==6742== Memcheck, a memory error detector ==6742== Copyright (C) 2002-2011, and GNU GPL'd, by Julian Seward et al. ==6742== Using Valgrind-3.7.0 and LibVEX; rerun with -h for copyright info ==6742== Command: X :0 ==6742== Parent PID: 6651 ==6742== ==6742== Syscall param ioctl(generic) points to uninitialised byte(s) ==6742== at 0x68E77F7: ioctl (syscall-template.S:82) ==6742== by 0x7A7AAF7: drmIoctl (in /usr/lib64/libdrm.so.2.4.0) ==6742== by 0xA999A9A: intel_pci_probe (intel_module.c:418) ==6742== by 0x48C5A8: xf86PciProbeDev (xf86pciBus.c:576) ==6742== by 0x46A9AB: xf86CallDriverProbe (xf86Bus.c:88) ==6742== by 0x46B23F: xf86BusConfig (xf86Bus.c:133) ==6742== by 0x47736F: InitOutput (xf86Init.c:552) ==6742== by 0x4277C5: main (main.c:203) ==6742== Address 0x7ff000024 is on thread 1's stack ==6742== ==6742== Warning: noted but unhandled ioctl 0x6458 with no size/direction hints ==6742== This could cause spurious value errors to appear. ==6742== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper. ==6742== Syscall param ioctl(generic) points to uninitialised byte(s) ==6742== at 0x68E77F7: ioctl (syscall-template.S:82) ==6742== by 0x7A7AAF7: drmIoctl (in /usr/lib64/libdrm.so.2.4.0) ==6742== by 0xA9DAD5F: sna_mode_pre_init (sna_display.c:1488) ==6742== by 0xA9DD590: sna_pre_init (sna_driver.c:525) ==6742== by 0x477489: InitOutput (xf86Init.c:586) ==6742== by 0x4277C5: main (main.c:203) ==6742== Address 0x7feffffe0 is on thread 1's stack ==6742== ==6742== Syscall param ioctl(generic) points to uninitialised byte(s) ==6742== at 0x68E77F7: ioctl (syscall-template.S:82) ==6742== by 0x7A7AAF7: drmIoctl (in /usr/lib64/libdrm.so.2.4.0) ==6742== by 0x7A7EA00: drmModeGetProperty (in /usr/lib64/libdrm.so.2.4.0) ==6742== by 0xA9D8332: sna_output_create_resources (sna_display.c:1945) ==6742== by 0x4B0D14: xf86RandR12Init (xf86RandR12.c:1552) ==6742== by 0x4A4D01: xf86CrtcScreenInit (xf86Crtc.c:760) ==6742== by 0xA9DCB22: sna_screen_init (sna_driver.c:926) ==6742== by 0x438C28: AddScreen (dispatch.c:3797) ==6742== by 0x476E5D: InitOutput (xf86Init.c:834) ==6742== by 0x4277C5: main (main.c:203) ==6742== Address 0x7feffff28 is on thread 1's stack ==6742== ==6742== Syscall param ioctl(generic) points to uninitialised byte(s) ==6742== at 0x68E77F7: ioctl (syscall-template.S:82) ==6742== by 0x7A7AAF7: drmIoctl (in /usr/lib64/libdrm.so.2.4.0) ==6742== by 0x7A7CF5B: drmCommandWriteRead (in /usr/lib64/libdrm.so.2.4.0) ==6742== by 0xB0BAC43: ??? (in /usr/lib64/dri/i965_dri.so) ==6742== by 0xB0BACF7: ??? (in /usr/lib64/dri/i965_dri.so) ==6742== by 0xB0FD3BA: ??? (in /usr/lib64/dri/i965_dri.so) ==6742== by 0xA352A62: __glXDRIscreenProbe (glxdri2.c:872) ==6742== by 0xA3492C9: GlxExtensionInit (glxext.c:347) ==6742== by 0x4A3408: InitExtensions (miinitext.c:578) ==6742== by 0x4277E1: main (main.c:207) ==6742== Address 0x7fefffff4 is on thread 1's stack ==6742== ==6742== Warning: noted but unhandled ioctl 0x641e with no size/direction hints ==6742== This could cause spurious value errors to appear. ==6742== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper. ==6742== Syscall param ioctl(generic) points to unaddressable byte(s) ==6742== at 0x68E77F7: ioctl (syscall-template.S:82) ==6742== by 0xD25EBE2: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0xD25F6F3: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0xD25A7BF: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0x4819D0: xf86NewInputDevice (xf86Xinput.c:846) ==6742== by 0x4936B5: device_added (udev.c:211) ==6742== by 0x493C6A: config_udev_init (udev.c:334) ==6742== by 0x492F28: config_init (config.c:39) ==6742== by 0x47584D: InitInput (xf86Init.c:916) ==6742== by 0x427920: main (main.c:258) ==6742== Address 0x1 is not stack'd, malloc'd or (recently) free'd ==6742== ==6742== Syscall param ioctl(generic) points to unaddressable byte(s) ==6742== at 0x68E77F7: ioctl (syscall-template.S:82) ==6742== by 0xD25EC4F: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0xD25F6F3: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0xD25A7BF: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0x4819D0: xf86NewInputDevice (xf86Xinput.c:846) ==6742== by 0x4936B5: device_added (udev.c:211) ==6742== by 0x493C6A: config_udev_init (udev.c:334) ==6742== by 0x492F28: config_init (config.c:39) ==6742== by 0x47584D: InitInput (xf86Init.c:916) ==6742== by 0x427920: main (main.c:258) ==6742== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==6742== ==6742== Conditional jump or move depends on uninitialised value(s) ==6742== at 0xD26043C: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0xD25A9FC: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0x4819D0: xf86NewInputDevice (xf86Xinput.c:846) ==6742== by 0x4936B5: device_added (udev.c:211) ==6742== by 0x493C6A: config_udev_init (udev.c:334) ==6742== by 0x492F28: config_init (config.c:39) ==6742== by 0x47584D: InitInput (xf86Init.c:916) ==6742== by 0x427920: main (main.c:258) ==6742== ==6742== Conditional jump or move depends on uninitialised value(s) ==6742== at 0xD260440: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0xD25A9FC: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0x4819D0: xf86NewInputDevice (xf86Xinput.c:846) ==6742== by 0x4936B5: device_added (udev.c:211) ==6742== by 0x493C6A: config_udev_init (udev.c:334) ==6742== by 0x492F28: config_init (config.c:39) ==6742== by 0x47584D: InitInput (xf86Init.c:916) ==6742== by 0x427920: main (main.c:258) ==6742== ==6742== Syscall param ioctl(generic) points to unaddressable byte(s) ==6742== at 0x68E77F7: ioctl (syscall-template.S:82) ==6742== by 0xD25F8A4: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0xD256CF3: ??? (in /usr/lib64/xorg/modules/input/synaptics_drv.so) ==6742== by 0x4309E9: EnableDevice (devices.c:385) ==6742== by 0x481DE0: xf86NewInputDevice (xf86Xinput.c:875) ==6742== by 0x4936B5: device_added (udev.c:211) ==6742== by 0x493C6A: config_udev_init (udev.c:334) ==6742== by 0x492F28: config_init (config.c:39) ==6742== by 0x47584D: InitInput (xf86Init.c:916) ==6742== by 0x427920: main (main.c:258) ==6742== Address 0x1 is not stack'd, malloc'd or (recently) free'd ==6742== ==6742== Warning: noted but unhandled ioctl 0x6458 with no size/direction hints ==6742== This could cause spurious value errors to appear. ==6742== See README_MISSING_SYSCALL_OR_IOCTL for guidance on writing a proper wrapper. ==6742== Syscall param writev(vector[...]) points to uninitialised byte(s) ==6742== at 0x68E78D7: writev (writev.c:51) ==6742== by 0x56BDB5: _XSERVTransSocketWritev (Xtranssock.c:2160) ==6742== by 0x56755C: FlushClient (io.c:890) ==6742== by 0x567D6E: FlushAllOutput (io.c:640) ==6742== by 0x438750: Dispatch (dispatch.c:450) ==6742== by 0x427964: main (main.c:288) ==6742== Address 0xccd6b31 is 1 bytes inside a block of size 4,096 alloc'd ==6742== at 0x4C292B8: calloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x567BA8: WriteToClient (io.c:1015) ==6742== by 0x4384CA: ProcEstablishConnection (dispatch.c:3580) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Syscall param writev(vector[...]) points to uninitialised byte(s) ==6742== at 0x68E78D7: writev (writev.c:51) ==6742== by 0x56BDB5: _XSERVTransSocketWritev (Xtranssock.c:2160) ==6742== by 0x56755C: FlushClient (io.c:890) ==6742== by 0x567A53: WriteToClient (io.c:812) ==6742== by 0xA345ED3: __glXDisp_GetVisualConfigs (glxcmds.c:999) ==6742== by 0xA349702: __glXDispatch (glxext.c:573) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== Address 0xccd6b31 is 1 bytes inside a block of size 4,096 alloc'd ==6742== at 0x4C292B8: calloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x567BA8: WriteToClient (io.c:1015) ==6742== by 0x4384CA: ProcEstablishConnection (dispatch.c:3580) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Invalid read of size 1 ==6742== at 0x4C2B502: __GI_strlen (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x688C135: strdup (strdup.c:42) ==6742== by 0x56A23D: XNFstrdup (utils.c:1087) ==6742== by 0x4ACEA8: xf86DuplicateMode (xf86Modes.c:209) ==6742== by 0x4A687E: xf86CrtcSetModeTransform (xf86Crtc.c:267) ==6742== by 0x4A7193: xf86SetDesiredModes (xf86Crtc.c:2633) ==6742== by 0xA9DC6E4: sna_enter_vt (sna_driver.c:1004) ==6742== by 0x4B042A: xf86RandR12EnterVT (xf86RandR12.c:1737) ==6742== by 0x487AE0: xf86XVEnterVT (xf86xv.c:1311) ==6742== by 0xA352E8B: glxDRIEnterVT (glxdri2.c:746) ==6742== by 0x473D6F: xf86Wakeup (xf86Events.c:549) ==6742== by 0x43C7EA: WakeupHandler (dixutils.c:421) ==6742== Address 0x7593060 is 0 bytes inside a block of size 9 free'd ==6742== at 0x4C29D4E: free (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x485284: xf86DeleteMode (xf86Mode.c:2004) ==6742== by 0x4A58D7: xf86ProbeOutputModes (xf86Crtc.c:1529) ==6742== by 0x4AF13B: xf86RandR12GetInfo12 (xf86RandR12.c:1517) ==6742== by 0x4DCC31: RRGetInfo (rrinfo.c:195) ==6742== by 0x4E1C43: ProcRRGetScreenInfo (rrscreen.c:578) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Invalid read of size 1 ==6742== at 0x4C2B514: __GI_strlen (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x688C135: strdup (strdup.c:42) ==6742== by 0x56A23D: XNFstrdup (utils.c:1087) ==6742== by 0x4ACEA8: xf86DuplicateMode (xf86Modes.c:209) ==6742== by 0x4A687E: xf86CrtcSetModeTransform (xf86Crtc.c:267) ==6742== by 0x4A7193: xf86SetDesiredModes (xf86Crtc.c:2633) ==6742== by 0xA9DC6E4: sna_enter_vt (sna_driver.c:1004) ==6742== by 0x4B042A: xf86RandR12EnterVT (xf86RandR12.c:1737) ==6742== by 0x487AE0: xf86XVEnterVT (xf86xv.c:1311) ==6742== by 0xA352E8B: glxDRIEnterVT (glxdri2.c:746) ==6742== by 0x473D6F: xf86Wakeup (xf86Events.c:549) ==6742== by 0x43C7EA: WakeupHandler (dixutils.c:421) ==6742== Address 0x7593061 is 1 bytes inside a block of size 9 free'd ==6742== at 0x4C29D4E: free (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x485284: xf86DeleteMode (xf86Mode.c:2004) ==6742== by 0x4A58D7: xf86ProbeOutputModes (xf86Crtc.c:1529) ==6742== by 0x4AF13B: xf86RandR12GetInfo12 (xf86RandR12.c:1517) ==6742== by 0x4DCC31: RRGetInfo (rrinfo.c:195) ==6742== by 0x4E1C43: ProcRRGetScreenInfo (rrscreen.c:578) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Invalid read of size 1 ==6742== at 0x6894C0E: __GI_memcpy (memcpy.S:72) ==6742== by 0x56A23D: XNFstrdup (utils.c:1087) ==6742== by 0x4ACEA8: xf86DuplicateMode (xf86Modes.c:209) ==6742== by 0x4A687E: xf86CrtcSetModeTransform (xf86Crtc.c:267) ==6742== by 0x4A7193: xf86SetDesiredModes (xf86Crtc.c:2633) ==6742== by 0xA9DC6E4: sna_enter_vt (sna_driver.c:1004) ==6742== by 0x4B042A: xf86RandR12EnterVT (xf86RandR12.c:1737) ==6742== by 0x487AE0: xf86XVEnterVT (xf86xv.c:1311) ==6742== by 0xA352E8B: glxDRIEnterVT (glxdri2.c:746) ==6742== by 0x473D6F: xf86Wakeup (xf86Events.c:549) ==6742== by 0x43C7EA: WakeupHandler (dixutils.c:421) ==6742== by 0x561A83: WaitForSomething (WaitFor.c:224) ==6742== Address 0x7593060 is 0 bytes inside a block of size 9 free'd ==6742== at 0x4C29D4E: free (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x485284: xf86DeleteMode (xf86Mode.c:2004) ==6742== by 0x4A58D7: xf86ProbeOutputModes (xf86Crtc.c:1529) ==6742== by 0x4AF13B: xf86RandR12GetInfo12 (xf86RandR12.c:1517) ==6742== by 0x4DCC31: RRGetInfo (rrinfo.c:195) ==6742== by 0x4E1C43: ProcRRGetScreenInfo (rrscreen.c:578) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Invalid read of size 8 ==6742== at 0x6894C46: __GI_memcpy (memcpy.S:108) ==6742== by 0x56A23D: XNFstrdup (utils.c:1087) ==6742== by 0x4ACEA8: xf86DuplicateMode (xf86Modes.c:209) ==6742== by 0x4A687E: xf86CrtcSetModeTransform (xf86Crtc.c:267) ==6742== by 0x4A7193: xf86SetDesiredModes (xf86Crtc.c:2633) ==6742== by 0xA9DC6E4: sna_enter_vt (sna_driver.c:1004) ==6742== by 0x4B042A: xf86RandR12EnterVT (xf86RandR12.c:1737) ==6742== by 0x487AE0: xf86XVEnterVT (xf86xv.c:1311) ==6742== by 0xA352E8B: glxDRIEnterVT (glxdri2.c:746) ==6742== by 0x473D6F: xf86Wakeup (xf86Events.c:549) ==6742== by 0x43C7EA: WakeupHandler (dixutils.c:421) ==6742== by 0x561A83: WaitForSomething (WaitFor.c:224) ==6742== Address 0x7593061 is 1 bytes inside a block of size 9 free'd ==6742== at 0x4C29D4E: free (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x485284: xf86DeleteMode (xf86Mode.c:2004) ==6742== by 0x4A58D7: xf86ProbeOutputModes (xf86Crtc.c:1529) ==6742== by 0x4AF13B: xf86RandR12GetInfo12 (xf86RandR12.c:1517) ==6742== by 0x4DCC31: RRGetInfo (rrinfo.c:195) ==6742== by 0x4E1C43: ProcRRGetScreenInfo (rrscreen.c:578) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Invalid read of size 1 ==6742== at 0x4C2B6D1: strncpy (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0xA9D8D31: sna_crtc_set_mode_major (sna_display.c:588) ==6742== by 0x4A695C: xf86CrtcSetModeTransform (xf86Crtc.c:294) ==6742== by 0x4A7193: xf86SetDesiredModes (xf86Crtc.c:2633) ==6742== by 0xA9DC6E4: sna_enter_vt (sna_driver.c:1004) ==6742== by 0x4B042A: xf86RandR12EnterVT (xf86RandR12.c:1737) ==6742== by 0x487AE0: xf86XVEnterVT (xf86xv.c:1311) ==6742== by 0xA352E8B: glxDRIEnterVT (glxdri2.c:746) ==6742== by 0x473D6F: xf86Wakeup (xf86Events.c:549) ==6742== by 0x43C7EA: WakeupHandler (dixutils.c:421) ==6742== by 0x561A83: WaitForSomething (WaitFor.c:224) ==6742== by 0x4385E0: Dispatch (dispatch.c:357) ==6742== Address 0x7593060 is 0 bytes inside a block of size 9 free'd ==6742== at 0x4C29D4E: free (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x485284: xf86DeleteMode (xf86Mode.c:2004) ==6742== by 0x4A58D7: xf86ProbeOutputModes (xf86Crtc.c:1529) ==6742== by 0x4AF13B: xf86RandR12GetInfo12 (xf86RandR12.c:1517) ==6742== by 0x4DCC31: RRGetInfo (rrinfo.c:195) ==6742== by 0x4E1C43: ProcRRGetScreenInfo (rrscreen.c:578) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Invalid read of size 1 ==6742== at 0x4C2B6F0: strncpy (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0xA9D8D31: sna_crtc_set_mode_major (sna_display.c:588) ==6742== by 0x4A695C: xf86CrtcSetModeTransform (xf86Crtc.c:294) ==6742== by 0x4A7193: xf86SetDesiredModes (xf86Crtc.c:2633) ==6742== by 0xA9DC6E4: sna_enter_vt (sna_driver.c:1004) ==6742== by 0x4B042A: xf86RandR12EnterVT (xf86RandR12.c:1737) ==6742== by 0x487AE0: xf86XVEnterVT (xf86xv.c:1311) ==6742== by 0xA352E8B: glxDRIEnterVT (glxdri2.c:746) ==6742== by 0x473D6F: xf86Wakeup (xf86Events.c:549) ==6742== by 0x43C7EA: WakeupHandler (dixutils.c:421) ==6742== by 0x561A83: WaitForSomething (WaitFor.c:224) ==6742== by 0x4385E0: Dispatch (dispatch.c:357) ==6742== Address 0x7593061 is 1 bytes inside a block of size 9 free'd ==6742== at 0x4C29D4E: free (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x485284: xf86DeleteMode (xf86Mode.c:2004) ==6742== by 0x4A58D7: xf86ProbeOutputModes (xf86Crtc.c:1529) ==6742== by 0x4AF13B: xf86RandR12GetInfo12 (xf86RandR12.c:1517) ==6742== by 0x4DCC31: RRGetInfo (rrinfo.c:195) ==6742== by 0x4E1C43: ProcRRGetScreenInfo (rrscreen.c:578) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Conditional jump or move depends on uninitialised value(s) ==6742== at 0xAA5BD83: sfbBltOne (fbbltone.c:266) ==6742== by 0xAA5CCE4: sfbCopy1toN (fbcopy.c:95) ==6742== by 0x543B14: miCopyRegion (micopy.c:121) ==6742== by 0x5440B5: miDoCopy (micopy.c:297) ==6742== by 0xA9C2978: sna_copy_plane (sna_accel.c:6555) ==6742== by 0x4F95EB: damageCopyPlane (damage.c:857) ==6742== by 0x434B24: ProcCopyPlane (dispatch.c:1670) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Conditional jump or move depends on uninitialised value(s) ==6742== at 0xAA5BDC4: sfbBltOne (fbbltone.c:266) ==6742== by 0xAA5CCE4: sfbCopy1toN (fbcopy.c:95) ==6742== by 0x543B14: miCopyRegion (micopy.c:121) ==6742== by 0x5440B5: miDoCopy (micopy.c:297) ==6742== by 0xA9C2978: sna_copy_plane (sna_accel.c:6555) ==6742== by 0x4F95EB: damageCopyPlane (damage.c:857) ==6742== by 0x434B24: ProcCopyPlane (dispatch.c:1670) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Invalid read of size 4 ==6742== at 0xA9F82CB: lerp32_unaligned_box_row.isra.31 (sna_trapezoids.c:3052) ==6742== by 0xA9F9C1A: composite_unaligned_boxes (sna_trapezoids.c:3315) ==6742== by 0xA9FBF12: sna_composite_trapezoids (sna_trapezoids.c:5578) ==6742== by 0x4F026A: ProcRenderTrapezoids (render.c:758) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== Address 0xe29a8b0 is 0 bytes after a block of size 448 alloc'd ==6742== at 0x4C2ABED: malloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x45338F: AllocatePixmap (pixmap.c:117) ==6742== by 0xA9A8E9E: create_pixmap (sna_accel.c:710) ==6742== by 0xA9AA2B7: sna_create_pixmap (sna_accel.c:1190) ==6742== by 0x43422E: ProcCreatePixmap (dispatch.c:1388) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Invalid write of size 4 ==6742== at 0xA9F83D1: lerp32_unaligned_box_row.isra.31 (sna_trapezoids.c:3015) ==6742== by 0xA9F9C1A: composite_unaligned_boxes (sna_trapezoids.c:3315) ==6742== by 0xA9FBF12: sna_composite_trapezoids (sna_trapezoids.c:5578) ==6742== by 0x4F026A: ProcRenderTrapezoids (render.c:758) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== Address 0xe29a8b0 is 0 bytes after a block of size 448 alloc'd ==6742== at 0x4C2ABED: malloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x45338F: AllocatePixmap (pixmap.c:117) ==6742== by 0xA9A8E9E: create_pixmap (sna_accel.c:710) ==6742== by 0xA9AA2B7: sna_create_pixmap (sna_accel.c:1190) ==6742== by 0x43422E: ProcCreatePixmap (dispatch.c:1388) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Invalid read of size 4 ==6742== at 0xA9F81FD: lerp32_unaligned_box_row.isra.31 (sna_trapezoids.c:3052) ==6742== by 0xA9F9C1A: composite_unaligned_boxes (sna_trapezoids.c:3315) ==6742== by 0xA9FBF12: sna_composite_trapezoids (sna_trapezoids.c:5578) ==6742== by 0x4F026A: ProcRenderTrapezoids (render.c:758) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== Address 0xe29a8b4 is 4 bytes after a block of size 448 alloc'd ==6742== at 0x4C2ABED: malloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x45338F: AllocatePixmap (pixmap.c:117) ==6742== by 0xA9A8E9E: create_pixmap (sna_accel.c:710) ==6742== by 0xA9AA2B7: sna_create_pixmap (sna_accel.c:1190) ==6742== by 0x43422E: ProcCreatePixmap (dispatch.c:1388) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Invalid write of size 4 ==6742== at 0xA9F80C4: lerp32_unaligned_box_row.isra.31 (sna_trapezoids.c:3015) ==6742== by 0xA9F9C1A: composite_unaligned_boxes (sna_trapezoids.c:3315) ==6742== by 0xA9FBF12: sna_composite_trapezoids (sna_trapezoids.c:5578) ==6742== by 0x4F026A: ProcRenderTrapezoids (render.c:758) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== Address 0xe29a8b4 is 4 bytes after a block of size 448 alloc'd ==6742== at 0x4C2ABED: malloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x45338F: AllocatePixmap (pixmap.c:117) ==6742== by 0xA9A8E9E: create_pixmap (sna_accel.c:710) ==6742== by 0xA9AA2B7: sna_create_pixmap (sna_accel.c:1190) ==6742== by 0x43422E: ProcCreatePixmap (dispatch.c:1388) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== Invalid read of size 4 ==6742== at 0x42D18D: FreeCursor (cursor.c:117) ==6742== by 0x44FFDB: FreeGrab (grabs.c:253) ==6742== by 0x42DEBD: CloseDevice (devices.c:932) ==6742== by 0x42E4F2: CloseDownDevices (devices.c:996) ==6742== by 0x4279CB: main (main.c:321) ==6742== Address 0xe701034 is 20 bytes inside a block of size 112 free'd ==6742== at 0x4C29D4E: free (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so) ==6742== by 0x42D1EE: FreeCursor (cursor.c:126) ==6742== by 0x459891: doFreeResource (resource.c:549) ==6742== by 0x459FF2: FreeResource (resource.c:579) ==6742== by 0x4374AD: ProcFreeCursor (dispatch.c:2958) ==6742== by 0x438890: Dispatch (dispatch.c:428) ==6742== by 0x427964: main (main.c:288) ==6742== ==6742== ==6742== HEAP SUMMARY: ==6742== in use at exit: 2,237,987 bytes in 4,613 blocks ==6742== total heap usage: 239,946 allocs, 235,333 frees, 54,705,766 bytes allocated ==6742== ==6742== LEAK SUMMARY: ==6742== definitely lost: 18,263 bytes in 83 blocks ==6742== indirectly lost: 1,088,142 bytes in 127 blocks ==6742== possibly lost: 18,944 bytes in 134 blocks ==6742== still reachable: 1,112,638 bytes in 4,269 blocks ==6742== suppressed: 0 bytes in 0 blocks ==6742== Rerun with --leak-check=full to see details of leaked memory ==6742== ==6742== For counts of detected and suppressed errors, rerun with: -v ==6742== Use --track-origins=yes to see where uninitialised values come from ==6742== ERROR SUMMARY: 2093 errors from 24 contexts (suppressed: 2 from 2)