On 05/02/14 22:21, Jeffrey Walton wrote:
> ==6516== Use of uninitialised value of size 8
> ==6516== at 0x533B449: _x86_64_AES_encrypt_compact (in
> /usr/local/ssl/lib/libcrypto.so.1.0.0)
> ==6516== by 0x533B6DA: fips_aes_encrypt (in
> /usr/local/ssl/lib/libcrypto.so.1.0.0)
> ==6516== by 0x56FBC47: ??? (in /usr/local/ssl/lib/libcrypto.so.1.0.0)
> ==6516== by 0x56FBD27: ??? (in /usr/local/ssl/lib/libcrypto.so.1.0.0)
> ==6516== by 0x56FBE47: ??? (in /usr/local/ssl/lib/libcrypto.so.1.0.0)
> ==6516== by 0xFFEFFFE17: ???
So this is the stack you are matching against.
> {
> RAND_init_fips_1
> Memcheck:Cond
> ...
> fun:RAND_init_fips
> ...
> }
and this is one of the match rules, which uses a function that is not in
the stack being matched.
> Any ideas what I'm doing wrong?
Yes, you're trying to match against the location where the memory is
allocated, but suppression rules (except for leak suppressions) match
against the stack at the point the error is detected.
Tom
--
Tom Hughes ([email protected])
http://compton.nu/
------------------------------------------------------------------------------
Managing the Performance of Cloud-Based Applications
Take advantage of what the Cloud has to offer - Avoid Common Pitfalls.
Read the Whitepaper.
http://pubads.g.doubleclick.net/gampad/clk?id=121051231&iu=/4140/ostg.clktrk
_______________________________________________
Valgrind-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/valgrind-users