID: 4274 ==12079== ==12079== Use of uninitialised value of size 4 ==12079== at 0x40115CE: strcpy (strcpy.S:123) ==12079== by 0x400792F: _dl_lookup_symbol_x (dl-lookup.c:781) ==12079== by 0x4E52F87: do_sym (dl-sym.c:168) ==12079== by 0x4E53291: _dl_sym (dl-sym.c:273) ==12079== by 0x4FA5BED: dlsym_doit (dlsym.c:50) ==12079== by 0x400B13F: _dl_catch_error (dl-error.c:187) ==12079== by 0x4FA5F47: _dlerror_run (dlerror.c:163) ==12079== by 0x4FA5C25: dlsym (dlsym.c:70) ==12079== by 0x4A294C5: ??? (in /usr/lib/libSDL2-2.0.so.0.4.0) ==12079== Uninitialised value was created by a stack allocation ==12079== at 0x4A294B0: ??? (in /usr/lib/libSDL2-2.0.so.0.4.0) ==12079== ==12079== Use of uninitialised value of size 4 ==12079== at 0x40115D8: strcpy (strcpy.S:128) ==12079== by 0x400792F: _dl_lookup_symbol_x (dl-lookup.c:781) ==12079== by 0x4E52F87: do_sym (dl-sym.c:168) ==12079== by 0x4E53291: _dl_sym (dl-sym.c:273) ==12079== by 0x4FA5BED: dlsym_doit (dlsym.c:50) ==12079== by 0x400B13F: _dl_catch_error (dl-error.c:187) ==12079== by 0x4FA5F47: _dlerror_run (dlerror.c:163) ==12079== by 0x4FA5C25: dlsym (dlsym.c:70) ==12079== by 0x4A294C5: ??? (in /usr/lib/libSDL2-2.0.so.0.4.0) ==12079== Uninitialised value was created by a stack allocation ==12079== at 0x4A294B0: ??? (in /usr/lib/libSDL2-2.0.so.0.4.0) ==12079== ==12079== Syscall param ioctl(generic) points to uninitialised byte(s) ==12079== at 0x4E292B6: ioctl (syscall-template.S:81) ==12079== by 0x4939B2F: ??? (in /usr/lib/arm-linux-gnueabihf/libMali.so) ==12079== Address 0xbdd0c8f4 is on thread 1's stack ==12079== Uninitialised value was created by a stack allocation ==12079== at 0x493A604: _mali_base_arch_mem_write_safe_ptr (in /usr/lib/arm-linux-gnueabihf/libMali.so) ==12079== ==12079== Syscall param ioctl(generic) points to unaddressable byte(s) ==12079== at 0x4E292B6: ioctl (syscall-template.S:81) ==12079== by 0x492EF61: eglSwapBuffers (in /usr/lib/arm-linux-gnueabihf/libMali.so) ==12079== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==12079== ==12079== Syscall param writev(vector[...]) points to uninitialised byte(s) ==12079== at 0x4DB28E6: __libc_do_syscall (libc-do-syscall.S:44) ==12079== by 0x4E29397: writev (writev.c:54) ==12079== by 0x517A311: ??? (in /usr/lib/arm-linux-gnueabihf/libxcb.so.1.1.0) ==12079== Address 0x57802cc is 28 bytes inside a block of size 16,384 alloc'd ==12079== at 0x482ED74: calloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== Uninitialised value was created by a stack allocation ==12079== at 0x4EA93EE: XIconifyWindow (in /usr/lib/arm-linux-gnueabihf/libX11.so.6.3.0) ==12079== ==12079== Use of uninitialised value of size 4 ==12079== at 0x4008002: _dl_new_object (dl-object.c:206) ==12079== by 0x40040F5: _dl_map_object_from_fd (dl-load.c:1059) ==12079== by 0x400638B: _dl_map_object (dl-load.c:2605) ==12079== by 0x400DEC7: dl_open_worker (dl-open.c:235) ==12079== by 0x400B13F: _dl_catch_error (dl-error.c:187) ==12079== by 0x400DA8D: _dl_open (dl-open.c:661) ==12079== by 0x4FA5AF7: dlopen_doit (dlopen.c:66) ==12079== by 0x400B13F: _dl_catch_error (dl-error.c:187) ==12079== by 0x4FA5F47: _dlerror_run (dlerror.c:163) ==12079== by 0x4FA5B81: dlopen@@GLIBC_2.4 (dlopen.c:87) ==12079== by 0x4A29445: ??? (in /usr/lib/libSDL2-2.0.so.0.4.0) ==12079== Uninitialised value was created by a heap allocation ==12079== at 0x483149C: malloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== ==12079== Use of uninitialised value of size 4 ==12079== at 0x4008010: _dl_new_object (dl-object.c:207) ==12079== by 0x40040F5: _dl_map_object_from_fd (dl-load.c:1059) ==12079== by 0x400638B: _dl_map_object (dl-load.c:2605) ==12079== by 0x400DEC7: dl_open_worker (dl-open.c:235) ==12079== by 0x400B13F: _dl_catch_error (dl-error.c:187) ==12079== by 0x400DA8D: _dl_open (dl-open.c:661) ==12079== by 0x4FA5AF7: dlopen_doit (dlopen.c:66) ==12079== by 0x400B13F: _dl_catch_error (dl-error.c:187) ==12079== by 0x4FA5F47: _dlerror_run (dlerror.c:163) ==12079== by 0x4FA5B81: dlopen@@GLIBC_2.4 (dlopen.c:87) ==12079== by 0x4A29445: ??? (in /usr/lib/libSDL2-2.0.so.0.4.0) ==12079== Uninitialised value was created by a heap allocation ==12079== at 0x483149C: malloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== ==12079== Conditional jump or move depends on uninitialised value(s) ==12079== at 0x3807E1EC: ??? (in /usr/lib/valgrind/memcheck-arm-linux) ==12079== Uninitialised value was created by a heap allocation ==12079== at 0x483149C: malloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== ==12079== Use of uninitialised value of size 4 ==12079== at 0x3807E218: ??? (in /usr/lib/valgrind/memcheck-arm-linux) ==12079== Uninitialised value was created by a heap allocation ==12079== at 0x483149C: malloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== ==12079== Use of uninitialised value of size 4 ==12079== at 0x3807E264: ??? (in /usr/lib/valgrind/memcheck-arm-linux) ==12079== Uninitialised value was created by a heap allocation ==12079== at 0x483149C: malloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== ==12079== Use of uninitialised value of size 4 ==12079== at 0x400801E: _dl_new_object (dl-object.c:217) ==12079== by 0x40040F5: _dl_map_object_from_fd (dl-load.c:1059) ==12079== by 0x400638B: _dl_map_object (dl-load.c:2605) ==12079== by 0x400DEC7: dl_open_worker (dl-open.c:235) ==12079== by 0x400B13F: _dl_catch_error (dl-error.c:187) ==12079== by 0x400DA8D: _dl_open (dl-open.c:661) ==12079== by 0x4FA5AF7: dlopen_doit (dlopen.c:66) ==12079== by 0x400B13F: _dl_catch_error (dl-error.c:187) ==12079== by 0x4FA5F47: _dlerror_run (dlerror.c:163) ==12079== by 0x4FA5B81: dlopen@@GLIBC_2.4 (dlopen.c:87) ==12079== by 0x4A29445: ??? (in /usr/lib/libSDL2-2.0.so.0.4.0) ==12079== Uninitialised value was created by a heap allocation ==12079== at 0x483149C: malloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== disInstr(thumb): unhandled instruction: 0xEEFE 0x7ACA ==12079== valgrind: Unrecognised instruction at address 0x33fae857. ==12079== at 0x33FAE856: G_VisCheckDist(Edict const*) (g_vis.cpp:169) ==12079== by 0x33FAE8E3: G_Vis(int, Edict const*, Edict const*, unsigned int) (g_vis.cpp:213) ==12079== by 0x33FAEA6D: G_TestVis(int, Edict*, unsigned int) (g_vis.cpp:269) ==12079== by 0x33FAED23: G_DoTestVis (g_vis.cpp:293) ==12079== by 0x33FAED23: G_CheckVisTeam (g_vis.cpp:366) ==12079== by 0x33FAED23: G_CheckVis(Edict*, unsigned int) (g_vis.cpp:416) ==12079== by 0x33F94697: G_SpawnAIPlayer(Player const&, equipDef_s const*) (g_ai.cpp:1889) ==12079== by 0x33F97A91: G_SpawnAIPlayers (g_ai.cpp:1906) ==12079== by 0x33F97A91: AI_CreatePlayer(int) (g_ai.cpp:1977) ==12079== by 0x33FAAF0D: G_SpawnEntities(char const*, bool, char const*) (g_spawn.cpp:384) ==12079== by 0xDBC39: SV_Map(bool, char const*, char const*, bool) (sv_init.cpp:218) ==12079== by 0xDA0E1: SV_Map_f() (sv_ccmds.cpp:181) ==12079== by 0xA2497: Cmd_vExecuteString(char const*, std::__va_list) (cmd.cpp:976) ==12079== by 0xA25B7: Cmd_ExecuteString(char const*, ...) [clone .constprop.30] (cmd.cpp:1012) ==12079== by 0xA277B: Cbuf_Execute() (cmd.cpp:255) ==12079== Your program just tried to execute an instruction that Valgrind ==12079== did not recognise. There are two possible reasons for this. ==12079== 1. Your program has a bug and erroneously jumped to a non-code ==12079== location. If you are running Memcheck and you just saw a ==12079== warning about a bad jump, it's probably your program's fault. ==12079== 2. The instruction is legitimate but Valgrind doesn't handle it, ==12079== i.e. it's Valgrind's fault. If you think this is the case or ==12079== you are not sure, please let us know and we'll try to fix it. ==12079== Either way, Valgrind will now raise a SIGILL signal which will ==12079== probably kill your program. ==12079== Invalid free() / delete / delete[] / realloc() ==12079== at 0x482FE78: free (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== Address 0x4e7e31c is 0 bytes inside data symbol "noai6ai_cached" ==12079== ==12079== ==12079== HEAP SUMMARY: ==12079== in use at exit: 248,170,602 bytes in 97,636 blocks ==12079== total heap usage: 1,288,001 allocs, 1,190,366 frees, 1,408,309,624 bytes allocated ==12079== ==12079== 240 bytes in 12 blocks are possibly lost in loss record 2 of 9 ==12079== at 0x483149C: malloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== ==12079== 304 bytes in 2 blocks are definitely lost in loss record 3 of 9 ==12079== at 0x482ED74: calloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== ==12079== 1,908 bytes in 14 blocks are possibly lost in loss record 5 of 9 ==12079== at 0x482ED74: calloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== ==12079== 15,740 (14,964 direct, 776 indirect) bytes in 747 blocks are definitely lost in loss record 6 of 9 ==12079== at 0x483149C: malloc (in /usr/lib/valgrind/vgpreload_memcheck-arm-linux.so) ==12079== ==12079== LEAK SUMMARY: ==12079== definitely lost: 15,268 bytes in 749 blocks ==12079== indirectly lost: 776 bytes in 1 blocks ==12079== possibly lost: 2,148 bytes in 26 blocks ==12079== still reachable: 248,152,410 bytes in 96,860 blocks ==12079== suppressed: 0 bytes in 0 blocks ==12079== Reachable blocks (those to which a pointer was found) are not shown. ==12079== To see them, rerun with: --leak-check=full --show-leak-kinds=all ==12079== ==12079== For counts of detected and suppressed errors, rerun with: -v ==12079== ERROR SUMMARY: 54779 errors from 16 contexts (suppressed: 115 from 13)