[Bug 43380] New: valgrind shows an uninitialized memory in dlls/ntdll/ tests/pipe.c
wine-bugs at winehq.org
wine-bugs at winehq.org
Tue Jul 18 15:58:40 CDT 2017
https://bugs.winehq.org/show_bug.cgi?id=43380
Bug ID: 43380
Summary: valgrind shows an uninitialized memory in
dlls/ntdll/tests/pipe.c
Product: Wine
Version: 2.12
Hardware: x86
OS: Linux
Status: NEW
Keywords: download, source, testcase, valgrind
Severity: normal
Priority: P2
Component: ntdll
Assignee: wine-bugs at winehq.org
Reporter: austinenglish at gmail.com
Distribution: ---
../../../tools/runtest -q -P wine -T ../../.. -M ntdll.dll -p ntdll_test.exe.so
pipe && touch pipe.ok
==30664== Syscall param write(buf) points to uninitialised byte(s)
==30664== at 0x424CE7F: ??? (syscall-template.S:84)
==30664== by 0x7BC4A163: NtWriteFile (file.c:1314)
==30664== by 0x7B441F2B: WriteFile (file.c:570)
==30664== by 0x4A6D51F: read_pipe_test (pipe.c:810)
==30664== by 0x4A7031A: func_pipe (pipe.c:1133)
==30664== by 0x4AA25B4: run_test (test.h:603)
==30664== by 0x4AA2A13: main (test.h:687)
==30664== Address 0x4befc1c is on thread 1's stack
==30664== in frame #3, created by read_pipe_test (pipe.c:787)
==30664== Uninitialised value was created by a stack allocation
==30664== at 0x4A6D285: read_pipe_test (pipe.c:787)
==30664==
==30664== Syscall param write(buf) points to uninitialised byte(s)
==30664== at 0x424CE7F: ??? (syscall-template.S:84)
==30664== by 0x7BC4A163: NtWriteFile (file.c:1314)
==30664== by 0x7B441F2B: WriteFile (file.c:570)
==30664== by 0x4A6DE84: read_pipe_test (pipe.c:876)
==30664== by 0x4A7031A: func_pipe (pipe.c:1133)
==30664== by 0x4AA25B4: run_test (test.h:603)
==30664== by 0x4AA2A13: main (test.h:687)
==30664== Address 0x4befc1d is on thread 1's stack
==30664== in frame #3, created by read_pipe_test (pipe.c:787)
==30664== Uninitialised value was created by a stack allocation
==30664== at 0x4A6D285: read_pipe_test (pipe.c:787)
==30664==
==30664== Syscall param writev(vector[...]) points to uninitialised byte(s)
==30664== at 0x433804F: ??? (syscall-template.S:84)
==30664== by 0x7BC8946B: send_request (server.c:228)
==30664== by 0x7BC89626: wine_server_call (server.c:309)
==30664== by 0x7BC4867A: server_write_file (file.c:624)
==30664== by 0x7BC49E71: NtWriteFile (file.c:1238)
==30664== by 0x7B441F2B: WriteFile (file.c:570)
==30664== by 0x4A6D51F: read_pipe_test (pipe.c:810)
==30664== by 0x4A70352: func_pipe (pipe.c:1135)
==30664== by 0x4AA25B4: run_test (test.h:603)
==30664== by 0x4AA2A13: main (test.h:687)
==30664== Address 0x4befc1c is on thread 1's stack
==30664== in frame #6, created by read_pipe_test (pipe.c:787)
==30664== Uninitialised value was created by a stack allocation
==30664== at 0x4A6D285: read_pipe_test (pipe.c:787)
==30664==
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
More information about the wine-bugs
mailing list