OLD | NEW |
1 ############################ | 1 ############################ |
2 # Known reports on the third party we have no control over. | 2 # Known reports on the third party we have no control over. |
3 UNINITIALIZED READ | 3 UNINITIALIZED READ |
4 ... | 4 ... |
5 *!deflate_* | 5 *!deflate_* |
6 *!MOZ_Z_deflate | 6 *!MOZ_Z_deflate |
7 | 7 |
8 # http://code.google.com/p/drmemory/issues/detail?id=406 | 8 # http://code.google.com/p/drmemory/issues/detail?id=406 |
9 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. | 9 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. |
10 LEAK | 10 LEAK |
(...skipping 21 matching lines...) Expand all Loading... |
32 # They deliberately use uninit local var in sqlite random generator | 32 # They deliberately use uninit local var in sqlite random generator |
33 UNINITIALIZED READ | 33 UNINITIALIZED READ |
34 *!randomByte | 34 *!randomByte |
35 *!sqlite3_randomness | 35 *!sqlite3_randomness |
36 | 36 |
37 ############################ | 37 ############################ |
38 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis | 38 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis |
39 # assumptions or unhandled syscalls | 39 # assumptions or unhandled syscalls |
40 | 40 |
41 # http://code.google.com/p/drmemory/issues/detail?id=12 | 41 # http://code.google.com/p/drmemory/issues/detail?id=12 |
| 42 # Please note: the following suppressions were written in the abscense of |
| 43 # private symbols so may need to be updated when we switch to auto-loading PDBs |
42 UNINITIALIZED READ | 44 UNINITIALIZED READ |
43 ntdll.dll!Rtl* | 45 ntdll.dll!Rtl* |
44 ntdll.dll!Rtl* | 46 ntdll.dll!Rtl* |
45 ntdll.dll!RtlFindActivationContextSectionString | 47 ntdll.dll!RtlFindActivationContextSectionString |
46 | 48 |
47 UNINITIALIZED READ | 49 UNINITIALIZED READ |
48 ... | 50 ... |
49 SHELL32.dll!SHFileOperation* | 51 SHELL32.dll!SHFileOperation* |
50 | 52 |
51 UNINITIALIZED READ | 53 UNINITIALIZED READ |
(...skipping 13 matching lines...) Expand all Loading... |
65 SHELL32.dll!SHFileOperation* | 67 SHELL32.dll!SHFileOperation* |
66 | 68 |
67 UNINITIALIZED READ | 69 UNINITIALIZED READ |
68 ... | 70 ... |
69 SHELL32.dll!ILLoadFromStream* | 71 SHELL32.dll!ILLoadFromStream* |
70 | 72 |
71 UNINITIALIZED READ | 73 UNINITIALIZED READ |
72 ... | 74 ... |
73 SHELL32.dll!ILSaveToStream* | 75 SHELL32.dll!ILSaveToStream* |
74 | 76 |
75 POSSIBLE LEAK | 77 LEAK |
76 ... | 78 ... |
77 SHELL32.dll!SHFileOperation* | 79 SHELL32.dll!SHFileOperation* |
78 | 80 |
| 81 UNINITIALIZED READ |
| 82 ... |
| 83 SHELL32.dll!SHGetItemFromDataObject |
| 84 |
| 85 LEAK |
| 86 ... |
| 87 SHELL32.dll!SHGetItemFromDataObject |
| 88 |
| 89 LEAK |
| 90 ole32.dll!* |
| 91 ... |
| 92 ole32.dll!* |
| 93 SHELL32.dll!SHChangeNotifySuspendResume |
| 94 |
79 # http://code.google.com/p/drmemory/issues/detail?id=14 | 95 # http://code.google.com/p/drmemory/issues/detail?id=14 |
80 UNINITIALIZED READ | 96 UNINITIALIZED READ |
81 ... | 97 ... |
82 *!CreateProcess* | 98 *!CreateProcess* |
83 | 99 |
84 LEAK | 100 LEAK |
85 ... | 101 ... |
86 *!CreateProcess* | 102 *!CreateProcess* |
87 | 103 |
88 UNINITIALIZED READ | 104 UNINITIALIZED READ |
(...skipping 787 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
876 softokn3.dll!NSC_ModuleDBFunc | 892 softokn3.dll!NSC_ModuleDBFunc |
877 | 893 |
878 # http://crbug.com/92166 | 894 # http://crbug.com/92166 |
879 LEAK | 895 LEAK |
880 ... | 896 ... |
881 *!operator new | 897 *!operator new |
882 *!views::NativeWidgetWin::OnCreate | 898 *!views::NativeWidgetWin::OnCreate |
883 | 899 |
884 # Empty line at EOF - workaround for | 900 # Empty line at EOF - workaround for |
885 # http://code.google.com/p/drmemory/issues/detail?id=41 | 901 # http://code.google.com/p/drmemory/issues/detail?id=41 |
OLD | NEW |