https://bugs.kde.org/show_bug.cgi?id=444571

--- Comment #3 from Mark Wielaard <m...@klomp.org> ---
There is also the following failure in memcheck/tests/badrw

--- badrw.stderr.exp    2021-10-28 17:52:34.577616207 -0400
+++ badrw.stderr.out    2021-10-28 17:57:16.957629621 -0400
@@ -10,24 +10,12 @@
    at 0x........: malloc (vg_replace_malloc.c:...)
    by 0x........: main (badrw.c:5)

-Invalid read of size 2
-   at 0x........: main (badrw.c:22)
- Address 0x........ is 4 bytes before a block of size 10 alloc'd
-   at 0x........: malloc (vg_replace_malloc.c:...)
-   by 0x........: main (badrw.c:5)
-
 Invalid write of size 2
    at 0x........: main (badrw.c:23)
  Address 0x........ is 4 bytes before a block of size 10 alloc'd
    at 0x........: malloc (vg_replace_malloc.c:...)
    by 0x........: main (badrw.c:5)

-Invalid read of size 1
-   at 0x........: main (badrw.c:25)
- Address 0x........ is 1 bytes before a block of size 10 alloc'd
-   at 0x........: malloc (vg_replace_malloc.c:...)
-   by 0x........: main (badrw.c:5)
-
 Invalid write of size 1
    at 0x........: main (badrw.c:26)
  Address 0x........ is 1 bytes before a block of size 10 alloc'd

Where the missing invalid read reports correspond with:

22         y2 = *x2;
   0x00000000100006c0 <+116>:   ld      r9,48(r31)
   0x00000000100006c4 <+120>:   lxsihzx vs0,0,r9
   0x00000000100006c8 <+124>:   addi    r9,r31,68
   0x00000000100006cc <+128>:   stxsihx vs0,0,r9

and

25         y1 = *x1;
   0x00000000100006e0 <+148>:   ld      r9,56(r31)
   0x00000000100006e4 <+152>:   lxsibzx vs0,0,r9
   0x00000000100006e8 <+156>:   addi    r9,r31,70
   0x00000000100006ec <+160>:   stxsibx vs0,0,r9

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to