You can ignore that. If you care that much about the epoll error then
just bzero() the data being passed into epoll_ctl() before its called.
adrian
On Mon, Mar 24, 2008, Amos Jeffries wrote:
> Just doing a quick check with valgrind I'm seeing a lot of errors in the
> event system.
>
> "Syscall param epoll_ctl(event) points to uninitialised byte(s)"
>
> with a wide range of events like:
>
> ==25761== at 0x4559A59: epoll_ctl (in /lib/libc-2.7.so)
> ==25761== by 0x8171C2F: comm_read(int, char*, int,
> RefCount<AsyncCall>&) (comm.cc:346)
> ==25761== by 0x814B50C: StoreEntry::delayAwareRead(int, char*, int,
> RefCount<AsyncCall>) (store.cc:261)
> ==25761== by 0x80FB573: HttpStateData::maybeReadVirginBody()
> (http.cc:1290)
> ==25761== by 0x80F9C36: HttpStateData::sendRequest() (http.cc:1782)
> ==25761== by 0x80FA594: httpStart (http.cc:1845)
> ==25761== by 0x817AF86: CommConnectCbPtrFun::dial() (CommCalls.cc:127)
> ==25761== by 0x8069A27: AsyncCall::make() (AsyncCall.cc:34)
> ==25761== by 0x8068EAC: AsyncCallQueue::fireNext() (AsyncCallQueue.cc:53)
> ==25761== by 0x8068FAD: AsyncCallQueue::fire() (AsyncCallQueue.cc:39)
> ==25761== by 0x80CF392: EventLoop::dispatchCalls() (EventLoop.cc:156)
> ==25761== by 0x80CF58C: EventLoop::runOnce() (EventLoop.cc:133)
> ==25761== Address 0xbef187d8 is on thread 1's stack
>
>
> All sharing the root:
> comm_read(int, char*, int, RefCount<AsyncCall>&) (comm.cc:346)
>
> Anyone want to attack this one?
>
> Amos
> --
> Please use Squid 2.6STABLE17+ or 3.0STABLE1+
> There are serious security advisories out on all earlier releases.
-- - Xenion - http://www.xenion.com.au/ - VPS Hosting - Commercial Squid Support - - $25/pm entry-level VPSes w/ capped bandwidth charges available in WA -Received on Sun Mar 23 2008 - 05:11:18 MDT
This archive was generated by hypermail pre-2.1.9 : Tue Apr 01 2008 - 13:00:10 MDT