forked from bloomberg/pystack
-
Notifications
You must be signed in to change notification settings - Fork 0
/
valgrind.supp
66 lines (63 loc) · 1.61 KB
/
valgrind.supp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
{
<cython_cached_module_and_code_objects>
Memcheck:Leak
match-leak-kinds: definite
fun:malloc
fun:PyCode_NewWithPosOnlyArgs
fun:PyCode_New
fun:__Pyx_InitCachedConstants
fun:_ZL25__pyx_pymod_exec__pystackP7_object
fun:PyModule_ExecDef
fun:exec_builtin_or_dynamic
fun:_imp_exec_dynamic_impl
fun:_imp_exec_dynamic
fun:cfunction_vectorcall_O
fun:PyVectorcall_Call
fun:do_call_core
fun:_PyEval_EvalFrameDefault
fun:PyEval_EvalFrameEx
fun:_PyEval_EvalCodeWithName
fun:_PyFunction_Vectorcall
fun:_PyObject_Vectorcall
fun:call_function
fun:_PyEval_EvalFrameDefault
}
# CPython does not deallocate multitude of immortal objects
# and this confuses valgrind. For this, we want to suppress
# all traces that are not 'definite lost' that originated from
# raw malloc/calloc/realloc.
{
<cpython_possible_leaks_with_malloc>
Memcheck:Leak
match-leak-kinds: possible
fun:malloc
...
}
{
<cpython_possible_leaks_with_realloc>
Memcheck:Leak
match-leak-kinds: possible
fun:realloc
...
}
{
<cpython_possible_leaks_with_realloc>
Memcheck:Leak
match-leak-kinds: possible
fun:calloc
...
}
# When dynamically loading the Python extension that contains
# libdwfl's symbols, an initializer installed by libdwfl
# tries to dlopen an optional library (libdebuginfod) for
# preparing some internal state and this confuses valgrind (this
# call list is not used by any code in our library).
{
<__libdwfl_debuginfod_init_initializer_in_shared_objects>
Memcheck:Leak
match-leak-kinds: definite
fun:malloc
...
fun:__libdwfl_debuginfod_init
...
}