Syscall param sendmsg(mmsg[0].msg_hdr) points to uninitialised byte(s)

RESOLVED WONTFIX

Status

()

Core
Networking
RESOLVED WONTFIX
5 years ago
2 years ago

People

(Reporter: dougt, Assigned: sworkman)

Tracking

Firefox Tracking Flags

(Not tracked)

Details

(Reporter)

Description

5 years ago
==38108== Thread 28:
==38108== Syscall param sendmsg(mmsg[0].msg_hdr) points to uninitialised byte(s)
==38108==    at 0x5958CCB: sendmmsg (sendmmsg.c:36)
==38108==    by 0xFF5D8FD: __libc_res_nsend (res_send.c:1140)
==38108==    by 0xFF5AD48: __libc_res_nquery (res_query.c:226)
==38108==    by 0xFF5B6F8: __libc_res_nsearch (res_query.c:582)
==38108==    by 0x3982FB57: _nss_dns_gethostbyname4_r (dns-host.c:314)
==38108==    by 0x5928F97: gaih_inet (getaddrinfo.c:849)
==38108==    by 0x592CDB3: getaddrinfo (getaddrinfo.c:2465)
==38108==    by 0x646737E: PR_GetAddrInfoByName (prnetdb.c:2047)
==38108==    by 0x73705EC: nsHostResolver::ThreadFunc(void*) (nsHostResolver.cpp:1081)
==38108==    by 0x6478C56: _pt_root (ptthread.c:204)
==38108==    by 0x5647F8D: start_thread (pthread_create.c:311)
==38108==    by 0x5956E1C: clone (clone.S:113)
==38108==  Address 0x344fdf80 is on thread 28's stack
==38108==
==38108== Syscall param sendmsg(mmsg[0].msg_hdr) points to uninitialised byte(s)
==38108==    at 0x5958CCB: sendmmsg (sendmmsg.c:36)
==38108==    by 0xFF5D8FD: __libc_res_nsend (res_send.c:1140)
==38108==    by 0xFF5AD48: __libc_res_nquery (res_query.c:226)
==38108==    by 0xFF5B6F8: __libc_res_nsearch (res_query.c:582)
==38108==    by 0x3982FB57: _nss_dns_gethostbyname4_r (dns-host.c:314)
==38108==    by 0x5928F97: gaih_inet (getaddrinfo.c:849)
==38108==    by 0x592CDB3: getaddrinfo (getaddrinfo.c:2465)
==38108==    by 0x646737E: PR_GetAddrInfoByName (prnetdb.c:2047)
==38108==    by 0x73705EC: nsHostResolver::ThreadFunc(void*) (nsHostResolver.cpp:1081)
==38108==    by 0x6478C56: _pt_root (ptthread.c:204)
==38108==    by 0x5647F8D: start_thread (pthread_create.c:311)
==38108==    by 0x5956E1C: clone (clone.S:113)
==38108==  Address 0x344fdf80 is on thread 28's stack

B2G Linux Desktop
b2g specific libc
Status: NEW → RESOLVED
Last Resolved: 2 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.