Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(166)

Side by Side Diff: tools/valgrind/drmemory/suppressions_full.txt

Issue 761903003: Update from https://crrev.com/306655 (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # This file contains suppressions for the Dr.Memory tool, see 1 # This file contains suppressions for the Dr.Memory tool, see
2 # http://dev.chromium.org/developers/how-tos/using-drmemory 2 # http://dev.chromium.org/developers/how-tos/using-drmemory
3 # 3 #
4 # This file should contain suppressions only for the reports happening 4 # This file should contain suppressions only for the reports happening
5 # in the 'full' mode (drmemory_full). 5 # in the 'full' mode (drmemory_full).
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light), 6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
7 # please use suppressions.txt instead. 7 # please use suppressions.txt instead.
8 8
9 ############################################################### 9 ###############################################################
10 # Known reports on the third party we have no control over. 10 # Known reports on the third party we have no control over.
11 11
12 UNINITIALIZED READ 12 UNINITIALIZED READ
13 name=http://crbug.com/116277 13 name=http://crbug.com/116277
14 ... 14 ...
15 *!MOZ_Z_deflate 15 *!MOZ_Z_deflate
16 16
17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. 17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
18 LEAK 18 LEAK
19 name=http://code.google.com/p/drmemory/issues/detail?id=406 19 name=https://github.com/DynamoRIO/drmemory/issues/406
20 ADVAPI32.dll!WmiOpenBlock 20 ADVAPI32.dll!WmiOpenBlock
21 ADVAPI32.dll!WmiOpenBlock 21 ADVAPI32.dll!WmiOpenBlock
22 22
23 # Leaks inside GoogleDesktop - it injects into our processes for some reason 23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
24 LEAK 24 LEAK
25 name=GoogleDesktop LEAK 25 name=GoogleDesktop LEAK
26 ... 26 ...
27 GoogleDesktopNetwork3.DLL!DllUnregisterServer 27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
28 28
29 # They deliberately use uninit local var in sqlite random generator. 29 # They deliberately use uninit local var in sqlite random generator.
30 # Random bytes may mess up the call stack between randomByte and 30 # Random bytes may mess up the call stack between randomByte and
31 # sqlite3_* frames (http://code.google.com/p/drmemory/issues/detail?id=1514) 31 # sqlite3_* frames (https://github.com/DynamoRIO/drmemory/issues/1514)
32 # so we just look for randomByte. 32 # so we just look for randomByte.
33 UNINITIALIZED READ 33 UNINITIALIZED READ
34 name=sqlite3_randomness UNINIT 34 name=sqlite3_randomness UNINIT
35 *!randomByte 35 *!randomByte
36 36
37 # Intentional leak in WebKit Template Framework for ThreadData. 37 # Intentional leak in WebKit Template Framework for ThreadData.
38 LEAK 38 LEAK
39 name=intentional WTF ThreadData leak 39 name=intentional WTF ThreadData leak
40 ... 40 ...
41 *!WTF::wtfThreadData 41 *!WTF::wtfThreadData
(...skipping 27 matching lines...) Expand all
69 libpng.dll!wk_png_write_find_filter 69 libpng.dll!wk_png_write_find_filter
70 libpng.dll!wk_png_write_row 70 libpng.dll!wk_png_write_row
71 71
72 ############################################################### 72 ###############################################################
73 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis 73 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
74 # assumptions or unhandled syscalls 74 # assumptions or unhandled syscalls
75 75
76 # Please note: the following suppressions were written in the abscense of 76 # Please note: the following suppressions were written in the abscense of
77 # private symbols so may need to be updated when we switch to auto-loading PDBs 77 # private symbols so may need to be updated when we switch to auto-loading PDBs
78 UNINITIALIZED READ 78 UNINITIALIZED READ
79 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1) 79 name=https://github.com/DynamoRIO/drmemory/issues/12 (1)
80 ntdll.dll!Rtl* 80 ntdll.dll!Rtl*
81 ntdll.dll!Rtl* 81 ntdll.dll!Rtl*
82 ntdll.dll!RtlFindActivationContextSectionString 82 ntdll.dll!RtlFindActivationContextSectionString
83 83
84 UNINITIALIZED READ 84 UNINITIALIZED READ
85 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2) 85 name=https://github.com/DynamoRIO/drmemory/issues/12 (2)
86 ... 86 ...
87 SHELL32.dll!SHFileOperation* 87 SHELL32.dll!SHFileOperation*
88 88
89 UNINITIALIZED READ 89 UNINITIALIZED READ
90 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3) 90 name=https://github.com/DynamoRIO/drmemory/issues/12 (3)
91 ... 91 ...
92 SHELL32.dll!SHGetFolderPath* 92 SHELL32.dll!SHGetFolderPath*
93 93
94 LEAK 94 LEAK
95 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4) 95 name=https://github.com/DynamoRIO/drmemory/issues/12 (4)
96 ... 96 ...
97 SHELL32.dll!SHGetFolderPath* 97 SHELL32.dll!SHGetFolderPath*
98 98
99 UNINITIALIZED READ 99 UNINITIALIZED READ
100 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5) 100 name=https://github.com/DynamoRIO/drmemory/issues/12 (5)
101 ... 101 ...
102 SHELL32.dll!SHCreateDirectory* 102 SHELL32.dll!SHCreateDirectory*
103 103
104 UNINITIALIZED READ 104 UNINITIALIZED READ
105 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6) 105 name=https://github.com/DynamoRIO/drmemory/issues/12 (6)
106 ... 106 ...
107 SHELL32.dll!ILLoadFromStream* 107 SHELL32.dll!ILLoadFromStream*
108 108
109 UNINITIALIZED READ 109 UNINITIALIZED READ
110 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7) 110 name=https://github.com/DynamoRIO/drmemory/issues/12 (7)
111 ... 111 ...
112 SHELL32.dll!ILSaveToStream* 112 SHELL32.dll!ILSaveToStream*
113 113
114 LEAK 114 LEAK
115 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8) 115 name=https://github.com/DynamoRIO/drmemory/issues/12 (8)
116 ... 116 ...
117 SHELL32.dll!SHFileOperation* 117 SHELL32.dll!SHFileOperation*
118 118
119 UNINITIALIZED READ 119 UNINITIALIZED READ
120 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9) 120 name=https://github.com/DynamoRIO/drmemory/issues/12 (9)
121 ... 121 ...
122 SHELL32.dll!SHGetItemFromDataObject 122 SHELL32.dll!SHGetItemFromDataObject
123 123
124 LEAK 124 LEAK
125 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10) 125 name=https://github.com/DynamoRIO/drmemory/issues/12 (10)
126 ... 126 ...
127 SHELL32.dll!SHGetItemFromDataObject 127 SHELL32.dll!SHGetItemFromDataObject
128 128
129 LEAK 129 LEAK
130 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11) 130 name=https://github.com/DynamoRIO/drmemory/issues/12 (11)
131 ... 131 ...
132 ole32.dll!* 132 ole32.dll!*
133 SHELL32.dll!SHChangeNotifySuspendResume 133 SHELL32.dll!SHChangeNotifySuspendResume
134 134
135 UNINITIALIZED READ 135 UNINITIALIZED READ
136 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1) 136 name=https://github.com/DynamoRIO/drmemory/issues/14 (1)
137 ... 137 ...
138 *!CreateProcess* 138 *!CreateProcess*
139 139
140 LEAK 140 LEAK
141 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2) 141 name=https://github.com/DynamoRIO/drmemory/issues/14 (2)
142 ... 142 ...
143 *!CreateProcess* 143 *!CreateProcess*
144 144
145 UNINITIALIZED READ 145 UNINITIALIZED READ
146 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3) 146 name=https://github.com/DynamoRIO/drmemory/issues/14 (3)
147 ... 147 ...
148 *!base::LaunchApp* 148 *!base::LaunchApp*
149 149
150 UNINITIALIZED READ 150 UNINITIALIZED READ
151 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1) 151 name=https://github.com/DynamoRIO/drmemory/issues/17 (1)
152 ... 152 ...
153 *!CreateWindow* 153 *!CreateWindow*
154 154
155 POSSIBLE LEAK 155 POSSIBLE LEAK
156 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2) 156 name=https://github.com/DynamoRIO/drmemory/issues/17 (2)
157 GDI32.dll!* 157 GDI32.dll!*
158 GDI32.dll!CreateFontIndirectExW 158 GDI32.dll!CreateFontIndirectExW
159 GDI32.dll!CreateFontIndirectW 159 GDI32.dll!CreateFontIndirectW
160 160
161 LEAK 161 LEAK
162 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3) 162 name=https://github.com/DynamoRIO/drmemory/issues/17 (3)
163 KERNELBASE.dll!LocalAlloc 163 KERNELBASE.dll!LocalAlloc
164 ... 164 ...
165 USER32.dll!CreateWindow* 165 USER32.dll!CreateWindow*
166 166
167 UNINITIALIZED READ 167 UNINITIALIZED READ
168 name=http://code.google.com/p/drmemory/issues/detail?id=18 a 168 name=https://github.com/DynamoRIO/drmemory/issues/18 a
169 ... 169 ...
170 *!CoInitialize* 170 *!CoInitialize*
171 171
172 UNINITIALIZED READ 172 UNINITIALIZED READ
173 name=http://code.google.com/p/drmemory/issues/detail?id=18 b 173 name=https://github.com/DynamoRIO/drmemory/issues/18 b
174 ... 174 ...
175 *!CoCreateInstance* 175 *!CoCreateInstance*
176 176
177 UNINITIALIZED READ 177 UNINITIALIZED READ
178 name=http://code.google.com/p/drmemory/issues/detail?id=18 c 178 name=https://github.com/DynamoRIO/drmemory/issues/18 c
179 ... 179 ...
180 *!CoUninitialize* 180 *!CoUninitialize*
181 181
182 UNINITIALIZED READ 182 UNINITIALIZED READ
183 name=http://code.google.com/p/drmemory/issues/detail?id=18 d 183 name=https://github.com/DynamoRIO/drmemory/issues/18 d
184 ... 184 ...
185 UxTheme.dll!* 185 UxTheme.dll!*
186 186
187 UNINITIALIZED READ 187 UNINITIALIZED READ
188 name=http://code.google.com/p/drmemory/issues/detail?id=40 a 188 name=https://github.com/DynamoRIO/drmemory/issues/40 a
189 ... 189 ...
190 WINSPOOL.DRV!* 190 WINSPOOL.DRV!*
191 191
192 LEAK 192 LEAK
193 name=http://code.google.com/p/drmemory/issues/detail?id=40 b 193 name=https://github.com/DynamoRIO/drmemory/issues/40 b
194 ... 194 ...
195 WINSPOOL.DRV!* 195 WINSPOOL.DRV!*
196 196
197 UNINITIALIZED READ 197 UNINITIALIZED READ
198 name=http://code.google.com/p/drmemory/issues/detail?id=48 a 198 name=https://github.com/DynamoRIO/drmemory/issues/48 a
199 system call NtContinue 199 system call NtContinue
200 ... 200 ...
201 *!*SetThreadName 201 *!*SetThreadName
202 202
203 UNINITIALIZED READ 203 UNINITIALIZED READ
204 name=http://code.google.com/p/drmemory/issues/detail?id=48 b 204 name=https://github.com/DynamoRIO/drmemory/issues/48 b
205 system call NtContinue 205 system call NtContinue
206 *!WTF::initializeCurrentThreadInternal 206 *!WTF::initializeCurrentThreadInternal
207 207
208 UNINITIALIZED READ 208 UNINITIALIZED READ
209 name=http://code.google.com/p/drmemory/issues/detail?id=52 a 209 name=https://github.com/DynamoRIO/drmemory/issues/52 a
210 ... 210 ...
211 DBGHELP.dll!SymInitialize 211 DBGHELP.dll!SymInitialize
212 212
213 UNINITIALIZED READ 213 UNINITIALIZED READ
214 name=http://code.google.com/p/drmemory/issues/detail?id=52 b 214 name=https://github.com/DynamoRIO/drmemory/issues/52 b
215 ... 215 ...
216 DBGHELP.dll!SymEnumSourceFiles 216 DBGHELP.dll!SymEnumSourceFiles
217 217
218 UNINITIALIZED READ 218 UNINITIALIZED READ
219 name=http://code.google.com/p/drmemory/issues/detail?id=52 c 219 name=https://github.com/DynamoRIO/drmemory/issues/52 c
220 ... 220 ...
221 msvcrt.dll!_RTDynamicCast 221 msvcrt.dll!_RTDynamicCast
222 222
223 UNINITIALIZED READ 223 UNINITIALIZED READ
224 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghe lp 224 name=https://github.com/DynamoRIO/drmemory/issues/52 bit-level fp in dbghelp
225 instruction=test 0x*(%*) $0x?? 225 instruction=test 0x*(%*) $0x??
226 DBGHELP.dll!SymUnloadModule64 226 DBGHELP.dll!SymUnloadModule64
227 227
228 UNINITIALIZED READ 228 UNINITIALIZED READ
229 name=http://code.google.com/p/drmemory/issues/detail?id=53 229 name=https://github.com/DynamoRIO/drmemory/issues/53
230 ADVAPI32.dll!WmiMofEnumerateResourcesA 230 ADVAPI32.dll!WmiMofEnumerateResourcesA
231 ADVAPI32.dll!WmiMofEnumerateResourcesA 231 ADVAPI32.dll!WmiMofEnumerateResourcesA
232 ADVAPI32.dll!Sta*TraceW 232 ADVAPI32.dll!Sta*TraceW
233 233
234 UNINITIALIZED READ 234 UNINITIALIZED READ
235 name=http://code.google.com/p/drmemory/issues/detail?id=58 235 name=https://github.com/DynamoRIO/drmemory/issues/58
236 ... 236 ...
237 *!_cfltcvt_l 237 *!_cfltcvt_l
238 238
239 UNINITIALIZED READ 239 UNINITIALIZED READ
240 name=http://code.google.com/p/drmemory/issues/detail?id=60 240 name=https://github.com/DynamoRIO/drmemory/issues/60
241 USP10.dll!* 241 USP10.dll!*
242 ... 242 ...
243 USP10.dll!ScriptStringAnalyse 243 USP10.dll!ScriptStringAnalyse
244 244
245 LEAK 245 LEAK
246 IMM32.dll!ImmGetIMCCSize 246 IMM32.dll!ImmGetIMCCSize
247 IMM32.dll!ImmLockClientImc 247 IMM32.dll!ImmLockClientImc
248 IMM32.dll!ImmDisableIME 248 IMM32.dll!ImmDisableIME
249 IMM32.dll!ImmSetActiveContext 249 IMM32.dll!ImmSetActiveContext
250 USER32.dll!IMPSetIMEA 250 USER32.dll!IMPSetIMEA
251 251
252 UNINITIALIZED READ 252 UNINITIALIZED READ
253 name=http://code.google.com/p/drmemory/issues/detail?id=65 a 253 name=https://github.com/DynamoRIO/drmemory/issues/65 a
254 ... 254 ...
255 *!SystemFunction036 255 *!SystemFunction036
256 256
257 UNINITIALIZED READ 257 UNINITIALIZED READ
258 name=http://code.google.com/p/drmemory/issues/detail?id=65 b 258 name=https://github.com/DynamoRIO/drmemory/issues/65 b
259 ... 259 ...
260 *!talk_base::CreateRandomString 260 *!talk_base::CreateRandomString
261 261
262 UNINITIALIZED READ 262 UNINITIALIZED READ
263 name=http://code.google.com/p/drmemory/issues/detail?id=68 a 263 name=https://github.com/DynamoRIO/drmemory/issues/68 a
264 ... 264 ...
265 WS2_32.dll!* 265 WS2_32.dll!*
266 266
267 UNINITIALIZED READ 267 UNINITIALIZED READ
268 name=http://code.google.com/p/drmemory/issues/detail?id=68 b 268 name=https://github.com/DynamoRIO/drmemory/issues/68 b
269 ... 269 ...
270 ADVAPI32.dll!SetSecurityDescriptorDacl 270 ADVAPI32.dll!SetSecurityDescriptorDacl
271 271
272 UNINITIALIZED READ 272 UNINITIALIZED READ
273 name=http://code.google.com/p/drmemory/issues/detail?id=68 c 273 name=https://github.com/DynamoRIO/drmemory/issues/68 c
274 ... 274 ...
275 MSWSOCK.dll!WSPStartup 275 MSWSOCK.dll!WSPStartup
276 276
277 UNINITIALIZED READ 277 UNINITIALIZED READ
278 name=http://code.google.com/p/drmemory/issues/detail?id=68 d 278 name=https://github.com/DynamoRIO/drmemory/issues/68 d
279 ... 279 ...
280 ntdll.dll!RtlValidateUnicodeString 280 ntdll.dll!RtlValidateUnicodeString
281 281
282 LEAK 282 LEAK
283 name=http://code.google.com/p/drmemory/issues/detail?id=256 283 name=https://github.com/DynamoRIO/drmemory/issues/256
284 *!_mtinit 284 *!_mtinit
285 *!__tmainCRTStartup 285 *!__tmainCRTStartup
286 *!mainCRTStartup 286 *!mainCRTStartup
287 287
288 POSSIBLE LEAK 288 POSSIBLE LEAK
289 name=http://code.google.com/p/drmemory/issues/detail?id=274 a 289 name=https://github.com/DynamoRIO/drmemory/issues/274 a
290 ... 290 ...
291 GDI32.dll!CreateDCW 291 GDI32.dll!CreateDCW
292 292
293 LEAK 293 LEAK
294 name=http://code.google.com/p/drmemory/issues/detail?id=274 b 294 name=https://github.com/DynamoRIO/drmemory/issues/274 b
295 ... 295 ...
296 GDI32.dll!CreateDCW 296 GDI32.dll!CreateDCW
297 297
298 LEAK 298 LEAK
299 name=http://code.google.com/p/drmemory/issues/detail?id=275 299 name=https://github.com/DynamoRIO/drmemory/issues/275
300 ... 300 ...
301 *!_getptd* 301 *!_getptd*
302 302
303 UNINITIALIZED READ 303 UNINITIALIZED READ
304 name=http://code.google.com/p/drmemory/issues/detail?id=276 304 name=https://github.com/DynamoRIO/drmemory/issues/276
305 ... 305 ...
306 ntdll.dll!RtlConvertUlongToLargeInteger 306 ntdll.dll!RtlConvertUlongToLargeInteger
307 ntdll.dll!RtlConvertUlongToLargeInteger 307 ntdll.dll!RtlConvertUlongToLargeInteger
308 ntdll.dll!KiUserExceptionDispatcher 308 ntdll.dll!KiUserExceptionDispatcher
309 309
310 LEAK 310 LEAK
311 name=http://code.google.com/p/drmemory/issues/detail?id=305 311 name=https://github.com/DynamoRIO/drmemory/issues/305
312 *!free 312 *!free
313 *!free 313 *!free
314 *!operator new 314 *!operator new
315 ... 315 ...
316 *!MiniDumpWriteDump 316 *!MiniDumpWriteDump
317 317
318 UNINITIALIZED READ 318 UNINITIALIZED READ
319 name=http://code.google.com/p/drmemory/issues/detail?id=346 a 319 name=https://github.com/DynamoRIO/drmemory/issues/346 a
320 ... 320 ...
321 GDI32.dll!CloseEnhMetaFile 321 GDI32.dll!CloseEnhMetaFile
322 322
323 UNINITIALIZED READ 323 UNINITIALIZED READ
324 name=http://code.google.com/p/drmemory/issues/detail?id=346 b 324 name=https://github.com/DynamoRIO/drmemory/issues/346 b
325 GDI32.dll!SetPolyFillMode 325 GDI32.dll!SetPolyFillMode
326 GDI32.dll!CreateICW 326 GDI32.dll!CreateICW
327 327
328 UNINITIALIZED READ 328 UNINITIALIZED READ
329 name=http://code.google.com/p/drmemory/issues/detail?id=362 329 name=https://github.com/DynamoRIO/drmemory/issues/362
330 USER32.dll!UnregisterClass* 330 USER32.dll!UnregisterClass*
331 331
332 LEAK 332 LEAK
333 name=http://code.google.com/p/drmemory/issues/detail?id=382 333 name=https://github.com/DynamoRIO/drmemory/issues/382
334 ... 334 ...
335 ntdll.dll!CsrNewThread 335 ntdll.dll!CsrNewThread
336 336
337 UNINITIALIZED READ 337 UNINITIALIZED READ
338 name=http://code.google.com/p/drmemory/issues/detail?id=397 338 name=https://github.com/DynamoRIO/drmemory/issues/397
339 system call NtDeviceIoControlFile InputBuffer 339 system call NtDeviceIoControlFile InputBuffer
340 ADVAPI32.dll!ImpersonateAnonymousToken 340 ADVAPI32.dll!ImpersonateAnonymousToken
341 341
342 UNINITIALIZED READ 342 UNINITIALIZED READ
343 name=http://code.google.com/p/drmemory/issues/detail?id=407 a 343 name=https://github.com/DynamoRIO/drmemory/issues/407 a
344 system call NtRequestWaitReplyPort 344 system call NtRequestWaitReplyPort
345 RPCRT4.dll!I_RpcSendReceive 345 RPCRT4.dll!I_RpcSendReceive
346 RPCRT4.dll!NdrSendReceive 346 RPCRT4.dll!NdrSendReceive
347 347
348 UNINITIALIZED READ 348 UNINITIALIZED READ
349 name=http://code.google.com/p/drmemory/issues/detail?id=407 b 349 name=https://github.com/DynamoRIO/drmemory/issues/407 b
350 IMM32.dll!* 350 IMM32.dll!*
351 ntdll.dll!LdrInitializeThunk 351 ntdll.dll!LdrInitializeThunk
352 ntdll.dll!LdrShutdownThread 352 ntdll.dll!LdrShutdownThread
353 353
354 UNINITIALIZED READ 354 UNINITIALIZED READ
355 name=http://code.google.com/p/drmemory/issues/detail?id=412 a 355 name=https://github.com/DynamoRIO/drmemory/issues/412 a
356 ADVAPI32.dll!RegDeleteValue* 356 ADVAPI32.dll!RegDeleteValue*
357 357
358 UNINITIALIZED READ 358 UNINITIALIZED READ
359 name=http://code.google.com/p/drmemory/issues/detail?id=412 b 359 name=https://github.com/DynamoRIO/drmemory/issues/412 b
360 ... 360 ...
361 ADVAPI32.dll!Crypt* 361 ADVAPI32.dll!Crypt*
362 362
363 UNINITIALIZED READ 363 UNINITIALIZED READ
364 name=http://code.google.com/p/drmemory/issues/detail?id=412 c 364 name=https://github.com/DynamoRIO/drmemory/issues/412 c
365 ... 365 ...
366 RPCRT4.dll!NdrClientCall2 366 RPCRT4.dll!NdrClientCall2
367 367
368 LEAK 368 LEAK
369 name=http://code.google.com/p/drmemory/issues/detail?id=412 d 369 name=https://github.com/DynamoRIO/drmemory/issues/412 d
370 RSAENH.dll!DllUnregisterServer 370 RSAENH.dll!DllUnregisterServer
371 ... 371 ...
372 ADVAPI32.dll!CryptAcquireContextA 372 ADVAPI32.dll!CryptAcquireContextA
373 CRYPT32.dll!CryptEnumOIDFunction 373 CRYPT32.dll!CryptEnumOIDFunction
374 ... 374 ...
375 CRYPT32.dll!CertFindCertificateInStore 375 CRYPT32.dll!CertFindCertificateInStore
376 376
377 UNINITIALIZED READ 377 UNINITIALIZED READ
378 name=http://code.google.com/p/drmemory/issues/detail?id=412 e 378 name=https://github.com/DynamoRIO/drmemory/issues/412 e
379 ... 379 ...
380 RSAENH.dll!CPGenRandom 380 RSAENH.dll!CPGenRandom
381 381
382 UNINITIALIZED READ 382 UNINITIALIZED READ
383 name=http://code.google.com/p/drmemory/issues/detail?id=412 f 383 name=https://github.com/DynamoRIO/drmemory/issues/412 f
384 ... 384 ...
385 CRYPT??.dll!Crypt* 385 CRYPT??.dll!Crypt*
386 386
387 UNINITIALIZED READ 387 UNINITIALIZED READ
388 name=http://code.google.com/p/drmemory/issues/detail?id=412 g 388 name=https://github.com/DynamoRIO/drmemory/issues/412 g
389 *!replace_memcmp 389 *!replace_memcmp
390 ... 390 ...
391 *!testing::internal::CmpHelperEQ* 391 *!testing::internal::CmpHelperEQ*
392 ... 392 ...
393 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody 393 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
394 394
395 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't 395 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't
396 # have frame pointers, and we have trouble unwinding from it. Therefore, we use 396 # have frame pointers, and we have trouble unwinding from it. Therefore, we use
397 # this broad suppression, effectively disabling uninit checks in rsaenh.dll. 397 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
398 UNINITIALIZED READ 398 UNINITIALIZED READ
399 name=http://code.google.com/p/drmemory/issues/detail?id=412 h 399 name=https://github.com/DynamoRIO/drmemory/issues/412 h
400 RSAENH.dll!* 400 RSAENH.dll!*
401 401
402 UNINITIALIZED READ 402 UNINITIALIZED READ
403 name=http://code.google.com/p/drmemory/issues/detail?id=425 a 403 name=https://github.com/DynamoRIO/drmemory/issues/425 a
404 CLBCatQ.DLL!DestroyStgDatabase 404 CLBCatQ.DLL!DestroyStgDatabase
405 CLBCatQ.DLL!PostError 405 CLBCatQ.DLL!PostError
406 CLBCatQ.DLL!PostError 406 CLBCatQ.DLL!PostError
407 407
408 LEAK 408 LEAK
409 name=http://code.google.com/p/drmemory/issues/detail?id=425 b 409 name=https://github.com/DynamoRIO/drmemory/issues/425 b
410 RPCRT4.dll!I_RpcBCacheFree 410 RPCRT4.dll!I_RpcBCacheFree
411 RPCRT4.dll!I_RpcBCacheFree 411 RPCRT4.dll!I_RpcBCacheFree
412 ... 412 ...
413 RPCRT4.dll!NdrClientCall2 413 RPCRT4.dll!NdrClientCall2
414 414
415 UNINITIALIZED READ 415 UNINITIALIZED READ
416 name=http://code.google.com/p/drmemory/issues/detail?id=425 c 416 name=https://github.com/DynamoRIO/drmemory/issues/425 c
417 msdmo.dll!* 417 msdmo.dll!*
418 msdmo.dll!* 418 msdmo.dll!*
419 DEVENUM.DLL!* 419 DEVENUM.DLL!*
420 420
421 UNINITIALIZED READ 421 UNINITIALIZED READ
422 name=http://code.google.com/p/drmemory/issues/detail?id=435 a 422 name=https://github.com/DynamoRIO/drmemory/issues/435 a
423 ... 423 ...
424 ntdll.dll!RtlSetSecurityObject 424 ntdll.dll!RtlSetSecurityObject
425 ntdll.dll!RtlNewSecurityObjectEx 425 ntdll.dll!RtlNewSecurityObjectEx
426 ADVAPI32.dll!CreatePrivateObjectSecurityEx 426 ADVAPI32.dll!CreatePrivateObjectSecurityEx
427 NTMARTA.dll!AccRewriteSetNamedRights 427 NTMARTA.dll!AccRewriteSetNamedRights
428 428
429 POSSIBLE LEAK 429 POSSIBLE LEAK
430 name=http://code.google.com/p/drmemory/issues/detail?id=435 b 430 name=https://github.com/DynamoRIO/drmemory/issues/435 b
431 WLDAP32.dll!Ordinal325 431 WLDAP32.dll!Ordinal325
432 ... 432 ...
433 WLDAP32.dll!Ordinal325 433 WLDAP32.dll!Ordinal325
434 ntdll.dll!LdrInitializeThunk 434 ntdll.dll!LdrInitializeThunk
435 ntdll.dll!LdrFindResourceDirectory_U 435 ntdll.dll!LdrFindResourceDirectory_U
436 ntdll.dll!RtlValidateUnicodeString 436 ntdll.dll!RtlValidateUnicodeString
437 ntdll.dll!LdrLoadDll 437 ntdll.dll!LdrLoadDll
438 KERNEL32.dll!LoadLibraryExW 438 KERNEL32.dll!LoadLibraryExW
439 439
440 # mod+offs suppression because the symbolic makes no sense and changes 440 # mod+offs suppression because the symbolic makes no sense and changes
441 # completely in the presence of WS2_32.dll symbols. 441 # completely in the presence of WS2_32.dll symbols.
442 LEAK 442 LEAK
443 name=http://code.google.com/p/drmemory/issues/detail?id=438 443 name=https://github.com/DynamoRIO/drmemory/issues/438
444 <WS2_32.dll+0x260c> 444 <WS2_32.dll+0x260c>
445 <WS2_32.dll+0x2b76> 445 <WS2_32.dll+0x2b76>
446 <WS2_32.dll+0x2c61> 446 <WS2_32.dll+0x2c61>
447 447
448 UNINITIALIZED READ 448 UNINITIALIZED READ
449 name=http://code.google.com/p/drmemory/issues/detail?id=454 a 449 name=https://github.com/DynamoRIO/drmemory/issues/454 a
450 ... 450 ...
451 WINMM.dll!wave*GetNumDevs 451 WINMM.dll!wave*GetNumDevs
452 452
453 LEAK 453 LEAK
454 name=http://code.google.com/p/drmemory/issues/detail?id=454 b 454 name=https://github.com/DynamoRIO/drmemory/issues/454 b
455 ... 455 ...
456 WINMM.dll!wave*GetNumDevs 456 WINMM.dll!wave*GetNumDevs
457 457
458 LEAK 458 LEAK
459 name=http://code.google.com/p/drmemory/issues/detail?id=466 459 name=https://github.com/DynamoRIO/drmemory/issues/466
460 ntdll.dll!RtlRunOnceBeginInitialize 460 ntdll.dll!RtlRunOnceBeginInitialize
461 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount 461 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
462 462
463 UNINITIALIZED READ 463 UNINITIALIZED READ
464 name=http://code.google.com/p/drmemory/issues/detail?id=473 a 464 name=https://github.com/DynamoRIO/drmemory/issues/473 a
465 system call NtDeviceIoControlFile InputBuffer 465 system call NtDeviceIoControlFile InputBuffer
466 ... 466 ...
467 iphlpapi.dll!GetAdaptersAddresses 467 iphlpapi.dll!GetAdaptersAddresses
468 468
469 POSSIBLE LEAK 469 POSSIBLE LEAK
470 name=http://code.google.com/p/drmemory/issues/detail?id=473 b 470 name=https://github.com/DynamoRIO/drmemory/issues/473 b
471 ESENT.dll!* 471 ESENT.dll!*
472 ESENT.dll!* 472 ESENT.dll!*
473 ESENT.dll!* 473 ESENT.dll!*
474 ntdll.dll!Ldr*Init* 474 ntdll.dll!Ldr*Init*
475 ntdll.dll!Ldr* 475 ntdll.dll!Ldr*
476 ntdll.dll!* 476 ntdll.dll!*
477 ntdll.dll!LdrLoadDll 477 ntdll.dll!LdrLoadDll
478 ... 478 ...
479 iphlpapi.dll!GetPerAdapterInfo 479 iphlpapi.dll!GetPerAdapterInfo
480 ... 480 ...
481 iphlpapi.dll!GetAdaptersAddresses 481 iphlpapi.dll!GetAdaptersAddresses
482 482
483 POSSIBLE LEAK 483 POSSIBLE LEAK
484 name=http://code.google.com/p/drmemory/issues/detail?id=473 c 484 name=https://github.com/DynamoRIO/drmemory/issues/473 c
485 RPCRT4.dll!* 485 RPCRT4.dll!*
486 RPCRT4.dll!* 486 RPCRT4.dll!*
487 ... 487 ...
488 IPHLPAPI.DLL!GetAdaptersAddresses 488 IPHLPAPI.DLL!GetAdaptersAddresses
489 489
490 LEAK 490 LEAK
491 name=http://code.google.com/p/drmemory/issues/detail?id=475 491 name=https://github.com/DynamoRIO/drmemory/issues/475
492 ... 492 ...
493 ADVAPI32.dll!CryptAcquireContextA 493 ADVAPI32.dll!CryptAcquireContextA
494 ... 494 ...
495 CRYPT32.dll!CryptMsgOpenToDecode 495 CRYPT32.dll!CryptMsgOpenToDecode
496 ... 496 ...
497 CRYPT32.dll!CryptQueryObject 497 CRYPT32.dll!CryptQueryObject
498 498
499 # Lots of leaks from our interactions with the system certificate store. May be 499 # Lots of leaks from our interactions with the system certificate store. May be
500 # worth reviewing our use of their API. 500 # worth reviewing our use of their API.
501 LEAK 501 LEAK
502 name=http://code.google.com/p/drmemory/issues/detail?id=476 a 502 name=https://github.com/DynamoRIO/drmemory/issues/476 a
503 KERNEL*.dll!LocalAlloc 503 KERNEL*.dll!LocalAlloc
504 ... 504 ...
505 CRYPT32.dll!CertGetCRLContextProperty 505 CRYPT32.dll!CertGetCRLContextProperty
506 506
507 LEAK 507 LEAK
508 name=http://code.google.com/p/drmemory/issues/detail?id=476 b 508 name=https://github.com/DynamoRIO/drmemory/issues/476 b
509 KERNEL*.dll!LocalAlloc 509 KERNEL*.dll!LocalAlloc
510 ... 510 ...
511 CRYPT32.dll!CertAddCRLContextToStore 511 CRYPT32.dll!CertAddCRLContextToStore
512 512
513 LEAK 513 LEAK
514 name=http://code.google.com/p/drmemory/issues/detail?id=476 c 514 name=https://github.com/DynamoRIO/drmemory/issues/476 c
515 KERNEL*.dll!LocalAlloc 515 KERNEL*.dll!LocalAlloc
516 ... 516 ...
517 CRYPT32.dll!CertOpenStore 517 CRYPT32.dll!CertOpenStore
518 518
519 LEAK 519 LEAK
520 name=http://code.google.com/p/drmemory/issues/detail?id=476 d 520 name=https://github.com/DynamoRIO/drmemory/issues/476 d
521 ... 521 ...
522 CRYPT32.dll!CertOpenSystemStore? 522 CRYPT32.dll!CertOpenSystemStore?
523 523
524 LEAK 524 LEAK
525 name=http://code.google.com/p/drmemory/issues/detail?id=476 e 525 name=https://github.com/DynamoRIO/drmemory/issues/476 e
526 ... 526 ...
527 CRYPT32.dll!CertGetCertificateChain 527 CRYPT32.dll!CertGetCertificateChain
528 528
529 LEAK 529 LEAK
530 name=http://code.google.com/p/drmemory/issues/detail?id=476 f 530 name=https://github.com/DynamoRIO/drmemory/issues/476 f
531 ... 531 ...
532 CRYPT32.dll!CertCompareIntegerBlob 532 CRYPT32.dll!CertCompareIntegerBlob
533 533
534 LEAK 534 LEAK
535 name=http://code.google.com/p/drmemory/issues/detail?id=476 g 535 name=https://github.com/DynamoRIO/drmemory/issues/476 g
536 ... 536 ...
537 CRYPT32.dll!CryptUnprotectData 537 CRYPT32.dll!CryptUnprotectData
538 538
539 LEAK 539 LEAK
540 name=http://code.google.com/p/drmemory/issues/detail?id=476 h 540 name=https://github.com/DynamoRIO/drmemory/issues/476 h
541 KERNEL*.dll!LocalAlloc 541 KERNEL*.dll!LocalAlloc
542 ... 542 ...
543 CRYPT32.dll!CertEnumCertificatesInStore 543 CRYPT32.dll!CertEnumCertificatesInStore
544 544
545 LEAK 545 LEAK
546 name=http://code.google.com/p/drmemory/issues/detail?id=476 i 546 name=https://github.com/DynamoRIO/drmemory/issues/476 i
547 ... 547 ...
548 CRYPT32.dll!CryptProtectData 548 CRYPT32.dll!CryptProtectData
549 549
550 LEAK 550 LEAK
551 name=http://code.google.com/p/drmemory/issues/detail?id=476 j 551 name=https://github.com/DynamoRIO/drmemory/issues/476 j
552 ... 552 ...
553 CRYPT32.dll!CryptExportPublicKeyInfoEx 553 CRYPT32.dll!CryptExportPublicKeyInfoEx
554 554
555 UNINITIALIZED READ 555 UNINITIALIZED READ
556 name=http://code.google.com/p/drmemory/issues/detail?id=502 a 556 name=https://github.com/DynamoRIO/drmemory/issues/502 a
557 system call NtSecureConnectPort parameter #3 557 system call NtSecureConnectPort parameter #3
558 GDI32.dll!* 558 GDI32.dll!*
559 GDI32.dll!* 559 GDI32.dll!*
560 560
561 UNINITIALIZED READ 561 UNINITIALIZED READ
562 name=http://code.google.com/p/drmemory/issues/detail?id=502 b 562 name=https://github.com/DynamoRIO/drmemory/issues/502 b
563 system call NtGdiEnumFonts parameter #6 563 system call NtGdiEnumFonts parameter #6
564 GDI32.dll!* 564 GDI32.dll!*
565 GDI32.dll!* 565 GDI32.dll!*
566 566
567 UNINITIALIZED READ 567 UNINITIALIZED READ
568 name=http://code.google.com/p/drmemory/issues/detail?id=511 a 568 name=https://github.com/DynamoRIO/drmemory/issues/511 a
569 RPCRT4.dll!... 569 RPCRT4.dll!...
570 ole32.dll!* 570 ole32.dll!*
571 571
572 UNINITIALIZED READ 572 UNINITIALIZED READ
573 name=http://code.google.com/p/drmemory/issues/detail?id=511 b 573 name=https://github.com/DynamoRIO/drmemory/issues/511 b
574 ole32.dll!* 574 ole32.dll!*
575 ole32.dll!* 575 ole32.dll!*
576 ole32.dll!StringFromGUID2 576 ole32.dll!StringFromGUID2
577 577
578 UNINITIALIZED READ 578 UNINITIALIZED READ
579 name=http://code.google.com/p/drmemory/issues/detail?id=512 a 579 name=https://github.com/DynamoRIO/drmemory/issues/512 a
580 ... 580 ...
581 *!browser_sync::Cryptographer::PackBootstrapToken 581 *!browser_sync::Cryptographer::PackBootstrapToken
582 *!browser_sync::Cryptographer::GetBootstrapToken 582 *!browser_sync::Cryptographer::GetBootstrapToken
583 583
584 UNINITIALIZED READ 584 UNINITIALIZED READ
585 name=http://code.google.com/p/drmemory/issues/detail?id=512 b 585 name=https://github.com/DynamoRIO/drmemory/issues/512 b
586 ... 586 ...
587 *!Encrypt* 587 *!Encrypt*
588 588
589 # TODO(bruening): remove these once we have v8 bitfields handled 589 # TODO(bruening): remove these once we have v8 bitfields handled
590 UNINITIALIZED READ 590 UNINITIALIZED READ
591 name=http://code.google.com/p/drmemory/issues/detail?id=513 a 591 name=https://github.com/DynamoRIO/drmemory/issues/513 a
592 *!v8* 592 *!v8*
593 593
594 UNINITIALIZED READ 594 UNINITIALIZED READ
595 name=http://code.google.com/p/drmemory/issues/detail?id=513 b 595 name=https://github.com/DynamoRIO/drmemory/issues/513 b
596 *!* 596 *!*
597 *!v8* 597 *!v8*
598 598
599 UNINITIALIZED READ 599 UNINITIALIZED READ
600 name=http://code.google.com/p/drmemory/issues/detail?id=513 c 600 name=https://github.com/DynamoRIO/drmemory/issues/513 c
601 <not in a module> 601 <not in a module>
602 ... 602 ...
603 *!v8* 603 *!v8*
604 604
605 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll 605 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll
606 # has no symbols. These are all on the bots using component build, so we use 606 # has no symbols. These are all on the bots using component build, so we use
607 # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue. 607 # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue.
608 UNINITIALIZED READ 608 UNINITIALIZED READ
609 name=http://code.google.com/p/drmemory/issues/detail?id=513 d 609 name=https://github.com/DynamoRIO/drmemory/issues/513 d
610 v8.dll!* 610 v8.dll!*
611 611
612 UNINITIALIZED READ 612 UNINITIALIZED READ
613 name=http://code.google.com/p/drmemory/issues/detail?id=513 e 613 name=https://github.com/DynamoRIO/drmemory/issues/513 e
614 <not in a module> 614 <not in a module>
615 ... 615 ...
616 v8.dll!* 616 v8.dll!*
617 617
618 UNINITIALIZED READ 618 UNINITIALIZED READ
619 name=http://code.google.com/p/drmemory/issues/detail?id=546 619 name=https://github.com/DynamoRIO/drmemory/issues/546
620 ... 620 ...
621 mscms.dll!* 621 mscms.dll!*
622 ... 622 ...
623 GDI32.dll!* 623 GDI32.dll!*
624 *!IconUtil::Create*HICON* 624 *!IconUtil::Create*HICON*
625 625
626 LEAK 626 LEAK
627 name=http://crbug.com/92152 627 name=http://crbug.com/92152
628 ... 628 ...
629 USER32.dll!CreateWindowExW 629 USER32.dll!CreateWindowExW
630 *!views::TooltipManagerWin::Init 630 *!views::TooltipManagerWin::Init
631 *!views::TooltipManagerWin::TooltipManagerWin 631 *!views::TooltipManagerWin::TooltipManagerWin
632 632
633 UNINITIALIZED READ 633 UNINITIALIZED READ
634 name=http://code.google.com/p/drmemory/issues/detail?id=567 a 634 name=https://github.com/DynamoRIO/drmemory/issues/567 a
635 dbghelp.dll!* 635 dbghelp.dll!*
636 ... 636 ...
637 dbghelp.dll!StackWalk64 637 dbghelp.dll!StackWalk64
638 638
639 LEAK 639 LEAK
640 name=http://code.google.com/p/drmemory/issues/detail?id=567 b 640 name=https://github.com/DynamoRIO/drmemory/issues/567 b
641 *!* 641 *!*
642 dbghelp.dll!* 642 dbghelp.dll!*
643 ... 643 ...
644 dbghelp.dll!StackWalk64 644 dbghelp.dll!StackWalk64
645 645
646 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and 646 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
647 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too 647 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too
648 # brittle, so we switched to RPCRT4.dll!*. 648 # brittle, so we switched to RPCRT4.dll!*.
649 LEAK 649 LEAK
650 name=http://code.google.com/p/drmemory/issues/detail?id=569 650 name=https://github.com/DynamoRIO/drmemory/issues/569
651 RPCRT4.dll!... 651 RPCRT4.dll!...
652 ntdll.dll!* 652 ntdll.dll!*
653 ntdll.dll!* 653 ntdll.dll!*
654 KERNEL*.dll!BaseThreadInitThunk 654 KERNEL*.dll!BaseThreadInitThunk
655 655
656 # TODO(timurrrr): investigate these 656 # TODO(timurrrr): investigate these
657 UNINITIALIZED READ 657 UNINITIALIZED READ
658 name=http://crbug.com/TODO a 658 name=http://crbug.com/TODO a
659 ... 659 ...
660 *!win_util::GetLogonSessionOnlyDACL 660 *!win_util::GetLogonSessionOnlyDACL
(...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after
765 ... 765 ...
766 *!media::VideoCaptureDevice::* 766 *!media::VideoCaptureDevice::*
767 767
768 LEAK 768 LEAK
769 name=http://crbug.com/109278 audio device COM leaks 769 name=http://crbug.com/109278 audio device COM leaks
770 ... 770 ...
771 *!media::GetInputDeviceNamesWin 771 *!media::GetInputDeviceNamesWin
772 772
773 # False pos uninit in shell32 when resolving links. 773 # False pos uninit in shell32 when resolving links.
774 UNINITIALIZED READ 774 UNINITIALIZED READ
775 name=http://code.google.com/p/drmemory/issues/detail?id=745 775 name=https://github.com/DynamoRIO/drmemory/issues/745
776 SHELL*.dll!* 776 SHELL*.dll!*
777 ... 777 ...
778 SHELL*.dll!* 778 SHELL*.dll!*
779 *!file_util::ResolveShortcut 779 *!file_util::ResolveShortcut
780 780
781 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a 781 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a
782 # buffer with SSE/MMX instructions whose results are then masked out later. 782 # buffer with SSE/MMX instructions whose results are then masked out later.
783 UNINITIALIZED READ 783 UNINITIALIZED READ
784 name=http://code.google.com/p/drmemory/issues/detail?id=747 a 784 name=https://github.com/DynamoRIO/drmemory/issues/747 a
785 *!ff_pred4x4_vertical_vp8_mmxext 785 *!ff_pred4x4_vertical_vp8_mmxext
786 786
787 UNINITIALIZED READ 787 UNINITIALIZED READ
788 name=http://code.google.com/p/drmemory/issues/detail?id=747 b 788 name=https://github.com/DynamoRIO/drmemory/issues/747 b
789 *!ff_pred4x4_down_left_mmxext 789 *!ff_pred4x4_down_left_mmxext
790 790
791 UNINITIALIZED READ 791 UNINITIALIZED READ
792 name=http://code.google.com/p/drmemory/issues/detail?id=747 c 792 name=https://github.com/DynamoRIO/drmemory/issues/747 c
793 *!ff_vorbis_floor1_render_list 793 *!ff_vorbis_floor1_render_list
794 794
795 UNINITIALIZED READ 795 UNINITIALIZED READ
796 name=http://code.google.com/p/drmemory/issues/detail?id=747 d 796 name=https://github.com/DynamoRIO/drmemory/issues/747 d
797 *!ff_put_vp8_epel8_h6_ssse3 797 *!ff_put_vp8_epel8_h6_ssse3
798 798
799 UNINITIALIZED READ 799 UNINITIALIZED READ
800 name=http://code.google.com/p/drmemory/issues/detail?id=747 e 800 name=https://github.com/DynamoRIO/drmemory/issues/747 e
801 *!ff_put_vp8_epel8_h4_ssse3 801 *!ff_put_vp8_epel8_h4_ssse3
802 802
803 UNINITIALIZED READ 803 UNINITIALIZED READ
804 name=http://code.google.com/p/drmemory/issues/detail?id=747 f 804 name=https://github.com/DynamoRIO/drmemory/issues/747 f
805 *!ff_fft_permute_sse 805 *!ff_fft_permute_sse
806 806
807 UNINITIALIZED READ 807 UNINITIALIZED READ
808 name=http://code.google.com/p/drmemory/issues/detail?id=747 g 808 name=https://github.com/DynamoRIO/drmemory/issues/747 g
809 *!ff_simple_idct_add_mmx 809 *!ff_simple_idct_add_mmx
810 810
811 # ffmpeg seems to leak a pthread condition variable. 811 # ffmpeg seems to leak a pthread condition variable.
812 LEAK 812 LEAK
813 name=http://crbug.com/110042 813 name=http://crbug.com/110042
814 *!ptw32_new 814 *!ptw32_new
815 *!pthread_self 815 *!pthread_self
816 *!sem_wait 816 *!sem_wait
817 *!pthread_cond_wait 817 *!pthread_cond_wait
818 *!ff_thread_decode_frame 818 *!ff_thread_decode_frame
819 *!avcodec_decode_video2 819 *!avcodec_decode_video2
820 820
821 # Improperly handled ioctl in bcrypt. 821 # Improperly handled ioctl in bcrypt.
822 UNINITIALIZED READ 822 UNINITIALIZED READ
823 name=http://code.google.com/p/drmemory/issues/detail?id=748 823 name=https://github.com/DynamoRIO/drmemory/issues/748
824 system call NtDeviceIoControlFile InputBuffer 824 system call NtDeviceIoControlFile InputBuffer
825 ... 825 ...
826 bcrypt.dll!BCryptUnregisterConfigChangeNotify 826 bcrypt.dll!BCryptUnregisterConfigChangeNotify
827 bcrypt.dll!BCryptGetFipsAlgorithmMode 827 bcrypt.dll!BCryptGetFipsAlgorithmMode
828 ntdll.dll!RtlQueryEnvironmentVariable 828 ntdll.dll!RtlQueryEnvironmentVariable
829 829
830 # Not sure what this is. 830 # Not sure what this is.
831 POSSIBLE LEAK 831 POSSIBLE LEAK
832 name=http://code.google.com/p/drmemory/issues/detail?id=749 832 name=https://github.com/DynamoRIO/drmemory/issues/749
833 ... 833 ...
834 fwpuclnt.dll!* 834 fwpuclnt.dll!*
835 ... 835 ...
836 RPCRT4.dll!* 836 RPCRT4.dll!*
837 ... 837 ...
838 fwpuclnt.dll!* 838 fwpuclnt.dll!*
839 ... 839 ...
840 WS2_32.dll!* 840 WS2_32.dll!*
841 *!talk_base::SafeGetHostByName 841 *!talk_base::SafeGetHostByName
842 *!talk_base::SocketAddress::GetLocalIPs 842 *!talk_base::SocketAddress::GetLocalIPs
843 *!talk_base::SocketAddress::IsLocalIP 843 *!talk_base::SocketAddress::IsLocalIP
844 *!cricket::Transport::VerifyCandidate 844 *!cricket::Transport::VerifyCandidate
845 *!cricket::Session::OnRemoteCandidates 845 *!cricket::Session::OnRemoteCandidates
846 *!cricket::Session::OnTransportInfoMessage 846 *!cricket::Session::OnTransportInfoMessage
847 *!cricket::Session::OnIncomingMessage 847 *!cricket::Session::OnIncomingMessage
848 *!cricket::SessionManager::OnIncomingMessage 848 *!cricket::SessionManager::OnIncomingMessage
849 849
850 # More uninit false pos in rpcrt4.dll not caught by default suppressions. 850 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
851 UNINITIALIZED READ 851 UNINITIALIZED READ
852 name=http://code.google.com/p/drmemory/issues/detail?id=529 852 name=https://github.com/DynamoRIO/drmemory/issues/529
853 RPCRT4.dll!* 853 RPCRT4.dll!*
854 ... 854 ...
855 *!base::LaunchProcess 855 *!base::LaunchProcess
856 856
857 # System leak from CreateEnvironmentBlock. 857 # System leak from CreateEnvironmentBlock.
858 LEAK 858 LEAK
859 name=http://code.google.com/p/drmemory/issues/detail?id=757 859 name=https://github.com/DynamoRIO/drmemory/issues/757
860 ... 860 ...
861 USERENV.dll!CreateEnvironmentBlock 861 USERENV.dll!CreateEnvironmentBlock
862 862
863 # Looks like another instance of 753 863 # Looks like another instance of 753
864 LEAK 864 LEAK
865 name=http://code.google.com/p/drmemory/issues/detail?id=753 865 name=https://github.com/DynamoRIO/drmemory/issues/753
866 ... 866 ...
867 ntdll.dll!RtlLoadString 867 ntdll.dll!RtlLoadString
868 868
869 # More bit manip fps 869 # More bit manip fps
870 UNINITIALIZED READ 870 UNINITIALIZED READ
871 name=http://code.google.com/p/drmemory/issues/detail?id=493 871 name=https://github.com/DynamoRIO/drmemory/issues/493
872 USP10.dll!ScriptPositionSingleGlyph 872 USP10.dll!ScriptPositionSingleGlyph
873 873
874 # Various TLS leaks that we don't understand yet. We should be finding a root 874 # Various TLS leaks that we don't understand yet. We should be finding a root
875 # for these. 875 # for these.
876 LEAK 876 LEAK
877 name=http://code.google.com/p/drmemory/issues/detail?id=778 a 877 name=https://github.com/DynamoRIO/drmemory/issues/778 a
878 KERNELBASE.dll!TlsSetValue 878 KERNELBASE.dll!TlsSetValue
879 879
880 # Originally filed as: http://crbug.com/109281 880 # Originally filed as: http://crbug.com/109281
881 LEAK 881 LEAK
882 name=http://code.google.com/p/drmemory/issues/detail?id=778 b 882 name=https://github.com/DynamoRIO/drmemory/issues/778 b
883 *!operator new 883 *!operator new
884 *!operator new[] 884 *!operator new[]
885 *!*::ConstructTlsVector 885 *!*::ConstructTlsVector
886 *!base::ThreadLocalStorage::StaticSlot::Get 886 *!base::ThreadLocalStorage::StaticSlot::Get
887 887
888 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a 888 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a
889 # root? See also http://crbug.com/32624 889 # root? See also http://crbug.com/32624
890 LEAK 890 LEAK
891 name=http://code.google.com/p/drmemory/issues/detail?id=778 c 891 name=https://github.com/DynamoRIO/drmemory/issues/778 c
892 *!PR_Calloc 892 *!PR_Calloc
893 *!_PR_AttachThread 893 *!_PR_AttachThread
894 *!_PRI_AttachThread 894 *!_PRI_AttachThread
895 895
896 # Bit-level fps in rich edit layer. 896 # Bit-level fps in rich edit layer.
897 UNINITIALIZED READ 897 UNINITIALIZED READ
898 name=http://code.google.com/p/drmemory/issues/detail?id=791 898 name=https://github.com/DynamoRIO/drmemory/issues/791
899 RICHED20.dll!* 899 RICHED20.dll!*
900 RICHED20.dll!* 900 RICHED20.dll!*
901 901
902 # Already suppressed by drmemory default supp we don't have yet. 902 # Already suppressed by drmemory default supp we don't have yet.
903 LEAK 903 LEAK
904 name=i#757: RPC binding leaks in sspicli.dll 904 name=i#757: RPC binding leaks in sspicli.dll
905 RPCRT4.dll!* 905 RPCRT4.dll!*
906 ... 906 ...
907 SspiCli.dll!* 907 SspiCli.dll!*
908 SspiCli.dll!Cre* 908 SspiCli.dll!Cre*
909 909
910 # Async NtReadFile false positives. This was fixed in drmemory r772, remove 910 # Async NtReadFile false positives. This was fixed in drmemory r772, remove
911 # this supp when we pull that rev. 911 # this supp when we pull that rev.
912 UNADDRESSABLE ACCESS 912 UNADDRESSABLE ACCESS
913 name=http://code.google.com/p/drmemory/issues/detail?id=798 913 name=https://github.com/DynamoRIO/drmemory/issues/798
914 system call NtReadFile parameter #5 914 system call NtReadFile parameter #5
915 KERNEL32.dll!ReadFile 915 KERNEL32.dll!ReadFile
916 916
917 # Probable syscall false positive. 917 # Probable syscall false positive.
918 UNADDRESSABLE ACCESS 918 UNADDRESSABLE ACCESS
919 name=http://code.google.com/p/drmemory/issues/detail?id=809 919 name=https://github.com/DynamoRIO/drmemory/issues/809
920 system call NtGdiPolyPolyDraw parameter #1 920 system call NtGdiPolyPolyDraw parameter #1
921 *!gfx::Path::CreateNativeRegion 921 *!gfx::Path::CreateNativeRegion
922 922
923 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces 923 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces
924 # coming out of this module (sometimes only one frame), which makes it hard to 924 # coming out of this module (sometimes only one frame), which makes it hard to
925 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we 925 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we
926 # should keep this. 926 # should keep this.
927 UNINITIALIZED READ 927 UNINITIALIZED READ
928 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard 928 name=https://github.com/DynamoRIO/drmemory/issues/113 rpcrt4.dll wildcard
929 RPCRT4.dll!* 929 RPCRT4.dll!*
930 930
931 UNINITIALIZED READ 931 UNINITIALIZED READ
932 name=http://code.google.com/p/drmemory/issues/detail?id=841 a 932 name=https://github.com/DynamoRIO/drmemory/issues/841 a
933 ... 933 ...
934 CRYPTNET.dll!I_CryptNetGetConnectivity 934 CRYPTNET.dll!I_CryptNetGetConnectivity
935 935
936 UNINITIALIZED READ 936 UNINITIALIZED READ
937 name=http://code.google.com/p/drmemory/issues/detail?id=841 b 937 name=https://github.com/DynamoRIO/drmemory/issues/841 b
938 ... 938 ...
939 webio.dll!* 939 webio.dll!*
940 940
941 UNINITIALIZED READ 941 UNINITIALIZED READ
942 name=http://code.google.com/p/drmemory/issues/detail?id=841 c 942 name=https://github.com/DynamoRIO/drmemory/issues/841 c
943 ... 943 ...
944 winhttp.dll!* 944 winhttp.dll!*
945 945
946 LEAK 946 LEAK
947 name=http://code.google.com/p/drmemory/issues/detail?id=841 d 947 name=https://github.com/DynamoRIO/drmemory/issues/841 d
948 ... 948 ...
949 CRYPTNET.dll!I_CryptNetGetConnectivity 949 CRYPTNET.dll!I_CryptNetGetConnectivity
950 950
951 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame. 951 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
952 UNINITIALIZED READ 952 UNINITIALIZED READ
953 name=http://code.google.com/p/drmemory/issues/detail?id=810 953 name=https://github.com/DynamoRIO/drmemory/issues/810
954 instruction=test %edx %edx 954 instruction=test %edx %edx
955 USER32.dll!GetClassLongW 955 USER32.dll!GetClassLongW
956 ... 956 ...
957 *!ui::CenterAndSizeWindow 957 *!ui::CenterAndSizeWindow
958 958
959 UNINITIALIZED READ 959 UNINITIALIZED READ
960 name=http://code.google.com/p/drmemory/issues/detail?id=815 960 name=https://github.com/DynamoRIO/drmemory/issues/815
961 KERNEL*.dll!... 961 KERNEL*.dll!...
962 dxgi.dll!* 962 dxgi.dll!*
963 USER32.dll!GetMonitorInfoA 963 USER32.dll!GetMonitorInfoA
964 ntdll.dll!KiUserCallbackDispatcher 964 ntdll.dll!KiUserCallbackDispatcher
965 dxgi.dll!* 965 dxgi.dll!*
966 WinSATAPI.DLL!* 966 WinSATAPI.DLL!*
967 967
968 # Suppress anything in cmd.exe. It's safer to suppress these than disable 968 # Suppress anything in cmd.exe. It's safer to suppress these than disable
969 # following, since someone might launch a Chrome process via cmd.exe. 969 # following, since someone might launch a Chrome process via cmd.exe.
970 LEAK 970 LEAK
971 name=cmd.exe 971 name=cmd.exe
972 ... 972 ...
973 cmd.exe!* 973 cmd.exe!*
974 974
975 # Possible true system use after free. 975 # Possible true system use after free.
976 UNADDRESSABLE ACCESS 976 UNADDRESSABLE ACCESS
977 name=http://code.google.com/p/drmemory/issues/detail?id=623 977 name=https://github.com/DynamoRIO/drmemory/issues/623
978 KERNELBASE.dll!TlsGetValue 978 KERNELBASE.dll!TlsGetValue
979 OLEAUT32.dll!SysFreeString 979 OLEAUT32.dll!SysFreeString
980 OLEAUT32.dll!SysAllocStringByteLen 980 OLEAUT32.dll!SysAllocStringByteLen
981 OLEACC.dll!* 981 OLEACC.dll!*
982 OLEACC.dll!* 982 OLEACC.dll!*
983 OLEACC.dll!* 983 OLEACC.dll!*
984 OLEACC.dll!* 984 OLEACC.dll!*
985 985
986 # basic_streambuf seems to leak something in creating a std::_Mutex 986 # basic_streambuf seems to leak something in creating a std::_Mutex
987 LEAK 987 LEAK
988 name=http://code.google.com/p/drmemory/issues/detail?id=857 988 name=https://github.com/DynamoRIO/drmemory/issues/857
989 ntdll.dll!... 989 ntdll.dll!...
990 ntdll.dll!RtlInitializeCriticalSection 990 ntdll.dll!RtlInitializeCriticalSection
991 *!_Mtxinit 991 *!_Mtxinit
992 *!std::_Mutex::_Mutex 992 *!std::_Mutex::_Mutex
993 *!std::basic_streambuf<> 993 *!std::basic_streambuf<>
994 994
995 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. 995 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though.
996 LEAK 996 LEAK
997 name=GDI SetBrushOrgEx leak 997 name=GDI SetBrushOrgEx leak
998 GDI32.dll!... 998 GDI32.dll!...
(...skipping 625 matching lines...) Expand 10 before | Expand all | Expand 10 after
1624 name=BUG_349128 1624 name=BUG_349128
1625 content.dll!std::* 1625 content.dll!std::*
1626 ... 1626 ...
1627 content.dll!content::BrowserAccessibilityManagerWin::* 1627 content.dll!content::BrowserAccessibilityManagerWin::*
1628 ... 1628 ...
1629 *!*::UpdateNode 1629 *!*::UpdateNode
1630 1630
1631 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB* 1631 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB*
1632 # variety) that it's a performance hit. We avoid that by requesting 1632 # variety) that it's a performance hit. We avoid that by requesting
1633 # whole-module suppression 1633 # whole-module suppression
1634 # (see https://code.google.com/p/drmemory/issues/detail?id=1529). 1634 # (see https://github.com/DynamoRIO/drmemory/issues/1529).
1635 UNINITIALIZED READ 1635 UNINITIALIZED READ
1636 name=bug_347967_all_osmesa 1636 name=bug_347967_all_osmesa
1637 osmesa.dll!* 1637 osmesa.dll!*
1638 1638
1639 UNINITIALIZED READ 1639 UNINITIALIZED READ
1640 name=bug_347967 1640 name=bug_347967
1641 osmesa.dll!unpack_RGB*888 1641 osmesa.dll!unpack_RGB*888
1642 osmesa.dll!_mesa_unpack_rgba_row 1642 osmesa.dll!_mesa_unpack_rgba_row
1643 osmesa.dll!slow_read_rgba_pixels 1643 osmesa.dll!slow_read_rgba_pixels
1644 osmesa.dll!read_rgba_pixels 1644 osmesa.dll!read_rgba_pixels
(...skipping 231 matching lines...) Expand 10 before | Expand all | Expand 10 after
1876 *!`anonymous namespace'::TOutputTraverser::visitConstantUnion 1876 *!`anonymous namespace'::TOutputTraverser::visitConstantUnion
1877 *!TIntermBinary::traverse 1877 *!TIntermBinary::traverse
1878 *!TIntermBinary::traverse 1878 *!TIntermBinary::traverse
1879 *!TIntermAggregate::traverse 1879 *!TIntermAggregate::traverse
1880 *!TIntermAggregate::traverse 1880 *!TIntermAggregate::traverse
1881 *!TIntermAggregate::traverse 1881 *!TIntermAggregate::traverse
1882 *!TIntermediate::outputTree 1882 *!TIntermediate::outputTree
1883 *!TCompiler::compile 1883 *!TCompiler::compile
1884 *!TypeTrackingTest::compile 1884 *!TypeTrackingTest::compile
1885 *!TypeTrackingTest_StructConstructorResultNoPrecision_Test::TestBody 1885 *!TypeTrackingTest_StructConstructorResultNoPrecision_Test::TestBody
1886
1887 UNADDRESSABLE ACCESS
1888 name=bug_436131
1889 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
1890 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
1891 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1892
1893 UNADDRESSABLE ACCESS
1894 name=bug_436131_b
1895 views.dll!ObserverListBase<>::RemoveObserver
1896 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
1897 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1898
1899 UNADDRESSABLE ACCESS
1900 name=bug_436131_c
1901 *!ash::test::ShelfViewTestAPI::GetPreferredSize
1902 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
1903 *!testing::internal::HandleExceptionsInMethodIfSupported<>
OLDNEW
« no previous file with comments | « tools/valgrind/drmemory/suppressions.txt ('k') | tools/valgrind/gtest_exclude/base_unittests.gtest.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698