| Index: tools/valgrind/drmemory/suppressions_full.txt
|
| diff --git a/tools/valgrind/drmemory/suppressions_full.txt b/tools/valgrind/drmemory/suppressions_full.txt
|
| index ca3d29aca52837d080e9ecba2129281781621e64..050e507e233f7f6ecee607a83f60c78dad84ff2f 100644
|
| --- a/tools/valgrind/drmemory/suppressions_full.txt
|
| +++ b/tools/valgrind/drmemory/suppressions_full.txt
|
| @@ -16,7 +16,7 @@ name=http://crbug.com/116277
|
|
|
| # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=406
|
| +name=https://github.com/DynamoRIO/drmemory/issues/406
|
| ADVAPI32.dll!WmiOpenBlock
|
| ADVAPI32.dll!WmiOpenBlock
|
|
|
| @@ -28,7 +28,7 @@ GoogleDesktopNetwork3.DLL!DllUnregisterServer
|
|
|
| # They deliberately use uninit local var in sqlite random generator.
|
| # Random bytes may mess up the call stack between randomByte and
|
| -# sqlite3_* frames (http://code.google.com/p/drmemory/issues/detail?id=1514)
|
| +# sqlite3_* frames (https://github.com/DynamoRIO/drmemory/issues/1514)
|
| # so we just look for randomByte.
|
| UNINITIALIZED READ
|
| name=sqlite3_randomness UNINIT
|
| @@ -76,168 +76,168 @@ libpng.dll!wk_png_write_row
|
| # Please note: the following suppressions were written in the abscense of
|
| # private symbols so may need to be updated when we switch to auto-loading PDBs
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=12 (1)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/12 (1)
|
| ntdll.dll!Rtl*
|
| ntdll.dll!Rtl*
|
| ntdll.dll!RtlFindActivationContextSectionString
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=12 (2)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/12 (2)
|
| ...
|
| SHELL32.dll!SHFileOperation*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=12 (3)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/12 (3)
|
| ...
|
| SHELL32.dll!SHGetFolderPath*
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=12 (4)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/12 (4)
|
| ...
|
| SHELL32.dll!SHGetFolderPath*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=12 (5)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/12 (5)
|
| ...
|
| SHELL32.dll!SHCreateDirectory*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=12 (6)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/12 (6)
|
| ...
|
| SHELL32.dll!ILLoadFromStream*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=12 (7)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/12 (7)
|
| ...
|
| SHELL32.dll!ILSaveToStream*
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=12 (8)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/12 (8)
|
| ...
|
| SHELL32.dll!SHFileOperation*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=12 (9)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/12 (9)
|
| ...
|
| SHELL32.dll!SHGetItemFromDataObject
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=12 (10)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/12 (10)
|
| ...
|
| SHELL32.dll!SHGetItemFromDataObject
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=12 (11)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/12 (11)
|
| ...
|
| ole32.dll!*
|
| SHELL32.dll!SHChangeNotifySuspendResume
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=14 (1)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/14 (1)
|
| ...
|
| *!CreateProcess*
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=14 (2)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/14 (2)
|
| ...
|
| *!CreateProcess*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=14 (3)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/14 (3)
|
| ...
|
| *!base::LaunchApp*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=17 (1)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/17 (1)
|
| ...
|
| *!CreateWindow*
|
|
|
| POSSIBLE LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=17 (2)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/17 (2)
|
| GDI32.dll!*
|
| GDI32.dll!CreateFontIndirectExW
|
| GDI32.dll!CreateFontIndirectW
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=17 (3)
|
| +name=https://github.com/DynamoRIO/drmemory/issues/17 (3)
|
| KERNELBASE.dll!LocalAlloc
|
| ...
|
| USER32.dll!CreateWindow*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=18 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/18 a
|
| ...
|
| *!CoInitialize*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=18 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/18 b
|
| ...
|
| *!CoCreateInstance*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=18 c
|
| +name=https://github.com/DynamoRIO/drmemory/issues/18 c
|
| ...
|
| *!CoUninitialize*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=18 d
|
| +name=https://github.com/DynamoRIO/drmemory/issues/18 d
|
| ...
|
| UxTheme.dll!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=40 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/40 a
|
| ...
|
| WINSPOOL.DRV!*
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=40 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/40 b
|
| ...
|
| WINSPOOL.DRV!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=48 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/48 a
|
| system call NtContinue
|
| ...
|
| *!*SetThreadName
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=48 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/48 b
|
| system call NtContinue
|
| *!WTF::initializeCurrentThreadInternal
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=52 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/52 a
|
| ...
|
| DBGHELP.dll!SymInitialize
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=52 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/52 b
|
| ...
|
| DBGHELP.dll!SymEnumSourceFiles
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=52 c
|
| +name=https://github.com/DynamoRIO/drmemory/issues/52 c
|
| ...
|
| msvcrt.dll!_RTDynamicCast
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp
|
| +name=https://github.com/DynamoRIO/drmemory/issues/52 bit-level fp in dbghelp
|
| instruction=test 0x*(%*) $0x??
|
| DBGHELP.dll!SymUnloadModule64
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=53
|
| +name=https://github.com/DynamoRIO/drmemory/issues/53
|
| ADVAPI32.dll!WmiMofEnumerateResourcesA
|
| ADVAPI32.dll!WmiMofEnumerateResourcesA
|
| ADVAPI32.dll!Sta*TraceW
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=58
|
| +name=https://github.com/DynamoRIO/drmemory/issues/58
|
| ...
|
| *!_cfltcvt_l
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=60
|
| +name=https://github.com/DynamoRIO/drmemory/issues/60
|
| USP10.dll!*
|
| ...
|
| USP10.dll!ScriptStringAnalyse
|
| @@ -250,65 +250,65 @@ IMM32.dll!ImmSetActiveContext
|
| USER32.dll!IMPSetIMEA
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=65 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/65 a
|
| ...
|
| *!SystemFunction036
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=65 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/65 b
|
| ...
|
| *!talk_base::CreateRandomString
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=68 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/68 a
|
| ...
|
| WS2_32.dll!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=68 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/68 b
|
| ...
|
| ADVAPI32.dll!SetSecurityDescriptorDacl
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=68 c
|
| +name=https://github.com/DynamoRIO/drmemory/issues/68 c
|
| ...
|
| MSWSOCK.dll!WSPStartup
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=68 d
|
| +name=https://github.com/DynamoRIO/drmemory/issues/68 d
|
| ...
|
| ntdll.dll!RtlValidateUnicodeString
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=256
|
| +name=https://github.com/DynamoRIO/drmemory/issues/256
|
| *!_mtinit
|
| *!__tmainCRTStartup
|
| *!mainCRTStartup
|
|
|
| POSSIBLE LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=274 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/274 a
|
| ...
|
| GDI32.dll!CreateDCW
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=274 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/274 b
|
| ...
|
| GDI32.dll!CreateDCW
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=275
|
| +name=https://github.com/DynamoRIO/drmemory/issues/275
|
| ...
|
| *!_getptd*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=276
|
| +name=https://github.com/DynamoRIO/drmemory/issues/276
|
| ...
|
| ntdll.dll!RtlConvertUlongToLargeInteger
|
| ntdll.dll!RtlConvertUlongToLargeInteger
|
| ntdll.dll!KiUserExceptionDispatcher
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=305
|
| +name=https://github.com/DynamoRIO/drmemory/issues/305
|
| *!free
|
| *!free
|
| *!operator new
|
| @@ -316,57 +316,57 @@ name=http://code.google.com/p/drmemory/issues/detail?id=305
|
| *!MiniDumpWriteDump
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=346 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/346 a
|
| ...
|
| GDI32.dll!CloseEnhMetaFile
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=346 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/346 b
|
| GDI32.dll!SetPolyFillMode
|
| GDI32.dll!CreateICW
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=362
|
| +name=https://github.com/DynamoRIO/drmemory/issues/362
|
| USER32.dll!UnregisterClass*
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=382
|
| +name=https://github.com/DynamoRIO/drmemory/issues/382
|
| ...
|
| ntdll.dll!CsrNewThread
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=397
|
| +name=https://github.com/DynamoRIO/drmemory/issues/397
|
| system call NtDeviceIoControlFile InputBuffer
|
| ADVAPI32.dll!ImpersonateAnonymousToken
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=407 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/407 a
|
| system call NtRequestWaitReplyPort
|
| RPCRT4.dll!I_RpcSendReceive
|
| RPCRT4.dll!NdrSendReceive
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=407 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/407 b
|
| IMM32.dll!*
|
| ntdll.dll!LdrInitializeThunk
|
| ntdll.dll!LdrShutdownThread
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=412 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/412 a
|
| ADVAPI32.dll!RegDeleteValue*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=412 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/412 b
|
| ...
|
| ADVAPI32.dll!Crypt*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=412 c
|
| +name=https://github.com/DynamoRIO/drmemory/issues/412 c
|
| ...
|
| RPCRT4.dll!NdrClientCall2
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=412 d
|
| +name=https://github.com/DynamoRIO/drmemory/issues/412 d
|
| RSAENH.dll!DllUnregisterServer
|
| ...
|
| ADVAPI32.dll!CryptAcquireContextA
|
| @@ -375,17 +375,17 @@ CRYPT32.dll!CryptEnumOIDFunction
|
| CRYPT32.dll!CertFindCertificateInStore
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=412 e
|
| +name=https://github.com/DynamoRIO/drmemory/issues/412 e
|
| ...
|
| RSAENH.dll!CPGenRandom
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=412 f
|
| +name=https://github.com/DynamoRIO/drmemory/issues/412 f
|
| ...
|
| CRYPT??.dll!Crypt*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=412 g
|
| +name=https://github.com/DynamoRIO/drmemory/issues/412 g
|
| *!replace_memcmp
|
| ...
|
| *!testing::internal::CmpHelperEQ*
|
| @@ -396,30 +396,30 @@ name=http://code.google.com/p/drmemory/issues/detail?id=412 g
|
| # have frame pointers, and we have trouble unwinding from it. Therefore, we use
|
| # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=412 h
|
| +name=https://github.com/DynamoRIO/drmemory/issues/412 h
|
| RSAENH.dll!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=425 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/425 a
|
| CLBCatQ.DLL!DestroyStgDatabase
|
| CLBCatQ.DLL!PostError
|
| CLBCatQ.DLL!PostError
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=425 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/425 b
|
| RPCRT4.dll!I_RpcBCacheFree
|
| RPCRT4.dll!I_RpcBCacheFree
|
| ...
|
| RPCRT4.dll!NdrClientCall2
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=425 c
|
| +name=https://github.com/DynamoRIO/drmemory/issues/425 c
|
| msdmo.dll!*
|
| msdmo.dll!*
|
| DEVENUM.DLL!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=435 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/435 a
|
| ...
|
| ntdll.dll!RtlSetSecurityObject
|
| ntdll.dll!RtlNewSecurityObjectEx
|
| @@ -427,7 +427,7 @@ ADVAPI32.dll!CreatePrivateObjectSecurityEx
|
| NTMARTA.dll!AccRewriteSetNamedRights
|
|
|
| POSSIBLE LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=435 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/435 b
|
| WLDAP32.dll!Ordinal325
|
| ...
|
| WLDAP32.dll!Ordinal325
|
| @@ -440,34 +440,34 @@ KERNEL32.dll!LoadLibraryExW
|
| # mod+offs suppression because the symbolic makes no sense and changes
|
| # completely in the presence of WS2_32.dll symbols.
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=438
|
| +name=https://github.com/DynamoRIO/drmemory/issues/438
|
| <WS2_32.dll+0x260c>
|
| <WS2_32.dll+0x2b76>
|
| <WS2_32.dll+0x2c61>
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=454 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/454 a
|
| ...
|
| WINMM.dll!wave*GetNumDevs
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=454 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/454 b
|
| ...
|
| WINMM.dll!wave*GetNumDevs
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=466
|
| +name=https://github.com/DynamoRIO/drmemory/issues/466
|
| ntdll.dll!RtlRunOnceBeginInitialize
|
| ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=473 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/473 a
|
| system call NtDeviceIoControlFile InputBuffer
|
| ...
|
| iphlpapi.dll!GetAdaptersAddresses
|
|
|
| POSSIBLE LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=473 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/473 b
|
| ESENT.dll!*
|
| ESENT.dll!*
|
| ESENT.dll!*
|
| @@ -481,14 +481,14 @@ iphlpapi.dll!GetPerAdapterInfo
|
| iphlpapi.dll!GetAdaptersAddresses
|
|
|
| POSSIBLE LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=473 c
|
| +name=https://github.com/DynamoRIO/drmemory/issues/473 c
|
| RPCRT4.dll!*
|
| RPCRT4.dll!*
|
| ...
|
| IPHLPAPI.DLL!GetAdaptersAddresses
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=475
|
| +name=https://github.com/DynamoRIO/drmemory/issues/475
|
| ...
|
| ADVAPI32.dll!CryptAcquireContextA
|
| ...
|
| @@ -499,105 +499,105 @@ CRYPT32.dll!CryptQueryObject
|
| # Lots of leaks from our interactions with the system certificate store. May be
|
| # worth reviewing our use of their API.
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=476 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/476 a
|
| KERNEL*.dll!LocalAlloc
|
| ...
|
| CRYPT32.dll!CertGetCRLContextProperty
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=476 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/476 b
|
| KERNEL*.dll!LocalAlloc
|
| ...
|
| CRYPT32.dll!CertAddCRLContextToStore
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=476 c
|
| +name=https://github.com/DynamoRIO/drmemory/issues/476 c
|
| KERNEL*.dll!LocalAlloc
|
| ...
|
| CRYPT32.dll!CertOpenStore
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=476 d
|
| +name=https://github.com/DynamoRIO/drmemory/issues/476 d
|
| ...
|
| CRYPT32.dll!CertOpenSystemStore?
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=476 e
|
| +name=https://github.com/DynamoRIO/drmemory/issues/476 e
|
| ...
|
| CRYPT32.dll!CertGetCertificateChain
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=476 f
|
| +name=https://github.com/DynamoRIO/drmemory/issues/476 f
|
| ...
|
| CRYPT32.dll!CertCompareIntegerBlob
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=476 g
|
| +name=https://github.com/DynamoRIO/drmemory/issues/476 g
|
| ...
|
| CRYPT32.dll!CryptUnprotectData
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=476 h
|
| +name=https://github.com/DynamoRIO/drmemory/issues/476 h
|
| KERNEL*.dll!LocalAlloc
|
| ...
|
| CRYPT32.dll!CertEnumCertificatesInStore
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=476 i
|
| +name=https://github.com/DynamoRIO/drmemory/issues/476 i
|
| ...
|
| CRYPT32.dll!CryptProtectData
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=476 j
|
| +name=https://github.com/DynamoRIO/drmemory/issues/476 j
|
| ...
|
| CRYPT32.dll!CryptExportPublicKeyInfoEx
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=502 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/502 a
|
| system call NtSecureConnectPort parameter #3
|
| GDI32.dll!*
|
| GDI32.dll!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=502 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/502 b
|
| system call NtGdiEnumFonts parameter #6
|
| GDI32.dll!*
|
| GDI32.dll!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=511 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/511 a
|
| RPCRT4.dll!...
|
| ole32.dll!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=511 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/511 b
|
| ole32.dll!*
|
| ole32.dll!*
|
| ole32.dll!StringFromGUID2
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=512 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/512 a
|
| ...
|
| *!browser_sync::Cryptographer::PackBootstrapToken
|
| *!browser_sync::Cryptographer::GetBootstrapToken
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=512 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/512 b
|
| ...
|
| *!Encrypt*
|
|
|
| # TODO(bruening): remove these once we have v8 bitfields handled
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=513 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/513 a
|
| *!v8*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=513 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/513 b
|
| *!*
|
| *!v8*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=513 c
|
| +name=https://github.com/DynamoRIO/drmemory/issues/513 c
|
| <not in a module>
|
| ...
|
| *!v8*
|
| @@ -606,17 +606,17 @@ name=http://code.google.com/p/drmemory/issues/detail?id=513 c
|
| # has no symbols. These are all on the bots using component build, so we use
|
| # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue.
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=513 d
|
| +name=https://github.com/DynamoRIO/drmemory/issues/513 d
|
| v8.dll!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=513 e
|
| +name=https://github.com/DynamoRIO/drmemory/issues/513 e
|
| <not in a module>
|
| ...
|
| v8.dll!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=546
|
| +name=https://github.com/DynamoRIO/drmemory/issues/546
|
| ...
|
| mscms.dll!*
|
| ...
|
| @@ -631,13 +631,13 @@ USER32.dll!CreateWindowExW
|
| *!views::TooltipManagerWin::TooltipManagerWin
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=567 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/567 a
|
| dbghelp.dll!*
|
| ...
|
| dbghelp.dll!StackWalk64
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=567 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/567 b
|
| *!*
|
| dbghelp.dll!*
|
| ...
|
| @@ -647,7 +647,7 @@ dbghelp.dll!StackWalk64
|
| # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too
|
| # brittle, so we switched to RPCRT4.dll!*.
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=569
|
| +name=https://github.com/DynamoRIO/drmemory/issues/569
|
| RPCRT4.dll!...
|
| ntdll.dll!*
|
| ntdll.dll!*
|
| @@ -772,7 +772,7 @@ name=http://crbug.com/109278 audio device COM leaks
|
|
|
| # False pos uninit in shell32 when resolving links.
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=745
|
| +name=https://github.com/DynamoRIO/drmemory/issues/745
|
| SHELL*.dll!*
|
| ...
|
| SHELL*.dll!*
|
| @@ -781,31 +781,31 @@ SHELL*.dll!*
|
| # Probable false pos uninit in ffmpeg. Probably due to running off the end of a
|
| # buffer with SSE/MMX instructions whose results are then masked out later.
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=747 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/747 a
|
| *!ff_pred4x4_vertical_vp8_mmxext
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=747 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/747 b
|
| *!ff_pred4x4_down_left_mmxext
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=747 c
|
| +name=https://github.com/DynamoRIO/drmemory/issues/747 c
|
| *!ff_vorbis_floor1_render_list
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=747 d
|
| +name=https://github.com/DynamoRIO/drmemory/issues/747 d
|
| *!ff_put_vp8_epel8_h6_ssse3
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=747 e
|
| +name=https://github.com/DynamoRIO/drmemory/issues/747 e
|
| *!ff_put_vp8_epel8_h4_ssse3
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=747 f
|
| +name=https://github.com/DynamoRIO/drmemory/issues/747 f
|
| *!ff_fft_permute_sse
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=747 g
|
| +name=https://github.com/DynamoRIO/drmemory/issues/747 g
|
| *!ff_simple_idct_add_mmx
|
|
|
| # ffmpeg seems to leak a pthread condition variable.
|
| @@ -820,7 +820,7 @@ name=http://crbug.com/110042
|
|
|
| # Improperly handled ioctl in bcrypt.
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=748
|
| +name=https://github.com/DynamoRIO/drmemory/issues/748
|
| system call NtDeviceIoControlFile InputBuffer
|
| ...
|
| bcrypt.dll!BCryptUnregisterConfigChangeNotify
|
| @@ -829,7 +829,7 @@ ntdll.dll!RtlQueryEnvironmentVariable
|
|
|
| # Not sure what this is.
|
| POSSIBLE LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=749
|
| +name=https://github.com/DynamoRIO/drmemory/issues/749
|
| ...
|
| fwpuclnt.dll!*
|
| ...
|
| @@ -849,37 +849,37 @@ WS2_32.dll!*
|
|
|
| # More uninit false pos in rpcrt4.dll not caught by default suppressions.
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=529
|
| +name=https://github.com/DynamoRIO/drmemory/issues/529
|
| RPCRT4.dll!*
|
| ...
|
| *!base::LaunchProcess
|
|
|
| # System leak from CreateEnvironmentBlock.
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=757
|
| +name=https://github.com/DynamoRIO/drmemory/issues/757
|
| ...
|
| USERENV.dll!CreateEnvironmentBlock
|
|
|
| # Looks like another instance of 753
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=753
|
| +name=https://github.com/DynamoRIO/drmemory/issues/753
|
| ...
|
| ntdll.dll!RtlLoadString
|
|
|
| # More bit manip fps
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=493
|
| +name=https://github.com/DynamoRIO/drmemory/issues/493
|
| USP10.dll!ScriptPositionSingleGlyph
|
|
|
| # Various TLS leaks that we don't understand yet. We should be finding a root
|
| # for these.
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=778 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/778 a
|
| KERNELBASE.dll!TlsSetValue
|
|
|
| # Originally filed as: http://crbug.com/109281
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=778 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/778 b
|
| *!operator new
|
| *!operator new[]
|
| *!*::ConstructTlsVector
|
| @@ -888,14 +888,14 @@ name=http://code.google.com/p/drmemory/issues/detail?id=778 b
|
| # This is an NSS PRThread object installed in TLS. Why isn't this detected as a
|
| # root? See also http://crbug.com/32624
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=778 c
|
| +name=https://github.com/DynamoRIO/drmemory/issues/778 c
|
| *!PR_Calloc
|
| *!_PR_AttachThread
|
| *!_PRI_AttachThread
|
|
|
| # Bit-level fps in rich edit layer.
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=791
|
| +name=https://github.com/DynamoRIO/drmemory/issues/791
|
| RICHED20.dll!*
|
| RICHED20.dll!*
|
|
|
| @@ -910,13 +910,13 @@ SspiCli.dll!Cre*
|
| # Async NtReadFile false positives. This was fixed in drmemory r772, remove
|
| # this supp when we pull that rev.
|
| UNADDRESSABLE ACCESS
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=798
|
| +name=https://github.com/DynamoRIO/drmemory/issues/798
|
| system call NtReadFile parameter #5
|
| KERNEL32.dll!ReadFile
|
|
|
| # Probable syscall false positive.
|
| UNADDRESSABLE ACCESS
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=809
|
| +name=https://github.com/DynamoRIO/drmemory/issues/809
|
| system call NtGdiPolyPolyDraw parameter #1
|
| *!gfx::Path::CreateNativeRegion
|
|
|
| @@ -925,39 +925,39 @@ system call NtGdiPolyPolyDraw parameter #1
|
| # write precise suppressions. Until we have bit-level tracking (DRMi#113) we
|
| # should keep this.
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard
|
| +name=https://github.com/DynamoRIO/drmemory/issues/113 rpcrt4.dll wildcard
|
| RPCRT4.dll!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=841 a
|
| +name=https://github.com/DynamoRIO/drmemory/issues/841 a
|
| ...
|
| CRYPTNET.dll!I_CryptNetGetConnectivity
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=841 b
|
| +name=https://github.com/DynamoRIO/drmemory/issues/841 b
|
| ...
|
| webio.dll!*
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=841 c
|
| +name=https://github.com/DynamoRIO/drmemory/issues/841 c
|
| ...
|
| winhttp.dll!*
|
|
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=841 d
|
| +name=https://github.com/DynamoRIO/drmemory/issues/841 d
|
| ...
|
| CRYPTNET.dll!I_CryptNetGetConnectivity
|
|
|
| # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=810
|
| +name=https://github.com/DynamoRIO/drmemory/issues/810
|
| instruction=test %edx %edx
|
| USER32.dll!GetClassLongW
|
| ...
|
| *!ui::CenterAndSizeWindow
|
|
|
| UNINITIALIZED READ
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=815
|
| +name=https://github.com/DynamoRIO/drmemory/issues/815
|
| KERNEL*.dll!...
|
| dxgi.dll!*
|
| USER32.dll!GetMonitorInfoA
|
| @@ -974,7 +974,7 @@ cmd.exe!*
|
|
|
| # Possible true system use after free.
|
| UNADDRESSABLE ACCESS
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=623
|
| +name=https://github.com/DynamoRIO/drmemory/issues/623
|
| KERNELBASE.dll!TlsGetValue
|
| OLEAUT32.dll!SysFreeString
|
| OLEAUT32.dll!SysAllocStringByteLen
|
| @@ -985,7 +985,7 @@ OLEACC.dll!*
|
|
|
| # basic_streambuf seems to leak something in creating a std::_Mutex
|
| LEAK
|
| -name=http://code.google.com/p/drmemory/issues/detail?id=857
|
| +name=https://github.com/DynamoRIO/drmemory/issues/857
|
| ntdll.dll!...
|
| ntdll.dll!RtlInitializeCriticalSection
|
| *!_Mtxinit
|
| @@ -1631,7 +1631,7 @@ content.dll!content::BrowserAccessibilityManagerWin::*
|
| # There are so many osmesa errors we have to suppress (mostly the unpack_RGB*
|
| # variety) that it's a performance hit. We avoid that by requesting
|
| # whole-module suppression
|
| -# (see https://code.google.com/p/drmemory/issues/detail?id=1529).
|
| +# (see https://github.com/DynamoRIO/drmemory/issues/1529).
|
| UNINITIALIZED READ
|
| name=bug_347967_all_osmesa
|
| osmesa.dll!*
|
| @@ -1883,3 +1883,21 @@ name=bug_434033
|
| *!TCompiler::compile
|
| *!TypeTrackingTest::compile
|
| *!TypeTrackingTest_StructConstructorResultNoPrecision_Test::TestBody
|
| +
|
| +UNADDRESSABLE ACCESS
|
| +name=bug_436131
|
| +*!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
|
| +*!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
|
| +*!testing::internal::HandleExceptionsInMethodIfSupported<>
|
| +
|
| +UNADDRESSABLE ACCESS
|
| +name=bug_436131_b
|
| +views.dll!ObserverListBase<>::RemoveObserver
|
| +*!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
|
| +*!testing::internal::HandleExceptionsInMethodIfSupported<>
|
| +
|
| +UNADDRESSABLE ACCESS
|
| +name=bug_436131_c
|
| +*!ash::test::ShelfViewTestAPI::GetPreferredSize
|
| +*!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
|
| +*!testing::internal::HandleExceptionsInMethodIfSupported<>
|
|
|