OLD | NEW |
---|---|
1 ############################ | 1 ############################ |
2 # Known reports on the third party we have no control over. | 2 # Known reports on the third party we have no control over. |
3 UNINITIALIZED READ | 3 UNINITIALIZED READ |
4 ... | 4 ... |
5 *!deflate_* | 5 *!deflate_* |
6 *!MOZ_Z_deflate | 6 *!MOZ_Z_deflate |
7 | 7 |
8 # http://code.google.com/p/drmemory/issues/detail?id=406 | |
9 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. | |
8 LEAK | 10 LEAK |
9 ADVAPI32.dll!WmiOpenBlock | 11 ADVAPI32.dll!WmiOpenBlock |
10 ADVAPI32.dll!WmiOpenBlock | 12 ADVAPI32.dll!WmiOpenBlock |
11 | 13 |
14 # Reports from Sophos antivirus | |
15 UNINITIALIZED READ | |
16 ... | |
17 sophos*.dll!* | |
18 | |
19 LEAK | |
20 ... | |
21 sophos*.dll!* | |
22 | |
23 # Leaks inside GoogleDesktop | |
Derek Bruening
2011/05/24 13:45:32
don't we want to report errors to the desktop team
| |
24 # TODO(timurrrr): How/why does it inject itself into the binaries? WTF? | |
Derek Bruening
2011/05/24 13:45:32
not surprising for windows apps to end up injectin
| |
25 LEAK | |
26 ... | |
27 GoogleDesktop*.DLL!* | |
28 | |
12 ############################ | 29 ############################ |
13 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis | 30 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis |
14 # assumptions or unhandled syscalls | 31 # assumptions or unhandled syscalls |
15 | 32 |
16 # False reports during printing using fprintf | 33 # False reports during printing using fprintf |
17 UNINITIALIZED READ | 34 UNINITIALIZED READ |
18 system call NtRaiseException | 35 system call NtRaiseException |
19 KERNEL32.dll!RaiseException | 36 KERNEL32.dll!RaiseException |
20 *!DebuggerProbe | 37 *!DebuggerProbe |
21 *!DebuggerKnownHandle | 38 *!DebuggerKnownHandle |
(...skipping 152 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
174 DBGHELP.dll!SymInitialize | 191 DBGHELP.dll!SymInitialize |
175 | 192 |
176 UNINITIALIZED READ | 193 UNINITIALIZED READ |
177 ... | 194 ... |
178 DBGHELP.dll!SymEnumSourceFiles | 195 DBGHELP.dll!SymEnumSourceFiles |
179 | 196 |
180 UNINITIALIZED READ | 197 UNINITIALIZED READ |
181 ... | 198 ... |
182 msvcrt.dll!_RTDynamicCast | 199 msvcrt.dll!_RTDynamicCast |
183 | 200 |
184 # http://code.google.com/p/drmemory/issues/detail?id=52 | 201 # http://code.google.com/p/drmemory/issues/detail?id=53 |
185 UNINITIALIZED READ | 202 UNINITIALIZED READ |
186 ADVAPI32.dll!WmiMofEnumerateResourcesA | 203 ADVAPI32.dll!WmiMofEnumerateResourcesA |
187 ADVAPI32.dll!WmiMofEnumerateResourcesA | 204 ADVAPI32.dll!WmiMofEnumerateResourcesA |
188 ADVAPI32.dll!Sta*TraceW | 205 ADVAPI32.dll!Sta*TraceW |
189 | 206 |
190 # http://code.google.com/p/drmemory/issues/detail?id=55 | |
Derek Bruening
2011/05/24 13:45:32
I have in my notes a TODO item to remove this, wil
| |
191 UNADDRESSABLE ACCESS | |
192 ntdll.dll!Rtl*CriticalSection* | |
193 | |
194 UNADDRESSABLE ACCESS | |
195 *!Send | |
196 | |
197 UNADDRESSABLE ACCESS | |
198 ... | |
199 *!tracked_objects::Tracked::Tracked | |
200 | |
201 UNADDRESSABLE ACCESS | |
202 *!Pickle::Pickle | |
203 | |
204 UNADDRESSABLE ACCESS | |
205 ... | |
206 *!IPC::Channel*::*Message* | |
207 | |
208 # http://code.google.com/p/drmemory/issues/detail?id=58 | 207 # http://code.google.com/p/drmemory/issues/detail?id=58 |
209 UNINITIALIZED READ | 208 UNINITIALIZED READ |
210 ... | 209 ... |
211 *!_cfltcvt_l | 210 *!_cfltcvt_l |
212 | 211 |
213 # http://code.google.com/p/drmemory/issues/detail?id=59 | 212 # http://code.google.com/p/drmemory/issues/detail?id=59 |
214 UNADDRESSABLE ACCESS | 213 UNADDRESSABLE ACCESS |
215 ... | 214 ... |
216 *!SetEnvironmentVariable* | 215 *!SetEnvironmentVariable* |
217 | 216 |
(...skipping 23 matching lines...) Expand all Loading... | |
241 UNINITIALIZED READ | 240 UNINITIALIZED READ |
242 ... | 241 ... |
243 WS2_32.dll!* | 242 WS2_32.dll!* |
244 | 243 |
245 UNINITIALIZED READ | 244 UNINITIALIZED READ |
246 ... | 245 ... |
247 ADVAPI32.dll!SetSecurityDescriptorDacl | 246 ADVAPI32.dll!SetSecurityDescriptorDacl |
248 | 247 |
249 UNINITIALIZED READ | 248 UNINITIALIZED READ |
250 ... | 249 ... |
251 ADVAPI32.dll!Reg*Value* | |
Derek Bruening
2011/05/24 13:45:32
I have in my notes a TODO item to go and remove th
| |
252 | |
253 UNINITIALIZED READ | |
254 ... | |
255 MSWSOCK.dll!WSPStartup | 250 MSWSOCK.dll!WSPStartup |
256 | 251 |
257 UNADDRESSABLE ACCESS | 252 UNADDRESSABLE ACCESS |
258 ... | 253 ... |
259 MSWSOCK.dll!WSPStartup | 254 MSWSOCK.dll!WSPStartup |
260 | 255 |
261 UNINITIALIZED READ | 256 UNINITIALIZED READ |
262 ... | 257 ... |
263 ntdll.dll!RtlValidateUnicodeString | 258 ntdll.dll!RtlValidateUnicodeString |
264 | 259 |
(...skipping 25 matching lines...) Expand all Loading... | |
290 LEAK | 285 LEAK |
291 *!_getptd_noexit | 286 *!_getptd_noexit |
292 | 287 |
293 # http://code.google.com/p/drmemory/issues/detail?id=276 | 288 # http://code.google.com/p/drmemory/issues/detail?id=276 |
294 UNINITIALIZED READ | 289 UNINITIALIZED READ |
295 ... | 290 ... |
296 ntdll.dll!RtlConvertUlongToLargeInteger | 291 ntdll.dll!RtlConvertUlongToLargeInteger |
297 ntdll.dll!RtlConvertUlongToLargeInteger | 292 ntdll.dll!RtlConvertUlongToLargeInteger |
298 ntdll.dll!KiUserExceptionDispatcher | 293 ntdll.dll!KiUserExceptionDispatcher |
299 | 294 |
300 # http://code.google.com/p/drmemory/issues/detail?id=304 | |
301 UNINITIALIZED READ | |
302 ... | |
303 *!_nh_malloc_dbg_impl | |
304 | |
305 UNADDRESSABLE ACCESS | |
306 ... | |
307 *!_nh_malloc_dbg_impl | |
308 | |
309 # http://code.google.com/p/drmemory/issues/detail?id=305 | 295 # http://code.google.com/p/drmemory/issues/detail?id=305 |
310 LEAK | 296 LEAK |
311 *!free | 297 *!free |
312 *!free | 298 *!free |
313 *!operator new | 299 *!operator new |
314 ... | 300 ... |
315 *!MiniDumpWriteDump | 301 *!MiniDumpWriteDump |
316 | 302 |
317 # http://code.google.com/p/drmemory/issues/detail?id=346 | 303 # http://code.google.com/p/drmemory/issues/detail?id=346 |
318 UNINITIALIZED READ | 304 UNINITIALIZED READ |
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
350 UNINITIALIZED READ | 336 UNINITIALIZED READ |
351 system call NtRequestWaitReplyPort | 337 system call NtRequestWaitReplyPort |
352 RPCRT4.dll!I_RpcSendReceive | 338 RPCRT4.dll!I_RpcSendReceive |
353 RPCRT4.dll!NdrSendReceive | 339 RPCRT4.dll!NdrSendReceive |
354 | 340 |
355 UNINITIALIZED READ | 341 UNINITIALIZED READ |
356 IMM32.dll!* | 342 IMM32.dll!* |
357 ntdll.dll!LdrInitializeThunk | 343 ntdll.dll!LdrInitializeThunk |
358 ntdll.dll!LdrShutdownThread | 344 ntdll.dll!LdrShutdownThread |
359 | 345 |
360 ############################ | 346 # http://code.google.com/p/drmemory/issues/detail?id=412 |
361 # TODO(timurrrr): investigate these | |
362 UNINITIALIZED READ | 347 UNINITIALIZED READ |
363 ... | 348 ... |
364 *!win_util::GetLogonSessionOnlyDACL | 349 ADVAPI32.dll!Reg*Value* |
Derek Bruening
2011/05/24 13:45:32
this one shouldn't be here: i#358 was fixed. what
| |
365 | 350 |
366 UNINITIALIZED READ | 351 UNINITIALIZED READ |
367 ... | 352 ... |
368 ADVAPI32.dll!Crypt* | 353 ADVAPI32.dll!Crypt* |
369 | 354 |
370 UNINITIALIZED READ | 355 UNINITIALIZED READ |
371 ... | 356 ... |
357 RPCRT4.dll!NdrClientCall2 | |
358 | |
359 ############################ | |
360 # TODO(timurrrr): investigate these | |
361 UNINITIALIZED READ | |
362 ... | |
363 *!win_util::GetLogonSessionOnlyDACL | |
364 | |
365 UNINITIALIZED READ | |
366 ... | |
372 ntshrui.dll!IsPathSharedW | 367 ntshrui.dll!IsPathSharedW |
373 | 368 |
374 UNINITIALIZED READ | 369 UNINITIALIZED READ |
375 ... | 370 ... |
376 *!NetApiBufferFree | 371 *!NetApiBufferFree |
377 | 372 |
378 UNINITIALIZED READ | 373 UNINITIALIZED READ |
379 ... | 374 ... |
380 *!ShellExecute* | 375 *!ShellExecute* |
381 | 376 |
(...skipping 39 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
421 *!SyncSocketClientListener::OnMsgClassResponse | 416 *!SyncSocketClientListener::OnMsgClassResponse |
422 | 417 |
423 UNINITIALIZED READ | 418 UNINITIALIZED READ |
424 ... | 419 ... |
425 *!*NSPRInitSingleton* | 420 *!*NSPRInitSingleton* |
426 | 421 |
427 UNINITIALIZED READ | 422 UNINITIALIZED READ |
428 *!NdrSimpleStructFree | 423 *!NdrSimpleStructFree |
429 | 424 |
430 UNINITIALIZED READ | 425 UNINITIALIZED READ |
431 ... | |
432 *!NdrClientCall2 | |
433 | |
434 UNINITIALIZED READ | |
435 ntdll.dll!RtlpNtOpenKey | 426 ntdll.dll!RtlpNtOpenKey |
436 ntdll.dll!RtlMakeSelfRelativeSD | 427 ntdll.dll!RtlMakeSelfRelativeSD |
437 ntdll.dll!RtlAbsoluteToSelfRelativeSD | 428 ntdll.dll!RtlAbsoluteToSelfRelativeSD |
438 ADVAPI32.dll!MakeSelfRelativeSD | 429 ADVAPI32.dll!MakeSelfRelativeSD |
439 | 430 |
440 UNINITIALIZED READ | 431 UNINITIALIZED READ |
441 ... | 432 ... |
442 CRYPT32.dll!I_CertSyncStore | 433 CRYPT32.dll!I_CertSyncStore |
443 | 434 |
444 ############################ | 435 ############################ |
(...skipping 128 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
573 # http://crbug.com/81522 | 564 # http://crbug.com/81522 |
574 LEAK | 565 LEAK |
575 *!operator new | 566 *!operator new |
576 *!base::MessageLoopProxy::CreateForCurrentThread | 567 *!base::MessageLoopProxy::CreateForCurrentThread |
577 *!IPC::ChannelProxy::Context::Context | 568 *!IPC::ChannelProxy::Context::Context |
578 *!IPC::ChannelProxy::ChannelProxy | 569 *!IPC::ChannelProxy::ChannelProxy |
579 *!IPCChannelTest_ChannelProxyTest_Test::TestBody | 570 *!IPCChannelTest_ChannelProxyTest_Test::TestBody |
580 | 571 |
581 # Empty line at EOF - workaround for | 572 # Empty line at EOF - workaround for |
582 # http://code.google.com/p/drmemory/issues/detail?id=41 | 573 # http://code.google.com/p/drmemory/issues/detail?id=41 |
OLD | NEW |