Re: Multiple false-positive warnings from Valgrind - Mailing list pgsql-hackers

From Aleksander Alekseev
Subject Re: Multiple false-positive warnings from Valgrind
Date
Msg-id 20170331134006.GA6150@e733.localdomain
Whole thread Raw
In response to [HACKERS] Multiple false-positive warnings from Valgrind  (Aleksander Alekseev <a.alekseev@postgrespro.ru>)
Responses Re: Multiple false-positive warnings from Valgrind
List pgsql-hackers
Hi Kyotaro,

> > And it seems to me that this is caused by the routines of OpenSSL.
> > When building without --with-openssl, using the fallback
> > implementations of SHA256 and RAND_bytes I see no warnings generated
> > by scram_build_verifier... I think it makes most sense to discard that
> > from the list of open items.
>
> FWIW a document of the function says that,
>
> https://www.openssl.org/docs/man1.0.1/crypto/RAND_bytes.html
>
> > The contents of buf is mixed into the entropy pool before
> > retrieving the new pseudo-random bytes unless disabled at compile
> > time (see FAQ).
>
> This isn't saying that RAND_bytes does the same thing but
> something similar can be happening there.

OK, turned out that warnings regarding uninitialized values disappear
after removing --with-openssl. That's a good thing.

What about all these memory leak reports [1]? If I see them should I just
ignore them or, if reports look false positive, suggest a patch that
modifies a Valgrind suppression file? In other words what is current
consensus in community regarding Valgrind and it's reports?

[1] http://afiskon.ru/s/47/871f1e21ef_valgrind.txt.gz

--
Best regards,
Aleksander Alekseev

pgsql-hackers by date:

Previous
From: Robert Haas
Date:
Subject: Re: strange parallel query behavior after OOM crashes
Next
From: Robert Haas
Date:
Subject: Re: logical replication launcher crash on buildfarm