summaryrefslogtreecommitdiffstats
path: root/tools/valgrind/drmemory_analyze.py
diff options
context:
space:
mode:
authortimurrrr@chromium.org <timurrrr@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-08-08 12:58:30 +0000
committertimurrrr@chromium.org <timurrrr@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-08-08 12:58:30 +0000
commitb5e0537a77275e408ff7b6f66166abe675e57cf9 (patch)
tree36ab13267691cf8fc2a6a1b08051e5d23841c21c /tools/valgrind/drmemory_analyze.py
parent7d5c3cf1d401855bbe23d343bf7c078e923ea0e7 (diff)
downloadchromium_src-b5e0537a77275e408ff7b6f66166abe675e57cf9.zip
chromium_src-b5e0537a77275e408ff7b6f66166abe675e57cf9.tar.gz
chromium_src-b5e0537a77275e408ff7b6f66166abe675e57cf9.tar.bz2
Suppress uninitialized read reports below GetStandardColorSpaceProfile
Also: * improve readability and completeness of the drmemory_analyze script * add BROWSER_WRAPPER support to the Dr. Memory runner (for ui_tests, browser_tests, etc) TBR=bruening BUG=http://code.google.com/p/drmemory/issues/detail?id=546 Review URL: http://codereview.chromium.org/7491093 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@95803 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'tools/valgrind/drmemory_analyze.py')
-rwxr-xr-xtools/valgrind/drmemory_analyze.py9
1 files changed, 5 insertions, 4 deletions
diff --git a/tools/valgrind/drmemory_analyze.py b/tools/valgrind/drmemory_analyze.py
index c2b257c..4780593 100755
--- a/tools/valgrind/drmemory_analyze.py
+++ b/tools/valgrind/drmemory_analyze.py
@@ -50,7 +50,7 @@ class DrMemoryAnalyze:
"chromium\\src\\",
"crt_bld\\self_x86\\",
]
- CUT_STACK_BELOW = ".*testing.*Test.*Run.*"
+ CUT_STACK_BELOW = ".*testing.*Test.*Run.*|testing::internal.*"
result = [self.line_]
self.ReadLine()
@@ -70,8 +70,8 @@ class DrMemoryAnalyze:
# access address in the UNADDRESSABLE ACCESS reports like this:
# Note: next higher malloc: <address range>
# Note: prev lower malloc: <address range>
- match_malloc_info = re.search("Note: .* malloc: +0x.*", tmp_line)
- if match_malloc_info:
+ # Note: 0x1234-0x5678 overlaps freed memory 0x1000-0x6000
+ if tmp_line.startswith("Note: "):
result.append(tmp_line)
self.ReadLine()
continue
@@ -87,7 +87,8 @@ class DrMemoryAnalyze:
if re.search(CUT_STACK_BELOW, fname):
break
report_line = (" #%2i %-50s" % (cnt, fname))
- if not re.search("\.exe\+0x", binary):
+ if (not re.search("\.exe\+0x", binary) and
+ not re.search("chrome\.dll", binary)):
# Print the DLL name
report_line += " " + binary
src, lineno = match_src_line.groups()