https://bugs.kde.org/show_bug.cgi?id=444571
--- Comment #3 from Mark Wielaard <m...@klomp.org> --- There is also the following failure in memcheck/tests/badrw --- badrw.stderr.exp 2021-10-28 17:52:34.577616207 -0400 +++ badrw.stderr.out 2021-10-28 17:57:16.957629621 -0400 @@ -10,24 +10,12 @@ at 0x........: malloc (vg_replace_malloc.c:...) by 0x........: main (badrw.c:5) -Invalid read of size 2 - at 0x........: main (badrw.c:22) - Address 0x........ is 4 bytes before a block of size 10 alloc'd - at 0x........: malloc (vg_replace_malloc.c:...) - by 0x........: main (badrw.c:5) - Invalid write of size 2 at 0x........: main (badrw.c:23) Address 0x........ is 4 bytes before a block of size 10 alloc'd at 0x........: malloc (vg_replace_malloc.c:...) by 0x........: main (badrw.c:5) -Invalid read of size 1 - at 0x........: main (badrw.c:25) - Address 0x........ is 1 bytes before a block of size 10 alloc'd - at 0x........: malloc (vg_replace_malloc.c:...) - by 0x........: main (badrw.c:5) - Invalid write of size 1 at 0x........: main (badrw.c:26) Address 0x........ is 1 bytes before a block of size 10 alloc'd Where the missing invalid read reports correspond with: 22 y2 = *x2; 0x00000000100006c0 <+116>: ld r9,48(r31) 0x00000000100006c4 <+120>: lxsihzx vs0,0,r9 0x00000000100006c8 <+124>: addi r9,r31,68 0x00000000100006cc <+128>: stxsihx vs0,0,r9 and 25 y1 = *x1; 0x00000000100006e0 <+148>: ld r9,56(r31) 0x00000000100006e4 <+152>: lxsibzx vs0,0,r9 0x00000000100006e8 <+156>: addi r9,r31,70 0x00000000100006ec <+160>: stxsibx vs0,0,r9 -- You are receiving this mail because: You are watching all bug changes.