OLD | NEW |
1 # This file contains suppressions for the Dr.Memory tool, see | 1 # This file contains suppressions for the Dr.Memory tool, see |
2 # http://dev.chromium.org/developers/how-tos/using-drmemory | 2 # http://dev.chromium.org/developers/how-tos/using-drmemory |
3 # | 3 # |
4 # This file should contain suppressions only for the reports happening | 4 # This file should contain suppressions only for the reports happening |
5 # in the 'full' mode (drmemory_full). | 5 # in the 'full' mode (drmemory_full). |
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light), | 6 # For the reports that can happen in the light mode (a.k.a. drmemory_light), |
7 # please use suppressions.txt instead. | 7 # please use suppressions.txt instead. |
8 | 8 |
9 ############################################################### | 9 ############################################################### |
10 # Known reports on the third party we have no control over. | 10 # Known reports on the third party we have no control over. |
11 | 11 |
12 UNINITIALIZED READ | 12 UNINITIALIZED READ |
13 name=http://crbug.com/116277 | 13 name=http://crbug.com/116277 |
14 ... | 14 ... |
15 *!MOZ_Z_deflate | 15 *!MOZ_Z_deflate |
16 | 16 |
17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. | 17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. |
18 LEAK | 18 LEAK |
19 name=http://code.google.com/p/drmemory/issues/detail?id=406 | 19 name=https://github.com/DynamoRIO/drmemory/issues/406 |
20 ADVAPI32.dll!WmiOpenBlock | 20 ADVAPI32.dll!WmiOpenBlock |
21 ADVAPI32.dll!WmiOpenBlock | 21 ADVAPI32.dll!WmiOpenBlock |
22 | 22 |
23 # Leaks inside GoogleDesktop - it injects into our processes for some reason | 23 # Leaks inside GoogleDesktop - it injects into our processes for some reason |
24 LEAK | 24 LEAK |
25 name=GoogleDesktop LEAK | 25 name=GoogleDesktop LEAK |
26 ... | 26 ... |
27 GoogleDesktopNetwork3.DLL!DllUnregisterServer | 27 GoogleDesktopNetwork3.DLL!DllUnregisterServer |
28 | 28 |
29 # They deliberately use uninit local var in sqlite random generator. | 29 # They deliberately use uninit local var in sqlite random generator. |
30 # Random bytes may mess up the call stack between randomByte and | 30 # Random bytes may mess up the call stack between randomByte and |
31 # sqlite3_* frames (http://code.google.com/p/drmemory/issues/detail?id=1514) | 31 # sqlite3_* frames (https://github.com/DynamoRIO/drmemory/issues/1514) |
32 # so we just look for randomByte. | 32 # so we just look for randomByte. |
33 UNINITIALIZED READ | 33 UNINITIALIZED READ |
34 name=sqlite3_randomness UNINIT | 34 name=sqlite3_randomness UNINIT |
35 *!randomByte | 35 *!randomByte |
36 | 36 |
37 # Intentional leak in WebKit Template Framework for ThreadData. | 37 # Intentional leak in WebKit Template Framework for ThreadData. |
38 LEAK | 38 LEAK |
39 name=intentional WTF ThreadData leak | 39 name=intentional WTF ThreadData leak |
40 ... | 40 ... |
41 *!WTF::wtfThreadData | 41 *!WTF::wtfThreadData |
(...skipping 27 matching lines...) Expand all Loading... |
69 libpng.dll!wk_png_write_find_filter | 69 libpng.dll!wk_png_write_find_filter |
70 libpng.dll!wk_png_write_row | 70 libpng.dll!wk_png_write_row |
71 | 71 |
72 ############################################################### | 72 ############################################################### |
73 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis | 73 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis |
74 # assumptions or unhandled syscalls | 74 # assumptions or unhandled syscalls |
75 | 75 |
76 # Please note: the following suppressions were written in the abscense of | 76 # Please note: the following suppressions were written in the abscense of |
77 # private symbols so may need to be updated when we switch to auto-loading PDBs | 77 # private symbols so may need to be updated when we switch to auto-loading PDBs |
78 UNINITIALIZED READ | 78 UNINITIALIZED READ |
79 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1) | 79 name=https://github.com/DynamoRIO/drmemory/issues/12 (1) |
80 ntdll.dll!Rtl* | 80 ntdll.dll!Rtl* |
81 ntdll.dll!Rtl* | 81 ntdll.dll!Rtl* |
82 ntdll.dll!RtlFindActivationContextSectionString | 82 ntdll.dll!RtlFindActivationContextSectionString |
83 | 83 |
84 UNINITIALIZED READ | 84 UNINITIALIZED READ |
85 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2) | 85 name=https://github.com/DynamoRIO/drmemory/issues/12 (2) |
86 ... | 86 ... |
87 SHELL32.dll!SHFileOperation* | 87 SHELL32.dll!SHFileOperation* |
88 | 88 |
89 UNINITIALIZED READ | 89 UNINITIALIZED READ |
90 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3) | 90 name=https://github.com/DynamoRIO/drmemory/issues/12 (3) |
91 ... | 91 ... |
92 SHELL32.dll!SHGetFolderPath* | 92 SHELL32.dll!SHGetFolderPath* |
93 | 93 |
94 LEAK | 94 LEAK |
95 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4) | 95 name=https://github.com/DynamoRIO/drmemory/issues/12 (4) |
96 ... | 96 ... |
97 SHELL32.dll!SHGetFolderPath* | 97 SHELL32.dll!SHGetFolderPath* |
98 | 98 |
99 UNINITIALIZED READ | 99 UNINITIALIZED READ |
100 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5) | 100 name=https://github.com/DynamoRIO/drmemory/issues/12 (5) |
101 ... | 101 ... |
102 SHELL32.dll!SHCreateDirectory* | 102 SHELL32.dll!SHCreateDirectory* |
103 | 103 |
104 UNINITIALIZED READ | 104 UNINITIALIZED READ |
105 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6) | 105 name=https://github.com/DynamoRIO/drmemory/issues/12 (6) |
106 ... | 106 ... |
107 SHELL32.dll!ILLoadFromStream* | 107 SHELL32.dll!ILLoadFromStream* |
108 | 108 |
109 UNINITIALIZED READ | 109 UNINITIALIZED READ |
110 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7) | 110 name=https://github.com/DynamoRIO/drmemory/issues/12 (7) |
111 ... | 111 ... |
112 SHELL32.dll!ILSaveToStream* | 112 SHELL32.dll!ILSaveToStream* |
113 | 113 |
114 LEAK | 114 LEAK |
115 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8) | 115 name=https://github.com/DynamoRIO/drmemory/issues/12 (8) |
116 ... | 116 ... |
117 SHELL32.dll!SHFileOperation* | 117 SHELL32.dll!SHFileOperation* |
118 | 118 |
119 UNINITIALIZED READ | 119 UNINITIALIZED READ |
120 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9) | 120 name=https://github.com/DynamoRIO/drmemory/issues/12 (9) |
121 ... | 121 ... |
122 SHELL32.dll!SHGetItemFromDataObject | 122 SHELL32.dll!SHGetItemFromDataObject |
123 | 123 |
124 LEAK | 124 LEAK |
125 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10) | 125 name=https://github.com/DynamoRIO/drmemory/issues/12 (10) |
126 ... | 126 ... |
127 SHELL32.dll!SHGetItemFromDataObject | 127 SHELL32.dll!SHGetItemFromDataObject |
128 | 128 |
129 LEAK | 129 LEAK |
130 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11) | 130 name=https://github.com/DynamoRIO/drmemory/issues/12 (11) |
131 ... | 131 ... |
132 ole32.dll!* | 132 ole32.dll!* |
133 SHELL32.dll!SHChangeNotifySuspendResume | 133 SHELL32.dll!SHChangeNotifySuspendResume |
134 | 134 |
135 UNINITIALIZED READ | 135 UNINITIALIZED READ |
136 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1) | 136 name=https://github.com/DynamoRIO/drmemory/issues/14 (1) |
137 ... | 137 ... |
138 *!CreateProcess* | 138 *!CreateProcess* |
139 | 139 |
140 LEAK | 140 LEAK |
141 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2) | 141 name=https://github.com/DynamoRIO/drmemory/issues/14 (2) |
142 ... | 142 ... |
143 *!CreateProcess* | 143 *!CreateProcess* |
144 | 144 |
145 UNINITIALIZED READ | 145 UNINITIALIZED READ |
146 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3) | 146 name=https://github.com/DynamoRIO/drmemory/issues/14 (3) |
147 ... | 147 ... |
148 *!base::LaunchApp* | 148 *!base::LaunchApp* |
149 | 149 |
150 UNINITIALIZED READ | 150 UNINITIALIZED READ |
151 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1) | 151 name=https://github.com/DynamoRIO/drmemory/issues/17 (1) |
152 ... | 152 ... |
153 *!CreateWindow* | 153 *!CreateWindow* |
154 | 154 |
155 POSSIBLE LEAK | 155 POSSIBLE LEAK |
156 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2) | 156 name=https://github.com/DynamoRIO/drmemory/issues/17 (2) |
157 GDI32.dll!* | 157 GDI32.dll!* |
158 GDI32.dll!CreateFontIndirectExW | 158 GDI32.dll!CreateFontIndirectExW |
159 GDI32.dll!CreateFontIndirectW | 159 GDI32.dll!CreateFontIndirectW |
160 | 160 |
161 LEAK | 161 LEAK |
162 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3) | 162 name=https://github.com/DynamoRIO/drmemory/issues/17 (3) |
163 KERNELBASE.dll!LocalAlloc | 163 KERNELBASE.dll!LocalAlloc |
164 ... | 164 ... |
165 USER32.dll!CreateWindow* | 165 USER32.dll!CreateWindow* |
166 | 166 |
167 UNINITIALIZED READ | 167 UNINITIALIZED READ |
168 name=http://code.google.com/p/drmemory/issues/detail?id=18 a | 168 name=https://github.com/DynamoRIO/drmemory/issues/18 a |
169 ... | 169 ... |
170 *!CoInitialize* | 170 *!CoInitialize* |
171 | 171 |
172 UNINITIALIZED READ | 172 UNINITIALIZED READ |
173 name=http://code.google.com/p/drmemory/issues/detail?id=18 b | 173 name=https://github.com/DynamoRIO/drmemory/issues/18 b |
174 ... | 174 ... |
175 *!CoCreateInstance* | 175 *!CoCreateInstance* |
176 | 176 |
177 UNINITIALIZED READ | 177 UNINITIALIZED READ |
178 name=http://code.google.com/p/drmemory/issues/detail?id=18 c | 178 name=https://github.com/DynamoRIO/drmemory/issues/18 c |
179 ... | 179 ... |
180 *!CoUninitialize* | 180 *!CoUninitialize* |
181 | 181 |
182 UNINITIALIZED READ | 182 UNINITIALIZED READ |
183 name=http://code.google.com/p/drmemory/issues/detail?id=18 d | 183 name=https://github.com/DynamoRIO/drmemory/issues/18 d |
184 ... | 184 ... |
185 UxTheme.dll!* | 185 UxTheme.dll!* |
186 | 186 |
187 UNINITIALIZED READ | 187 UNINITIALIZED READ |
188 name=http://code.google.com/p/drmemory/issues/detail?id=40 a | 188 name=https://github.com/DynamoRIO/drmemory/issues/40 a |
189 ... | 189 ... |
190 WINSPOOL.DRV!* | 190 WINSPOOL.DRV!* |
191 | 191 |
192 LEAK | 192 LEAK |
193 name=http://code.google.com/p/drmemory/issues/detail?id=40 b | 193 name=https://github.com/DynamoRIO/drmemory/issues/40 b |
194 ... | 194 ... |
195 WINSPOOL.DRV!* | 195 WINSPOOL.DRV!* |
196 | 196 |
197 UNINITIALIZED READ | 197 UNINITIALIZED READ |
198 name=http://code.google.com/p/drmemory/issues/detail?id=48 a | 198 name=https://github.com/DynamoRIO/drmemory/issues/48 a |
199 system call NtContinue | 199 system call NtContinue |
200 ... | 200 ... |
201 *!*SetThreadName | 201 *!*SetThreadName |
202 | 202 |
203 UNINITIALIZED READ | 203 UNINITIALIZED READ |
204 name=http://code.google.com/p/drmemory/issues/detail?id=48 b | 204 name=https://github.com/DynamoRIO/drmemory/issues/48 b |
205 system call NtContinue | 205 system call NtContinue |
206 *!WTF::initializeCurrentThreadInternal | 206 *!WTF::initializeCurrentThreadInternal |
207 | 207 |
208 UNINITIALIZED READ | 208 UNINITIALIZED READ |
209 name=http://code.google.com/p/drmemory/issues/detail?id=52 a | 209 name=https://github.com/DynamoRIO/drmemory/issues/52 a |
210 ... | 210 ... |
211 DBGHELP.dll!SymInitialize | 211 DBGHELP.dll!SymInitialize |
212 | 212 |
213 UNINITIALIZED READ | 213 UNINITIALIZED READ |
214 name=http://code.google.com/p/drmemory/issues/detail?id=52 b | 214 name=https://github.com/DynamoRIO/drmemory/issues/52 b |
215 ... | 215 ... |
216 DBGHELP.dll!SymEnumSourceFiles | 216 DBGHELP.dll!SymEnumSourceFiles |
217 | 217 |
218 UNINITIALIZED READ | 218 UNINITIALIZED READ |
219 name=http://code.google.com/p/drmemory/issues/detail?id=52 c | 219 name=https://github.com/DynamoRIO/drmemory/issues/52 c |
220 ... | 220 ... |
221 msvcrt.dll!_RTDynamicCast | 221 msvcrt.dll!_RTDynamicCast |
222 | 222 |
223 UNINITIALIZED READ | 223 UNINITIALIZED READ |
224 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghe
lp | 224 name=https://github.com/DynamoRIO/drmemory/issues/52 bit-level fp in dbghelp |
225 instruction=test 0x*(%*) $0x?? | 225 instruction=test 0x*(%*) $0x?? |
226 DBGHELP.dll!SymUnloadModule64 | 226 DBGHELP.dll!SymUnloadModule64 |
227 | 227 |
228 UNINITIALIZED READ | 228 UNINITIALIZED READ |
229 name=http://code.google.com/p/drmemory/issues/detail?id=53 | 229 name=https://github.com/DynamoRIO/drmemory/issues/53 |
230 ADVAPI32.dll!WmiMofEnumerateResourcesA | 230 ADVAPI32.dll!WmiMofEnumerateResourcesA |
231 ADVAPI32.dll!WmiMofEnumerateResourcesA | 231 ADVAPI32.dll!WmiMofEnumerateResourcesA |
232 ADVAPI32.dll!Sta*TraceW | 232 ADVAPI32.dll!Sta*TraceW |
233 | 233 |
234 UNINITIALIZED READ | 234 UNINITIALIZED READ |
235 name=http://code.google.com/p/drmemory/issues/detail?id=58 | 235 name=https://github.com/DynamoRIO/drmemory/issues/58 |
236 ... | 236 ... |
237 *!_cfltcvt_l | 237 *!_cfltcvt_l |
238 | 238 |
239 UNINITIALIZED READ | 239 UNINITIALIZED READ |
240 name=http://code.google.com/p/drmemory/issues/detail?id=60 | 240 name=https://github.com/DynamoRIO/drmemory/issues/60 |
241 USP10.dll!* | 241 USP10.dll!* |
242 ... | 242 ... |
243 USP10.dll!ScriptStringAnalyse | 243 USP10.dll!ScriptStringAnalyse |
244 | 244 |
245 LEAK | 245 LEAK |
246 IMM32.dll!ImmGetIMCCSize | 246 IMM32.dll!ImmGetIMCCSize |
247 IMM32.dll!ImmLockClientImc | 247 IMM32.dll!ImmLockClientImc |
248 IMM32.dll!ImmDisableIME | 248 IMM32.dll!ImmDisableIME |
249 IMM32.dll!ImmSetActiveContext | 249 IMM32.dll!ImmSetActiveContext |
250 USER32.dll!IMPSetIMEA | 250 USER32.dll!IMPSetIMEA |
251 | 251 |
252 UNINITIALIZED READ | 252 UNINITIALIZED READ |
253 name=http://code.google.com/p/drmemory/issues/detail?id=65 a | 253 name=https://github.com/DynamoRIO/drmemory/issues/65 a |
254 ... | 254 ... |
255 *!SystemFunction036 | 255 *!SystemFunction036 |
256 | 256 |
257 UNINITIALIZED READ | 257 UNINITIALIZED READ |
258 name=http://code.google.com/p/drmemory/issues/detail?id=65 b | 258 name=https://github.com/DynamoRIO/drmemory/issues/65 b |
259 ... | 259 ... |
260 *!talk_base::CreateRandomString | 260 *!talk_base::CreateRandomString |
261 | 261 |
262 UNINITIALIZED READ | 262 UNINITIALIZED READ |
263 name=http://code.google.com/p/drmemory/issues/detail?id=68 a | 263 name=https://github.com/DynamoRIO/drmemory/issues/68 a |
264 ... | 264 ... |
265 WS2_32.dll!* | 265 WS2_32.dll!* |
266 | 266 |
267 UNINITIALIZED READ | 267 UNINITIALIZED READ |
268 name=http://code.google.com/p/drmemory/issues/detail?id=68 b | 268 name=https://github.com/DynamoRIO/drmemory/issues/68 b |
269 ... | 269 ... |
270 ADVAPI32.dll!SetSecurityDescriptorDacl | 270 ADVAPI32.dll!SetSecurityDescriptorDacl |
271 | 271 |
272 UNINITIALIZED READ | 272 UNINITIALIZED READ |
273 name=http://code.google.com/p/drmemory/issues/detail?id=68 c | 273 name=https://github.com/DynamoRIO/drmemory/issues/68 c |
274 ... | 274 ... |
275 MSWSOCK.dll!WSPStartup | 275 MSWSOCK.dll!WSPStartup |
276 | 276 |
277 UNINITIALIZED READ | 277 UNINITIALIZED READ |
278 name=http://code.google.com/p/drmemory/issues/detail?id=68 d | 278 name=https://github.com/DynamoRIO/drmemory/issues/68 d |
279 ... | 279 ... |
280 ntdll.dll!RtlValidateUnicodeString | 280 ntdll.dll!RtlValidateUnicodeString |
281 | 281 |
282 LEAK | 282 LEAK |
283 name=http://code.google.com/p/drmemory/issues/detail?id=256 | 283 name=https://github.com/DynamoRIO/drmemory/issues/256 |
284 *!_mtinit | 284 *!_mtinit |
285 *!__tmainCRTStartup | 285 *!__tmainCRTStartup |
286 *!mainCRTStartup | 286 *!mainCRTStartup |
287 | 287 |
288 POSSIBLE LEAK | 288 POSSIBLE LEAK |
289 name=http://code.google.com/p/drmemory/issues/detail?id=274 a | 289 name=https://github.com/DynamoRIO/drmemory/issues/274 a |
290 ... | 290 ... |
291 GDI32.dll!CreateDCW | 291 GDI32.dll!CreateDCW |
292 | 292 |
293 LEAK | 293 LEAK |
294 name=http://code.google.com/p/drmemory/issues/detail?id=274 b | 294 name=https://github.com/DynamoRIO/drmemory/issues/274 b |
295 ... | 295 ... |
296 GDI32.dll!CreateDCW | 296 GDI32.dll!CreateDCW |
297 | 297 |
298 LEAK | 298 LEAK |
299 name=http://code.google.com/p/drmemory/issues/detail?id=275 | 299 name=https://github.com/DynamoRIO/drmemory/issues/275 |
300 ... | 300 ... |
301 *!_getptd* | 301 *!_getptd* |
302 | 302 |
303 UNINITIALIZED READ | 303 UNINITIALIZED READ |
304 name=http://code.google.com/p/drmemory/issues/detail?id=276 | 304 name=https://github.com/DynamoRIO/drmemory/issues/276 |
305 ... | 305 ... |
306 ntdll.dll!RtlConvertUlongToLargeInteger | 306 ntdll.dll!RtlConvertUlongToLargeInteger |
307 ntdll.dll!RtlConvertUlongToLargeInteger | 307 ntdll.dll!RtlConvertUlongToLargeInteger |
308 ntdll.dll!KiUserExceptionDispatcher | 308 ntdll.dll!KiUserExceptionDispatcher |
309 | 309 |
310 LEAK | 310 LEAK |
311 name=http://code.google.com/p/drmemory/issues/detail?id=305 | 311 name=https://github.com/DynamoRIO/drmemory/issues/305 |
312 *!free | 312 *!free |
313 *!free | 313 *!free |
314 *!operator new | 314 *!operator new |
315 ... | 315 ... |
316 *!MiniDumpWriteDump | 316 *!MiniDumpWriteDump |
317 | 317 |
318 UNINITIALIZED READ | 318 UNINITIALIZED READ |
319 name=http://code.google.com/p/drmemory/issues/detail?id=346 a | 319 name=https://github.com/DynamoRIO/drmemory/issues/346 a |
320 ... | 320 ... |
321 GDI32.dll!CloseEnhMetaFile | 321 GDI32.dll!CloseEnhMetaFile |
322 | 322 |
323 UNINITIALIZED READ | 323 UNINITIALIZED READ |
324 name=http://code.google.com/p/drmemory/issues/detail?id=346 b | 324 name=https://github.com/DynamoRIO/drmemory/issues/346 b |
325 GDI32.dll!SetPolyFillMode | 325 GDI32.dll!SetPolyFillMode |
326 GDI32.dll!CreateICW | 326 GDI32.dll!CreateICW |
327 | 327 |
328 UNINITIALIZED READ | 328 UNINITIALIZED READ |
329 name=http://code.google.com/p/drmemory/issues/detail?id=362 | 329 name=https://github.com/DynamoRIO/drmemory/issues/362 |
330 USER32.dll!UnregisterClass* | 330 USER32.dll!UnregisterClass* |
331 | 331 |
332 LEAK | 332 LEAK |
333 name=http://code.google.com/p/drmemory/issues/detail?id=382 | 333 name=https://github.com/DynamoRIO/drmemory/issues/382 |
334 ... | 334 ... |
335 ntdll.dll!CsrNewThread | 335 ntdll.dll!CsrNewThread |
336 | 336 |
337 UNINITIALIZED READ | 337 UNINITIALIZED READ |
338 name=http://code.google.com/p/drmemory/issues/detail?id=397 | 338 name=https://github.com/DynamoRIO/drmemory/issues/397 |
339 system call NtDeviceIoControlFile InputBuffer | 339 system call NtDeviceIoControlFile InputBuffer |
340 ADVAPI32.dll!ImpersonateAnonymousToken | 340 ADVAPI32.dll!ImpersonateAnonymousToken |
341 | 341 |
342 UNINITIALIZED READ | 342 UNINITIALIZED READ |
343 name=http://code.google.com/p/drmemory/issues/detail?id=407 a | 343 name=https://github.com/DynamoRIO/drmemory/issues/407 a |
344 system call NtRequestWaitReplyPort | 344 system call NtRequestWaitReplyPort |
345 RPCRT4.dll!I_RpcSendReceive | 345 RPCRT4.dll!I_RpcSendReceive |
346 RPCRT4.dll!NdrSendReceive | 346 RPCRT4.dll!NdrSendReceive |
347 | 347 |
348 UNINITIALIZED READ | 348 UNINITIALIZED READ |
349 name=http://code.google.com/p/drmemory/issues/detail?id=407 b | 349 name=https://github.com/DynamoRIO/drmemory/issues/407 b |
350 IMM32.dll!* | 350 IMM32.dll!* |
351 ntdll.dll!LdrInitializeThunk | 351 ntdll.dll!LdrInitializeThunk |
352 ntdll.dll!LdrShutdownThread | 352 ntdll.dll!LdrShutdownThread |
353 | 353 |
354 UNINITIALIZED READ | 354 UNINITIALIZED READ |
355 name=http://code.google.com/p/drmemory/issues/detail?id=412 a | 355 name=https://github.com/DynamoRIO/drmemory/issues/412 a |
356 ADVAPI32.dll!RegDeleteValue* | 356 ADVAPI32.dll!RegDeleteValue* |
357 | 357 |
358 UNINITIALIZED READ | 358 UNINITIALIZED READ |
359 name=http://code.google.com/p/drmemory/issues/detail?id=412 b | 359 name=https://github.com/DynamoRIO/drmemory/issues/412 b |
360 ... | 360 ... |
361 ADVAPI32.dll!Crypt* | 361 ADVAPI32.dll!Crypt* |
362 | 362 |
363 UNINITIALIZED READ | 363 UNINITIALIZED READ |
364 name=http://code.google.com/p/drmemory/issues/detail?id=412 c | 364 name=https://github.com/DynamoRIO/drmemory/issues/412 c |
365 ... | 365 ... |
366 RPCRT4.dll!NdrClientCall2 | 366 RPCRT4.dll!NdrClientCall2 |
367 | 367 |
368 LEAK | 368 LEAK |
369 name=http://code.google.com/p/drmemory/issues/detail?id=412 d | 369 name=https://github.com/DynamoRIO/drmemory/issues/412 d |
370 RSAENH.dll!DllUnregisterServer | 370 RSAENH.dll!DllUnregisterServer |
371 ... | 371 ... |
372 ADVAPI32.dll!CryptAcquireContextA | 372 ADVAPI32.dll!CryptAcquireContextA |
373 CRYPT32.dll!CryptEnumOIDFunction | 373 CRYPT32.dll!CryptEnumOIDFunction |
374 ... | 374 ... |
375 CRYPT32.dll!CertFindCertificateInStore | 375 CRYPT32.dll!CertFindCertificateInStore |
376 | 376 |
377 UNINITIALIZED READ | 377 UNINITIALIZED READ |
378 name=http://code.google.com/p/drmemory/issues/detail?id=412 e | 378 name=https://github.com/DynamoRIO/drmemory/issues/412 e |
379 ... | 379 ... |
380 RSAENH.dll!CPGenRandom | 380 RSAENH.dll!CPGenRandom |
381 | 381 |
382 UNINITIALIZED READ | 382 UNINITIALIZED READ |
383 name=http://code.google.com/p/drmemory/issues/detail?id=412 f | 383 name=https://github.com/DynamoRIO/drmemory/issues/412 f |
384 ... | 384 ... |
385 CRYPT??.dll!Crypt* | 385 CRYPT??.dll!Crypt* |
386 | 386 |
387 UNINITIALIZED READ | 387 UNINITIALIZED READ |
388 name=http://code.google.com/p/drmemory/issues/detail?id=412 g | 388 name=https://github.com/DynamoRIO/drmemory/issues/412 g |
389 *!replace_memcmp | 389 *!replace_memcmp |
390 ... | 390 ... |
391 *!testing::internal::CmpHelperEQ* | 391 *!testing::internal::CmpHelperEQ* |
392 ... | 392 ... |
393 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody | 393 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody |
394 | 394 |
395 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't | 395 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't |
396 # have frame pointers, and we have trouble unwinding from it. Therefore, we use | 396 # have frame pointers, and we have trouble unwinding from it. Therefore, we use |
397 # this broad suppression, effectively disabling uninit checks in rsaenh.dll. | 397 # this broad suppression, effectively disabling uninit checks in rsaenh.dll. |
398 UNINITIALIZED READ | 398 UNINITIALIZED READ |
399 name=http://code.google.com/p/drmemory/issues/detail?id=412 h | 399 name=https://github.com/DynamoRIO/drmemory/issues/412 h |
400 RSAENH.dll!* | 400 RSAENH.dll!* |
401 | 401 |
402 UNINITIALIZED READ | 402 UNINITIALIZED READ |
403 name=http://code.google.com/p/drmemory/issues/detail?id=425 a | 403 name=https://github.com/DynamoRIO/drmemory/issues/425 a |
404 CLBCatQ.DLL!DestroyStgDatabase | 404 CLBCatQ.DLL!DestroyStgDatabase |
405 CLBCatQ.DLL!PostError | 405 CLBCatQ.DLL!PostError |
406 CLBCatQ.DLL!PostError | 406 CLBCatQ.DLL!PostError |
407 | 407 |
408 LEAK | 408 LEAK |
409 name=http://code.google.com/p/drmemory/issues/detail?id=425 b | 409 name=https://github.com/DynamoRIO/drmemory/issues/425 b |
410 RPCRT4.dll!I_RpcBCacheFree | 410 RPCRT4.dll!I_RpcBCacheFree |
411 RPCRT4.dll!I_RpcBCacheFree | 411 RPCRT4.dll!I_RpcBCacheFree |
412 ... | 412 ... |
413 RPCRT4.dll!NdrClientCall2 | 413 RPCRT4.dll!NdrClientCall2 |
414 | 414 |
415 UNINITIALIZED READ | 415 UNINITIALIZED READ |
416 name=http://code.google.com/p/drmemory/issues/detail?id=425 c | 416 name=https://github.com/DynamoRIO/drmemory/issues/425 c |
417 msdmo.dll!* | 417 msdmo.dll!* |
418 msdmo.dll!* | 418 msdmo.dll!* |
419 DEVENUM.DLL!* | 419 DEVENUM.DLL!* |
420 | 420 |
421 UNINITIALIZED READ | 421 UNINITIALIZED READ |
422 name=http://code.google.com/p/drmemory/issues/detail?id=435 a | 422 name=https://github.com/DynamoRIO/drmemory/issues/435 a |
423 ... | 423 ... |
424 ntdll.dll!RtlSetSecurityObject | 424 ntdll.dll!RtlSetSecurityObject |
425 ntdll.dll!RtlNewSecurityObjectEx | 425 ntdll.dll!RtlNewSecurityObjectEx |
426 ADVAPI32.dll!CreatePrivateObjectSecurityEx | 426 ADVAPI32.dll!CreatePrivateObjectSecurityEx |
427 NTMARTA.dll!AccRewriteSetNamedRights | 427 NTMARTA.dll!AccRewriteSetNamedRights |
428 | 428 |
429 POSSIBLE LEAK | 429 POSSIBLE LEAK |
430 name=http://code.google.com/p/drmemory/issues/detail?id=435 b | 430 name=https://github.com/DynamoRIO/drmemory/issues/435 b |
431 WLDAP32.dll!Ordinal325 | 431 WLDAP32.dll!Ordinal325 |
432 ... | 432 ... |
433 WLDAP32.dll!Ordinal325 | 433 WLDAP32.dll!Ordinal325 |
434 ntdll.dll!LdrInitializeThunk | 434 ntdll.dll!LdrInitializeThunk |
435 ntdll.dll!LdrFindResourceDirectory_U | 435 ntdll.dll!LdrFindResourceDirectory_U |
436 ntdll.dll!RtlValidateUnicodeString | 436 ntdll.dll!RtlValidateUnicodeString |
437 ntdll.dll!LdrLoadDll | 437 ntdll.dll!LdrLoadDll |
438 KERNEL32.dll!LoadLibraryExW | 438 KERNEL32.dll!LoadLibraryExW |
439 | 439 |
440 # mod+offs suppression because the symbolic makes no sense and changes | 440 # mod+offs suppression because the symbolic makes no sense and changes |
441 # completely in the presence of WS2_32.dll symbols. | 441 # completely in the presence of WS2_32.dll symbols. |
442 LEAK | 442 LEAK |
443 name=http://code.google.com/p/drmemory/issues/detail?id=438 | 443 name=https://github.com/DynamoRIO/drmemory/issues/438 |
444 <WS2_32.dll+0x260c> | 444 <WS2_32.dll+0x260c> |
445 <WS2_32.dll+0x2b76> | 445 <WS2_32.dll+0x2b76> |
446 <WS2_32.dll+0x2c61> | 446 <WS2_32.dll+0x2c61> |
447 | 447 |
448 UNINITIALIZED READ | 448 UNINITIALIZED READ |
449 name=http://code.google.com/p/drmemory/issues/detail?id=454 a | 449 name=https://github.com/DynamoRIO/drmemory/issues/454 a |
450 ... | 450 ... |
451 WINMM.dll!wave*GetNumDevs | 451 WINMM.dll!wave*GetNumDevs |
452 | 452 |
453 LEAK | 453 LEAK |
454 name=http://code.google.com/p/drmemory/issues/detail?id=454 b | 454 name=https://github.com/DynamoRIO/drmemory/issues/454 b |
455 ... | 455 ... |
456 WINMM.dll!wave*GetNumDevs | 456 WINMM.dll!wave*GetNumDevs |
457 | 457 |
458 LEAK | 458 LEAK |
459 name=http://code.google.com/p/drmemory/issues/detail?id=466 | 459 name=https://github.com/DynamoRIO/drmemory/issues/466 |
460 ntdll.dll!RtlRunOnceBeginInitialize | 460 ntdll.dll!RtlRunOnceBeginInitialize |
461 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount | 461 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount |
462 | 462 |
463 UNINITIALIZED READ | 463 UNINITIALIZED READ |
464 name=http://code.google.com/p/drmemory/issues/detail?id=473 a | 464 name=https://github.com/DynamoRIO/drmemory/issues/473 a |
465 system call NtDeviceIoControlFile InputBuffer | 465 system call NtDeviceIoControlFile InputBuffer |
466 ... | 466 ... |
467 iphlpapi.dll!GetAdaptersAddresses | 467 iphlpapi.dll!GetAdaptersAddresses |
468 | 468 |
469 POSSIBLE LEAK | 469 POSSIBLE LEAK |
470 name=http://code.google.com/p/drmemory/issues/detail?id=473 b | 470 name=https://github.com/DynamoRIO/drmemory/issues/473 b |
471 ESENT.dll!* | 471 ESENT.dll!* |
472 ESENT.dll!* | 472 ESENT.dll!* |
473 ESENT.dll!* | 473 ESENT.dll!* |
474 ntdll.dll!Ldr*Init* | 474 ntdll.dll!Ldr*Init* |
475 ntdll.dll!Ldr* | 475 ntdll.dll!Ldr* |
476 ntdll.dll!* | 476 ntdll.dll!* |
477 ntdll.dll!LdrLoadDll | 477 ntdll.dll!LdrLoadDll |
478 ... | 478 ... |
479 iphlpapi.dll!GetPerAdapterInfo | 479 iphlpapi.dll!GetPerAdapterInfo |
480 ... | 480 ... |
481 iphlpapi.dll!GetAdaptersAddresses | 481 iphlpapi.dll!GetAdaptersAddresses |
482 | 482 |
483 POSSIBLE LEAK | 483 POSSIBLE LEAK |
484 name=http://code.google.com/p/drmemory/issues/detail?id=473 c | 484 name=https://github.com/DynamoRIO/drmemory/issues/473 c |
485 RPCRT4.dll!* | 485 RPCRT4.dll!* |
486 RPCRT4.dll!* | 486 RPCRT4.dll!* |
487 ... | 487 ... |
488 IPHLPAPI.DLL!GetAdaptersAddresses | 488 IPHLPAPI.DLL!GetAdaptersAddresses |
489 | 489 |
490 LEAK | 490 LEAK |
491 name=http://code.google.com/p/drmemory/issues/detail?id=475 | 491 name=https://github.com/DynamoRIO/drmemory/issues/475 |
492 ... | 492 ... |
493 ADVAPI32.dll!CryptAcquireContextA | 493 ADVAPI32.dll!CryptAcquireContextA |
494 ... | 494 ... |
495 CRYPT32.dll!CryptMsgOpenToDecode | 495 CRYPT32.dll!CryptMsgOpenToDecode |
496 ... | 496 ... |
497 CRYPT32.dll!CryptQueryObject | 497 CRYPT32.dll!CryptQueryObject |
498 | 498 |
499 # Lots of leaks from our interactions with the system certificate store. May be | 499 # Lots of leaks from our interactions with the system certificate store. May be |
500 # worth reviewing our use of their API. | 500 # worth reviewing our use of their API. |
501 LEAK | 501 LEAK |
502 name=http://code.google.com/p/drmemory/issues/detail?id=476 a | 502 name=https://github.com/DynamoRIO/drmemory/issues/476 a |
503 KERNEL*.dll!LocalAlloc | 503 KERNEL*.dll!LocalAlloc |
504 ... | 504 ... |
505 CRYPT32.dll!CertGetCRLContextProperty | 505 CRYPT32.dll!CertGetCRLContextProperty |
506 | 506 |
507 LEAK | 507 LEAK |
508 name=http://code.google.com/p/drmemory/issues/detail?id=476 b | 508 name=https://github.com/DynamoRIO/drmemory/issues/476 b |
509 KERNEL*.dll!LocalAlloc | 509 KERNEL*.dll!LocalAlloc |
510 ... | 510 ... |
511 CRYPT32.dll!CertAddCRLContextToStore | 511 CRYPT32.dll!CertAddCRLContextToStore |
512 | 512 |
513 LEAK | 513 LEAK |
514 name=http://code.google.com/p/drmemory/issues/detail?id=476 c | 514 name=https://github.com/DynamoRIO/drmemory/issues/476 c |
515 KERNEL*.dll!LocalAlloc | 515 KERNEL*.dll!LocalAlloc |
516 ... | 516 ... |
517 CRYPT32.dll!CertOpenStore | 517 CRYPT32.dll!CertOpenStore |
518 | 518 |
519 LEAK | 519 LEAK |
520 name=http://code.google.com/p/drmemory/issues/detail?id=476 d | 520 name=https://github.com/DynamoRIO/drmemory/issues/476 d |
521 ... | 521 ... |
522 CRYPT32.dll!CertOpenSystemStore? | 522 CRYPT32.dll!CertOpenSystemStore? |
523 | 523 |
524 LEAK | 524 LEAK |
525 name=http://code.google.com/p/drmemory/issues/detail?id=476 e | 525 name=https://github.com/DynamoRIO/drmemory/issues/476 e |
526 ... | 526 ... |
527 CRYPT32.dll!CertGetCertificateChain | 527 CRYPT32.dll!CertGetCertificateChain |
528 | 528 |
529 LEAK | 529 LEAK |
530 name=http://code.google.com/p/drmemory/issues/detail?id=476 f | 530 name=https://github.com/DynamoRIO/drmemory/issues/476 f |
531 ... | 531 ... |
532 CRYPT32.dll!CertCompareIntegerBlob | 532 CRYPT32.dll!CertCompareIntegerBlob |
533 | 533 |
534 LEAK | 534 LEAK |
535 name=http://code.google.com/p/drmemory/issues/detail?id=476 g | 535 name=https://github.com/DynamoRIO/drmemory/issues/476 g |
536 ... | 536 ... |
537 CRYPT32.dll!CryptUnprotectData | 537 CRYPT32.dll!CryptUnprotectData |
538 | 538 |
539 LEAK | 539 LEAK |
540 name=http://code.google.com/p/drmemory/issues/detail?id=476 h | 540 name=https://github.com/DynamoRIO/drmemory/issues/476 h |
541 KERNEL*.dll!LocalAlloc | 541 KERNEL*.dll!LocalAlloc |
542 ... | 542 ... |
543 CRYPT32.dll!CertEnumCertificatesInStore | 543 CRYPT32.dll!CertEnumCertificatesInStore |
544 | 544 |
545 LEAK | 545 LEAK |
546 name=http://code.google.com/p/drmemory/issues/detail?id=476 i | 546 name=https://github.com/DynamoRIO/drmemory/issues/476 i |
547 ... | 547 ... |
548 CRYPT32.dll!CryptProtectData | 548 CRYPT32.dll!CryptProtectData |
549 | 549 |
550 LEAK | 550 LEAK |
551 name=http://code.google.com/p/drmemory/issues/detail?id=476 j | 551 name=https://github.com/DynamoRIO/drmemory/issues/476 j |
552 ... | 552 ... |
553 CRYPT32.dll!CryptExportPublicKeyInfoEx | 553 CRYPT32.dll!CryptExportPublicKeyInfoEx |
554 | 554 |
555 UNINITIALIZED READ | 555 UNINITIALIZED READ |
556 name=http://code.google.com/p/drmemory/issues/detail?id=502 a | 556 name=https://github.com/DynamoRIO/drmemory/issues/502 a |
557 system call NtSecureConnectPort parameter #3 | 557 system call NtSecureConnectPort parameter #3 |
558 GDI32.dll!* | 558 GDI32.dll!* |
559 GDI32.dll!* | 559 GDI32.dll!* |
560 | 560 |
561 UNINITIALIZED READ | 561 UNINITIALIZED READ |
562 name=http://code.google.com/p/drmemory/issues/detail?id=502 b | 562 name=https://github.com/DynamoRIO/drmemory/issues/502 b |
563 system call NtGdiEnumFonts parameter #6 | 563 system call NtGdiEnumFonts parameter #6 |
564 GDI32.dll!* | 564 GDI32.dll!* |
565 GDI32.dll!* | 565 GDI32.dll!* |
566 | 566 |
567 UNINITIALIZED READ | 567 UNINITIALIZED READ |
568 name=http://code.google.com/p/drmemory/issues/detail?id=511 a | 568 name=https://github.com/DynamoRIO/drmemory/issues/511 a |
569 RPCRT4.dll!... | 569 RPCRT4.dll!... |
570 ole32.dll!* | 570 ole32.dll!* |
571 | 571 |
572 UNINITIALIZED READ | 572 UNINITIALIZED READ |
573 name=http://code.google.com/p/drmemory/issues/detail?id=511 b | 573 name=https://github.com/DynamoRIO/drmemory/issues/511 b |
574 ole32.dll!* | 574 ole32.dll!* |
575 ole32.dll!* | 575 ole32.dll!* |
576 ole32.dll!StringFromGUID2 | 576 ole32.dll!StringFromGUID2 |
577 | 577 |
578 UNINITIALIZED READ | 578 UNINITIALIZED READ |
579 name=http://code.google.com/p/drmemory/issues/detail?id=512 a | 579 name=https://github.com/DynamoRIO/drmemory/issues/512 a |
580 ... | 580 ... |
581 *!browser_sync::Cryptographer::PackBootstrapToken | 581 *!browser_sync::Cryptographer::PackBootstrapToken |
582 *!browser_sync::Cryptographer::GetBootstrapToken | 582 *!browser_sync::Cryptographer::GetBootstrapToken |
583 | 583 |
584 UNINITIALIZED READ | 584 UNINITIALIZED READ |
585 name=http://code.google.com/p/drmemory/issues/detail?id=512 b | 585 name=https://github.com/DynamoRIO/drmemory/issues/512 b |
586 ... | 586 ... |
587 *!Encrypt* | 587 *!Encrypt* |
588 | 588 |
589 # TODO(bruening): remove these once we have v8 bitfields handled | 589 # TODO(bruening): remove these once we have v8 bitfields handled |
590 UNINITIALIZED READ | 590 UNINITIALIZED READ |
591 name=http://code.google.com/p/drmemory/issues/detail?id=513 a | 591 name=https://github.com/DynamoRIO/drmemory/issues/513 a |
592 *!v8* | 592 *!v8* |
593 | 593 |
594 UNINITIALIZED READ | 594 UNINITIALIZED READ |
595 name=http://code.google.com/p/drmemory/issues/detail?id=513 b | 595 name=https://github.com/DynamoRIO/drmemory/issues/513 b |
596 *!* | 596 *!* |
597 *!v8* | 597 *!v8* |
598 | 598 |
599 UNINITIALIZED READ | 599 UNINITIALIZED READ |
600 name=http://code.google.com/p/drmemory/issues/detail?id=513 c | 600 name=https://github.com/DynamoRIO/drmemory/issues/513 c |
601 <not in a module> | 601 <not in a module> |
602 ... | 602 ... |
603 *!v8* | 603 *!v8* |
604 | 604 |
605 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll | 605 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll |
606 # has no symbols. These are all on the bots using component build, so we use | 606 # has no symbols. These are all on the bots using component build, so we use |
607 # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue. | 607 # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue. |
608 UNINITIALIZED READ | 608 UNINITIALIZED READ |
609 name=http://code.google.com/p/drmemory/issues/detail?id=513 d | 609 name=https://github.com/DynamoRIO/drmemory/issues/513 d |
610 v8.dll!* | 610 v8.dll!* |
611 | 611 |
612 UNINITIALIZED READ | 612 UNINITIALIZED READ |
613 name=http://code.google.com/p/drmemory/issues/detail?id=513 e | 613 name=https://github.com/DynamoRIO/drmemory/issues/513 e |
614 <not in a module> | 614 <not in a module> |
615 ... | 615 ... |
616 v8.dll!* | 616 v8.dll!* |
617 | 617 |
618 UNINITIALIZED READ | 618 UNINITIALIZED READ |
619 name=http://code.google.com/p/drmemory/issues/detail?id=546 | 619 name=https://github.com/DynamoRIO/drmemory/issues/546 |
620 ... | 620 ... |
621 mscms.dll!* | 621 mscms.dll!* |
622 ... | 622 ... |
623 GDI32.dll!* | 623 GDI32.dll!* |
624 *!IconUtil::Create*HICON* | 624 *!IconUtil::Create*HICON* |
625 | 625 |
626 LEAK | 626 LEAK |
627 name=http://crbug.com/92152 | 627 name=http://crbug.com/92152 |
628 ... | 628 ... |
629 USER32.dll!CreateWindowExW | 629 USER32.dll!CreateWindowExW |
630 *!views::TooltipManagerWin::Init | 630 *!views::TooltipManagerWin::Init |
631 *!views::TooltipManagerWin::TooltipManagerWin | 631 *!views::TooltipManagerWin::TooltipManagerWin |
632 | 632 |
633 UNINITIALIZED READ | 633 UNINITIALIZED READ |
634 name=http://code.google.com/p/drmemory/issues/detail?id=567 a | 634 name=https://github.com/DynamoRIO/drmemory/issues/567 a |
635 dbghelp.dll!* | 635 dbghelp.dll!* |
636 ... | 636 ... |
637 dbghelp.dll!StackWalk64 | 637 dbghelp.dll!StackWalk64 |
638 | 638 |
639 LEAK | 639 LEAK |
640 name=http://code.google.com/p/drmemory/issues/detail?id=567 b | 640 name=https://github.com/DynamoRIO/drmemory/issues/567 b |
641 *!* | 641 *!* |
642 dbghelp.dll!* | 642 dbghelp.dll!* |
643 ... | 643 ... |
644 dbghelp.dll!StackWalk64 | 644 dbghelp.dll!StackWalk64 |
645 | 645 |
646 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and | 646 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and |
647 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too | 647 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too |
648 # brittle, so we switched to RPCRT4.dll!*. | 648 # brittle, so we switched to RPCRT4.dll!*. |
649 LEAK | 649 LEAK |
650 name=http://code.google.com/p/drmemory/issues/detail?id=569 | 650 name=https://github.com/DynamoRIO/drmemory/issues/569 |
651 RPCRT4.dll!... | 651 RPCRT4.dll!... |
652 ntdll.dll!* | 652 ntdll.dll!* |
653 ntdll.dll!* | 653 ntdll.dll!* |
654 KERNEL*.dll!BaseThreadInitThunk | 654 KERNEL*.dll!BaseThreadInitThunk |
655 | 655 |
656 # TODO(timurrrr): investigate these | 656 # TODO(timurrrr): investigate these |
657 UNINITIALIZED READ | 657 UNINITIALIZED READ |
658 name=http://crbug.com/TODO a | 658 name=http://crbug.com/TODO a |
659 ... | 659 ... |
660 *!win_util::GetLogonSessionOnlyDACL | 660 *!win_util::GetLogonSessionOnlyDACL |
(...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
765 ... | 765 ... |
766 *!media::VideoCaptureDevice::* | 766 *!media::VideoCaptureDevice::* |
767 | 767 |
768 LEAK | 768 LEAK |
769 name=http://crbug.com/109278 audio device COM leaks | 769 name=http://crbug.com/109278 audio device COM leaks |
770 ... | 770 ... |
771 *!media::GetInputDeviceNamesWin | 771 *!media::GetInputDeviceNamesWin |
772 | 772 |
773 # False pos uninit in shell32 when resolving links. | 773 # False pos uninit in shell32 when resolving links. |
774 UNINITIALIZED READ | 774 UNINITIALIZED READ |
775 name=http://code.google.com/p/drmemory/issues/detail?id=745 | 775 name=https://github.com/DynamoRIO/drmemory/issues/745 |
776 SHELL*.dll!* | 776 SHELL*.dll!* |
777 ... | 777 ... |
778 SHELL*.dll!* | 778 SHELL*.dll!* |
779 *!file_util::ResolveShortcut | 779 *!file_util::ResolveShortcut |
780 | 780 |
781 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a | 781 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a |
782 # buffer with SSE/MMX instructions whose results are then masked out later. | 782 # buffer with SSE/MMX instructions whose results are then masked out later. |
783 UNINITIALIZED READ | 783 UNINITIALIZED READ |
784 name=http://code.google.com/p/drmemory/issues/detail?id=747 a | 784 name=https://github.com/DynamoRIO/drmemory/issues/747 a |
785 *!ff_pred4x4_vertical_vp8_mmxext | 785 *!ff_pred4x4_vertical_vp8_mmxext |
786 | 786 |
787 UNINITIALIZED READ | 787 UNINITIALIZED READ |
788 name=http://code.google.com/p/drmemory/issues/detail?id=747 b | 788 name=https://github.com/DynamoRIO/drmemory/issues/747 b |
789 *!ff_pred4x4_down_left_mmxext | 789 *!ff_pred4x4_down_left_mmxext |
790 | 790 |
791 UNINITIALIZED READ | 791 UNINITIALIZED READ |
792 name=http://code.google.com/p/drmemory/issues/detail?id=747 c | 792 name=https://github.com/DynamoRIO/drmemory/issues/747 c |
793 *!ff_vorbis_floor1_render_list | 793 *!ff_vorbis_floor1_render_list |
794 | 794 |
795 UNINITIALIZED READ | 795 UNINITIALIZED READ |
796 name=http://code.google.com/p/drmemory/issues/detail?id=747 d | 796 name=https://github.com/DynamoRIO/drmemory/issues/747 d |
797 *!ff_put_vp8_epel8_h6_ssse3 | 797 *!ff_put_vp8_epel8_h6_ssse3 |
798 | 798 |
799 UNINITIALIZED READ | 799 UNINITIALIZED READ |
800 name=http://code.google.com/p/drmemory/issues/detail?id=747 e | 800 name=https://github.com/DynamoRIO/drmemory/issues/747 e |
801 *!ff_put_vp8_epel8_h4_ssse3 | 801 *!ff_put_vp8_epel8_h4_ssse3 |
802 | 802 |
803 UNINITIALIZED READ | 803 UNINITIALIZED READ |
804 name=http://code.google.com/p/drmemory/issues/detail?id=747 f | 804 name=https://github.com/DynamoRIO/drmemory/issues/747 f |
805 *!ff_fft_permute_sse | 805 *!ff_fft_permute_sse |
806 | 806 |
807 UNINITIALIZED READ | 807 UNINITIALIZED READ |
808 name=http://code.google.com/p/drmemory/issues/detail?id=747 g | 808 name=https://github.com/DynamoRIO/drmemory/issues/747 g |
809 *!ff_simple_idct_add_mmx | 809 *!ff_simple_idct_add_mmx |
810 | 810 |
811 # ffmpeg seems to leak a pthread condition variable. | 811 # ffmpeg seems to leak a pthread condition variable. |
812 LEAK | 812 LEAK |
813 name=http://crbug.com/110042 | 813 name=http://crbug.com/110042 |
814 *!ptw32_new | 814 *!ptw32_new |
815 *!pthread_self | 815 *!pthread_self |
816 *!sem_wait | 816 *!sem_wait |
817 *!pthread_cond_wait | 817 *!pthread_cond_wait |
818 *!ff_thread_decode_frame | 818 *!ff_thread_decode_frame |
819 *!avcodec_decode_video2 | 819 *!avcodec_decode_video2 |
820 | 820 |
821 # Improperly handled ioctl in bcrypt. | 821 # Improperly handled ioctl in bcrypt. |
822 UNINITIALIZED READ | 822 UNINITIALIZED READ |
823 name=http://code.google.com/p/drmemory/issues/detail?id=748 | 823 name=https://github.com/DynamoRIO/drmemory/issues/748 |
824 system call NtDeviceIoControlFile InputBuffer | 824 system call NtDeviceIoControlFile InputBuffer |
825 ... | 825 ... |
826 bcrypt.dll!BCryptUnregisterConfigChangeNotify | 826 bcrypt.dll!BCryptUnregisterConfigChangeNotify |
827 bcrypt.dll!BCryptGetFipsAlgorithmMode | 827 bcrypt.dll!BCryptGetFipsAlgorithmMode |
828 ntdll.dll!RtlQueryEnvironmentVariable | 828 ntdll.dll!RtlQueryEnvironmentVariable |
829 | 829 |
830 # Not sure what this is. | 830 # Not sure what this is. |
831 POSSIBLE LEAK | 831 POSSIBLE LEAK |
832 name=http://code.google.com/p/drmemory/issues/detail?id=749 | 832 name=https://github.com/DynamoRIO/drmemory/issues/749 |
833 ... | 833 ... |
834 fwpuclnt.dll!* | 834 fwpuclnt.dll!* |
835 ... | 835 ... |
836 RPCRT4.dll!* | 836 RPCRT4.dll!* |
837 ... | 837 ... |
838 fwpuclnt.dll!* | 838 fwpuclnt.dll!* |
839 ... | 839 ... |
840 WS2_32.dll!* | 840 WS2_32.dll!* |
841 *!talk_base::SafeGetHostByName | 841 *!talk_base::SafeGetHostByName |
842 *!talk_base::SocketAddress::GetLocalIPs | 842 *!talk_base::SocketAddress::GetLocalIPs |
843 *!talk_base::SocketAddress::IsLocalIP | 843 *!talk_base::SocketAddress::IsLocalIP |
844 *!cricket::Transport::VerifyCandidate | 844 *!cricket::Transport::VerifyCandidate |
845 *!cricket::Session::OnRemoteCandidates | 845 *!cricket::Session::OnRemoteCandidates |
846 *!cricket::Session::OnTransportInfoMessage | 846 *!cricket::Session::OnTransportInfoMessage |
847 *!cricket::Session::OnIncomingMessage | 847 *!cricket::Session::OnIncomingMessage |
848 *!cricket::SessionManager::OnIncomingMessage | 848 *!cricket::SessionManager::OnIncomingMessage |
849 | 849 |
850 # More uninit false pos in rpcrt4.dll not caught by default suppressions. | 850 # More uninit false pos in rpcrt4.dll not caught by default suppressions. |
851 UNINITIALIZED READ | 851 UNINITIALIZED READ |
852 name=http://code.google.com/p/drmemory/issues/detail?id=529 | 852 name=https://github.com/DynamoRIO/drmemory/issues/529 |
853 RPCRT4.dll!* | 853 RPCRT4.dll!* |
854 ... | 854 ... |
855 *!base::LaunchProcess | 855 *!base::LaunchProcess |
856 | 856 |
857 # System leak from CreateEnvironmentBlock. | 857 # System leak from CreateEnvironmentBlock. |
858 LEAK | 858 LEAK |
859 name=http://code.google.com/p/drmemory/issues/detail?id=757 | 859 name=https://github.com/DynamoRIO/drmemory/issues/757 |
860 ... | 860 ... |
861 USERENV.dll!CreateEnvironmentBlock | 861 USERENV.dll!CreateEnvironmentBlock |
862 | 862 |
863 # Looks like another instance of 753 | 863 # Looks like another instance of 753 |
864 LEAK | 864 LEAK |
865 name=http://code.google.com/p/drmemory/issues/detail?id=753 | 865 name=https://github.com/DynamoRIO/drmemory/issues/753 |
866 ... | 866 ... |
867 ntdll.dll!RtlLoadString | 867 ntdll.dll!RtlLoadString |
868 | 868 |
869 # More bit manip fps | 869 # More bit manip fps |
870 UNINITIALIZED READ | 870 UNINITIALIZED READ |
871 name=http://code.google.com/p/drmemory/issues/detail?id=493 | 871 name=https://github.com/DynamoRIO/drmemory/issues/493 |
872 USP10.dll!ScriptPositionSingleGlyph | 872 USP10.dll!ScriptPositionSingleGlyph |
873 | 873 |
874 # Various TLS leaks that we don't understand yet. We should be finding a root | 874 # Various TLS leaks that we don't understand yet. We should be finding a root |
875 # for these. | 875 # for these. |
876 LEAK | 876 LEAK |
877 name=http://code.google.com/p/drmemory/issues/detail?id=778 a | 877 name=https://github.com/DynamoRIO/drmemory/issues/778 a |
878 KERNELBASE.dll!TlsSetValue | 878 KERNELBASE.dll!TlsSetValue |
879 | 879 |
880 # Originally filed as: http://crbug.com/109281 | 880 # Originally filed as: http://crbug.com/109281 |
881 LEAK | 881 LEAK |
882 name=http://code.google.com/p/drmemory/issues/detail?id=778 b | 882 name=https://github.com/DynamoRIO/drmemory/issues/778 b |
883 *!operator new | 883 *!operator new |
884 *!operator new[] | 884 *!operator new[] |
885 *!*::ConstructTlsVector | 885 *!*::ConstructTlsVector |
886 *!base::ThreadLocalStorage::StaticSlot::Get | 886 *!base::ThreadLocalStorage::StaticSlot::Get |
887 | 887 |
888 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a | 888 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a |
889 # root? See also http://crbug.com/32624 | 889 # root? See also http://crbug.com/32624 |
890 LEAK | 890 LEAK |
891 name=http://code.google.com/p/drmemory/issues/detail?id=778 c | 891 name=https://github.com/DynamoRIO/drmemory/issues/778 c |
892 *!PR_Calloc | 892 *!PR_Calloc |
893 *!_PR_AttachThread | 893 *!_PR_AttachThread |
894 *!_PRI_AttachThread | 894 *!_PRI_AttachThread |
895 | 895 |
896 # Bit-level fps in rich edit layer. | 896 # Bit-level fps in rich edit layer. |
897 UNINITIALIZED READ | 897 UNINITIALIZED READ |
898 name=http://code.google.com/p/drmemory/issues/detail?id=791 | 898 name=https://github.com/DynamoRIO/drmemory/issues/791 |
899 RICHED20.dll!* | 899 RICHED20.dll!* |
900 RICHED20.dll!* | 900 RICHED20.dll!* |
901 | 901 |
902 # Already suppressed by drmemory default supp we don't have yet. | 902 # Already suppressed by drmemory default supp we don't have yet. |
903 LEAK | 903 LEAK |
904 name=i#757: RPC binding leaks in sspicli.dll | 904 name=i#757: RPC binding leaks in sspicli.dll |
905 RPCRT4.dll!* | 905 RPCRT4.dll!* |
906 ... | 906 ... |
907 SspiCli.dll!* | 907 SspiCli.dll!* |
908 SspiCli.dll!Cre* | 908 SspiCli.dll!Cre* |
909 | 909 |
910 # Async NtReadFile false positives. This was fixed in drmemory r772, remove | 910 # Async NtReadFile false positives. This was fixed in drmemory r772, remove |
911 # this supp when we pull that rev. | 911 # this supp when we pull that rev. |
912 UNADDRESSABLE ACCESS | 912 UNADDRESSABLE ACCESS |
913 name=http://code.google.com/p/drmemory/issues/detail?id=798 | 913 name=https://github.com/DynamoRIO/drmemory/issues/798 |
914 system call NtReadFile parameter #5 | 914 system call NtReadFile parameter #5 |
915 KERNEL32.dll!ReadFile | 915 KERNEL32.dll!ReadFile |
916 | 916 |
917 # Probable syscall false positive. | 917 # Probable syscall false positive. |
918 UNADDRESSABLE ACCESS | 918 UNADDRESSABLE ACCESS |
919 name=http://code.google.com/p/drmemory/issues/detail?id=809 | 919 name=https://github.com/DynamoRIO/drmemory/issues/809 |
920 system call NtGdiPolyPolyDraw parameter #1 | 920 system call NtGdiPolyPolyDraw parameter #1 |
921 *!gfx::Path::CreateNativeRegion | 921 *!gfx::Path::CreateNativeRegion |
922 | 922 |
923 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces | 923 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces |
924 # coming out of this module (sometimes only one frame), which makes it hard to | 924 # coming out of this module (sometimes only one frame), which makes it hard to |
925 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we | 925 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we |
926 # should keep this. | 926 # should keep this. |
927 UNINITIALIZED READ | 927 UNINITIALIZED READ |
928 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard | 928 name=https://github.com/DynamoRIO/drmemory/issues/113 rpcrt4.dll wildcard |
929 RPCRT4.dll!* | 929 RPCRT4.dll!* |
930 | 930 |
931 UNINITIALIZED READ | 931 UNINITIALIZED READ |
932 name=http://code.google.com/p/drmemory/issues/detail?id=841 a | 932 name=https://github.com/DynamoRIO/drmemory/issues/841 a |
933 ... | 933 ... |
934 CRYPTNET.dll!I_CryptNetGetConnectivity | 934 CRYPTNET.dll!I_CryptNetGetConnectivity |
935 | 935 |
936 UNINITIALIZED READ | 936 UNINITIALIZED READ |
937 name=http://code.google.com/p/drmemory/issues/detail?id=841 b | 937 name=https://github.com/DynamoRIO/drmemory/issues/841 b |
938 ... | 938 ... |
939 webio.dll!* | 939 webio.dll!* |
940 | 940 |
941 UNINITIALIZED READ | 941 UNINITIALIZED READ |
942 name=http://code.google.com/p/drmemory/issues/detail?id=841 c | 942 name=https://github.com/DynamoRIO/drmemory/issues/841 c |
943 ... | 943 ... |
944 winhttp.dll!* | 944 winhttp.dll!* |
945 | 945 |
946 LEAK | 946 LEAK |
947 name=http://code.google.com/p/drmemory/issues/detail?id=841 d | 947 name=https://github.com/DynamoRIO/drmemory/issues/841 d |
948 ... | 948 ... |
949 CRYPTNET.dll!I_CryptNetGetConnectivity | 949 CRYPTNET.dll!I_CryptNetGetConnectivity |
950 | 950 |
951 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame. | 951 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame. |
952 UNINITIALIZED READ | 952 UNINITIALIZED READ |
953 name=http://code.google.com/p/drmemory/issues/detail?id=810 | 953 name=https://github.com/DynamoRIO/drmemory/issues/810 |
954 instruction=test %edx %edx | 954 instruction=test %edx %edx |
955 USER32.dll!GetClassLongW | 955 USER32.dll!GetClassLongW |
956 ... | 956 ... |
957 *!ui::CenterAndSizeWindow | 957 *!ui::CenterAndSizeWindow |
958 | 958 |
959 UNINITIALIZED READ | 959 UNINITIALIZED READ |
960 name=http://code.google.com/p/drmemory/issues/detail?id=815 | 960 name=https://github.com/DynamoRIO/drmemory/issues/815 |
961 KERNEL*.dll!... | 961 KERNEL*.dll!... |
962 dxgi.dll!* | 962 dxgi.dll!* |
963 USER32.dll!GetMonitorInfoA | 963 USER32.dll!GetMonitorInfoA |
964 ntdll.dll!KiUserCallbackDispatcher | 964 ntdll.dll!KiUserCallbackDispatcher |
965 dxgi.dll!* | 965 dxgi.dll!* |
966 WinSATAPI.DLL!* | 966 WinSATAPI.DLL!* |
967 | 967 |
968 # Suppress anything in cmd.exe. It's safer to suppress these than disable | 968 # Suppress anything in cmd.exe. It's safer to suppress these than disable |
969 # following, since someone might launch a Chrome process via cmd.exe. | 969 # following, since someone might launch a Chrome process via cmd.exe. |
970 LEAK | 970 LEAK |
971 name=cmd.exe | 971 name=cmd.exe |
972 ... | 972 ... |
973 cmd.exe!* | 973 cmd.exe!* |
974 | 974 |
975 # Possible true system use after free. | 975 # Possible true system use after free. |
976 UNADDRESSABLE ACCESS | 976 UNADDRESSABLE ACCESS |
977 name=http://code.google.com/p/drmemory/issues/detail?id=623 | 977 name=https://github.com/DynamoRIO/drmemory/issues/623 |
978 KERNELBASE.dll!TlsGetValue | 978 KERNELBASE.dll!TlsGetValue |
979 OLEAUT32.dll!SysFreeString | 979 OLEAUT32.dll!SysFreeString |
980 OLEAUT32.dll!SysAllocStringByteLen | 980 OLEAUT32.dll!SysAllocStringByteLen |
981 OLEACC.dll!* | 981 OLEACC.dll!* |
982 OLEACC.dll!* | 982 OLEACC.dll!* |
983 OLEACC.dll!* | 983 OLEACC.dll!* |
984 OLEACC.dll!* | 984 OLEACC.dll!* |
985 | 985 |
986 # basic_streambuf seems to leak something in creating a std::_Mutex | 986 # basic_streambuf seems to leak something in creating a std::_Mutex |
987 LEAK | 987 LEAK |
988 name=http://code.google.com/p/drmemory/issues/detail?id=857 | 988 name=https://github.com/DynamoRIO/drmemory/issues/857 |
989 ntdll.dll!... | 989 ntdll.dll!... |
990 ntdll.dll!RtlInitializeCriticalSection | 990 ntdll.dll!RtlInitializeCriticalSection |
991 *!_Mtxinit | 991 *!_Mtxinit |
992 *!std::_Mutex::_Mutex | 992 *!std::_Mutex::_Mutex |
993 *!std::basic_streambuf<> | 993 *!std::basic_streambuf<> |
994 | 994 |
995 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. | 995 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. |
996 LEAK | 996 LEAK |
997 name=GDI SetBrushOrgEx leak | 997 name=GDI SetBrushOrgEx leak |
998 GDI32.dll!... | 998 GDI32.dll!... |
(...skipping 625 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1624 name=BUG_349128 | 1624 name=BUG_349128 |
1625 content.dll!std::* | 1625 content.dll!std::* |
1626 ... | 1626 ... |
1627 content.dll!content::BrowserAccessibilityManagerWin::* | 1627 content.dll!content::BrowserAccessibilityManagerWin::* |
1628 ... | 1628 ... |
1629 *!*::UpdateNode | 1629 *!*::UpdateNode |
1630 | 1630 |
1631 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB* | 1631 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB* |
1632 # variety) that it's a performance hit. We avoid that by requesting | 1632 # variety) that it's a performance hit. We avoid that by requesting |
1633 # whole-module suppression | 1633 # whole-module suppression |
1634 # (see https://code.google.com/p/drmemory/issues/detail?id=1529). | 1634 # (see https://github.com/DynamoRIO/drmemory/issues/1529). |
1635 UNINITIALIZED READ | 1635 UNINITIALIZED READ |
1636 name=bug_347967_all_osmesa | 1636 name=bug_347967_all_osmesa |
1637 osmesa.dll!* | 1637 osmesa.dll!* |
1638 | 1638 |
1639 UNINITIALIZED READ | 1639 UNINITIALIZED READ |
1640 name=bug_347967 | 1640 name=bug_347967 |
1641 osmesa.dll!unpack_RGB*888 | 1641 osmesa.dll!unpack_RGB*888 |
1642 osmesa.dll!_mesa_unpack_rgba_row | 1642 osmesa.dll!_mesa_unpack_rgba_row |
1643 osmesa.dll!slow_read_rgba_pixels | 1643 osmesa.dll!slow_read_rgba_pixels |
1644 osmesa.dll!read_rgba_pixels | 1644 osmesa.dll!read_rgba_pixels |
(...skipping 231 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1876 *!`anonymous namespace'::TOutputTraverser::visitConstantUnion | 1876 *!`anonymous namespace'::TOutputTraverser::visitConstantUnion |
1877 *!TIntermBinary::traverse | 1877 *!TIntermBinary::traverse |
1878 *!TIntermBinary::traverse | 1878 *!TIntermBinary::traverse |
1879 *!TIntermAggregate::traverse | 1879 *!TIntermAggregate::traverse |
1880 *!TIntermAggregate::traverse | 1880 *!TIntermAggregate::traverse |
1881 *!TIntermAggregate::traverse | 1881 *!TIntermAggregate::traverse |
1882 *!TIntermediate::outputTree | 1882 *!TIntermediate::outputTree |
1883 *!TCompiler::compile | 1883 *!TCompiler::compile |
1884 *!TypeTrackingTest::compile | 1884 *!TypeTrackingTest::compile |
1885 *!TypeTrackingTest_StructConstructorResultNoPrecision_Test::TestBody | 1885 *!TypeTrackingTest_StructConstructorResultNoPrecision_Test::TestBody |
| 1886 |
| 1887 UNADDRESSABLE ACCESS |
| 1888 name=bug_436131 |
| 1889 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone |
| 1890 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody |
| 1891 *!testing::internal::HandleExceptionsInMethodIfSupported<> |
| 1892 |
| 1893 UNADDRESSABLE ACCESS |
| 1894 name=bug_436131_b |
| 1895 views.dll!ObserverListBase<>::RemoveObserver |
| 1896 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone |
| 1897 *!testing::internal::HandleExceptionsInMethodIfSupported<> |
| 1898 |
| 1899 UNADDRESSABLE ACCESS |
| 1900 name=bug_436131_c |
| 1901 *!ash::test::ShelfViewTestAPI::GetPreferredSize |
| 1902 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody |
| 1903 *!testing::internal::HandleExceptionsInMethodIfSupported<> |
OLD | NEW |