https://bugs.kde.org/show_bug.cgi?id=381304
Bug ID: 381304
Summary: RFE: --track-origins=yes identifies system call source
of Uninitialized value
Product: valgrind
Version: 3.13 SVN
Platform: Other
OS: Linux
Status: UNCONFIRMED
Severity: wishlist
Priority: NOR
Component: memcheck
Assignee: [email protected]
Reporter: [email protected]
Target Milestone: ---
Request for enhancement (RFE): memcheck --track-origins=yes should report the
system call name (or number) if the "Uninitialised value was created" by a
system call. Currently the message gives the program counter value. In
general for most compiler-written code this is sufficient to identify the
source code.
However, for system calls there is an implementation style which sets up the
arguments separately for each call, then merges all syscalls into one tail.
This style makes it easy to track all system calls because there is only one
location which makes system calls. Unfortunately the program counter printed
by memcheck no longer identifies which syscall:
==25006== Conditional jump or move depends on uninitialised value(s)
==25006== at 0xF17E32: ???
==25006== Uninitialised value was created
==25006== at 0xF169C6: ???
==25006==
and 0xF169C6 is the address of the instruction after the one-and-only syscall
instruction, and is the same for any system call.
--
You are receiving this mail because:
You are watching all bug changes.