On 05/02/14 22:21, Jeffrey Walton wrote:

> ==6516== Use of uninitialised value of size 8
> ==6516==    at 0x533B449: _x86_64_AES_encrypt_compact (in
> /usr/local/ssl/lib/libcrypto.so.1.0.0)
> ==6516==    by 0x533B6DA: fips_aes_encrypt (in
> /usr/local/ssl/lib/libcrypto.so.1.0.0)
> ==6516==    by 0x56FBC47: ??? (in /usr/local/ssl/lib/libcrypto.so.1.0.0)
> ==6516==    by 0x56FBD27: ??? (in /usr/local/ssl/lib/libcrypto.so.1.0.0)
> ==6516==    by 0x56FBE47: ??? (in /usr/local/ssl/lib/libcrypto.so.1.0.0)
> ==6516==    by 0xFFEFFFE17: ???

So this is the stack you are matching against.

> {
>     RAND_init_fips_1
>     Memcheck:Cond
>     ...
>     fun:RAND_init_fips
>     ...
> }

and this is one of the match rules, which uses a function that is not in 
the stack being matched.

> Any ideas what I'm doing wrong?

Yes, you're trying to match against the location where the memory is 
allocated, but suppression rules (except for leak suppressions) match 
against the stack at the point the error is detected.

Tom

-- 
Tom Hughes (t...@compton.nu)
http://compton.nu/

------------------------------------------------------------------------------
Managing the Performance of Cloud-Based Applications
Take advantage of what the Cloud has to offer - Avoid Common Pitfalls.
Read the Whitepaper.
http://pubads.g.doubleclick.net/gampad/clk?id=121051231&iu=/4140/ostg.clktrk
_______________________________________________
Valgrind-users mailing list
Valgrind-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/valgrind-users

Reply via email to