https://bugs.kde.org/show_bug.cgi?id=453084

--- Comment #6 from Tom Hughes <t...@compton.nu> ---
I think this (from --trace-redir=yes) explains is:

--3163534-- REDIR: 0x4a5f6c0 (libc.so.6:__memmove_chk) redirected to 0x48391ea
(_vgnU_ifunc_wrapper)
--3163534-- Adding redirect for indirect function 0x4a5f6c0 from 0x493ff50 ->
0x484eba0
--3163534-- REDIR: 0x493ff50 (libc.so.6:__memcpy_chk_sse2_unaligned) redirected
to 0x484f220 (__memcpy_chk)

So __memmove_chk is actually an IFUNC that, on first call, resolves to the
optimal implementation for the current preprocessor.

In this case it chose __memcpy_chk_sse2_unaligned presumably because it knows
that is in fact overlap safe, so as far as valgrind is concerned the call did
in fact wind up going to memcpy and hence got checked.

I'm not sure there's a huge amount we can do to avoid this sadly.

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to