Index: tools/valgrind/drmemory/suppressions.txt |
=================================================================== |
--- tools/valgrind/drmemory/suppressions.txt (revision 85638) |
+++ tools/valgrind/drmemory/suppressions.txt (working copy) |
@@ -5,10 +5,27 @@ |
*!deflate_* |
*!MOZ_Z_deflate |
+# http://code.google.com/p/drmemory/issues/detail?id=406 |
+# TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. |
LEAK |
ADVAPI32.dll!WmiOpenBlock |
ADVAPI32.dll!WmiOpenBlock |
+# Reports from Sophos antivirus |
+UNINITIALIZED READ |
+... |
+sophos*.dll!* |
+ |
+LEAK |
+... |
+sophos*.dll!* |
+ |
+# Leaks inside GoogleDesktop |
Derek Bruening
2011/05/24 13:45:32
don't we want to report errors to the desktop team
|
+# TODO(timurrrr): How/why does it inject itself into the binaries? WTF? |
Derek Bruening
2011/05/24 13:45:32
not surprising for windows apps to end up injectin
|
+LEAK |
+... |
+GoogleDesktop*.DLL!* |
+ |
############################ |
# Suppress some false reports due to bugs in Dr.Memory like wrong analysis |
# assumptions or unhandled syscalls |
@@ -181,30 +198,12 @@ |
... |
msvcrt.dll!_RTDynamicCast |
-# http://code.google.com/p/drmemory/issues/detail?id=52 |
+# http://code.google.com/p/drmemory/issues/detail?id=53 |
UNINITIALIZED READ |
ADVAPI32.dll!WmiMofEnumerateResourcesA |
ADVAPI32.dll!WmiMofEnumerateResourcesA |
ADVAPI32.dll!Sta*TraceW |
-# http://code.google.com/p/drmemory/issues/detail?id=55 |
Derek Bruening
2011/05/24 13:45:32
I have in my notes a TODO item to remove this, wil
|
-UNADDRESSABLE ACCESS |
-ntdll.dll!Rtl*CriticalSection* |
- |
-UNADDRESSABLE ACCESS |
-*!Send |
- |
-UNADDRESSABLE ACCESS |
-... |
-*!tracked_objects::Tracked::Tracked |
- |
-UNADDRESSABLE ACCESS |
-*!Pickle::Pickle |
- |
-UNADDRESSABLE ACCESS |
-... |
-*!IPC::Channel*::*Message* |
- |
# http://code.google.com/p/drmemory/issues/detail?id=58 |
UNINITIALIZED READ |
... |
@@ -248,10 +247,6 @@ |
UNINITIALIZED READ |
... |
-ADVAPI32.dll!Reg*Value* |
Derek Bruening
2011/05/24 13:45:32
I have in my notes a TODO item to go and remove th
|
- |
-UNINITIALIZED READ |
-... |
MSWSOCK.dll!WSPStartup |
UNADDRESSABLE ACCESS |
@@ -297,15 +292,6 @@ |
ntdll.dll!RtlConvertUlongToLargeInteger |
ntdll.dll!KiUserExceptionDispatcher |
-# http://code.google.com/p/drmemory/issues/detail?id=304 |
-UNINITIALIZED READ |
-... |
-*!_nh_malloc_dbg_impl |
- |
-UNADDRESSABLE ACCESS |
-... |
-*!_nh_malloc_dbg_impl |
- |
# http://code.google.com/p/drmemory/issues/detail?id=305 |
LEAK |
*!free |
@@ -357,11 +343,10 @@ |
ntdll.dll!LdrInitializeThunk |
ntdll.dll!LdrShutdownThread |
-############################ |
-# TODO(timurrrr): investigate these |
+# http://code.google.com/p/drmemory/issues/detail?id=412 |
UNINITIALIZED READ |
... |
-*!win_util::GetLogonSessionOnlyDACL |
+ADVAPI32.dll!Reg*Value* |
Derek Bruening
2011/05/24 13:45:32
this one shouldn't be here: i#358 was fixed. what
|
UNINITIALIZED READ |
... |
@@ -369,6 +354,16 @@ |
UNINITIALIZED READ |
... |
+RPCRT4.dll!NdrClientCall2 |
+ |
+############################ |
+# TODO(timurrrr): investigate these |
+UNINITIALIZED READ |
+... |
+*!win_util::GetLogonSessionOnlyDACL |
+ |
+UNINITIALIZED READ |
+... |
ntshrui.dll!IsPathSharedW |
UNINITIALIZED READ |
@@ -428,10 +423,6 @@ |
*!NdrSimpleStructFree |
UNINITIALIZED READ |
-... |
-*!NdrClientCall2 |
- |
-UNINITIALIZED READ |
ntdll.dll!RtlpNtOpenKey |
ntdll.dll!RtlMakeSelfRelativeSD |
ntdll.dll!RtlAbsoluteToSelfRelativeSD |