Created
November 8, 2016 14:00
-
-
Save whalebot-helmsman/620d2e99fbf427f692e0906963b56f13 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Dr. Memory version 1.11.0 build 2 built on Aug 29 2016 02:42:07 | |
Dr. Memory results for pid 7496: "libuv-spawn.exe" | |
Application cmdline: "./libuv-spawn.exe cat" | |
Recorded 115 suppression(s) from default C:\Users\SBT-Vostretsov-NS\root\bin\DrMemory-Windows-1.11.0-2\bin\suppress-default.txt | |
Error #1: UNINITIALIZED READ: reading 0x02070d94-0x02070db0 28 byte(s) within 0x02070d48-0x02070dd8 | |
# 0 system call NtCreateUserProcess parameter #8 | |
# 1 KERNEL32.dll!CreateProcessInternalW +0x768 (0x772e4324 <KERNEL32.dll+0x24324>) | |
# 2 KERNEL32.dll!CreateProcessW +0x2b (0x772d1069 <KERNEL32.dll+0x11069>) | |
# 3 libuv.dll!uv_spawn +0x308 (0x74d103e9 <libuv.dll+0x103e9>) | |
# 4 worker_init [../src/spawn/spawn.c:86] | |
# 5 context_init [../src/spawn/spawn.c:135] | |
# 6 main [../src/spawn/spawn.c:313] | |
Note: @0:00:02.200 in thread 8312 | |
Error #2: UNINITIALIZED READ: reading 0x0028f8bc-0x0028f8c0 4 byte(s) within 0x0028f8b8-0x0028f8c8 | |
# 0 system call NtWriteFile parameter #5 | |
# 1 KERNELBASE.dll!WriteFile +0xa9 (0x7585df9b <KERNELBASE.dll+0xdf9b>) | |
# 2 KERNEL32.dll!WriteFile +0x49 (0x772d12cc <KERNEL32.dll+0x112cc>) | |
# 3 libuv.dll!uv_pipe_connect +0xe6f (0x74d0c9f0 <libuv.dll+0xc9f0>) | |
# 4 libuv.dll!uv_write +0x92 (0x74d11923 <libuv.dll+0x11923>) | |
# 5 context_write [../src/spawn/spawn.c:212] | |
# 6 context_on_read_cb [../src/spawn/spawn.c:288] | |
# 7 libuv.dll!uv_dlerror +0x2bc1 (0x74d074f2 <libuv.dll+0x74f2>) | |
# 8 libuv.dll!uv_inet_pton +0x936 (0x74d02257 <libuv.dll+0x2257>) | |
# 9 libuv.dll!uv_async_send +0x329 (0x74d03c5a <libuv.dll+0x3c5a>) | |
#10 libuv.dll!uv_run +0x166 (0x74d04627 <libuv.dll+0x4627>) | |
#11 main [../src/spawn/spawn.c:315] | |
Note: @0:00:02.993 in thread 8312 | |
Error #3: HANDLE LEAK: KERNEL handle 0x00000108 and 3 similar handle(s) were opened but not closed: | |
# 0 system call NtCreateUserProcess | |
# 1 KERNEL32.dll!CreateProcessInternalW +0x768 (0x772e4324 <KERNEL32.dll+0x24324>) | |
# 2 KERNEL32.dll!CreateProcessW +0x2b (0x772d1069 <KERNEL32.dll+0x11069>) | |
# 3 libuv.dll!uv_spawn +0x308 (0x74d103e9 <libuv.dll+0x103e9>) | |
# 4 worker_init [../src/spawn/spawn.c:86] | |
# 5 context_init [../src/spawn/spawn.c:135] | |
# 6 main [../src/spawn/spawn.c:313] | |
Note: @0:00:03.442 in thread 8312 | |
Note: handles created with the same callstack are closed here: | |
Note: # 0 system call NtClose | |
Note: # 1 KERNELBASE.dll!CloseHandle +0x2c (0x7585c585 <KERNELBASE.dll+0xc585>) | |
Note: # 2 KERNEL32.dll!CloseHandle +0x27 (0x772d1408 <KERNEL32.dll+0x11408>) | |
Note: # 3 libuv.dll!uv_spawn +0x417 (0x74d104f8 <libuv.dll+0x104f8>) | |
Note: # 4 worker_init [../src/spawn/spawn.c:86] | |
Note: # 5 context_init [../src/spawn/spawn.c:135] | |
Note: # 6 main [../src/spawn/spawn.c:313] | |
=========================================================================== | |
FINAL SUMMARY: | |
DUPLICATE ERROR COUNTS: | |
Error # 1: 4 | |
Error # 3: 4 | |
SUPPRESSIONS USED: | |
ERRORS FOUND: | |
0 unique, 0 total unaddressable access(es) | |
2 unique, 5 total uninitialized access(es) | |
0 unique, 0 total invalid heap argument(s) | |
0 unique, 0 total GDI usage error(s) | |
1 unique, 4 total handle leak(s) | |
0 unique, 0 total warning(s) | |
0 unique, 0 total, 0 byte(s) of leak(s) | |
0 unique, 0 total, 0 byte(s) of possible leak(s) | |
ERRORS IGNORED: | |
27 potential error(s) (suspected false positives) | |
(details: C:\Users\SBT-Vostretsov-NS\root\bin\DrMemory-Windows-1.11.0-2\drmemory\logs\DrMemory-libuv-spawn.exe.7496.000\potential_errors.txt) | |
79 unique, 158 total, 46354 byte(s) of still-reachable allocation(s) | |
(re-run with "-show_reachable" for details) | |
Details: C:\Users\SBT-Vostretsov-NS\root\bin\DrMemory-Windows-1.11.0-2\drmemory\logs\DrMemory-libuv-spawn.exe.7496.000\results.txt |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment