| Summary: | Segmentation fault in get_bszB_as_is after program performs an invalid write | ||
|---|---|---|---|
| Product: | [Developer tools] valgrind | Reporter: | julian |
| Component: | memcheck | Assignee: | Paul Floyd <pjfloyd> |
| Status: | RESOLVED NOT A BUG | ||
| Severity: | crash | CC: | pjfloyd |
| Priority: | NOR | ||
| Version First Reported In: | 3.25.1 | ||
| Target Milestone: | --- | ||
| Platform: | Arch Linux | ||
| OS: | Linux | ||
| Latest Commit: | Version Fixed/Implemented In: | ||
| Sentry Crash Report: | |||
| Attachments: | The program under test, its sources, the test file, the log file and the combined coredump | ||
|
Description
julian
2026-01-01 23:08:34 UTC
Memcheck has detected a bug in your code. After that, especially invalid writes, anything can happen. We do not make any promises that Valgrind will be able to continue in a correct manner. The same is true for all dynamic analysis tools as far as I know. What you can do is increase the redzone size, e.g., valgrind --redzone-size=128 ./build/main/lilycc test-files/test_compound.c That is the amount of slop that Valgrind adds surrounding each heap allocation. That makes it more robust in the face of invalid writes. I'm closing this as not a bug. If you fix the bug in your code and the segfault is still there please reopen this report. |