| OLD | NEW |
| 1 # This file contains suppressions for the Dr.Memory tool, see | 1 # This file contains suppressions for the Dr.Memory tool, see |
| 2 # http://dev.chromium.org/developers/how-tos/using-drmemory | 2 # http://dev.chromium.org/developers/how-tos/using-drmemory |
| 3 # | 3 # |
| 4 # This file should contain suppressions only for the reports happening | 4 # This file should contain suppressions only for the reports happening |
| 5 # in the 'full' mode (drmemory_full). | 5 # in the 'full' mode (drmemory_full). |
| 6 # For the reports that can happen in the light mode (a.k.a. drmemory_light), | 6 # For the reports that can happen in the light mode (a.k.a. drmemory_light), |
| 7 # please use suppressions.txt instead. | 7 # please use suppressions.txt instead. |
| 8 | 8 |
| 9 ############################################################### | 9 ############################################################### |
| 10 # Known reports on the third party we have no control over. | 10 # Known reports on the third party we have no control over. |
| 11 | 11 |
| 12 UNINITIALIZED READ | 12 UNINITIALIZED READ |
| 13 name=http://crbug.com/116277 | 13 name=http://crbug.com/116277 |
| 14 ... | 14 ... |
| 15 *!MOZ_Z_deflate | 15 *!MOZ_Z_deflate |
| 16 | 16 |
| 17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. | 17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. |
| 18 LEAK | 18 LEAK |
| 19 name=http://code.google.com/p/drmemory/issues/detail?id=406 | 19 name=https://github.com/DynamoRIO/drmemory/issues/406 |
| 20 ADVAPI32.dll!WmiOpenBlock | 20 ADVAPI32.dll!WmiOpenBlock |
| 21 ADVAPI32.dll!WmiOpenBlock | 21 ADVAPI32.dll!WmiOpenBlock |
| 22 | 22 |
| 23 # Leaks inside GoogleDesktop - it injects into our processes for some reason | 23 # Leaks inside GoogleDesktop - it injects into our processes for some reason |
| 24 LEAK | 24 LEAK |
| 25 name=GoogleDesktop LEAK | 25 name=GoogleDesktop LEAK |
| 26 ... | 26 ... |
| 27 GoogleDesktopNetwork3.DLL!DllUnregisterServer | 27 GoogleDesktopNetwork3.DLL!DllUnregisterServer |
| 28 | 28 |
| 29 # They deliberately use uninit local var in sqlite random generator. | 29 # They deliberately use uninit local var in sqlite random generator. |
| 30 # Random bytes may mess up the call stack between randomByte and | 30 # Random bytes may mess up the call stack between randomByte and |
| 31 # sqlite3_* frames (http://code.google.com/p/drmemory/issues/detail?id=1514) | 31 # sqlite3_* frames (https://github.com/DynamoRIO/drmemory/issues/1514) |
| 32 # so we just look for randomByte. | 32 # so we just look for randomByte. |
| 33 UNINITIALIZED READ | 33 UNINITIALIZED READ |
| 34 name=sqlite3_randomness UNINIT | 34 name=sqlite3_randomness UNINIT |
| 35 *!randomByte | 35 *!randomByte |
| 36 | 36 |
| 37 # Intentional leak in WebKit Template Framework for ThreadData. | 37 # Intentional leak in WebKit Template Framework for ThreadData. |
| 38 LEAK | 38 LEAK |
| 39 name=intentional WTF ThreadData leak | 39 name=intentional WTF ThreadData leak |
| 40 ... | 40 ... |
| 41 *!WTF::wtfThreadData | 41 *!WTF::wtfThreadData |
| (...skipping 27 matching lines...) Expand all Loading... |
| 69 libpng.dll!wk_png_write_find_filter | 69 libpng.dll!wk_png_write_find_filter |
| 70 libpng.dll!wk_png_write_row | 70 libpng.dll!wk_png_write_row |
| 71 | 71 |
| 72 ############################################################### | 72 ############################################################### |
| 73 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis | 73 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis |
| 74 # assumptions or unhandled syscalls | 74 # assumptions or unhandled syscalls |
| 75 | 75 |
| 76 # Please note: the following suppressions were written in the abscense of | 76 # Please note: the following suppressions were written in the abscense of |
| 77 # private symbols so may need to be updated when we switch to auto-loading PDBs | 77 # private symbols so may need to be updated when we switch to auto-loading PDBs |
| 78 UNINITIALIZED READ | 78 UNINITIALIZED READ |
| 79 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1) | 79 name=https://github.com/DynamoRIO/drmemory/issues/12 (1) |
| 80 ntdll.dll!Rtl* | 80 ntdll.dll!Rtl* |
| 81 ntdll.dll!Rtl* | 81 ntdll.dll!Rtl* |
| 82 ntdll.dll!RtlFindActivationContextSectionString | 82 ntdll.dll!RtlFindActivationContextSectionString |
| 83 | 83 |
| 84 UNINITIALIZED READ | 84 UNINITIALIZED READ |
| 85 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2) | 85 name=https://github.com/DynamoRIO/drmemory/issues/12 (2) |
| 86 ... | 86 ... |
| 87 SHELL32.dll!SHFileOperation* | 87 SHELL32.dll!SHFileOperation* |
| 88 | 88 |
| 89 UNINITIALIZED READ | 89 UNINITIALIZED READ |
| 90 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3) | 90 name=https://github.com/DynamoRIO/drmemory/issues/12 (3) |
| 91 ... | 91 ... |
| 92 SHELL32.dll!SHGetFolderPath* | 92 SHELL32.dll!SHGetFolderPath* |
| 93 | 93 |
| 94 LEAK | 94 LEAK |
| 95 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4) | 95 name=https://github.com/DynamoRIO/drmemory/issues/12 (4) |
| 96 ... | 96 ... |
| 97 SHELL32.dll!SHGetFolderPath* | 97 SHELL32.dll!SHGetFolderPath* |
| 98 | 98 |
| 99 UNINITIALIZED READ | 99 UNINITIALIZED READ |
| 100 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5) | 100 name=https://github.com/DynamoRIO/drmemory/issues/12 (5) |
| 101 ... | 101 ... |
| 102 SHELL32.dll!SHCreateDirectory* | 102 SHELL32.dll!SHCreateDirectory* |
| 103 | 103 |
| 104 UNINITIALIZED READ | 104 UNINITIALIZED READ |
| 105 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6) | 105 name=https://github.com/DynamoRIO/drmemory/issues/12 (6) |
| 106 ... | 106 ... |
| 107 SHELL32.dll!ILLoadFromStream* | 107 SHELL32.dll!ILLoadFromStream* |
| 108 | 108 |
| 109 UNINITIALIZED READ | 109 UNINITIALIZED READ |
| 110 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7) | 110 name=https://github.com/DynamoRIO/drmemory/issues/12 (7) |
| 111 ... | 111 ... |
| 112 SHELL32.dll!ILSaveToStream* | 112 SHELL32.dll!ILSaveToStream* |
| 113 | 113 |
| 114 LEAK | 114 LEAK |
| 115 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8) | 115 name=https://github.com/DynamoRIO/drmemory/issues/12 (8) |
| 116 ... | 116 ... |
| 117 SHELL32.dll!SHFileOperation* | 117 SHELL32.dll!SHFileOperation* |
| 118 | 118 |
| 119 UNINITIALIZED READ | 119 UNINITIALIZED READ |
| 120 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9) | 120 name=https://github.com/DynamoRIO/drmemory/issues/12 (9) |
| 121 ... | 121 ... |
| 122 SHELL32.dll!SHGetItemFromDataObject | 122 SHELL32.dll!SHGetItemFromDataObject |
| 123 | 123 |
| 124 LEAK | 124 LEAK |
| 125 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10) | 125 name=https://github.com/DynamoRIO/drmemory/issues/12 (10) |
| 126 ... | 126 ... |
| 127 SHELL32.dll!SHGetItemFromDataObject | 127 SHELL32.dll!SHGetItemFromDataObject |
| 128 | 128 |
| 129 LEAK | 129 LEAK |
| 130 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11) | 130 name=https://github.com/DynamoRIO/drmemory/issues/12 (11) |
| 131 ... | 131 ... |
| 132 ole32.dll!* | 132 ole32.dll!* |
| 133 SHELL32.dll!SHChangeNotifySuspendResume | 133 SHELL32.dll!SHChangeNotifySuspendResume |
| 134 | 134 |
| 135 UNINITIALIZED READ | 135 UNINITIALIZED READ |
| 136 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1) | 136 name=https://github.com/DynamoRIO/drmemory/issues/14 (1) |
| 137 ... | 137 ... |
| 138 *!CreateProcess* | 138 *!CreateProcess* |
| 139 | 139 |
| 140 LEAK | 140 LEAK |
| 141 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2) | 141 name=https://github.com/DynamoRIO/drmemory/issues/14 (2) |
| 142 ... | 142 ... |
| 143 *!CreateProcess* | 143 *!CreateProcess* |
| 144 | 144 |
| 145 UNINITIALIZED READ | 145 UNINITIALIZED READ |
| 146 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3) | 146 name=https://github.com/DynamoRIO/drmemory/issues/14 (3) |
| 147 ... | 147 ... |
| 148 *!base::LaunchApp* | 148 *!base::LaunchApp* |
| 149 | 149 |
| 150 UNINITIALIZED READ | 150 UNINITIALIZED READ |
| 151 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1) | 151 name=https://github.com/DynamoRIO/drmemory/issues/17 (1) |
| 152 ... | 152 ... |
| 153 *!CreateWindow* | 153 *!CreateWindow* |
| 154 | 154 |
| 155 POSSIBLE LEAK | 155 POSSIBLE LEAK |
| 156 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2) | 156 name=https://github.com/DynamoRIO/drmemory/issues/17 (2) |
| 157 GDI32.dll!* | 157 GDI32.dll!* |
| 158 GDI32.dll!CreateFontIndirectExW | 158 GDI32.dll!CreateFontIndirectExW |
| 159 GDI32.dll!CreateFontIndirectW | 159 GDI32.dll!CreateFontIndirectW |
| 160 | 160 |
| 161 LEAK | 161 LEAK |
| 162 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3) | 162 name=https://github.com/DynamoRIO/drmemory/issues/17 (3) |
| 163 KERNELBASE.dll!LocalAlloc | 163 KERNELBASE.dll!LocalAlloc |
| 164 ... | 164 ... |
| 165 USER32.dll!CreateWindow* | 165 USER32.dll!CreateWindow* |
| 166 | 166 |
| 167 UNINITIALIZED READ | 167 UNINITIALIZED READ |
| 168 name=http://code.google.com/p/drmemory/issues/detail?id=18 a | 168 name=https://github.com/DynamoRIO/drmemory/issues/18 a |
| 169 ... | 169 ... |
| 170 *!CoInitialize* | 170 *!CoInitialize* |
| 171 | 171 |
| 172 UNINITIALIZED READ | 172 UNINITIALIZED READ |
| 173 name=http://code.google.com/p/drmemory/issues/detail?id=18 b | 173 name=https://github.com/DynamoRIO/drmemory/issues/18 b |
| 174 ... | 174 ... |
| 175 *!CoCreateInstance* | 175 *!CoCreateInstance* |
| 176 | 176 |
| 177 UNINITIALIZED READ | 177 UNINITIALIZED READ |
| 178 name=http://code.google.com/p/drmemory/issues/detail?id=18 c | 178 name=https://github.com/DynamoRIO/drmemory/issues/18 c |
| 179 ... | 179 ... |
| 180 *!CoUninitialize* | 180 *!CoUninitialize* |
| 181 | 181 |
| 182 UNINITIALIZED READ | 182 UNINITIALIZED READ |
| 183 name=http://code.google.com/p/drmemory/issues/detail?id=18 d | 183 name=https://github.com/DynamoRIO/drmemory/issues/18 d |
| 184 ... | 184 ... |
| 185 UxTheme.dll!* | 185 UxTheme.dll!* |
| 186 | 186 |
| 187 UNINITIALIZED READ | 187 UNINITIALIZED READ |
| 188 name=http://code.google.com/p/drmemory/issues/detail?id=40 a | 188 name=https://github.com/DynamoRIO/drmemory/issues/40 a |
| 189 ... | 189 ... |
| 190 WINSPOOL.DRV!* | 190 WINSPOOL.DRV!* |
| 191 | 191 |
| 192 LEAK | 192 LEAK |
| 193 name=http://code.google.com/p/drmemory/issues/detail?id=40 b | 193 name=https://github.com/DynamoRIO/drmemory/issues/40 b |
| 194 ... | 194 ... |
| 195 WINSPOOL.DRV!* | 195 WINSPOOL.DRV!* |
| 196 | 196 |
| 197 UNINITIALIZED READ | 197 UNINITIALIZED READ |
| 198 name=http://code.google.com/p/drmemory/issues/detail?id=48 a | 198 name=https://github.com/DynamoRIO/drmemory/issues/48 a |
| 199 system call NtContinue | 199 system call NtContinue |
| 200 ... | 200 ... |
| 201 *!*SetThreadName | 201 *!*SetThreadName |
| 202 | 202 |
| 203 UNINITIALIZED READ | 203 UNINITIALIZED READ |
| 204 name=http://code.google.com/p/drmemory/issues/detail?id=48 b | 204 name=https://github.com/DynamoRIO/drmemory/issues/48 b |
| 205 system call NtContinue | 205 system call NtContinue |
| 206 *!WTF::initializeCurrentThreadInternal | 206 *!WTF::initializeCurrentThreadInternal |
| 207 | 207 |
| 208 UNINITIALIZED READ | 208 UNINITIALIZED READ |
| 209 name=http://code.google.com/p/drmemory/issues/detail?id=52 a | 209 name=https://github.com/DynamoRIO/drmemory/issues/52 a |
| 210 ... | 210 ... |
| 211 DBGHELP.dll!SymInitialize | 211 DBGHELP.dll!SymInitialize |
| 212 | 212 |
| 213 UNINITIALIZED READ | 213 UNINITIALIZED READ |
| 214 name=http://code.google.com/p/drmemory/issues/detail?id=52 b | 214 name=https://github.com/DynamoRIO/drmemory/issues/52 b |
| 215 ... | 215 ... |
| 216 DBGHELP.dll!SymEnumSourceFiles | 216 DBGHELP.dll!SymEnumSourceFiles |
| 217 | 217 |
| 218 UNINITIALIZED READ | 218 UNINITIALIZED READ |
| 219 name=http://code.google.com/p/drmemory/issues/detail?id=52 c | 219 name=https://github.com/DynamoRIO/drmemory/issues/52 c |
| 220 ... | 220 ... |
| 221 msvcrt.dll!_RTDynamicCast | 221 msvcrt.dll!_RTDynamicCast |
| 222 | 222 |
| 223 UNINITIALIZED READ | 223 UNINITIALIZED READ |
| 224 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghe
lp | 224 name=https://github.com/DynamoRIO/drmemory/issues/52 bit-level fp in dbghelp |
| 225 instruction=test 0x*(%*) $0x?? | 225 instruction=test 0x*(%*) $0x?? |
| 226 DBGHELP.dll!SymUnloadModule64 | 226 DBGHELP.dll!SymUnloadModule64 |
| 227 | 227 |
| 228 UNINITIALIZED READ | 228 UNINITIALIZED READ |
| 229 name=http://code.google.com/p/drmemory/issues/detail?id=53 | 229 name=https://github.com/DynamoRIO/drmemory/issues/53 |
| 230 ADVAPI32.dll!WmiMofEnumerateResourcesA | 230 ADVAPI32.dll!WmiMofEnumerateResourcesA |
| 231 ADVAPI32.dll!WmiMofEnumerateResourcesA | 231 ADVAPI32.dll!WmiMofEnumerateResourcesA |
| 232 ADVAPI32.dll!Sta*TraceW | 232 ADVAPI32.dll!Sta*TraceW |
| 233 | 233 |
| 234 UNINITIALIZED READ | 234 UNINITIALIZED READ |
| 235 name=http://code.google.com/p/drmemory/issues/detail?id=58 | 235 name=https://github.com/DynamoRIO/drmemory/issues/58 |
| 236 ... | 236 ... |
| 237 *!_cfltcvt_l | 237 *!_cfltcvt_l |
| 238 | 238 |
| 239 UNINITIALIZED READ | 239 UNINITIALIZED READ |
| 240 name=http://code.google.com/p/drmemory/issues/detail?id=60 | 240 name=https://github.com/DynamoRIO/drmemory/issues/60 |
| 241 USP10.dll!* | 241 USP10.dll!* |
| 242 ... | 242 ... |
| 243 USP10.dll!ScriptStringAnalyse | 243 USP10.dll!ScriptStringAnalyse |
| 244 | 244 |
| 245 LEAK | 245 LEAK |
| 246 IMM32.dll!ImmGetIMCCSize | 246 IMM32.dll!ImmGetIMCCSize |
| 247 IMM32.dll!ImmLockClientImc | 247 IMM32.dll!ImmLockClientImc |
| 248 IMM32.dll!ImmDisableIME | 248 IMM32.dll!ImmDisableIME |
| 249 IMM32.dll!ImmSetActiveContext | 249 IMM32.dll!ImmSetActiveContext |
| 250 USER32.dll!IMPSetIMEA | 250 USER32.dll!IMPSetIMEA |
| 251 | 251 |
| 252 UNINITIALIZED READ | 252 UNINITIALIZED READ |
| 253 name=http://code.google.com/p/drmemory/issues/detail?id=65 a | 253 name=https://github.com/DynamoRIO/drmemory/issues/65 a |
| 254 ... | 254 ... |
| 255 *!SystemFunction036 | 255 *!SystemFunction036 |
| 256 | 256 |
| 257 UNINITIALIZED READ | 257 UNINITIALIZED READ |
| 258 name=http://code.google.com/p/drmemory/issues/detail?id=65 b | 258 name=https://github.com/DynamoRIO/drmemory/issues/65 b |
| 259 ... | 259 ... |
| 260 *!talk_base::CreateRandomString | 260 *!talk_base::CreateRandomString |
| 261 | 261 |
| 262 UNINITIALIZED READ | 262 UNINITIALIZED READ |
| 263 name=http://code.google.com/p/drmemory/issues/detail?id=68 a | 263 name=https://github.com/DynamoRIO/drmemory/issues/68 a |
| 264 ... | 264 ... |
| 265 WS2_32.dll!* | 265 WS2_32.dll!* |
| 266 | 266 |
| 267 UNINITIALIZED READ | 267 UNINITIALIZED READ |
| 268 name=http://code.google.com/p/drmemory/issues/detail?id=68 b | 268 name=https://github.com/DynamoRIO/drmemory/issues/68 b |
| 269 ... | 269 ... |
| 270 ADVAPI32.dll!SetSecurityDescriptorDacl | 270 ADVAPI32.dll!SetSecurityDescriptorDacl |
| 271 | 271 |
| 272 UNINITIALIZED READ | 272 UNINITIALIZED READ |
| 273 name=http://code.google.com/p/drmemory/issues/detail?id=68 c | 273 name=https://github.com/DynamoRIO/drmemory/issues/68 c |
| 274 ... | 274 ... |
| 275 MSWSOCK.dll!WSPStartup | 275 MSWSOCK.dll!WSPStartup |
| 276 | 276 |
| 277 UNINITIALIZED READ | 277 UNINITIALIZED READ |
| 278 name=http://code.google.com/p/drmemory/issues/detail?id=68 d | 278 name=https://github.com/DynamoRIO/drmemory/issues/68 d |
| 279 ... | 279 ... |
| 280 ntdll.dll!RtlValidateUnicodeString | 280 ntdll.dll!RtlValidateUnicodeString |
| 281 | 281 |
| 282 LEAK | 282 LEAK |
| 283 name=http://code.google.com/p/drmemory/issues/detail?id=256 | 283 name=https://github.com/DynamoRIO/drmemory/issues/256 |
| 284 *!_mtinit | 284 *!_mtinit |
| 285 *!__tmainCRTStartup | 285 *!__tmainCRTStartup |
| 286 *!mainCRTStartup | 286 *!mainCRTStartup |
| 287 | 287 |
| 288 POSSIBLE LEAK | 288 POSSIBLE LEAK |
| 289 name=http://code.google.com/p/drmemory/issues/detail?id=274 a | 289 name=https://github.com/DynamoRIO/drmemory/issues/274 a |
| 290 ... | 290 ... |
| 291 GDI32.dll!CreateDCW | 291 GDI32.dll!CreateDCW |
| 292 | 292 |
| 293 LEAK | 293 LEAK |
| 294 name=http://code.google.com/p/drmemory/issues/detail?id=274 b | 294 name=https://github.com/DynamoRIO/drmemory/issues/274 b |
| 295 ... | 295 ... |
| 296 GDI32.dll!CreateDCW | 296 GDI32.dll!CreateDCW |
| 297 | 297 |
| 298 LEAK | 298 LEAK |
| 299 name=http://code.google.com/p/drmemory/issues/detail?id=275 | 299 name=https://github.com/DynamoRIO/drmemory/issues/275 |
| 300 ... | 300 ... |
| 301 *!_getptd* | 301 *!_getptd* |
| 302 | 302 |
| 303 UNINITIALIZED READ | 303 UNINITIALIZED READ |
| 304 name=http://code.google.com/p/drmemory/issues/detail?id=276 | 304 name=https://github.com/DynamoRIO/drmemory/issues/276 |
| 305 ... | 305 ... |
| 306 ntdll.dll!RtlConvertUlongToLargeInteger | 306 ntdll.dll!RtlConvertUlongToLargeInteger |
| 307 ntdll.dll!RtlConvertUlongToLargeInteger | 307 ntdll.dll!RtlConvertUlongToLargeInteger |
| 308 ntdll.dll!KiUserExceptionDispatcher | 308 ntdll.dll!KiUserExceptionDispatcher |
| 309 | 309 |
| 310 LEAK | 310 LEAK |
| 311 name=http://code.google.com/p/drmemory/issues/detail?id=305 | 311 name=https://github.com/DynamoRIO/drmemory/issues/305 |
| 312 *!free | 312 *!free |
| 313 *!free | 313 *!free |
| 314 *!operator new | 314 *!operator new |
| 315 ... | 315 ... |
| 316 *!MiniDumpWriteDump | 316 *!MiniDumpWriteDump |
| 317 | 317 |
| 318 UNINITIALIZED READ | 318 UNINITIALIZED READ |
| 319 name=http://code.google.com/p/drmemory/issues/detail?id=346 a | 319 name=https://github.com/DynamoRIO/drmemory/issues/346 a |
| 320 ... | 320 ... |
| 321 GDI32.dll!CloseEnhMetaFile | 321 GDI32.dll!CloseEnhMetaFile |
| 322 | 322 |
| 323 UNINITIALIZED READ | 323 UNINITIALIZED READ |
| 324 name=http://code.google.com/p/drmemory/issues/detail?id=346 b | 324 name=https://github.com/DynamoRIO/drmemory/issues/346 b |
| 325 GDI32.dll!SetPolyFillMode | 325 GDI32.dll!SetPolyFillMode |
| 326 GDI32.dll!CreateICW | 326 GDI32.dll!CreateICW |
| 327 | 327 |
| 328 UNINITIALIZED READ | 328 UNINITIALIZED READ |
| 329 name=http://code.google.com/p/drmemory/issues/detail?id=362 | 329 name=https://github.com/DynamoRIO/drmemory/issues/362 |
| 330 USER32.dll!UnregisterClass* | 330 USER32.dll!UnregisterClass* |
| 331 | 331 |
| 332 LEAK | 332 LEAK |
| 333 name=http://code.google.com/p/drmemory/issues/detail?id=382 | 333 name=https://github.com/DynamoRIO/drmemory/issues/382 |
| 334 ... | 334 ... |
| 335 ntdll.dll!CsrNewThread | 335 ntdll.dll!CsrNewThread |
| 336 | 336 |
| 337 UNINITIALIZED READ | 337 UNINITIALIZED READ |
| 338 name=http://code.google.com/p/drmemory/issues/detail?id=397 | 338 name=https://github.com/DynamoRIO/drmemory/issues/397 |
| 339 system call NtDeviceIoControlFile InputBuffer | 339 system call NtDeviceIoControlFile InputBuffer |
| 340 ADVAPI32.dll!ImpersonateAnonymousToken | 340 ADVAPI32.dll!ImpersonateAnonymousToken |
| 341 | 341 |
| 342 UNINITIALIZED READ | 342 UNINITIALIZED READ |
| 343 name=http://code.google.com/p/drmemory/issues/detail?id=407 a | 343 name=https://github.com/DynamoRIO/drmemory/issues/407 a |
| 344 system call NtRequestWaitReplyPort | 344 system call NtRequestWaitReplyPort |
| 345 RPCRT4.dll!I_RpcSendReceive | 345 RPCRT4.dll!I_RpcSendReceive |
| 346 RPCRT4.dll!NdrSendReceive | 346 RPCRT4.dll!NdrSendReceive |
| 347 | 347 |
| 348 UNINITIALIZED READ | 348 UNINITIALIZED READ |
| 349 name=http://code.google.com/p/drmemory/issues/detail?id=407 b | 349 name=https://github.com/DynamoRIO/drmemory/issues/407 b |
| 350 IMM32.dll!* | 350 IMM32.dll!* |
| 351 ntdll.dll!LdrInitializeThunk | 351 ntdll.dll!LdrInitializeThunk |
| 352 ntdll.dll!LdrShutdownThread | 352 ntdll.dll!LdrShutdownThread |
| 353 | 353 |
| 354 UNINITIALIZED READ | 354 UNINITIALIZED READ |
| 355 name=http://code.google.com/p/drmemory/issues/detail?id=412 a | 355 name=https://github.com/DynamoRIO/drmemory/issues/412 a |
| 356 ADVAPI32.dll!RegDeleteValue* | 356 ADVAPI32.dll!RegDeleteValue* |
| 357 | 357 |
| 358 UNINITIALIZED READ | 358 UNINITIALIZED READ |
| 359 name=http://code.google.com/p/drmemory/issues/detail?id=412 b | 359 name=https://github.com/DynamoRIO/drmemory/issues/412 b |
| 360 ... | 360 ... |
| 361 ADVAPI32.dll!Crypt* | 361 ADVAPI32.dll!Crypt* |
| 362 | 362 |
| 363 UNINITIALIZED READ | 363 UNINITIALIZED READ |
| 364 name=http://code.google.com/p/drmemory/issues/detail?id=412 c | 364 name=https://github.com/DynamoRIO/drmemory/issues/412 c |
| 365 ... | 365 ... |
| 366 RPCRT4.dll!NdrClientCall2 | 366 RPCRT4.dll!NdrClientCall2 |
| 367 | 367 |
| 368 LEAK | 368 LEAK |
| 369 name=http://code.google.com/p/drmemory/issues/detail?id=412 d | 369 name=https://github.com/DynamoRIO/drmemory/issues/412 d |
| 370 RSAENH.dll!DllUnregisterServer | 370 RSAENH.dll!DllUnregisterServer |
| 371 ... | 371 ... |
| 372 ADVAPI32.dll!CryptAcquireContextA | 372 ADVAPI32.dll!CryptAcquireContextA |
| 373 CRYPT32.dll!CryptEnumOIDFunction | 373 CRYPT32.dll!CryptEnumOIDFunction |
| 374 ... | 374 ... |
| 375 CRYPT32.dll!CertFindCertificateInStore | 375 CRYPT32.dll!CertFindCertificateInStore |
| 376 | 376 |
| 377 UNINITIALIZED READ | 377 UNINITIALIZED READ |
| 378 name=http://code.google.com/p/drmemory/issues/detail?id=412 e | 378 name=https://github.com/DynamoRIO/drmemory/issues/412 e |
| 379 ... | 379 ... |
| 380 RSAENH.dll!CPGenRandom | 380 RSAENH.dll!CPGenRandom |
| 381 | 381 |
| 382 UNINITIALIZED READ | 382 UNINITIALIZED READ |
| 383 name=http://code.google.com/p/drmemory/issues/detail?id=412 f | 383 name=https://github.com/DynamoRIO/drmemory/issues/412 f |
| 384 ... | 384 ... |
| 385 CRYPT??.dll!Crypt* | 385 CRYPT??.dll!Crypt* |
| 386 | 386 |
| 387 UNINITIALIZED READ | 387 UNINITIALIZED READ |
| 388 name=http://code.google.com/p/drmemory/issues/detail?id=412 g | 388 name=https://github.com/DynamoRIO/drmemory/issues/412 g |
| 389 *!replace_memcmp | 389 *!replace_memcmp |
| 390 ... | 390 ... |
| 391 *!testing::internal::CmpHelperEQ* | 391 *!testing::internal::CmpHelperEQ* |
| 392 ... | 392 ... |
| 393 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody | 393 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody |
| 394 | 394 |
| 395 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't | 395 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't |
| 396 # have frame pointers, and we have trouble unwinding from it. Therefore, we use | 396 # have frame pointers, and we have trouble unwinding from it. Therefore, we use |
| 397 # this broad suppression, effectively disabling uninit checks in rsaenh.dll. | 397 # this broad suppression, effectively disabling uninit checks in rsaenh.dll. |
| 398 UNINITIALIZED READ | 398 UNINITIALIZED READ |
| 399 name=http://code.google.com/p/drmemory/issues/detail?id=412 h | 399 name=https://github.com/DynamoRIO/drmemory/issues/412 h |
| 400 RSAENH.dll!* | 400 RSAENH.dll!* |
| 401 | 401 |
| 402 UNINITIALIZED READ | 402 UNINITIALIZED READ |
| 403 name=http://code.google.com/p/drmemory/issues/detail?id=425 a | 403 name=https://github.com/DynamoRIO/drmemory/issues/425 a |
| 404 CLBCatQ.DLL!DestroyStgDatabase | 404 CLBCatQ.DLL!DestroyStgDatabase |
| 405 CLBCatQ.DLL!PostError | 405 CLBCatQ.DLL!PostError |
| 406 CLBCatQ.DLL!PostError | 406 CLBCatQ.DLL!PostError |
| 407 | 407 |
| 408 LEAK | 408 LEAK |
| 409 name=http://code.google.com/p/drmemory/issues/detail?id=425 b | 409 name=https://github.com/DynamoRIO/drmemory/issues/425 b |
| 410 RPCRT4.dll!I_RpcBCacheFree | 410 RPCRT4.dll!I_RpcBCacheFree |
| 411 RPCRT4.dll!I_RpcBCacheFree | 411 RPCRT4.dll!I_RpcBCacheFree |
| 412 ... | 412 ... |
| 413 RPCRT4.dll!NdrClientCall2 | 413 RPCRT4.dll!NdrClientCall2 |
| 414 | 414 |
| 415 UNINITIALIZED READ | 415 UNINITIALIZED READ |
| 416 name=http://code.google.com/p/drmemory/issues/detail?id=425 c | 416 name=https://github.com/DynamoRIO/drmemory/issues/425 c |
| 417 msdmo.dll!* | 417 msdmo.dll!* |
| 418 msdmo.dll!* | 418 msdmo.dll!* |
| 419 DEVENUM.DLL!* | 419 DEVENUM.DLL!* |
| 420 | 420 |
| 421 UNINITIALIZED READ | 421 UNINITIALIZED READ |
| 422 name=http://code.google.com/p/drmemory/issues/detail?id=435 a | 422 name=https://github.com/DynamoRIO/drmemory/issues/435 a |
| 423 ... | 423 ... |
| 424 ntdll.dll!RtlSetSecurityObject | 424 ntdll.dll!RtlSetSecurityObject |
| 425 ntdll.dll!RtlNewSecurityObjectEx | 425 ntdll.dll!RtlNewSecurityObjectEx |
| 426 ADVAPI32.dll!CreatePrivateObjectSecurityEx | 426 ADVAPI32.dll!CreatePrivateObjectSecurityEx |
| 427 NTMARTA.dll!AccRewriteSetNamedRights | 427 NTMARTA.dll!AccRewriteSetNamedRights |
| 428 | 428 |
| 429 POSSIBLE LEAK | 429 POSSIBLE LEAK |
| 430 name=http://code.google.com/p/drmemory/issues/detail?id=435 b | 430 name=https://github.com/DynamoRIO/drmemory/issues/435 b |
| 431 WLDAP32.dll!Ordinal325 | 431 WLDAP32.dll!Ordinal325 |
| 432 ... | 432 ... |
| 433 WLDAP32.dll!Ordinal325 | 433 WLDAP32.dll!Ordinal325 |
| 434 ntdll.dll!LdrInitializeThunk | 434 ntdll.dll!LdrInitializeThunk |
| 435 ntdll.dll!LdrFindResourceDirectory_U | 435 ntdll.dll!LdrFindResourceDirectory_U |
| 436 ntdll.dll!RtlValidateUnicodeString | 436 ntdll.dll!RtlValidateUnicodeString |
| 437 ntdll.dll!LdrLoadDll | 437 ntdll.dll!LdrLoadDll |
| 438 KERNEL32.dll!LoadLibraryExW | 438 KERNEL32.dll!LoadLibraryExW |
| 439 | 439 |
| 440 # mod+offs suppression because the symbolic makes no sense and changes | 440 # mod+offs suppression because the symbolic makes no sense and changes |
| 441 # completely in the presence of WS2_32.dll symbols. | 441 # completely in the presence of WS2_32.dll symbols. |
| 442 LEAK | 442 LEAK |
| 443 name=http://code.google.com/p/drmemory/issues/detail?id=438 | 443 name=https://github.com/DynamoRIO/drmemory/issues/438 |
| 444 <WS2_32.dll+0x260c> | 444 <WS2_32.dll+0x260c> |
| 445 <WS2_32.dll+0x2b76> | 445 <WS2_32.dll+0x2b76> |
| 446 <WS2_32.dll+0x2c61> | 446 <WS2_32.dll+0x2c61> |
| 447 | 447 |
| 448 UNINITIALIZED READ | 448 UNINITIALIZED READ |
| 449 name=http://code.google.com/p/drmemory/issues/detail?id=454 a | 449 name=https://github.com/DynamoRIO/drmemory/issues/454 a |
| 450 ... | 450 ... |
| 451 WINMM.dll!wave*GetNumDevs | 451 WINMM.dll!wave*GetNumDevs |
| 452 | 452 |
| 453 LEAK | 453 LEAK |
| 454 name=http://code.google.com/p/drmemory/issues/detail?id=454 b | 454 name=https://github.com/DynamoRIO/drmemory/issues/454 b |
| 455 ... | 455 ... |
| 456 WINMM.dll!wave*GetNumDevs | 456 WINMM.dll!wave*GetNumDevs |
| 457 | 457 |
| 458 LEAK | 458 LEAK |
| 459 name=http://code.google.com/p/drmemory/issues/detail?id=466 | 459 name=https://github.com/DynamoRIO/drmemory/issues/466 |
| 460 ntdll.dll!RtlRunOnceBeginInitialize | 460 ntdll.dll!RtlRunOnceBeginInitialize |
| 461 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount | 461 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount |
| 462 | 462 |
| 463 UNINITIALIZED READ | 463 UNINITIALIZED READ |
| 464 name=http://code.google.com/p/drmemory/issues/detail?id=473 a | 464 name=https://github.com/DynamoRIO/drmemory/issues/473 a |
| 465 system call NtDeviceIoControlFile InputBuffer | 465 system call NtDeviceIoControlFile InputBuffer |
| 466 ... | 466 ... |
| 467 iphlpapi.dll!GetAdaptersAddresses | 467 iphlpapi.dll!GetAdaptersAddresses |
| 468 | 468 |
| 469 POSSIBLE LEAK | 469 POSSIBLE LEAK |
| 470 name=http://code.google.com/p/drmemory/issues/detail?id=473 b | 470 name=https://github.com/DynamoRIO/drmemory/issues/473 b |
| 471 ESENT.dll!* | 471 ESENT.dll!* |
| 472 ESENT.dll!* | 472 ESENT.dll!* |
| 473 ESENT.dll!* | 473 ESENT.dll!* |
| 474 ntdll.dll!Ldr*Init* | 474 ntdll.dll!Ldr*Init* |
| 475 ntdll.dll!Ldr* | 475 ntdll.dll!Ldr* |
| 476 ntdll.dll!* | 476 ntdll.dll!* |
| 477 ntdll.dll!LdrLoadDll | 477 ntdll.dll!LdrLoadDll |
| 478 ... | 478 ... |
| 479 iphlpapi.dll!GetPerAdapterInfo | 479 iphlpapi.dll!GetPerAdapterInfo |
| 480 ... | 480 ... |
| 481 iphlpapi.dll!GetAdaptersAddresses | 481 iphlpapi.dll!GetAdaptersAddresses |
| 482 | 482 |
| 483 POSSIBLE LEAK | 483 POSSIBLE LEAK |
| 484 name=http://code.google.com/p/drmemory/issues/detail?id=473 c | 484 name=https://github.com/DynamoRIO/drmemory/issues/473 c |
| 485 RPCRT4.dll!* | 485 RPCRT4.dll!* |
| 486 RPCRT4.dll!* | 486 RPCRT4.dll!* |
| 487 ... | 487 ... |
| 488 IPHLPAPI.DLL!GetAdaptersAddresses | 488 IPHLPAPI.DLL!GetAdaptersAddresses |
| 489 | 489 |
| 490 LEAK | 490 LEAK |
| 491 name=http://code.google.com/p/drmemory/issues/detail?id=475 | 491 name=https://github.com/DynamoRIO/drmemory/issues/475 |
| 492 ... | 492 ... |
| 493 ADVAPI32.dll!CryptAcquireContextA | 493 ADVAPI32.dll!CryptAcquireContextA |
| 494 ... | 494 ... |
| 495 CRYPT32.dll!CryptMsgOpenToDecode | 495 CRYPT32.dll!CryptMsgOpenToDecode |
| 496 ... | 496 ... |
| 497 CRYPT32.dll!CryptQueryObject | 497 CRYPT32.dll!CryptQueryObject |
| 498 | 498 |
| 499 # Lots of leaks from our interactions with the system certificate store. May be | 499 # Lots of leaks from our interactions with the system certificate store. May be |
| 500 # worth reviewing our use of their API. | 500 # worth reviewing our use of their API. |
| 501 LEAK | 501 LEAK |
| 502 name=http://code.google.com/p/drmemory/issues/detail?id=476 a | 502 name=https://github.com/DynamoRIO/drmemory/issues/476 a |
| 503 KERNEL*.dll!LocalAlloc | 503 KERNEL*.dll!LocalAlloc |
| 504 ... | 504 ... |
| 505 CRYPT32.dll!CertGetCRLContextProperty | 505 CRYPT32.dll!CertGetCRLContextProperty |
| 506 | 506 |
| 507 LEAK | 507 LEAK |
| 508 name=http://code.google.com/p/drmemory/issues/detail?id=476 b | 508 name=https://github.com/DynamoRIO/drmemory/issues/476 b |
| 509 KERNEL*.dll!LocalAlloc | 509 KERNEL*.dll!LocalAlloc |
| 510 ... | 510 ... |
| 511 CRYPT32.dll!CertAddCRLContextToStore | 511 CRYPT32.dll!CertAddCRLContextToStore |
| 512 | 512 |
| 513 LEAK | 513 LEAK |
| 514 name=http://code.google.com/p/drmemory/issues/detail?id=476 c | 514 name=https://github.com/DynamoRIO/drmemory/issues/476 c |
| 515 KERNEL*.dll!LocalAlloc | 515 KERNEL*.dll!LocalAlloc |
| 516 ... | 516 ... |
| 517 CRYPT32.dll!CertOpenStore | 517 CRYPT32.dll!CertOpenStore |
| 518 | 518 |
| 519 LEAK | 519 LEAK |
| 520 name=http://code.google.com/p/drmemory/issues/detail?id=476 d | 520 name=https://github.com/DynamoRIO/drmemory/issues/476 d |
| 521 ... | 521 ... |
| 522 CRYPT32.dll!CertOpenSystemStore? | 522 CRYPT32.dll!CertOpenSystemStore? |
| 523 | 523 |
| 524 LEAK | 524 LEAK |
| 525 name=http://code.google.com/p/drmemory/issues/detail?id=476 e | 525 name=https://github.com/DynamoRIO/drmemory/issues/476 e |
| 526 ... | 526 ... |
| 527 CRYPT32.dll!CertGetCertificateChain | 527 CRYPT32.dll!CertGetCertificateChain |
| 528 | 528 |
| 529 LEAK | 529 LEAK |
| 530 name=http://code.google.com/p/drmemory/issues/detail?id=476 f | 530 name=https://github.com/DynamoRIO/drmemory/issues/476 f |
| 531 ... | 531 ... |
| 532 CRYPT32.dll!CertCompareIntegerBlob | 532 CRYPT32.dll!CertCompareIntegerBlob |
| 533 | 533 |
| 534 LEAK | 534 LEAK |
| 535 name=http://code.google.com/p/drmemory/issues/detail?id=476 g | 535 name=https://github.com/DynamoRIO/drmemory/issues/476 g |
| 536 ... | 536 ... |
| 537 CRYPT32.dll!CryptUnprotectData | 537 CRYPT32.dll!CryptUnprotectData |
| 538 | 538 |
| 539 LEAK | 539 LEAK |
| 540 name=http://code.google.com/p/drmemory/issues/detail?id=476 h | 540 name=https://github.com/DynamoRIO/drmemory/issues/476 h |
| 541 KERNEL*.dll!LocalAlloc | 541 KERNEL*.dll!LocalAlloc |
| 542 ... | 542 ... |
| 543 CRYPT32.dll!CertEnumCertificatesInStore | 543 CRYPT32.dll!CertEnumCertificatesInStore |
| 544 | 544 |
| 545 LEAK | 545 LEAK |
| 546 name=http://code.google.com/p/drmemory/issues/detail?id=476 i | 546 name=https://github.com/DynamoRIO/drmemory/issues/476 i |
| 547 ... | 547 ... |
| 548 CRYPT32.dll!CryptProtectData | 548 CRYPT32.dll!CryptProtectData |
| 549 | 549 |
| 550 LEAK | 550 LEAK |
| 551 name=http://code.google.com/p/drmemory/issues/detail?id=476 j | 551 name=https://github.com/DynamoRIO/drmemory/issues/476 j |
| 552 ... | 552 ... |
| 553 CRYPT32.dll!CryptExportPublicKeyInfoEx | 553 CRYPT32.dll!CryptExportPublicKeyInfoEx |
| 554 | 554 |
| 555 UNINITIALIZED READ | 555 UNINITIALIZED READ |
| 556 name=http://code.google.com/p/drmemory/issues/detail?id=502 a | 556 name=https://github.com/DynamoRIO/drmemory/issues/502 a |
| 557 system call NtSecureConnectPort parameter #3 | 557 system call NtSecureConnectPort parameter #3 |
| 558 GDI32.dll!* | 558 GDI32.dll!* |
| 559 GDI32.dll!* | 559 GDI32.dll!* |
| 560 | 560 |
| 561 UNINITIALIZED READ | 561 UNINITIALIZED READ |
| 562 name=http://code.google.com/p/drmemory/issues/detail?id=502 b | 562 name=https://github.com/DynamoRIO/drmemory/issues/502 b |
| 563 system call NtGdiEnumFonts parameter #6 | 563 system call NtGdiEnumFonts parameter #6 |
| 564 GDI32.dll!* | 564 GDI32.dll!* |
| 565 GDI32.dll!* | 565 GDI32.dll!* |
| 566 | 566 |
| 567 UNINITIALIZED READ | 567 UNINITIALIZED READ |
| 568 name=http://code.google.com/p/drmemory/issues/detail?id=511 a | 568 name=https://github.com/DynamoRIO/drmemory/issues/511 a |
| 569 RPCRT4.dll!... | 569 RPCRT4.dll!... |
| 570 ole32.dll!* | 570 ole32.dll!* |
| 571 | 571 |
| 572 UNINITIALIZED READ | 572 UNINITIALIZED READ |
| 573 name=http://code.google.com/p/drmemory/issues/detail?id=511 b | 573 name=https://github.com/DynamoRIO/drmemory/issues/511 b |
| 574 ole32.dll!* | 574 ole32.dll!* |
| 575 ole32.dll!* | 575 ole32.dll!* |
| 576 ole32.dll!StringFromGUID2 | 576 ole32.dll!StringFromGUID2 |
| 577 | 577 |
| 578 UNINITIALIZED READ | 578 UNINITIALIZED READ |
| 579 name=http://code.google.com/p/drmemory/issues/detail?id=512 a | 579 name=https://github.com/DynamoRIO/drmemory/issues/512 a |
| 580 ... | 580 ... |
| 581 *!browser_sync::Cryptographer::PackBootstrapToken | 581 *!browser_sync::Cryptographer::PackBootstrapToken |
| 582 *!browser_sync::Cryptographer::GetBootstrapToken | 582 *!browser_sync::Cryptographer::GetBootstrapToken |
| 583 | 583 |
| 584 UNINITIALIZED READ | 584 UNINITIALIZED READ |
| 585 name=http://code.google.com/p/drmemory/issues/detail?id=512 b | 585 name=https://github.com/DynamoRIO/drmemory/issues/512 b |
| 586 ... | 586 ... |
| 587 *!Encrypt* | 587 *!Encrypt* |
| 588 | 588 |
| 589 # TODO(bruening): remove these once we have v8 bitfields handled | 589 # TODO(bruening): remove these once we have v8 bitfields handled |
| 590 UNINITIALIZED READ | 590 UNINITIALIZED READ |
| 591 name=http://code.google.com/p/drmemory/issues/detail?id=513 a | 591 name=https://github.com/DynamoRIO/drmemory/issues/513 a |
| 592 *!v8* | 592 *!v8* |
| 593 | 593 |
| 594 UNINITIALIZED READ | 594 UNINITIALIZED READ |
| 595 name=http://code.google.com/p/drmemory/issues/detail?id=513 b | 595 name=https://github.com/DynamoRIO/drmemory/issues/513 b |
| 596 *!* | 596 *!* |
| 597 *!v8* | 597 *!v8* |
| 598 | 598 |
| 599 UNINITIALIZED READ | 599 UNINITIALIZED READ |
| 600 name=http://code.google.com/p/drmemory/issues/detail?id=513 c | 600 name=https://github.com/DynamoRIO/drmemory/issues/513 c |
| 601 <not in a module> | 601 <not in a module> |
| 602 ... | 602 ... |
| 603 *!v8* | 603 *!v8* |
| 604 | 604 |
| 605 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll | 605 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll |
| 606 # has no symbols. These are all on the bots using component build, so we use | 606 # has no symbols. These are all on the bots using component build, so we use |
| 607 # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue. | 607 # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue. |
| 608 UNINITIALIZED READ | 608 UNINITIALIZED READ |
| 609 name=http://code.google.com/p/drmemory/issues/detail?id=513 d | 609 name=https://github.com/DynamoRIO/drmemory/issues/513 d |
| 610 v8.dll!* | 610 v8.dll!* |
| 611 | 611 |
| 612 UNINITIALIZED READ | 612 UNINITIALIZED READ |
| 613 name=http://code.google.com/p/drmemory/issues/detail?id=513 e | 613 name=https://github.com/DynamoRIO/drmemory/issues/513 e |
| 614 <not in a module> | 614 <not in a module> |
| 615 ... | 615 ... |
| 616 v8.dll!* | 616 v8.dll!* |
| 617 | 617 |
| 618 UNINITIALIZED READ | 618 UNINITIALIZED READ |
| 619 name=http://code.google.com/p/drmemory/issues/detail?id=546 | 619 name=https://github.com/DynamoRIO/drmemory/issues/546 |
| 620 ... | 620 ... |
| 621 mscms.dll!* | 621 mscms.dll!* |
| 622 ... | 622 ... |
| 623 GDI32.dll!* | 623 GDI32.dll!* |
| 624 *!IconUtil::Create*HICON* | 624 *!IconUtil::Create*HICON* |
| 625 | 625 |
| 626 LEAK | 626 LEAK |
| 627 name=http://crbug.com/92152 | 627 name=http://crbug.com/92152 |
| 628 ... | 628 ... |
| 629 USER32.dll!CreateWindowExW | 629 USER32.dll!CreateWindowExW |
| 630 *!views::TooltipManagerWin::Init | 630 *!views::TooltipManagerWin::Init |
| 631 *!views::TooltipManagerWin::TooltipManagerWin | 631 *!views::TooltipManagerWin::TooltipManagerWin |
| 632 | 632 |
| 633 UNINITIALIZED READ | 633 UNINITIALIZED READ |
| 634 name=http://code.google.com/p/drmemory/issues/detail?id=567 a | 634 name=https://github.com/DynamoRIO/drmemory/issues/567 a |
| 635 dbghelp.dll!* | 635 dbghelp.dll!* |
| 636 ... | 636 ... |
| 637 dbghelp.dll!StackWalk64 | 637 dbghelp.dll!StackWalk64 |
| 638 | 638 |
| 639 LEAK | 639 LEAK |
| 640 name=http://code.google.com/p/drmemory/issues/detail?id=567 b | 640 name=https://github.com/DynamoRIO/drmemory/issues/567 b |
| 641 *!* | 641 *!* |
| 642 dbghelp.dll!* | 642 dbghelp.dll!* |
| 643 ... | 643 ... |
| 644 dbghelp.dll!StackWalk64 | 644 dbghelp.dll!StackWalk64 |
| 645 | 645 |
| 646 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and | 646 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and |
| 647 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too | 647 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too |
| 648 # brittle, so we switched to RPCRT4.dll!*. | 648 # brittle, so we switched to RPCRT4.dll!*. |
| 649 LEAK | 649 LEAK |
| 650 name=http://code.google.com/p/drmemory/issues/detail?id=569 | 650 name=https://github.com/DynamoRIO/drmemory/issues/569 |
| 651 RPCRT4.dll!... | 651 RPCRT4.dll!... |
| 652 ntdll.dll!* | 652 ntdll.dll!* |
| 653 ntdll.dll!* | 653 ntdll.dll!* |
| 654 KERNEL*.dll!BaseThreadInitThunk | 654 KERNEL*.dll!BaseThreadInitThunk |
| 655 | 655 |
| 656 # TODO(timurrrr): investigate these | 656 # TODO(timurrrr): investigate these |
| 657 UNINITIALIZED READ | 657 UNINITIALIZED READ |
| 658 name=http://crbug.com/TODO a | 658 name=http://crbug.com/TODO a |
| 659 ... | 659 ... |
| 660 *!win_util::GetLogonSessionOnlyDACL | 660 *!win_util::GetLogonSessionOnlyDACL |
| (...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 765 ... | 765 ... |
| 766 *!media::VideoCaptureDevice::* | 766 *!media::VideoCaptureDevice::* |
| 767 | 767 |
| 768 LEAK | 768 LEAK |
| 769 name=http://crbug.com/109278 audio device COM leaks | 769 name=http://crbug.com/109278 audio device COM leaks |
| 770 ... | 770 ... |
| 771 *!media::GetInputDeviceNamesWin | 771 *!media::GetInputDeviceNamesWin |
| 772 | 772 |
| 773 # False pos uninit in shell32 when resolving links. | 773 # False pos uninit in shell32 when resolving links. |
| 774 UNINITIALIZED READ | 774 UNINITIALIZED READ |
| 775 name=http://code.google.com/p/drmemory/issues/detail?id=745 | 775 name=https://github.com/DynamoRIO/drmemory/issues/745 |
| 776 SHELL*.dll!* | 776 SHELL*.dll!* |
| 777 ... | 777 ... |
| 778 SHELL*.dll!* | 778 SHELL*.dll!* |
| 779 *!file_util::ResolveShortcut | 779 *!file_util::ResolveShortcut |
| 780 | 780 |
| 781 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a | 781 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a |
| 782 # buffer with SSE/MMX instructions whose results are then masked out later. | 782 # buffer with SSE/MMX instructions whose results are then masked out later. |
| 783 UNINITIALIZED READ | 783 UNINITIALIZED READ |
| 784 name=http://code.google.com/p/drmemory/issues/detail?id=747 a | 784 name=https://github.com/DynamoRIO/drmemory/issues/747 a |
| 785 *!ff_pred4x4_vertical_vp8_mmxext | 785 *!ff_pred4x4_vertical_vp8_mmxext |
| 786 | 786 |
| 787 UNINITIALIZED READ | 787 UNINITIALIZED READ |
| 788 name=http://code.google.com/p/drmemory/issues/detail?id=747 b | 788 name=https://github.com/DynamoRIO/drmemory/issues/747 b |
| 789 *!ff_pred4x4_down_left_mmxext | 789 *!ff_pred4x4_down_left_mmxext |
| 790 | 790 |
| 791 UNINITIALIZED READ | 791 UNINITIALIZED READ |
| 792 name=http://code.google.com/p/drmemory/issues/detail?id=747 c | 792 name=https://github.com/DynamoRIO/drmemory/issues/747 c |
| 793 *!ff_vorbis_floor1_render_list | 793 *!ff_vorbis_floor1_render_list |
| 794 | 794 |
| 795 UNINITIALIZED READ | 795 UNINITIALIZED READ |
| 796 name=http://code.google.com/p/drmemory/issues/detail?id=747 d | 796 name=https://github.com/DynamoRIO/drmemory/issues/747 d |
| 797 *!ff_put_vp8_epel8_h6_ssse3 | 797 *!ff_put_vp8_epel8_h6_ssse3 |
| 798 | 798 |
| 799 UNINITIALIZED READ | 799 UNINITIALIZED READ |
| 800 name=http://code.google.com/p/drmemory/issues/detail?id=747 e | 800 name=https://github.com/DynamoRIO/drmemory/issues/747 e |
| 801 *!ff_put_vp8_epel8_h4_ssse3 | 801 *!ff_put_vp8_epel8_h4_ssse3 |
| 802 | 802 |
| 803 UNINITIALIZED READ | 803 UNINITIALIZED READ |
| 804 name=http://code.google.com/p/drmemory/issues/detail?id=747 f | 804 name=https://github.com/DynamoRIO/drmemory/issues/747 f |
| 805 *!ff_fft_permute_sse | 805 *!ff_fft_permute_sse |
| 806 | 806 |
| 807 UNINITIALIZED READ | 807 UNINITIALIZED READ |
| 808 name=http://code.google.com/p/drmemory/issues/detail?id=747 g | 808 name=https://github.com/DynamoRIO/drmemory/issues/747 g |
| 809 *!ff_simple_idct_add_mmx | 809 *!ff_simple_idct_add_mmx |
| 810 | 810 |
| 811 # ffmpeg seems to leak a pthread condition variable. | 811 # ffmpeg seems to leak a pthread condition variable. |
| 812 LEAK | 812 LEAK |
| 813 name=http://crbug.com/110042 | 813 name=http://crbug.com/110042 |
| 814 *!ptw32_new | 814 *!ptw32_new |
| 815 *!pthread_self | 815 *!pthread_self |
| 816 *!sem_wait | 816 *!sem_wait |
| 817 *!pthread_cond_wait | 817 *!pthread_cond_wait |
| 818 *!ff_thread_decode_frame | 818 *!ff_thread_decode_frame |
| 819 *!avcodec_decode_video2 | 819 *!avcodec_decode_video2 |
| 820 | 820 |
| 821 # Improperly handled ioctl in bcrypt. | 821 # Improperly handled ioctl in bcrypt. |
| 822 UNINITIALIZED READ | 822 UNINITIALIZED READ |
| 823 name=http://code.google.com/p/drmemory/issues/detail?id=748 | 823 name=https://github.com/DynamoRIO/drmemory/issues/748 |
| 824 system call NtDeviceIoControlFile InputBuffer | 824 system call NtDeviceIoControlFile InputBuffer |
| 825 ... | 825 ... |
| 826 bcrypt.dll!BCryptUnregisterConfigChangeNotify | 826 bcrypt.dll!BCryptUnregisterConfigChangeNotify |
| 827 bcrypt.dll!BCryptGetFipsAlgorithmMode | 827 bcrypt.dll!BCryptGetFipsAlgorithmMode |
| 828 ntdll.dll!RtlQueryEnvironmentVariable | 828 ntdll.dll!RtlQueryEnvironmentVariable |
| 829 | 829 |
| 830 # Not sure what this is. | 830 # Not sure what this is. |
| 831 POSSIBLE LEAK | 831 POSSIBLE LEAK |
| 832 name=http://code.google.com/p/drmemory/issues/detail?id=749 | 832 name=https://github.com/DynamoRIO/drmemory/issues/749 |
| 833 ... | 833 ... |
| 834 fwpuclnt.dll!* | 834 fwpuclnt.dll!* |
| 835 ... | 835 ... |
| 836 RPCRT4.dll!* | 836 RPCRT4.dll!* |
| 837 ... | 837 ... |
| 838 fwpuclnt.dll!* | 838 fwpuclnt.dll!* |
| 839 ... | 839 ... |
| 840 WS2_32.dll!* | 840 WS2_32.dll!* |
| 841 *!talk_base::SafeGetHostByName | 841 *!talk_base::SafeGetHostByName |
| 842 *!talk_base::SocketAddress::GetLocalIPs | 842 *!talk_base::SocketAddress::GetLocalIPs |
| 843 *!talk_base::SocketAddress::IsLocalIP | 843 *!talk_base::SocketAddress::IsLocalIP |
| 844 *!cricket::Transport::VerifyCandidate | 844 *!cricket::Transport::VerifyCandidate |
| 845 *!cricket::Session::OnRemoteCandidates | 845 *!cricket::Session::OnRemoteCandidates |
| 846 *!cricket::Session::OnTransportInfoMessage | 846 *!cricket::Session::OnTransportInfoMessage |
| 847 *!cricket::Session::OnIncomingMessage | 847 *!cricket::Session::OnIncomingMessage |
| 848 *!cricket::SessionManager::OnIncomingMessage | 848 *!cricket::SessionManager::OnIncomingMessage |
| 849 | 849 |
| 850 # More uninit false pos in rpcrt4.dll not caught by default suppressions. | 850 # More uninit false pos in rpcrt4.dll not caught by default suppressions. |
| 851 UNINITIALIZED READ | 851 UNINITIALIZED READ |
| 852 name=http://code.google.com/p/drmemory/issues/detail?id=529 | 852 name=https://github.com/DynamoRIO/drmemory/issues/529 |
| 853 RPCRT4.dll!* | 853 RPCRT4.dll!* |
| 854 ... | 854 ... |
| 855 *!base::LaunchProcess | 855 *!base::LaunchProcess |
| 856 | 856 |
| 857 # System leak from CreateEnvironmentBlock. | 857 # System leak from CreateEnvironmentBlock. |
| 858 LEAK | 858 LEAK |
| 859 name=http://code.google.com/p/drmemory/issues/detail?id=757 | 859 name=https://github.com/DynamoRIO/drmemory/issues/757 |
| 860 ... | 860 ... |
| 861 USERENV.dll!CreateEnvironmentBlock | 861 USERENV.dll!CreateEnvironmentBlock |
| 862 | 862 |
| 863 # Looks like another instance of 753 | 863 # Looks like another instance of 753 |
| 864 LEAK | 864 LEAK |
| 865 name=http://code.google.com/p/drmemory/issues/detail?id=753 | 865 name=https://github.com/DynamoRIO/drmemory/issues/753 |
| 866 ... | 866 ... |
| 867 ntdll.dll!RtlLoadString | 867 ntdll.dll!RtlLoadString |
| 868 | 868 |
| 869 # More bit manip fps | 869 # More bit manip fps |
| 870 UNINITIALIZED READ | 870 UNINITIALIZED READ |
| 871 name=http://code.google.com/p/drmemory/issues/detail?id=493 | 871 name=https://github.com/DynamoRIO/drmemory/issues/493 |
| 872 USP10.dll!ScriptPositionSingleGlyph | 872 USP10.dll!ScriptPositionSingleGlyph |
| 873 | 873 |
| 874 # Various TLS leaks that we don't understand yet. We should be finding a root | 874 # Various TLS leaks that we don't understand yet. We should be finding a root |
| 875 # for these. | 875 # for these. |
| 876 LEAK | 876 LEAK |
| 877 name=http://code.google.com/p/drmemory/issues/detail?id=778 a | 877 name=https://github.com/DynamoRIO/drmemory/issues/778 a |
| 878 KERNELBASE.dll!TlsSetValue | 878 KERNELBASE.dll!TlsSetValue |
| 879 | 879 |
| 880 # Originally filed as: http://crbug.com/109281 | 880 # Originally filed as: http://crbug.com/109281 |
| 881 LEAK | 881 LEAK |
| 882 name=http://code.google.com/p/drmemory/issues/detail?id=778 b | 882 name=https://github.com/DynamoRIO/drmemory/issues/778 b |
| 883 *!operator new | 883 *!operator new |
| 884 *!operator new[] | 884 *!operator new[] |
| 885 *!*::ConstructTlsVector | 885 *!*::ConstructTlsVector |
| 886 *!base::ThreadLocalStorage::StaticSlot::Get | 886 *!base::ThreadLocalStorage::StaticSlot::Get |
| 887 | 887 |
| 888 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a | 888 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a |
| 889 # root? See also http://crbug.com/32624 | 889 # root? See also http://crbug.com/32624 |
| 890 LEAK | 890 LEAK |
| 891 name=http://code.google.com/p/drmemory/issues/detail?id=778 c | 891 name=https://github.com/DynamoRIO/drmemory/issues/778 c |
| 892 *!PR_Calloc | 892 *!PR_Calloc |
| 893 *!_PR_AttachThread | 893 *!_PR_AttachThread |
| 894 *!_PRI_AttachThread | 894 *!_PRI_AttachThread |
| 895 | 895 |
| 896 # Bit-level fps in rich edit layer. | 896 # Bit-level fps in rich edit layer. |
| 897 UNINITIALIZED READ | 897 UNINITIALIZED READ |
| 898 name=http://code.google.com/p/drmemory/issues/detail?id=791 | 898 name=https://github.com/DynamoRIO/drmemory/issues/791 |
| 899 RICHED20.dll!* | 899 RICHED20.dll!* |
| 900 RICHED20.dll!* | 900 RICHED20.dll!* |
| 901 | 901 |
| 902 # Already suppressed by drmemory default supp we don't have yet. | 902 # Already suppressed by drmemory default supp we don't have yet. |
| 903 LEAK | 903 LEAK |
| 904 name=i#757: RPC binding leaks in sspicli.dll | 904 name=i#757: RPC binding leaks in sspicli.dll |
| 905 RPCRT4.dll!* | 905 RPCRT4.dll!* |
| 906 ... | 906 ... |
| 907 SspiCli.dll!* | 907 SspiCli.dll!* |
| 908 SspiCli.dll!Cre* | 908 SspiCli.dll!Cre* |
| 909 | 909 |
| 910 # Async NtReadFile false positives. This was fixed in drmemory r772, remove | 910 # Async NtReadFile false positives. This was fixed in drmemory r772, remove |
| 911 # this supp when we pull that rev. | 911 # this supp when we pull that rev. |
| 912 UNADDRESSABLE ACCESS | 912 UNADDRESSABLE ACCESS |
| 913 name=http://code.google.com/p/drmemory/issues/detail?id=798 | 913 name=https://github.com/DynamoRIO/drmemory/issues/798 |
| 914 system call NtReadFile parameter #5 | 914 system call NtReadFile parameter #5 |
| 915 KERNEL32.dll!ReadFile | 915 KERNEL32.dll!ReadFile |
| 916 | 916 |
| 917 # Probable syscall false positive. | 917 # Probable syscall false positive. |
| 918 UNADDRESSABLE ACCESS | 918 UNADDRESSABLE ACCESS |
| 919 name=http://code.google.com/p/drmemory/issues/detail?id=809 | 919 name=https://github.com/DynamoRIO/drmemory/issues/809 |
| 920 system call NtGdiPolyPolyDraw parameter #1 | 920 system call NtGdiPolyPolyDraw parameter #1 |
| 921 *!gfx::Path::CreateNativeRegion | 921 *!gfx::Path::CreateNativeRegion |
| 922 | 922 |
| 923 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces | 923 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces |
| 924 # coming out of this module (sometimes only one frame), which makes it hard to | 924 # coming out of this module (sometimes only one frame), which makes it hard to |
| 925 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we | 925 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we |
| 926 # should keep this. | 926 # should keep this. |
| 927 UNINITIALIZED READ | 927 UNINITIALIZED READ |
| 928 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard | 928 name=https://github.com/DynamoRIO/drmemory/issues/113 rpcrt4.dll wildcard |
| 929 RPCRT4.dll!* | 929 RPCRT4.dll!* |
| 930 | 930 |
| 931 UNINITIALIZED READ | 931 UNINITIALIZED READ |
| 932 name=http://code.google.com/p/drmemory/issues/detail?id=841 a | 932 name=https://github.com/DynamoRIO/drmemory/issues/841 a |
| 933 ... | 933 ... |
| 934 CRYPTNET.dll!I_CryptNetGetConnectivity | 934 CRYPTNET.dll!I_CryptNetGetConnectivity |
| 935 | 935 |
| 936 UNINITIALIZED READ | 936 UNINITIALIZED READ |
| 937 name=http://code.google.com/p/drmemory/issues/detail?id=841 b | 937 name=https://github.com/DynamoRIO/drmemory/issues/841 b |
| 938 ... | 938 ... |
| 939 webio.dll!* | 939 webio.dll!* |
| 940 | 940 |
| 941 UNINITIALIZED READ | 941 UNINITIALIZED READ |
| 942 name=http://code.google.com/p/drmemory/issues/detail?id=841 c | 942 name=https://github.com/DynamoRIO/drmemory/issues/841 c |
| 943 ... | 943 ... |
| 944 winhttp.dll!* | 944 winhttp.dll!* |
| 945 | 945 |
| 946 LEAK | 946 LEAK |
| 947 name=http://code.google.com/p/drmemory/issues/detail?id=841 d | 947 name=https://github.com/DynamoRIO/drmemory/issues/841 d |
| 948 ... | 948 ... |
| 949 CRYPTNET.dll!I_CryptNetGetConnectivity | 949 CRYPTNET.dll!I_CryptNetGetConnectivity |
| 950 | 950 |
| 951 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame. | 951 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame. |
| 952 UNINITIALIZED READ | 952 UNINITIALIZED READ |
| 953 name=http://code.google.com/p/drmemory/issues/detail?id=810 | 953 name=https://github.com/DynamoRIO/drmemory/issues/810 |
| 954 instruction=test %edx %edx | 954 instruction=test %edx %edx |
| 955 USER32.dll!GetClassLongW | 955 USER32.dll!GetClassLongW |
| 956 ... | 956 ... |
| 957 *!ui::CenterAndSizeWindow | 957 *!ui::CenterAndSizeWindow |
| 958 | 958 |
| 959 UNINITIALIZED READ | 959 UNINITIALIZED READ |
| 960 name=http://code.google.com/p/drmemory/issues/detail?id=815 | 960 name=https://github.com/DynamoRIO/drmemory/issues/815 |
| 961 KERNEL*.dll!... | 961 KERNEL*.dll!... |
| 962 dxgi.dll!* | 962 dxgi.dll!* |
| 963 USER32.dll!GetMonitorInfoA | 963 USER32.dll!GetMonitorInfoA |
| 964 ntdll.dll!KiUserCallbackDispatcher | 964 ntdll.dll!KiUserCallbackDispatcher |
| 965 dxgi.dll!* | 965 dxgi.dll!* |
| 966 WinSATAPI.DLL!* | 966 WinSATAPI.DLL!* |
| 967 | 967 |
| 968 # Suppress anything in cmd.exe. It's safer to suppress these than disable | 968 # Suppress anything in cmd.exe. It's safer to suppress these than disable |
| 969 # following, since someone might launch a Chrome process via cmd.exe. | 969 # following, since someone might launch a Chrome process via cmd.exe. |
| 970 LEAK | 970 LEAK |
| 971 name=cmd.exe | 971 name=cmd.exe |
| 972 ... | 972 ... |
| 973 cmd.exe!* | 973 cmd.exe!* |
| 974 | 974 |
| 975 # Possible true system use after free. | 975 # Possible true system use after free. |
| 976 UNADDRESSABLE ACCESS | 976 UNADDRESSABLE ACCESS |
| 977 name=http://code.google.com/p/drmemory/issues/detail?id=623 | 977 name=https://github.com/DynamoRIO/drmemory/issues/623 |
| 978 KERNELBASE.dll!TlsGetValue | 978 KERNELBASE.dll!TlsGetValue |
| 979 OLEAUT32.dll!SysFreeString | 979 OLEAUT32.dll!SysFreeString |
| 980 OLEAUT32.dll!SysAllocStringByteLen | 980 OLEAUT32.dll!SysAllocStringByteLen |
| 981 OLEACC.dll!* | 981 OLEACC.dll!* |
| 982 OLEACC.dll!* | 982 OLEACC.dll!* |
| 983 OLEACC.dll!* | 983 OLEACC.dll!* |
| 984 OLEACC.dll!* | 984 OLEACC.dll!* |
| 985 | 985 |
| 986 # basic_streambuf seems to leak something in creating a std::_Mutex | 986 # basic_streambuf seems to leak something in creating a std::_Mutex |
| 987 LEAK | 987 LEAK |
| 988 name=http://code.google.com/p/drmemory/issues/detail?id=857 | 988 name=https://github.com/DynamoRIO/drmemory/issues/857 |
| 989 ntdll.dll!... | 989 ntdll.dll!... |
| 990 ntdll.dll!RtlInitializeCriticalSection | 990 ntdll.dll!RtlInitializeCriticalSection |
| 991 *!_Mtxinit | 991 *!_Mtxinit |
| 992 *!std::_Mutex::_Mutex | 992 *!std::_Mutex::_Mutex |
| 993 *!std::basic_streambuf<> | 993 *!std::basic_streambuf<> |
| 994 | 994 |
| 995 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. | 995 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. |
| 996 LEAK | 996 LEAK |
| 997 name=GDI SetBrushOrgEx leak | 997 name=GDI SetBrushOrgEx leak |
| 998 GDI32.dll!... | 998 GDI32.dll!... |
| (...skipping 625 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1624 name=BUG_349128 | 1624 name=BUG_349128 |
| 1625 content.dll!std::* | 1625 content.dll!std::* |
| 1626 ... | 1626 ... |
| 1627 content.dll!content::BrowserAccessibilityManagerWin::* | 1627 content.dll!content::BrowserAccessibilityManagerWin::* |
| 1628 ... | 1628 ... |
| 1629 *!*::UpdateNode | 1629 *!*::UpdateNode |
| 1630 | 1630 |
| 1631 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB* | 1631 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB* |
| 1632 # variety) that it's a performance hit. We avoid that by requesting | 1632 # variety) that it's a performance hit. We avoid that by requesting |
| 1633 # whole-module suppression | 1633 # whole-module suppression |
| 1634 # (see https://code.google.com/p/drmemory/issues/detail?id=1529). | 1634 # (see https://github.com/DynamoRIO/drmemory/issues/1529). |
| 1635 UNINITIALIZED READ | 1635 UNINITIALIZED READ |
| 1636 name=bug_347967_all_osmesa | 1636 name=bug_347967_all_osmesa |
| 1637 osmesa.dll!* | 1637 osmesa.dll!* |
| 1638 | 1638 |
| 1639 UNINITIALIZED READ | 1639 UNINITIALIZED READ |
| 1640 name=bug_347967 | 1640 name=bug_347967 |
| 1641 osmesa.dll!unpack_RGB*888 | 1641 osmesa.dll!unpack_RGB*888 |
| 1642 osmesa.dll!_mesa_unpack_rgba_row | 1642 osmesa.dll!_mesa_unpack_rgba_row |
| 1643 osmesa.dll!slow_read_rgba_pixels | 1643 osmesa.dll!slow_read_rgba_pixels |
| 1644 osmesa.dll!read_rgba_pixels | 1644 osmesa.dll!read_rgba_pixels |
| (...skipping 231 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1876 *!`anonymous namespace'::TOutputTraverser::visitConstantUnion | 1876 *!`anonymous namespace'::TOutputTraverser::visitConstantUnion |
| 1877 *!TIntermBinary::traverse | 1877 *!TIntermBinary::traverse |
| 1878 *!TIntermBinary::traverse | 1878 *!TIntermBinary::traverse |
| 1879 *!TIntermAggregate::traverse | 1879 *!TIntermAggregate::traverse |
| 1880 *!TIntermAggregate::traverse | 1880 *!TIntermAggregate::traverse |
| 1881 *!TIntermAggregate::traverse | 1881 *!TIntermAggregate::traverse |
| 1882 *!TIntermediate::outputTree | 1882 *!TIntermediate::outputTree |
| 1883 *!TCompiler::compile | 1883 *!TCompiler::compile |
| 1884 *!TypeTrackingTest::compile | 1884 *!TypeTrackingTest::compile |
| 1885 *!TypeTrackingTest_StructConstructorResultNoPrecision_Test::TestBody | 1885 *!TypeTrackingTest_StructConstructorResultNoPrecision_Test::TestBody |
| 1886 |
| 1887 UNADDRESSABLE ACCESS |
| 1888 name=bug_436131 |
| 1889 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone |
| 1890 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody |
| 1891 *!testing::internal::HandleExceptionsInMethodIfSupported<> |
| 1892 |
| 1893 UNADDRESSABLE ACCESS |
| 1894 name=bug_436131_b |
| 1895 views.dll!ObserverListBase<>::RemoveObserver |
| 1896 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone |
| 1897 *!testing::internal::HandleExceptionsInMethodIfSupported<> |
| 1898 |
| 1899 UNADDRESSABLE ACCESS |
| 1900 name=bug_436131_c |
| 1901 *!ash::test::ShelfViewTestAPI::GetPreferredSize |
| 1902 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody |
| 1903 *!testing::internal::HandleExceptionsInMethodIfSupported<> |
| OLD | NEW |