OLD | NEW |
1 ############################ | 1 ############################ |
2 # Known reports on the third party we have no control over. | 2 # Known reports on the third party we have no control over. |
3 UNINITIALIZED READ | 3 UNINITIALIZED READ |
4 ... | 4 ... |
5 *!deflate_* | 5 *!deflate_* |
6 *!MOZ_Z_deflate | 6 *!MOZ_Z_deflate |
7 | 7 |
8 # http://code.google.com/p/drmemory/issues/detail?id=406 | 8 # http://code.google.com/p/drmemory/issues/detail?id=406 |
9 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. | 9 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. |
10 LEAK | 10 LEAK |
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
80 | 80 |
81 UNINITIALIZED READ | 81 UNINITIALIZED READ |
82 ... | 82 ... |
83 SHELL32.dll!SHGetItemFromDataObject | 83 SHELL32.dll!SHGetItemFromDataObject |
84 | 84 |
85 LEAK | 85 LEAK |
86 ... | 86 ... |
87 SHELL32.dll!SHGetItemFromDataObject | 87 SHELL32.dll!SHGetItemFromDataObject |
88 | 88 |
89 LEAK | 89 LEAK |
90 ole32.dll!* | |
91 ... | 90 ... |
92 ole32.dll!* | 91 ole32.dll!* |
93 SHELL32.dll!SHChangeNotifySuspendResume | 92 SHELL32.dll!SHChangeNotifySuspendResume |
94 | 93 |
95 # http://code.google.com/p/drmemory/issues/detail?id=14 | 94 # http://code.google.com/p/drmemory/issues/detail?id=14 |
96 UNINITIALIZED READ | 95 UNINITIALIZED READ |
97 ... | 96 ... |
98 *!CreateProcess* | 97 *!CreateProcess* |
99 | 98 |
100 LEAK | 99 LEAK |
(...skipping 405 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
506 dbghelp.dll!* | 505 dbghelp.dll!* |
507 ... | 506 ... |
508 dbghelp.dll!StackWalk64 | 507 dbghelp.dll!StackWalk64 |
509 | 508 |
510 LEAK | 509 LEAK |
511 *!* | 510 *!* |
512 dbghelp.dll!* | 511 dbghelp.dll!* |
513 ... | 512 ... |
514 dbghelp.dll!StackWalk64 | 513 dbghelp.dll!StackWalk64 |
515 | 514 |
| 515 # http://code.google.com/p/drmemory/issues/detail?id=569 |
| 516 # symbols w/o PDB make no sense, so sticking with mod+offs |
| 517 POSSIBLE LEAK |
| 518 <RPCRT4.dll+0x10636> |
| 519 <RPCRT4.dll+0x10610> |
| 520 ... |
| 521 <RPCRT4.dll+0x3474?> |
| 522 <ntdll.dll+0x64fde> |
| 523 <ntdll.dll+0x447f3> |
| 524 |
516 ############################ | 525 ############################ |
517 # TODO(timurrrr): investigate these | 526 # TODO(timurrrr): investigate these |
518 UNINITIALIZED READ | 527 UNINITIALIZED READ |
519 ... | 528 ... |
520 *!win_util::GetLogonSessionOnlyDACL | 529 *!win_util::GetLogonSessionOnlyDACL |
521 | 530 |
522 UNINITIALIZED READ | 531 UNINITIALIZED READ |
523 ... | 532 ... |
524 ntshrui.dll!IsPathSharedW | 533 ntshrui.dll!IsPathSharedW |
525 | 534 |
(...skipping 366 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
892 softokn3.dll!NSC_ModuleDBFunc | 901 softokn3.dll!NSC_ModuleDBFunc |
893 | 902 |
894 # http://crbug.com/92166 | 903 # http://crbug.com/92166 |
895 LEAK | 904 LEAK |
896 ... | 905 ... |
897 *!operator new | 906 *!operator new |
898 *!views::NativeWidgetWin::OnCreate | 907 *!views::NativeWidgetWin::OnCreate |
899 | 908 |
900 # Empty line at EOF - workaround for | 909 # Empty line at EOF - workaround for |
901 # http://code.google.com/p/drmemory/issues/detail?id=41 | 910 # http://code.google.com/p/drmemory/issues/detail?id=41 |
OLD | NEW |