diff options
Diffstat (limited to 'tools/valgrind/drmemory_analyze.py')
-rwxr-xr-x | tools/valgrind/drmemory_analyze.py | 9 |
1 files changed, 5 insertions, 4 deletions
diff --git a/tools/valgrind/drmemory_analyze.py b/tools/valgrind/drmemory_analyze.py index c2b257c..4780593 100755 --- a/tools/valgrind/drmemory_analyze.py +++ b/tools/valgrind/drmemory_analyze.py @@ -50,7 +50,7 @@ class DrMemoryAnalyze: "chromium\\src\\", "crt_bld\\self_x86\\", ] - CUT_STACK_BELOW = ".*testing.*Test.*Run.*" + CUT_STACK_BELOW = ".*testing.*Test.*Run.*|testing::internal.*" result = [self.line_] self.ReadLine() @@ -70,8 +70,8 @@ class DrMemoryAnalyze: # access address in the UNADDRESSABLE ACCESS reports like this: # Note: next higher malloc: <address range> # Note: prev lower malloc: <address range> - match_malloc_info = re.search("Note: .* malloc: +0x.*", tmp_line) - if match_malloc_info: + # Note: 0x1234-0x5678 overlaps freed memory 0x1000-0x6000 + if tmp_line.startswith("Note: "): result.append(tmp_line) self.ReadLine() continue @@ -87,7 +87,8 @@ class DrMemoryAnalyze: if re.search(CUT_STACK_BELOW, fname): break report_line = (" #%2i %-50s" % (cnt, fname)) - if not re.search("\.exe\+0x", binary): + if (not re.search("\.exe\+0x", binary) and + not re.search("chrome\.dll", binary)): # Print the DLL name report_line += " " + binary src, lineno = match_src_line.groups() |