Uninitialized read in wait_chain_unittest |
||
Issue descriptionStarted in https://build.chromium.org/p/chromium.memory.fyi/builders/Windows%20Unit%20%28DrMemory%20full%29%20%282%29/builds/10470/steps/memory%20test%3A%20base_unittests/logs/stdio, which points to https://codereview.chromium.org/1834463002. [ RUN ] WaitChainTest.Deadlock ~~Dr.M~~ ~~Dr.M~~ Error #1: UNINITIALIZED READ: reading 0x001bf734-0x001bf738 4 byte(s) ~~Dr.M~~ # 0 ntdll.dll!RtlDosSearchPath_Ustr +0x578 (0x77c34a0a <ntdll.dll+0x54a0a>) ~~Dr.M~~ # 1 ntdll.dll!TpCheckTerminateWorker +0x11 (0x77c18eae <ntdll.dll+0x38eae>) ~~Dr.M~~ # 2 KERNELBASE.dll!TerminateThread +0x9c (0x77253a36 <KERNELBASE.dll+0x13a36>) ~~Dr.M~~ # 3 base::win::`anonymous namespace'::DeadlockThread::Terminate [base\win\wait_chain_unittest.cc:113] ~~Dr.M~~ # 4 base::win::WaitChainTest_Deadlock_Test::TestBody [base\win\wait_chain_unittest.cc:270] ~~Dr.M~~ # 5 testing::internal::HandleExceptionsInMethodIfSupported<> [testing\gtest\src\gtest.cc:2458] ~~Dr.M~~ Note: @0:07:27.594 in thread 744 ~~Dr.M~~ Note: instruction: cmp 0xfffffff8(%ebp) %ebx [ OK ] WaitChainTest.Deadlock (218 ms)
,
Apr 15 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/89acfa82ffd89b6d37f9a8e0a12ddb13b3f36951 commit 89acfa82ffd89b6d37f9a8e0a12ddb13b3f36951 Author: jyasskin <jyasskin@chromium.org> Date: Fri Apr 15 23:48:54 2016 Suppress an uninitialized read in WaitChainTest.Deadlock BUG= 604066 TBR=pmonette@chromium.org,groby@chromium.org Review URL: https://codereview.chromium.org/1894693004 Cr-Commit-Position: refs/heads/master@{#387753} [modify] https://crrev.com/89acfa82ffd89b6d37f9a8e0a12ddb13b3f36951/tools/valgrind/drmemory/suppressions_full.txt
,
Apr 20 2016
You may want to exclude this test to avoid the Dr. Memory crash at the end before we update Dr. Memory with a fix.
,
May 2 2016
This is a false positive coming from new system call behavior: https://github.com/DynamoRIO/drmemory/issues/1885
,
May 2 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/c0f377f6217891e216855d2ebee390411e42c17e commit c0f377f6217891e216855d2ebee390411e42c17e Author: bruening <bruening@chromium.org> Date: Mon May 02 16:10:40 2016 Update Dr. Memory to 1.10.16923 (0x65c2901) TBR=zhaoqin@chromium.org,jyasskin@chromium.org BUG= 604066 NOTRY=true Review-Url: https://codereview.chromium.org/1936193002 Cr-Commit-Position: refs/heads/master@{#390959} [modify] https://crrev.com/c0f377f6217891e216855d2ebee390411e42c17e/third_party/drmemory/README.chromium [modify] https://crrev.com/c0f377f6217891e216855d2ebee390411e42c17e/third_party/drmemory/drmemory-windows-sfx.exe.sha1
,
May 2 2016
,
May 2 2016
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/b76d621d2dbd9e58970d0be2ceb7ab7ad684c503 commit b76d621d2dbd9e58970d0be2ceb7ab7ad684c503 Author: bruening <bruening@chromium.org> Date: Mon May 02 16:25:00 2016 Remove suppression for now-fixed TppIsWOrkerThread false positive BUG= 604066 TBR=jyasskin@chromium.org NOTRY=true Review-Url: https://codereview.chromium.org/1934383002 Cr-Commit-Position: refs/heads/master@{#390964} [modify] https://crrev.com/b76d621d2dbd9e58970d0be2ceb7ab7ad684c503/tools/valgrind/drmemory/suppressions_full.txt |
||
►
Sign in to add a comment |
||
Comment 1 Deleted