Added some filtering. Removed a few compiler warnings.
memcheck manuel1 has an extra error somewhere within
the printf calltree - sensitive to libc changes.
I still get
== 853 tests, 2 stderr failures, 0 stdout failures, 0 stderrB failures, 0 stdoutB failures, 0 post failures ==
memcheck/tests/descr_belowsp (stderr)
memcheck/tests/varinfo5 (stderr)
descr_belowsp no longer mentions the guard page. Back in commit
121374b287ce39ef0e42e45dfc27ae0949e6f528
I said about FreeBSD 14 adding ASLR
" Some more work will be needed for the stack size."
Looks like that has now come home to roost.
varinfo5 has lost some inline info but gained info on variable names.
AM_CXXFLAGS += $(AM_FLAG_M3264_PRI)
LDADD = -lpthread
+
+sleepers_CFLAGS = ${AM_CFLAGS} @FLAG_W_NO_UNUSED_BUT_SET_VARIABLE@
$SED -e '/rtld.c: Inappropriate ioctl for device\./d' |
# similar for Debian 11.0 arm64
$SED -e '/_exit.c: Inappropriate ioctl for device\./d' |
+# On FreeBSD, the opional core source package gets
+# installed after binaries so gdb complains that rtld_start.S
+# is more recent than ld-elf.so.1
+$SED -e "/^warning: Source file is more recent than executable./d" |
# filter python loading denied error message (see also filter_gdb.in)
$SED -e '/warning: File .*valgrind-monitor.py.*declined.*/d' |
check_PROGRAMS += close_range
endif
-scalar_CFLAGS = ${AM_CFLAGS} -g
-
aligned_alloc_CFLAGS = ${AM_CFLAGS} @FLAG_W_NO_NON_POWER_OF_TWO_ALIGNMENT@
+close_range_CFLAGS = ${AM_CFLAGS} @FLAG_W_NO_UNUSED_BUT_SET_VARIABLE@
+
delete_sized_mismatch_CXXFLAGS = ${AM_CXXFLAGS} --std=c++14
delete_sized_mismatch_SOURCES = delete_sized_mismatch.cpp
memalign_CFLAGS = ${AM_CFLAGS} @FLAG_W_NO_NON_POWER_OF_TWO_ALIGNMENT@
openpty_LDFLAGS = ${AM_LDFLAGS} -lutil
+
+scalar_CFLAGS = ${AM_CFLAGS} -g
char buf2[LEN];
char buf3[LEN];
struct iovec vec_array[] = {{buf1, LEN}, {buf2, LEN}, {buf3, LEN}};
- struct iovec bad_array[] = {{NULL, LEN}, {buf2, LEN}, {buf3, LEN}};
+ //struct iovec bad_array[] = {{NULL, LEN}, {buf2, LEN}, {buf3, LEN}};
struct aiocb a;
...
by 0x........: main (manuel1.c:7)
+[[[
+Conditional jump or move depends on uninitialised value(s)
+ ...
+ by 0x........: main (manuel1.c:7)
+
[[[
Syscall param write(buf) points to uninitialised byte(s)
...
int main(int argc, char *argv[]) {
Test *toto;
int i;
- int j = 0;
+ volatile int j = 0;
toto = new Test[2];