On 05/02/14 22:21, Jeffrey Walton wrote: > ==6516== Use of uninitialised value of size 8 > ==6516== at 0x533B449: _x86_64_AES_encrypt_compact (in > /usr/local/ssl/lib/libcrypto.so.1.0.0) > ==6516== by 0x533B6DA: fips_aes_encrypt (in > /usr/local/ssl/lib/libcrypto.so.1.0.0) > ==6516== by 0x56FBC47: ??? (in /usr/local/ssl/lib/libcrypto.so.1.0.0) > ==6516== by 0x56FBD27: ??? (in /usr/local/ssl/lib/libcrypto.so.1.0.0) > ==6516== by 0x56FBE47: ??? (in /usr/local/ssl/lib/libcrypto.so.1.0.0) > ==6516== by 0xFFEFFFE17: ???
So this is the stack you are matching against. > { > RAND_init_fips_1 > Memcheck:Cond > ... > fun:RAND_init_fips > ... > } and this is one of the match rules, which uses a function that is not in the stack being matched. > Any ideas what I'm doing wrong? Yes, you're trying to match against the location where the memory is allocated, but suppression rules (except for leak suppressions) match against the stack at the point the error is detected. Tom -- Tom Hughes (t...@compton.nu) http://compton.nu/ ------------------------------------------------------------------------------ Managing the Performance of Cloud-Based Applications Take advantage of what the Cloud has to offer - Avoid Common Pitfalls. Read the Whitepaper. http://pubads.g.doubleclick.net/gampad/clk?id=121051231&iu=/4140/ostg.clktrk _______________________________________________ Valgrind-users mailing list Valgrind-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/valgrind-users