error 0 4d76b8688005833b361d800ff564f1f24a90a1b00af16d1599025416236ca611 836248655 146361346514 4300000000 crypto_kem/lotus256/ref ==18361== Memcheck, a memory error detector ==18361== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==18361== Using Valgrind-3.15.0.GIT and LibVEX; rerun with -h for copyright info ==18361== Command: ./try ==18361== ==18361== Warning: client switching stacks? SP change: 0x1ffeffff28 --> 0x1ffedddf18 ==18361== to suppress, use: --max-stackframe=2236432 or greater ==18361== Invalid write of size 8 ==18361== at 0x401F26: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== Address 0x1ffedddf18 is on thread 1's stack ==18361== ==18361== Invalid write of size 2 ==18361== at 0x402707: unpack_128elems (pack.c:84) ==18361== by 0x403101: sample_uniform (sampler.c:163) ==18361== by 0x4031B6: lotus_cpa_pke_keypair (cpa-pke.c:49) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffee45f20 is on thread 1's stack ==18361== in frame #3, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid write of size 2 ==18361== at 0x402728: unpack_128elems (pack.c:85) ==18361== by 0x403101: sample_uniform (sampler.c:163) ==18361== by 0x4031B6: lotus_cpa_pke_keypair (cpa-pke.c:49) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffee45f40 is on thread 1's stack ==18361== in frame #3, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid write of size 2 ==18361== at 0x402748: unpack_128elems (pack.c:86) ==18361== by 0x403101: sample_uniform (sampler.c:163) ==18361== by 0x4031B6: lotus_cpa_pke_keypair (cpa-pke.c:49) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffee45f60 is on thread 1's stack ==18361== in frame #3, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid write of size 2 ==18361== at 0x402768: unpack_128elems (pack.c:87) ==18361== by 0x403101: sample_uniform (sampler.c:163) ==18361== by 0x4031B6: lotus_cpa_pke_keypair (cpa-pke.c:49) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffee45f80 is on thread 1's stack ==18361== in frame #3, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid write of size 2 ==18361== at 0x40278B: unpack_128elems (pack.c:88) ==18361== by 0x403101: sample_uniform (sampler.c:163) ==18361== by 0x4031B6: lotus_cpa_pke_keypair (cpa-pke.c:49) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffee45fa0 is on thread 1's stack ==18361== in frame #3, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid write of size 2 ==18361== at 0x4027BB: unpack_128elems (pack.c:89) ==18361== by 0x403101: sample_uniform (sampler.c:163) ==18361== by 0x4031B6: lotus_cpa_pke_keypair (cpa-pke.c:49) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffee45fc0 is on thread 1's stack ==18361== in frame #3, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid write of size 2 ==18361== at 0x402812: unpack_128elems (pack.c:90) ==18361== by 0x403101: sample_uniform (sampler.c:163) ==18361== by 0x4031B6: lotus_cpa_pke_keypair (cpa-pke.c:49) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffee45fe0 is on thread 1's stack ==18361== in frame #3, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid write of size 2 ==18361== at 0x40285E: unpack_128elems (pack.c:95) ==18361== by 0x403101: sample_uniform (sampler.c:163) ==18361== by 0x4031B6: lotus_cpa_pke_keypair (cpa-pke.c:49) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffee46000 is on thread 1's stack ==18361== in frame #3, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid write of size 2 ==18361== at 0x4028AE: unpack_128elems (pack.c:98) ==18361== by 0x403101: sample_uniform (sampler.c:163) ==18361== by 0x4031B6: lotus_cpa_pke_keypair (cpa-pke.c:49) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffee46010 is on thread 1's stack ==18361== in frame #3, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid write of size 2 ==18361== at 0x40315B: sample_discrete_gaussian (sampler.c:176) ==18361== by 0x4031CA: lotus_cpa_pke_keypair (cpa-pke.c:53) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffedddf20 is on thread 1's stack ==18361== in frame #2, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid write of size 2 ==18361== at 0x40315B: sample_discrete_gaussian (sampler.c:176) ==18361== by 0x4031DF: lotus_cpa_pke_keypair (cpa-pke.c:54) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffef97f20 is on thread 1's stack ==18361== in frame #2, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid read of size 2 ==18361== at 0x403440: submul (lwe-arithmetics.c:18) ==18361== by 0x4031ED: lotus_cpa_pke_keypair (cpa-pke.c:56) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffedddf20 is on thread 1's stack ==18361== in frame #2, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid read of size 2 ==18361== at 0x403443: submul (lwe-arithmetics.c:18) ==18361== by 0x4031ED: lotus_cpa_pke_keypair (cpa-pke.c:56) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffee45f20 is on thread 1's stack ==18361== in frame #2, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid read of size 2 ==18361== at 0x403449: submul (lwe-arithmetics.c:17) ==18361== by 0x4031ED: lotus_cpa_pke_keypair (cpa-pke.c:56) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffef97f20 is on thread 1's stack ==18361== in frame #2, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== Invalid read of size 2 ==18361== at 0x403457: submul (lwe-arithmetics.c:16) ==18361== by 0x4031ED: lotus_cpa_pke_keypair (cpa-pke.c:56) ==18361== by 0x401F2A: crypto_kem_lotus256_ref_keypair (kem.c:35) ==18361== by 0x401116: test (try.c:108) ==18361== by 0x401B92: main (try-anything.c:295) ==18361== Address 0x1ffedddf24 is on thread 1's stack ==18361== in frame #2, created by crypto_kem_lotus256_ref_keypair (kem.c:30) ==18361== ==18361== ==18361== More than 10000000 total errors detected. I'm not reporting any more. ==18361== Final error counts will be inaccurate. Go fix your program! ==18361== Rerun with --error-limit=no to disable this cutoff. Note ==18361== that errors may occur in your program without prior warning from ==18361== Valgrind, because errors are no longer being displayed. ==18361== ==18361== Warning: client switching stacks? SP change: 0x1ffedddf20 --> 0x1ffeffff28 ==18361== to suppress, use: --max-stackframe=2236424 or greater ==18361== Warning: client switching stacks? SP change: 0x1ffeffff18 --> 0x1ffeddcd40 ==18361== to suppress, use: --max-stackframe=2240984 or greater ==18361== further instances of this message will not be shown. ==18361== ==18361== HEAP SUMMARY: ==18361== in use at exit: 16,310,192 bytes in 12 blocks ==18361== total heap usage: 42 allocs, 30 frees, 16,329,320 bytes allocated ==18361== ==18361== LEAK SUMMARY: ==18361== definitely lost: 0 bytes in 0 blocks ==18361== indirectly lost: 0 bytes in 0 blocks ==18361== possibly lost: 16,309,760 bytes in 10 blocks ==18361== still reachable: 432 bytes in 2 blocks ==18361== suppressed: 0 bytes in 0 blocks ==18361== Rerun with --leak-check=full to see details of leaked memory ==18361== ==18361== For lists of detected and suppressed errors, rerun with: -s ==18361== ERROR SUMMARY: 10000000 errors from 16 contexts (suppressed: 0 from 0)