You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The stacks involve a bunch of dlls: cryptnet.dll, webio.dll, and winhttp.dll. Not sure why we weren't seeing these before. I haven't been able to untangle which Windows API calls trigger this, but the only net/ change in that build was https://chromiumcodereview.appspot.com/9663017/ , which adds some more tests.
From rnk@google.com on March 21, 2012 11:06:49
These showed up on the full bot: http://build.chromium.org/p/chromium.fyi/builders/Windows%20Tests%20%28DrMemory%20full%29/builds/1132
3668Error#1
: UNINITIALIZED READ: reading register ecx3668# 0 webio.dll!? +0x0 (0x713a1a3c <webio.dll+0x1a3c>)3668# 1 webio.dll!? +0x0 (0x713a2b5b <webio.dll+0x2b5b>)3668# 2 webio.dll!? +0x0 (0x713a2ab8 <webio.dll+0x2ab8>)3668# 3 WINHTTP.dll!WinHttpOpen3668# 4 WINHTTP.dll!WinHttpOpen3668# 5 WINHTTP.dll!WinHttpOpen3668# 6 CRYPTNET.dll!I_CryptNetGetConnectivity3668# 7 CRYPTNET.dll!I_CryptNetGetConnectivity3668# 8 CRYPTNET.dll!CertDllVerifyRevocation3668# 9 CRYPTNET.dll!CryptRetrieveObjectByUrlW3668#10
CRYPTNET.dll!I_CryptNetGetConnectivity3668#11
KERNEL32.dll!BaseThreadInitThunk3668Note: @0:07:40.229 in thread 36683668Note: instruction: cmp %ecx 0x08(%edx)36683668Error#2
: UNINITIALIZED READ: reading register ecx3668# 0 webio.dll!? +0x0 (0x713a1a5e <webio.dll+0x1a5e>)3668# 1 webio.dll!? +0x0 (0x713a2b5b <webio.dll+0x2b5b>)3668# 2 webio.dll!? +0x0 (0x713a2ab8 <webio.dll+0x2ab8>)3668# 3 WINHTTP.dll!WinHttpOpen3668# 4 WINHTTP.dll!WinHttpOpen3668# 5 WINHTTP.dll!WinHttpOpen3668# 6 CRYPTNET.dll!I_CryptNetGetConnectivity3668# 7 CRYPTNET.dll!I_CryptNetGetConnectivity3668# 8 CRYPTNET.dll!CertDllVerifyRevocation3668# 9 CRYPTNET.dll!CryptRetrieveObjectByUrlW3668#10
CRYPTNET.dll!I_CryptNetGetConnectivity3668#11
KERNEL32.dll!BaseThreadInitThunk3668Note: @0:07:40.229 in thread 36683668Note: instruction: cmp %ecx %ebxetc.
The stacks involve a bunch of dlls: cryptnet.dll, webio.dll, and winhttp.dll. Not sure why we weren't seeing these before. I haven't been able to untangle which Windows API calls trigger this, but the only net/ change in that build was https://chromiumcodereview.appspot.com/9663017/ , which adds some more tests.
Original issue: http://code.google.com/p/drmemory/issues/detail?id=841
The text was updated successfully, but these errors were encountered: