From timurrrr.com on August 02, 2011 08:32:49
[ r438 on Windows 7]
Smallest repro found so far are Chromium ipc_tests/base_unittests with invalild gtest_filter: $ drmemory.exe -no_check_uninititalized -- ipc_tests.exe --gtest_filter="NOSUCHTEST"
... UNADDRESSABLE ACCESS: 0x00004648-0x00004649 1 byte(s) within 0x00004648-0x0000464c #1 LdrUnlockLoaderLock ntdll.dll+0x37a77 #2 LdrUnlockLoaderLock ntdll.dll+0x36e67 #3 RtlAllocateHeap ntdll.dll+0x2e0f2 #4 RtlDeleteBoundaryDescriptor ntdll.dll+0x2e6cc #5 wcsnicmp ntdll.dll+0x2f78e #6 IsNLSDefinedString KERNELBASE.dll+0x36dea #7 GetModuleHandleA KERNELBASE.dll+0x12487 #8 spmaa_finalise2 sophos_detoured.dll+0x1a810 #9 spmaa_finalise2 sophos_detoured.dll+0x1b135 #10 spmaa_finalise2 sophos_detoured.dll+0x192a4 #11 spmaa_finalise2 sophos_detoured.dll+0x1930e #12 LdrShutdownProcess ntdll.dll+0x5a516 #13 RtlExitUserProcess ntdll.dll+0x5a3b8 #14 ExitProcess KERNEL32.dll+0x17363 #15 __crtExitProcess crt\src\crt0dat.c:731 #16 doexit crt\src\crt0dat.c:644 #17 exit crt\src\crt0dat.c:412 #18 __tmainCRTStartup crt\src\crt0.c:270 #19 mainCRTStartup crt\src\crt0.c:181 #20 BaseThreadInitThunk KERNEL32.dll+0x13677 #21 RtlInitializeExceptionChain ntdll.dll+0x39f02 #22 RtlInitializeExceptionChain ntdll.dll+0x39ed5
The report goes away if I remove the "-no_check_uninititalized" flag.
It looks like either a -no_c_u false positive or default mode false negative. Or could it be Sophos behaving differently when Dr. Memory is in different instrumentation modes?
Original issue: http://code.google.com/p/drmemory/issues/detail?id=533
该提问来源于开源项目:DynamoRIO/drmemory