summaryrefslogtreecommitdiffstats
path: root/tools/valgrind/drmemory_analyze.py
diff options
context:
space:
mode:
Diffstat (limited to 'tools/valgrind/drmemory_analyze.py')
-rwxr-xr-xtools/valgrind/drmemory_analyze.py9
1 files changed, 5 insertions, 4 deletions
diff --git a/tools/valgrind/drmemory_analyze.py b/tools/valgrind/drmemory_analyze.py
index c2b257c..4780593 100755
--- a/tools/valgrind/drmemory_analyze.py
+++ b/tools/valgrind/drmemory_analyze.py
@@ -50,7 +50,7 @@ class DrMemoryAnalyze:
"chromium\\src\\",
"crt_bld\\self_x86\\",
]
- CUT_STACK_BELOW = ".*testing.*Test.*Run.*"
+ CUT_STACK_BELOW = ".*testing.*Test.*Run.*|testing::internal.*"
result = [self.line_]
self.ReadLine()
@@ -70,8 +70,8 @@ class DrMemoryAnalyze:
# access address in the UNADDRESSABLE ACCESS reports like this:
# Note: next higher malloc: <address range>
# Note: prev lower malloc: <address range>
- match_malloc_info = re.search("Note: .* malloc: +0x.*", tmp_line)
- if match_malloc_info:
+ # Note: 0x1234-0x5678 overlaps freed memory 0x1000-0x6000
+ if tmp_line.startswith("Note: "):
result.append(tmp_line)
self.ReadLine()
continue
@@ -87,7 +87,8 @@ class DrMemoryAnalyze:
if re.search(CUT_STACK_BELOW, fname):
break
report_line = (" #%2i %-50s" % (cnt, fname))
- if not re.search("\.exe\+0x", binary):
+ if (not re.search("\.exe\+0x", binary) and
+ not re.search("chrome\.dll", binary)):
# Print the DLL name
report_line += " " + binary
src, lineno = match_src_line.groups()