Index: tools/valgrind/drmemory_analyze.py |
=================================================================== |
--- tools/valgrind/drmemory_analyze.py (revision 95071) |
+++ tools/valgrind/drmemory_analyze.py (working copy) |
@@ -50,7 +50,7 @@ |
"chromium\\src\\", |
"crt_bld\\self_x86\\", |
] |
- CUT_STACK_BELOW = ".*testing.*Test.*Run.*" |
+ CUT_STACK_BELOW = ".*testing.*Test.*Run.*|testing::internal.*" |
result = [self.line_] |
self.ReadLine() |
@@ -70,8 +70,8 @@ |
# access address in the UNADDRESSABLE ACCESS reports like this: |
# Note: next higher malloc: <address range> |
# Note: prev lower malloc: <address range> |
- match_malloc_info = re.search("Note: .* malloc: +0x.*", tmp_line) |
- if match_malloc_info: |
+ # Note: 0x1234-0x5678 overlaps freed memory 0x1000-0x6000 |
+ if tmp_line.startswith("Note: "): |
result.append(tmp_line) |
self.ReadLine() |
continue |
@@ -87,7 +87,8 @@ |
if re.search(CUT_STACK_BELOW, fname): |
break |
report_line = (" #%2i %-50s" % (cnt, fname)) |
- if not re.search("\.exe\+0x", binary): |
+ if (not re.search("\.exe\+0x", binary) and |
+ not re.search("chrome\.dll", binary)): |
# Print the DLL name |
report_line += " " + binary |
src, lineno = match_src_line.groups() |