[Bug 43380] New: valgrind shows an uninitialized memory in dlls/ntdll/ tests/pipe.c

wine-bugs at winehq.org wine-bugs at winehq.org
Tue Jul 18 15:58:40 CDT 2017


https://bugs.winehq.org/show_bug.cgi?id=43380

            Bug ID: 43380
           Summary: valgrind shows an uninitialized memory in
                    dlls/ntdll/tests/pipe.c
           Product: Wine
           Version: 2.12
          Hardware: x86
                OS: Linux
            Status: NEW
          Keywords: download, source, testcase, valgrind
          Severity: normal
          Priority: P2
         Component: ntdll
          Assignee: wine-bugs at winehq.org
          Reporter: austinenglish at gmail.com
      Distribution: ---

../../../tools/runtest -q -P wine -T ../../.. -M ntdll.dll -p ntdll_test.exe.so
pipe && touch pipe.ok
==30664== Syscall param write(buf) points to uninitialised byte(s)
==30664==    at 0x424CE7F: ??? (syscall-template.S:84)
==30664==    by 0x7BC4A163: NtWriteFile (file.c:1314)
==30664==    by 0x7B441F2B: WriteFile (file.c:570)
==30664==    by 0x4A6D51F: read_pipe_test (pipe.c:810)
==30664==    by 0x4A7031A: func_pipe (pipe.c:1133)
==30664==    by 0x4AA25B4: run_test (test.h:603)
==30664==    by 0x4AA2A13: main (test.h:687)
==30664==  Address 0x4befc1c is on thread 1's stack
==30664==  in frame #3, created by read_pipe_test (pipe.c:787)
==30664==  Uninitialised value was created by a stack allocation
==30664==    at 0x4A6D285: read_pipe_test (pipe.c:787)
==30664== 

==30664== Syscall param write(buf) points to uninitialised byte(s)
==30664==    at 0x424CE7F: ??? (syscall-template.S:84)
==30664==    by 0x7BC4A163: NtWriteFile (file.c:1314)
==30664==    by 0x7B441F2B: WriteFile (file.c:570)
==30664==    by 0x4A6DE84: read_pipe_test (pipe.c:876)
==30664==    by 0x4A7031A: func_pipe (pipe.c:1133)
==30664==    by 0x4AA25B4: run_test (test.h:603)
==30664==    by 0x4AA2A13: main (test.h:687)
==30664==  Address 0x4befc1d is on thread 1's stack
==30664==  in frame #3, created by read_pipe_test (pipe.c:787)
==30664==  Uninitialised value was created by a stack allocation
==30664==    at 0x4A6D285: read_pipe_test (pipe.c:787)
==30664== 

==30664== Syscall param writev(vector[...]) points to uninitialised byte(s)
==30664==    at 0x433804F: ??? (syscall-template.S:84)
==30664==    by 0x7BC8946B: send_request (server.c:228)
==30664==    by 0x7BC89626: wine_server_call (server.c:309)
==30664==    by 0x7BC4867A: server_write_file (file.c:624)
==30664==    by 0x7BC49E71: NtWriteFile (file.c:1238)
==30664==    by 0x7B441F2B: WriteFile (file.c:570)
==30664==    by 0x4A6D51F: read_pipe_test (pipe.c:810)
==30664==    by 0x4A70352: func_pipe (pipe.c:1135)
==30664==    by 0x4AA25B4: run_test (test.h:603)
==30664==    by 0x4AA2A13: main (test.h:687)
==30664==  Address 0x4befc1c is on thread 1's stack
==30664==  in frame #6, created by read_pipe_test (pipe.c:787)
==30664==  Uninitialised value was created by a stack allocation
==30664==    at 0x4A6D285: read_pipe_test (pipe.c:787)
==30664==

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list