mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-10-25 03:05:34 +00:00
a7c4cd8963
LLVM can optimize code to a form `if B && A` when A is always false but B is undefined. This triggers a valgrind memcheck warning since the conditional depends on undefined data but in practice it can never have side-effects. Rust 1.20.0 seems to trigger this in the Option code. Since we believe the transform is correct in these cases and valgrind is incorrect to warn, we surpress the error. Thanks to Julian Seward for the analysis and help writing the suppression entries. MozReview-Commit-ID: pF1Bmy5PRY
666 lines
24 KiB
Plaintext
666 lines
24 KiB
Plaintext
# Full list is tracked through meta bug 793882
|
|
|
|
####################################
|
|
# Leaks in third party libraries #
|
|
####################################
|
|
|
|
{
|
|
Bug 793537
|
|
Memcheck:Leak
|
|
...
|
|
obj:/usr/lib64/libpango-1.0.so.0.2800.1
|
|
...
|
|
}
|
|
{
|
|
Bug 793598
|
|
Memcheck:Leak
|
|
...
|
|
obj:/lib64/libdbus-1.so.3.4.0
|
|
...
|
|
}
|
|
# Fontconfig is going fancy with its cache structure and that confuses valgrind.
|
|
# https://bugs.freedesktop.org/show_bug.cgi?id=8215
|
|
# https://bugs.freedesktop.org/show_bug.cgi?id=8428
|
|
{
|
|
Bug 1187649
|
|
Memcheck:Leak
|
|
match-leak-kinds: definite
|
|
fun:realloc
|
|
fun:FcPatternObjectInsertElt
|
|
...
|
|
}
|
|
# With older versions of fontconfig (e.g. 2.8.0 on taskcluster systems),
|
|
# there's an uninitialized memory usage and leak when loading app fonts.
|
|
{
|
|
Bug 1231701
|
|
Memcheck:Param
|
|
write(buf)
|
|
...
|
|
fun:FcDirCacheWrite
|
|
fun:FcDirCacheScan
|
|
fun:FcConfigAddDirList
|
|
fun:FcConfigAppFontAddDir
|
|
...
|
|
}
|
|
{
|
|
Bug 1231701
|
|
Memcheck:Leak
|
|
match-leak-kinds: definite
|
|
fun:malloc
|
|
fun:FcDirScanConfig
|
|
fun:FcDirCacheScan
|
|
fun:FcConfigAddDirList
|
|
fun:FcConfigAppFontAddDir
|
|
...
|
|
}
|
|
# Leaks due to either Gtk+3 or cairo, but Gecko is not directly involved with
|
|
# those cairo interactions. One suspected cause is Gecko not closing the
|
|
# display to work around a bug in old Gtk+3 versions. See also bug 1228724.
|
|
{
|
|
Bug 1187649
|
|
Memcheck:Leak
|
|
match-leak-kinds: definite
|
|
fun:malloc
|
|
fun:_cairo_freelist_alloc
|
|
fun:_cairo_xlib_display_queue_resource
|
|
fun:_cairo_xlib_surface_finish
|
|
...
|
|
}
|
|
# The following leak is deep in Gtk+3, and it doesn't seem we're doing
|
|
# anything wrong on our end with the container objects. This suppression
|
|
# is purposefully verbose so as to avoid catching actual leaks due to
|
|
# Gecko code.
|
|
# Note: valgrind doesn't support more than 24 elements in a suppression stack.
|
|
{
|
|
Bug 1187649
|
|
Memcheck:Leak
|
|
match-leak-kinds: definite
|
|
fun:malloc
|
|
fun:g_malloc
|
|
fun:g_slice_alloc
|
|
fun:g_list_prepend
|
|
fun:gtk_combo_box_get_path_for_child
|
|
fun:gtk_container_get_path_for_child
|
|
fun:gtk_widget_get_path
|
|
fun:_gtk_widget_update_path
|
|
fun:reset_style_recurse
|
|
fun:gtk_widget_reset_style
|
|
fun:gtk_widget_set_parent
|
|
fun:gtk_combo_box_add
|
|
fun:g_cclosure_marshal_VOID__OBJECTv
|
|
fun:_g_closure_invoke_va
|
|
fun:g_signal_emit_valist
|
|
fun:g_signal_emit
|
|
fun:gtk_combo_box_constructor
|
|
fun:g_object_newv
|
|
fun:g_object_new_valist
|
|
fun:g_object_new
|
|
...
|
|
}
|
|
# set_color() in gtkstyle.c of GTK version 3.4.4 only can leak GdkRGBA
|
|
# allocations when the theme has transparent colors:
|
|
# https://git.gnome.org/browse/gtk+/tree/gtk/deprecated/gtkstyle.c?h=3.4.4#n676
|
|
{
|
|
Bug 1250704
|
|
Memcheck:Leak
|
|
match-leak-kinds: definite
|
|
fun:malloc
|
|
fun:g_malloc
|
|
fun:g_slice_alloc
|
|
fun:g_slice_copy
|
|
fun:boxed_proxy_lcopy_value
|
|
fun:gtk_style_context_get_valist
|
|
fun:gtk_style_context_get
|
|
fun:set_color
|
|
fun:gtk_style_update_from_context
|
|
fun:gtk_style_constructed
|
|
fun:g_object_newv
|
|
fun:g_object_new_valist
|
|
fun:g_object_new
|
|
...
|
|
}
|
|
{
|
|
Bug 794366
|
|
Memcheck:Leak
|
|
...
|
|
obj:/usr/lib64/libgtk-x11-2.0.so.0.1800.9
|
|
...
|
|
}
|
|
{
|
|
Bug 794368
|
|
Memcheck:Leak
|
|
...
|
|
obj:/usr/lib64/libXrandr.so.2.2.0
|
|
...
|
|
}
|
|
{
|
|
Bug 794373
|
|
Memcheck:Leak
|
|
...
|
|
obj:/lib64/libgobject-2.0.so.0.2200.5
|
|
...
|
|
}
|
|
{
|
|
Bug 966673
|
|
Memcheck:Leak
|
|
fun:malloc
|
|
obj:/lib64/libresolv-2.12.so
|
|
...
|
|
fun:gaih_inet
|
|
fun:getaddrinfo
|
|
fun:PR_GetAddrInfoByName
|
|
...
|
|
}
|
|
{
|
|
Bug 979242
|
|
Memcheck:Leak
|
|
fun:calloc
|
|
fun:xcb_connect_to_fd
|
|
fun:xcb_connect_to_display_with_auth_info
|
|
fun:_XConnectXCB
|
|
fun:XOpenDisplay
|
|
fun:gdk_display_open
|
|
...
|
|
}
|
|
|
|
###################################
|
|
# Leaks in short lived precesses #
|
|
###################################
|
|
|
|
{
|
|
Bug 984196
|
|
Memcheck:Leak
|
|
...
|
|
fun:glxtest
|
|
...
|
|
}
|
|
|
|
#########################################
|
|
# Uninitialised value false positives #
|
|
#########################################
|
|
|
|
# This concerns a false positive pertaining to Memcheck's overly-
|
|
# conservative instrumentation of CPUID. See bug 1288618 comments
|
|
# 119 through 127.
|
|
{
|
|
Bug 1288618 comments 119 through 127
|
|
Memcheck:Cond
|
|
fun:_ZN6SkOptsL4initEv
|
|
fun:sk_once_no_arg_adaptor
|
|
}
|
|
|
|
{
|
|
Bug 1288618 comments 119 through 127 part 2
|
|
Memcheck:Cond
|
|
fun:__get_cpuid
|
|
fun:cpuid
|
|
fun:_ZN6SkOptsL4initEv
|
|
fun:sk_once_no_arg_adaptor
|
|
}
|
|
|
|
# More stuff to do with CPUID and Skia. Apparently we could get rid of
|
|
# these if we could patch our in-tree Skia, but that's not favoured.
|
|
#
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0xFDD1D97: SkCpu::CacheRuntimeFeatures()
|
|
# by 0xFE8A66E: SkGraphics::Init()
|
|
# by 0xE757308: gfxPlatform::Init()
|
|
# by 0xE75772C: gfxPlatform::GetPlatform()
|
|
{
|
|
Skia and CPUID, Jan 2017, #1
|
|
Memcheck:Cond
|
|
fun:_ZN5SkCpu20CacheRuntimeFeaturesEv
|
|
fun:_ZN10SkGraphics4InitEv
|
|
fun:_ZN11gfxPlatform4InitEv
|
|
fun:_ZN11gfxPlatform11GetPlatformEv
|
|
}
|
|
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0xFD5B218: SkOpts::Init()
|
|
# by 0xE757308: gfxPlatform::Init()
|
|
# by 0xE75772C: gfxPlatform::GetPlatform()
|
|
# by 0xF1A3691: mozilla::dom::ContentProcess::Init()
|
|
# or mozilla::dom::ContentChild::RecvSetXPCOMProcessAttributes()
|
|
{
|
|
Skia and CPUID, Jan 2017, #2
|
|
Memcheck:Cond
|
|
fun:_ZN6SkOpts4InitEv
|
|
fun:_ZN11gfxPlatform4InitEv
|
|
fun:_ZN11gfxPlatform11GetPlatformEv
|
|
fun:_ZN7mozilla3dom*Content*
|
|
}
|
|
|
|
# False positives triggered by rust 1.20.0 (at least) builds of stylo.
|
|
# See bug 1394696. The diagnosis is an llvm optimization transforming
|
|
# `if A && B` to `if B && A` if is can be proven that A is false
|
|
# whenever B is uninitialized. Confusing, but valid.
|
|
#
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0x113ED01E: selectors::matching::matches_complex_selector_internal (option.rs:421)
|
|
# by 0x113ECF19: selectors::matching::matches_complex_selector (matching.rs:501)
|
|
# by 0x113EBAC0: <style::selector_map::SelectorMap<style::stylist::Rule>>::get_matching_rules (matching.rs:397)
|
|
{
|
|
Bug 1394696 Stylo selector, Sept 2017, part 1
|
|
Memcheck:Cond
|
|
fun:_ZN9selectors8matching33matches_complex_selector_internal*
|
|
fun:_ZN9selectors8matching24matches_complex_selector*
|
|
...
|
|
fun:_ZN69_$LT$style..selector_map..SelectorMap$LT$style..stylist..Rule$GT$$GT$18get_matching_rules*
|
|
}
|
|
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0x113EFFDE: selectors::matching::matches_complex_selector_internal (option.rs:421)
|
|
# by 0x113EFED9: selectors::matching::matches_complex_selector (matching.rs:501)
|
|
# by 0x113DFE55: style::stylist::Stylist::match_revalidation_selectors::{{closure}} (matching.rs:397)
|
|
{
|
|
Bug 1394696 Stylo selector, Sept 2017, part 2
|
|
Memcheck:Cond
|
|
fun:_ZN9selectors8matching33matches_complex_selector_internal*
|
|
fun:_ZN9selectors8matching24matches_complex_selector*
|
|
...
|
|
fun:_ZN5style9traversal13compute_style*
|
|
fun:recalc_style_at<style::gecko::wrapper::GeckoElement,style::gecko::traversal::RecalcStyleOnly,closure>
|
|
}
|
|
|
|
###################################################
|
|
# For valgrind-mochitest ("tc-M-V [tier 2]") runs on taskcluster.
|
|
# See bug 1248365.
|
|
# These are specific to Ubuntu 12.04.5, 64-bit.
|
|
###################################################
|
|
|
|
|
|
# Not sure what this is. Is it the well-known
|
|
# Memcheck-being-confused-by-zlib thing? I suspect so.
|
|
#
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0xB6154E0: inflateReset2 (in /lib/x86_64-linux-gnu/libz.so.1.2.3.4)
|
|
# by 0xB6155D8: inflateInit2_ (in /lib/x86_64-linux-gnu/libz.so.1.2.3.4)
|
|
# by 0xADDE253: png_create_read_struct_2
|
|
# (in /lib/x86_64-linux-gnu/libpng12.so.0.46.0)
|
|
# Uninitialised value was created by a heap allocation
|
|
# at 0x4C2D027: malloc (coregrind/m_replacemalloc/vg_replace_malloc.c:298)
|
|
# by 0xADE960F: png_malloc (in /lib/x86_64-linux-gnu/libpng12.so.0.46.0)
|
|
# by 0xADD1B95: ??? (in /lib/x86_64-linux-gnu/libpng12.so.0.46.0)
|
|
# by 0xB6155B6: inflateInit2_ (in /lib/x86_64-linux-gnu/libz.so.1.2.3.4)
|
|
# by 0xADDE253: png_create_read_struct_2
|
|
# (in /lib/x86_64-linux-gnu/libpng12.so.0.46.0)
|
|
# by 0x15707869: ??? (in /usr/lib/x86_64-linux-gnu/gdk-pixbuf-2.0/2.10.0/
|
|
# loaders/libpixbufloader-png.so)
|
|
{
|
|
Bug 1248365: mochitest-libz-1
|
|
Memcheck:Cond
|
|
fun:inflateReset2
|
|
fun:inflateInit2_
|
|
fun:png_create_read_struct_2
|
|
}
|
|
|
|
|
|
# I don't know what this is.
|
|
#
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0x39608257: ??? (in /usr/lib/x86_64-linux-gnu/librsvg-2.so.2.36.1)
|
|
# by 0x39608E96: rsvg_handle_get_pixbuf_sub (in /usr/lib/x86_64-linux-gnu/l
|
|
# by 0x37D00D2A: ??? (in /usr/lib/x86_64-linux-gnu/gdk-pixbuf-2.0/2.10.0/lo
|
|
# by 0x88FF740: gdk_pixbuf_loader_close (in /usr/lib/x86_64-linux-gnu/libgd
|
|
# by 0x88FBA48: ??? (in /usr/lib/x86_64-linux-gnu/libgdk_pixbuf-2.0.so.0.26
|
|
# by 0x88FD290: gdk_pixbuf_new_from_stream_at_scale (in /usr/lib/x86_64-lin
|
|
# by 0x6EF96A7: ??? (in /usr/lib/x86_64-linux-gnu/libgtk-3.so.0.400.2)
|
|
# by 0x6EFC2B1: gtk_icon_info_load_icon (in /usr/lib/x86_64-linux-gnu/libgt
|
|
# Uninitialised value was created by a stack allocation
|
|
# at 0xAB786B0: ??? (in /usr/lib/x86_64-linux-gnu/libpixman-1.so.0.30.2)
|
|
{
|
|
Bug 1248365: mochitest-librsvg-1
|
|
Memcheck:Cond
|
|
obj:/*/librsvg-2.so.2.36*
|
|
fun:rsvg_handle_get_pixbuf_sub
|
|
obj:/*/libpixbufloader-svg.so*
|
|
fun:gdk_pixbuf_loader_close
|
|
}
|
|
|
|
|
|
# There now follow some suppressions to do with libpixman. There are two
|
|
# variants, one for errors in the system libpixman, and one for errors in
|
|
# our in-tree copy. I suspect that all of these sse2 compositing reports
|
|
# are Memcheck false positives, possibly to do with inaccurate
|
|
# instrumentation of the function combine1() in
|
|
# gfx/cairo/libpixman/src/pixman-sse2.c.
|
|
#
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0xAB93A10: ??? (in /usr/lib/x86_64-linux-gnu/libpixman-1.so.0.30.2)
|
|
# by 0xAB78927: ??? (in /usr/lib/x86_64-linux-gnu/libpixman-1.so.0.30.2)
|
|
# by 0xAB40B0B: pixman_image_composite32 (in /usr/lib/x86_64-linux-gnu/libp
|
|
# by 0x865C95C: ??? (in /usr/lib/x86_64-linux-gnu/libcairo.so.2.11000.2)
|
|
# by 0x865E3CB: ??? (in /usr/lib/x86_64-linux-gnu/libcairo.so.2.11000.2)
|
|
# by 0x865F6EA: ??? (in /usr/lib/x86_64-linux-gnu/libcairo.so.2.11000.2)
|
|
# by 0x865F968: ??? (in /usr/lib/x86_64-linux-gnu/libcairo.so.2.11000.2)
|
|
# by 0x867D7C3: ??? (in /usr/lib/x86_64-linux-gnu/libcairo.so.2.11000.2)
|
|
# Uninitialised value was created by a stack allocation
|
|
# at 0xAB786B0: ??? (in /usr/lib/x86_64-linux-gnu/libpixman-1.so.0.30.2)
|
|
{
|
|
Bug 1248365: mochitest-libpixman-1
|
|
Memcheck:Cond
|
|
obj:/*/libpixman-1.so.0.30*
|
|
obj:/*/libpixman-1.so.0.30*
|
|
fun:pixman_image_composite32
|
|
}
|
|
|
|
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0xF9EA219: sse2_composite_over_8888_8888
|
|
# by 0xF9F5B5F: _moz_pixman_image_composite32
|
|
# by 0xF96E29E: _clip_and_composite_boxes
|
|
# by 0xF96F79D: _cairo_image_surface_fill
|
|
# by 0xF98790C: _cairo_surface_fill
|
|
# by 0xF96FE2E: _cairo_gstate_fill
|
|
# by 0xF98B3D9: _moz_cairo_fill_preserve
|
|
# by 0xE4CF383: mozilla::gfx::DrawTargetCairo::DrawPattern(mozilla::gfx:
|
|
# Uninitialised value was created by a stack allocation
|
|
# at 0xB8E46B0: ??? (in /usr/lib/x86_64-linux-gnu/libpixman-1.so.0.30.2)
|
|
{
|
|
Bug 1248365: mochitest-libpixman-2
|
|
Memcheck:Cond
|
|
fun:sse2_composite_over_8888_8888
|
|
fun:_moz_pixman_image_composite32
|
|
fun:_clip_and_composite_boxes
|
|
fun:_cairo_image_surface_fill
|
|
}
|
|
|
|
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0xF9D56AE: sse2_combine_over_u (in /builds/worker/workspace/build/applic
|
|
# by 0xF9D05D4: general_composite_rect (in /builds/worker/workspace/build/app
|
|
# by 0xF9F5B5F: _moz_pixman_image_composite32 (in /builds/worker/workspace/bu
|
|
# by 0xF96CF63: _clip_and_composite (in /builds/worker/workspace/build/applic
|
|
# by 0xF96D656: _clip_and_composite_boxes.part.32 (in /builds/worker/workspac
|
|
# by 0xF96E328: _clip_and_composite_boxes (in /builds/worker/workspace/build/
|
|
# by 0xF96F79D: _cairo_image_surface_fill (in /builds/worker/workspace/build/
|
|
# by 0xF98790C: _cairo_surface_fill (in /builds/worker/workspace/build/applic
|
|
# Uninitialised value was created by a stack allocation
|
|
# at 0xF9D024D: general_composite_rect (in /builds/worker/workspace/build/app
|
|
#
|
|
{
|
|
Bug 1248365: mochitest-libpixman-3
|
|
Memcheck:Cond
|
|
fun:sse2_combine_over_u
|
|
fun:general_composite_rect
|
|
fun:_moz_pixman_image_composite32
|
|
fun:_clip_and_composite*
|
|
}
|
|
|
|
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0xE626A5C: mozilla::image::imgFrame::Optimize() (in /builds/worker/work
|
|
# by 0xE626C68: mozilla::image::imgFrame::UnlockImageData() (in /home/work
|
|
# by 0xE608E8F: mozilla::image::RawAccessFrameRef::~RawAccessFrameRef() (i
|
|
# by 0xE61F5E4: mozilla::image::Decoder::~Decoder() (in /builds/worker/works
|
|
# by 0xE630E32: mozilla::image::nsIconDecoder::~nsIconDecoder() (in /home/
|
|
# by 0xE61A5B2: mozilla::image::Decoder::Release() (in /builds/worker/worksp
|
|
# by 0xE61DD73: mozilla::image::NotifyDecodeCompleteWorker::~NotifyDecodeC
|
|
# by 0xE61DD8F: mozilla::image::NotifyDecodeCompleteWorker::~NotifyDecodeC
|
|
# Uninitialised value was created by a stack allocation
|
|
# at 0xB8E46B0: ??? (in /usr/lib/x86_64-linux-gnu/libpixman-1.so.0.30.2)
|
|
{
|
|
Bug 1248365: mochitest-libpixman-4
|
|
Memcheck:Cond
|
|
fun:_ZN7mozilla5image8imgFrame8OptimizeEv
|
|
fun:_ZN7mozilla5image8imgFrame15UnlockImageDataEv
|
|
fun:_ZN7mozilla5image17RawAccessFrameRefD1Ev
|
|
fun:_ZN7mozilla5image7DecoderD1Ev
|
|
}
|
|
|
|
|
|
# Not sure what this. I can't reproduce it locally despite much trying.
|
|
# Syscall param sendmsg(msg.msg_iov[0]) points to uninitialised byte(s)
|
|
# at 0x4E4533D: ??? (syscall-template.S:82)
|
|
# by 0xE12C0A7: IPC::Channel::ChannelImpl::ProcessOutgoingMessages() (in /h
|
|
# by 0xE142FD0: RunnableMethod<IPC::Channel, bool (IPC::Channel::*)(IPC::Me
|
|
# by 0xE1240EA: MessageLoop::RunTask(Task*) (in /builds/worker/workspace/buil
|
|
# by 0xE128A46: MessageLoop::DeferOrRunPendingTask(MessageLoop::PendingTask
|
|
# by 0xE128B6D: MessageLoop::DoWork() (in /builds/worker/workspace/build/appl
|
|
# by 0xE12272C: base::MessagePumpLibevent::Run(base::MessagePump::Delegate*
|
|
# by 0xE124155: MessageLoop::Run() (in /builds/worker/workspace/build/applica
|
|
{
|
|
Bug 1248365: mochitest-sendmsg-1
|
|
Memcheck:Param
|
|
sendmsg(msg.msg_iov[0])
|
|
obj:/lib/x86_64-linux-gnu/libpthread-2.15.so
|
|
fun:_ZN3IPC7Channel11ChannelImpl23ProcessOutgoingMessagesEv
|
|
fun:_ZN14RunnableMethodIN3IPC7ChannelEMS1_FbPNS0_7MessageEEN7mozilla5Tuple*
|
|
}
|
|
|
|
|
|
# I can't repro this either.
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0x418E7E7C: ??? (in /usr/lib/x86_64-linux-gnu/libavcodec.so.53.35.0)
|
|
# by 0x4192D620: ??? (in /usr/lib/x86_64-linux-gnu/libavcodec.so.53.35.0)
|
|
# by 0x4192E717: ??? (in /usr/lib/x86_64-linux-gnu/libavcodec.so.53.35.0)
|
|
# by 0x41711BC4: ??? (in /usr/lib/x86_64-linux-gnu/libavcodec.so.53.35.0)
|
|
# by 0x41B08B6A: avcodec_open2 (in /usr/lib/x86_64-linux-gnu/libavcodec.so.
|
|
# by 0xEEAD89C: mozilla::FFmpegDataDecoder<53>::InitDecoder() (in /home/wor
|
|
# by 0xEEAE42B: mozilla::FFmpegVideoDecoder<53>::Init() (in /builds/worker/wo
|
|
# by 0xEEA4C07: mozilla::H264Converter::Init() (in /builds/worker/workspace/b
|
|
# Uninitialised value was created by a heap allocation
|
|
# at 0x4C2D11F: realloc (vg_replace_malloc.c:785)
|
|
# by 0x406196: moz_xrealloc (in /builds/worker/workspace/build/application/fi
|
|
# by 0xDEB43AC: nsTArrayInfallibleAllocator::ResultTypeProxy nsTArray_base<
|
|
# by 0xEEAD850: mozilla::FFmpegDataDecoder<53>::InitDecoder() (in /home/wor
|
|
# by 0xEEAE42B: mozilla::FFmpegVideoDecoder<53>::Init() (in /builds/worker/wo
|
|
{
|
|
Bug 1248365: mochitest-libavcodec-1-c
|
|
Memcheck:Cond
|
|
obj:/*/libavcodec.so.53*
|
|
obj:/*/libavcodec.so.53*
|
|
obj:/*/libavcodec.so.53*
|
|
obj:/*/libavcodec.so.53*
|
|
}
|
|
{
|
|
Bug 1248365: mochitest-libavcodec-1-v8
|
|
Memcheck:Value8
|
|
obj:/*/libavcodec.so.53*
|
|
obj:/*/libavcodec.so.53*
|
|
obj:/*/libavcodec.so.53*
|
|
obj:/*/libavcodec.so.53*
|
|
}
|
|
|
|
|
|
# Not sure what this is, but I am inclined to think it is also probably a
|
|
# SSE2-induced false positive similar to mochitest-libpixman-2 above.
|
|
# Use of uninitialised value of size 8
|
|
# at 0xE4F3E89: FastConvertYUVToRGB32Row (in /builds/worker/workspace/build/a
|
|
# by 0xE4F4A6D: mozilla::gfx::ConvertYCbCrToRGB32(unsigned char const*, uns
|
|
# by 0xE4F4B17: mozilla::gfx::ConvertYCbCrToRGB(mozilla::layers::PlanarYCbC
|
|
# by 0xE5227CB: mozilla::layers::PlanarYCbCrImage::GetAsSourceSurface() (in
|
|
# by 0xE5B2465: mozilla::layers::SharedPlanarYCbCrImage::GetAsSourceSurface
|
|
# by 0xE52FE44: mozilla::layers::BasicImageLayer::Paint(mozilla::gfx::DrawT
|
|
# by 0xE5618A1: mozilla::layers::BasicLayerManager::PaintSelfOrChildren(moz
|
|
# by 0xE560F83: mozilla::layers::BasicLayerManager::PaintLayer(gfxContext*,
|
|
# Uninitialised value was created by a stack allocation
|
|
# at 0x434B36B2: ??? (in /usr/lib/x86_64-linux-gnu/libavcodec.so.53.35.0)
|
|
{
|
|
Bug 1248365: FastConvertYUVToRGB32Row-1
|
|
Memcheck:Value8
|
|
fun:FastConvertYUVToRGB32Row
|
|
fun:_ZN7mozilla3gfx19ConvertYCbCrToRGB32*
|
|
fun:_ZN7mozilla3gfx17ConvertYCbCrToRGB*
|
|
fun:_ZN7mozilla6layers16PlanarYCbCrImage18GetAsSourceSurface*
|
|
}
|
|
|
|
# Similarly:
|
|
# Conditional jump or move depends on uninitialised value(s)
|
|
# at 0xFDAD1D1: sse41::blit_row_s32a_opaque(unsigned int*, unsigned int con
|
|
# by 0xFD60FA9: Sprite_D32_S32::blitRect(int, int, int, int) (in /home/work
|
|
# by 0xFEB9E0D: SkScan::FillIRect(SkIRect const&, SkRegion const*, SkBlitte
|
|
# by 0xFEBDDF3: SkScan::FillIRect(SkIRect const&, SkRasterClip const&, SkBl
|
|
{
|
|
SKIA and SSE4, Jan 2017
|
|
Memcheck:Cond
|
|
fun:_ZN5sse41L20blit_row_s32a_opaque*
|
|
fun:_ZN14Sprite_D32_S328blitRect*
|
|
fun:_ZN6SkScan9FillIRect*
|
|
fun:_ZN6SkScan9FillIRect*
|
|
}
|
|
|
|
# This is probably a V false positive, due to an insufficiently accurate
|
|
# description of the ioctl(SIOCETHTOOL) behavior.
|
|
# Syscall param ioctl(SIOCETHTOOL) points to uninitialised byte(s)
|
|
# at 0x5D5CBF7: ioctl (syscall-template.S:82)
|
|
# by 0xF58EB67: nr_stun_get_addrs (in /builds/worker/workspace/build/applica
|
|
# by 0xF594791: nr_stun_find_local_addresses (in /builds/worker/workspace/bu
|
|
# by 0xF58A237: nr_ice_get_local_addresses (in /builds/worker/workspace/buil
|
|
# by 0xF58ADDE: nr_ice_gather (in /builds/worker/workspace/build/application
|
|
# by 0xE43F35F: mozilla::NrIceCtx::StartGathering() (in /builds/worker/works
|
|
# by 0xE419560: mozilla::PeerConnectionMedia::EnsureIceGathering_s() (in /
|
|
# by 0xE41A11C: mozilla::runnable_args_memfn<RefPtr<mozilla::PeerConnectio
|
|
# Address 0x1cc3fb48 is on thread 6's stack
|
|
# in frame #1, created by nr_stun_get_addrs (???:)
|
|
{
|
|
Bug 1248365: mochitest-ioctl(SIOCETHTOOL)-1
|
|
Memcheck:Param
|
|
ioctl(SIOCETHTOOL)
|
|
fun:ioctl
|
|
fun:nr_stun_get_addrs
|
|
fun:nr_stun_find_local_addresses
|
|
}
|
|
|
|
|
|
# This looks like uninitialised padding bytes in a structure owned
|
|
# by libfontconfig. So there's nothing we can do about it.
|
|
# Syscall param write(buf) points to uninitialised byte(s)
|
|
# at 0x4E44CCD: ??? (syscall-template.S:82)
|
|
# by 0x9F1FF56: ??? (in /usr/lib/x86_64-linux-gnu/libfontconfig.so.1.4.4)
|
|
# by 0x9F2679B: ??? (in /usr/lib/x86_64-linux-gnu/libfontconfig.so.1.4.4)
|
|
# by 0x9F22B98: ??? (in /usr/lib/x86_64-linux-gnu/libfontconfig.so.1.4.4)
|
|
# by 0x9F22C5F: FcConfigAppFontAddDir (in /usr/lib/x86_64-linux-gnu/libfon
|
|
# by 0xE850173: gfxFcPlatformFontList::ActivateBundledFonts() (in /home/wo
|
|
# by 0xE852258: gfxFcPlatformFontList::InitFontListForPlatform() (in /home
|
|
# by 0xE895E21: gfxPlatformFontList::InitFontList() (in /builds/worker/works
|
|
# Address 0x2316663c is 156 bytes inside a block of size 1,448 alloc'd
|
|
# at 0x4C2CF71: malloc (vg_replace_malloc.c:299)
|
|
# by 0x9F1FD1D: ??? (in /usr/lib/x86_64-linux-gnu/libfontconfig.so.1.4.4)
|
|
# by 0x9F26788: ??? (in /usr/lib/x86_64-linux-gnu/libfontconfig.so.1.4.4)
|
|
# by 0x9F22B98: ??? (in /usr/lib/x86_64-linux-gnu/libfontconfig.so.1.4.4)
|
|
# by 0x9F22C5F: FcConfigAppFontAddDir (in /usr/lib/x86_64-linux-gnu/libfon
|
|
# by 0xE850173: gfxFcPlatformFontList::ActivateBundledFonts() (in /home/wo
|
|
# by 0xE852258: gfxFcPlatformFontList::InitFontListForPlatform() (in /home
|
|
# by 0xE895E21: gfxPlatformFontList::InitFontList() (in /builds/worker/works
|
|
{
|
|
Bug 1248365: libfontconfig-1
|
|
Memcheck:Param
|
|
write(buf)
|
|
obj:/*/libpthread*.so*
|
|
obj:/*/libfontconfig.so*
|
|
...
|
|
obj:/*/libfontconfig.so*
|
|
fun:FcConfigAppFontAddDir
|
|
}
|
|
|
|
|
|
# There's nothing we can do about these short of throwing in
|
|
# --show-mismatched-frees=no, but that's a bit drastic, so for now,
|
|
# just suppress them. A typical error is:
|
|
#
|
|
# Mismatched free() / delete / delete []
|
|
# at 0x4C2BE97: free (vg_replace_malloc.c:530)
|
|
# by 0xFCD09EC: ots::ots_post_free(ots::Font*) (in /builds/worker/workspace/
|
|
# by 0xFCC600E: ots::Font::~Font() (in /builds/worker/workspace/build/applic
|
|
# by 0xFCCBFA5: ots::OTSContext::Process(ots::OTSStream*, unsigned char co
|
|
# by 0xE7D7C8D: gfxUserFontEntry::SanitizeOpenTypeData(unsigned char const
|
|
# by 0xE7E371D: gfxUserFontEntry::LoadPlatformFont(unsigned char const*, u
|
|
# by 0xE7E48AA: gfxUserFontEntry::FontDataDownloadComplete(unsigned char c
|
|
# by 0xF49D25B: nsFontFaceLoader::OnStreamComplete(nsIStreamLoader*, nsISu
|
|
# Address 0x15671f00 is 0 bytes inside a block of size 490 alloc'd
|
|
# at 0x4C2CAEE: operator new(unsigned long) (vg_replace_malloc.c:332)
|
|
# by 0xF6AB737: std::vector<unsigned short, std::allocator<unsigned short>
|
|
# by 0xFCD0FDE: ots::ots_post_parse(ots::Font*, unsigned char const*, unsi
|
|
# by 0xFCCA3D9: (anonymous namespace)::ProcessGeneric(ots::OpenTypeFile*,
|
|
# by 0xFCCB17E: (anonymous namespace)::ProcessTTF(ots::OpenTypeFile*, ots:
|
|
# by 0xFCCBA54: ots::OTSContext::Process(ots::OTSStream*, unsigned char co
|
|
# by 0xE7D7C8D: gfxUserFontEntry::SanitizeOpenTypeData(unsigned char const
|
|
# by 0xE7E371D: gfxUserFontEntry::LoadPlatformFont(unsigned char const*, u
|
|
{
|
|
Bug 1248365: ots::Font::~Font()-1
|
|
Memcheck:Free
|
|
fun:free
|
|
fun:_ZN3ots13ots_post_free*
|
|
fun:_ZN3ots4FontD1Ev
|
|
fun:_ZN3ots10OTSContext7Process*
|
|
}
|
|
|
|
# and various similar:
|
|
{
|
|
ots mismatched frees, Jan 2017, #1
|
|
Memcheck:Free
|
|
fun:_ZdlPv
|
|
fun:_ZN3ots14ots_glyf_parse*
|
|
fun:_ZN12_GLOBAL__N_114ProcessGenericEPN3ots12OpenTypeFile*
|
|
fun:_ZN12_GLOBAL__N_110ProcessTTFEPN3ots12OpenTypeFile*
|
|
}
|
|
{
|
|
ots mismatched frees, Jan 2017, #2
|
|
Memcheck:Free
|
|
fun:_ZdlPv
|
|
fun:_ZN3ots13ots_cff_parse*
|
|
fun:_ZN12_GLOBAL__N_114ProcessGenericEPN3ots12OpenTypeFile*
|
|
fun:_ZN3ots10OTSContext7ProcessEPNS_9OTSStream*
|
|
}
|
|
{
|
|
ots mismatched frees, Jan 2017, #3
|
|
Memcheck:Free
|
|
fun:_ZdlPv
|
|
fun:_ZN3ots13ots_cff_parse*
|
|
fun:_ZN12_GLOBAL__N_114ProcessGenericEPN3ots12OpenTypeFile*
|
|
fun:_ZN12_GLOBAL__N_110Process*
|
|
}
|
|
{
|
|
ots mismatched frees, Jan 2017, #4
|
|
Memcheck:Free
|
|
fun:_ZdlPv
|
|
fun:_ZN3ots12ots_cff_free*
|
|
fun:_ZN3ots4FontD1Ev*
|
|
fun:_ZN3ots10OTSContext7Process*
|
|
}
|
|
{
|
|
ots mismatched frees, Jan 2017, #5
|
|
Memcheck:Free
|
|
fun:_ZdlPv
|
|
fun:_ZN3ots13ots_loca_free*
|
|
fun:_ZN3ots4FontD1Ev*
|
|
fun:_ZN3ots10OTSContext7Process*
|
|
}
|
|
{
|
|
ots mismatched frees, Jan 2017, #6
|
|
Memcheck:Free
|
|
fun:_ZdlPv
|
|
fun:_ZN3ots14ots_glyf_parse*
|
|
fun:_ZN12_GLOBAL__N_114ProcessGenericEPN3ots12OpenTypeFile*
|
|
fun:_ZN3ots10OTSContext7ProcessEPNS_9OTSStream*
|
|
}
|
|
|
|
{
|
|
map_or<selectors::parser::Combinator,bool,closure> #1 (see bug 1365915)
|
|
Memcheck:Cond
|
|
fun:map_or<selectors::parser::Combinator,bool,closure>
|
|
fun:_ZN9selectors8matching33matches_complex_selector_internal*
|
|
fun:_ZN9selectors8matching24matches_complex_selector*
|
|
fun:matches_selector<style::gecko::wrapper::GeckoElement,closure>
|
|
}
|
|
|
|
{
|
|
map_or<selectors::parser::Combinator,bool,closure> #2 (see bug 1365915)
|
|
Memcheck:Cond
|
|
fun:map_or<selectors::parser::Combinator,bool,closure>
|
|
fun:_ZN9selectors8matching33matches_complex_selector_internal*
|
|
fun:_ZN9selectors8matching24matches_complex_selector*
|
|
fun:{{closure}}<closure>
|
|
}
|
|
|
|
# more leaks in libLLVM-3.6-mesa.so, August 2017. See bug 1338651.
|
|
{
|
|
static-object-leaks-in-libLLVM-3.6-mesa.so. See bug 1338651.
|
|
Memcheck:Leak
|
|
match-leak-kinds: definite
|
|
fun:_Znwm
|
|
obj:/*/lib*/libLLVM-3.6-mesa.so
|
|
obj:/*/lib*/libLLVM-3.6-mesa.so
|
|
}
|