You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
(forgot to attach a repro source code for the JetBeginSession possible leak:
#include <windows.h>
#include <iptypes.h>
#include <iphlpapi.h>
#pragma comment(lib, "iphlpapi.lib")
extern "C" {
// the headers didn't work for me for some reason
ULONG WINAPI GetAdaptersAddresses(ULONG Family, ULONG Flags, PVOID Reserved, PVOID AdapterAddresses, PULONG SizePointer);
}
int main(void) {
char info_temp[1024];
ULONG len = 0;
ULONG result = GetAdaptersAddresses(AF_UNSPEC, 0, NULL, &info_temp, &len);
return 0;
}
From timurrrr@google.com on June 23, 2011 06:44:03
$ drmemory.exe -suppress -- ipconfig
UNINITIALIZED READ: reading 0x003b9f4c-0x003b9f50 4 byte(s) within 0x003b9f48-0x003b9f50
@0:00:02.765 in thread 4064
system call NtDeviceIoControlFile InputBuffer
[different frames]
0x76d63ee3 <iphlpapi.dll+0x3ee3> iphlpapi.dll!GetAdaptersAddresses
0x76d63eae <iphlpapi.dll+0x3eae> iphlpapi.dll!GetAdaptersAddresses
0x01003e7f <ipconfig.exe+0x3e7f> ipconfig.exe!?
also,
UNINITIALIZED READ: reading 0x0007be70-0x0007be80 16 byte(s) within 0x0007be6c-0x0007be80
(with a similar stack)
The report was first seen on Chromium then I've decided to run "ipconfig" as a reproducer.
Original issue: http://code.google.com/p/drmemory/issues/detail?id=473
The text was updated successfully, but these errors were encountered: