Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 # This file contains suppressions for the Dr.Memory tool, see | 1 # This file contains suppressions for the Dr.Memory tool, see |
| 2 # http://dev.chromium.org/developers/how-tos/using-drmemory | 2 # http://dev.chromium.org/developers/how-tos/using-drmemory |
| 3 # | 3 # |
| 4 # This file should contain suppressions only for the reports happening | 4 # This file should contain suppressions only for the reports happening |
| 5 # in the 'full' mode (drmemory_full). | 5 # in the 'full' mode (drmemory_full). |
| 6 # For the reports that can happen in the light mode (a.k.a. drmemory_light), | 6 # For the reports that can happen in the light mode (a.k.a. drmemory_light), |
| 7 # please use suppressions.txt instead. | 7 # please use suppressions.txt instead. |
| 8 | 8 |
| 9 ############################################################### | 9 ############################################################### |
| 10 # Known reports on the third party we have no control over. | 10 # Known reports on the third party we have no control over. |
| (...skipping 333 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 344 CRYPT??.dll!Crypt* | 344 CRYPT??.dll!Crypt* |
| 345 | 345 |
| 346 UNINITIALIZED READ | 346 UNINITIALIZED READ |
| 347 name=http://code.google.com/p/drmemory/issues/detail?id=412 g | 347 name=http://code.google.com/p/drmemory/issues/detail?id=412 g |
| 348 *!replace_memcmp | 348 *!replace_memcmp |
| 349 ... | 349 ... |
| 350 *!testing::internal::CmpHelperEQ* | 350 *!testing::internal::CmpHelperEQ* |
| 351 ... | 351 ... |
| 352 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody | 352 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody |
| 353 | 353 |
| 354 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't | |
| 355 # have frame pointers, and we have trouble unwinding from it. Therefore, we use | |
| 356 # this broad suppression, effectively disabling uninit checks in rsaenh.dll. | |
| 357 UNINITIALIZED READ | |
| 358 name=http://code.google.com/p/drmemory/issues/detail?id=712 h | |
|
Timur Iskhodzhanov
2012/02/09 10:50:18
I prefer to sort the issues by their IDs.
Why "h"
Reid Kleckner
2012/02/09 15:17:37
Should be issue 412, and h follows g.
| |
| 359 RSAENH.dll!* | |
| 360 | |
| 354 UNINITIALIZED READ | 361 UNINITIALIZED READ |
| 355 name=http://code.google.com/p/drmemory/issues/detail?id=425 a | 362 name=http://code.google.com/p/drmemory/issues/detail?id=425 a |
| 356 CLBCatQ.DLL!DestroyStgDatabase | 363 CLBCatQ.DLL!DestroyStgDatabase |
| 357 CLBCatQ.DLL!PostError | 364 CLBCatQ.DLL!PostError |
| 358 CLBCatQ.DLL!PostError | 365 CLBCatQ.DLL!PostError |
| 359 | 366 |
| 360 LEAK | 367 LEAK |
| 361 name=http://code.google.com/p/drmemory/issues/detail?id=425 b | 368 name=http://code.google.com/p/drmemory/issues/detail?id=425 b |
| 362 RPCRT4.dll!I_RpcBCacheFree | 369 RPCRT4.dll!I_RpcBCacheFree |
| 363 RPCRT4.dll!I_RpcBCacheFree | 370 RPCRT4.dll!I_RpcBCacheFree |
| (...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 431 ESENT.dll!* | 438 ESENT.dll!* |
| 432 ntdll.dll!Ldr*Init* | 439 ntdll.dll!Ldr*Init* |
| 433 ntdll.dll!Ldr* | 440 ntdll.dll!Ldr* |
| 434 ntdll.dll!* | 441 ntdll.dll!* |
| 435 ntdll.dll!LdrLoadDll | 442 ntdll.dll!LdrLoadDll |
| 436 ... | 443 ... |
| 437 iphlpapi.dll!GetPerAdapterInfo | 444 iphlpapi.dll!GetPerAdapterInfo |
| 438 ... | 445 ... |
| 439 iphlpapi.dll!GetAdaptersAddresses | 446 iphlpapi.dll!GetAdaptersAddresses |
| 440 | 447 |
| 448 POSSIBLE LEAK | |
| 449 name=http://code.google.com/p/drmemory/issues/detail?id=473 c | |
| 450 RPCRT4.dll!* | |
| 451 RPCRT4.dll!* | |
| 452 ... | |
| 453 IPHLPAPI.DLL!GetAdaptersAddresses | |
| 454 | |
| 441 LEAK | 455 LEAK |
| 442 name=http://code.google.com/p/drmemory/issues/detail?id=475 | 456 name=http://code.google.com/p/drmemory/issues/detail?id=475 |
| 443 ... | 457 ... |
| 444 ADVAPI32.dll!CryptAcquireContextA | 458 ADVAPI32.dll!CryptAcquireContextA |
| 445 ... | 459 ... |
| 446 CRYPT32.dll!CryptMsgOpenToDecode | 460 CRYPT32.dll!CryptMsgOpenToDecode |
| 447 ... | 461 ... |
| 448 CRYPT32.dll!CryptQueryObject | 462 CRYPT32.dll!CryptQueryObject |
| 449 | 463 |
| 464 # Lots of leaks from our interactions with the system certificate store. May be | |
| 465 # worth reviewing our use of their API. | |
| 450 LEAK | 466 LEAK |
| 451 name=http://code.google.com/p/drmemory/issues/detail?id=476 a | 467 name=http://code.google.com/p/drmemory/issues/detail?id=476 a |
| 468 KERNEL*.dll!LocalAlloc | |
| 452 ... | 469 ... |
| 453 RPCRT4.dll!RpcBindingFromStringBindingW | 470 CRYPT32.dll!CertGetCRLContextProperty |
| 454 ... | |
| 455 NETAPI32.dll!DsRoleGetPrimaryDomainInformation | |
| 456 ... | |
| 457 USERENV.dll!CreateEnvironmentBlock | |
| 458 ... | |
| 459 CRYPT32.dll!CertOpenStore | |
| 460 ... | |
| 461 CRYPT32.dll!CertCreateCertificateChainEngine | |
| 462 | 471 |
| 463 LEAK | 472 LEAK |
| 464 name=http://code.google.com/p/drmemory/issues/detail?id=476 b | 473 name=http://code.google.com/p/drmemory/issues/detail?id=476 b |
| 465 KERNEL32.dll!LocalAlloc | 474 KERNEL*.dll!LocalAlloc |
| 466 ... | 475 ... |
| 467 CRYPT32.dll!CryptDecodeObjectEx | 476 CRYPT32.dll!CertAddCRLContextToStore |
| 477 | |
| 478 LEAK | |
| 479 name=http://code.google.com/p/drmemory/issues/detail?id=476 c | |
| 480 KERNEL*.dll!LocalAlloc | |
| 468 ... | 481 ... |
| 469 CRYPT32.dll!CertGetCRLContextProperty | 482 CRYPT32.dll!CertOpenStore |
| 483 | |
| 484 LEAK | |
| 485 name=http://code.google.com/p/drmemory/issues/detail?id=476 d | |
| 486 RSAENH.dll!* | |
| 470 ... | 487 ... |
| 471 CRYPT32.dll!CertGetCertificateChain | 488 CRYPT32.dll!CertGetCertificateChain |
| 472 | 489 |
| 490 LEAK | |
| 491 name=http://code.google.com/p/drmemory/issues/detail?id=476 e | |
| 492 RPCRT4.dll!* | |
| 493 ... | |
| 494 CRYPT32.dll!CertGetCertificateChain | |
| 495 | |
| 496 LEAK | |
| 497 name=http://code.google.com/p/drmemory/issues/detail?id=476 f | |
| 498 KERNELBASE.dll!LocalAlloc | |
| 499 SETUPAPI.dll!* | |
| 500 ... | |
| 501 CRYPT32.dll!CertGetCertificateChain | |
| 502 | |
| 503 LEAK | |
| 504 name=http://code.google.com/p/drmemory/issues/detail?id=476 g | |
| 505 RPCRT4.dll!* | |
| 506 RPCRT4.dll!* | |
| 507 ... | |
| 508 CRYPT32.dll!CertCompareIntegerBlob | |
| 509 | |
| 473 UNINITIALIZED READ | 510 UNINITIALIZED READ |
| 474 name=http://code.google.com/p/drmemory/issues/detail?id=511 a | 511 name=http://code.google.com/p/drmemory/issues/detail?id=511 a |
| 475 RPCRT4.dll!* | 512 RPCRT4.dll!* |
| 476 ... | 513 ... |
| 477 RPCRT4.dll!UuidCreate | 514 RPCRT4.dll!UuidCreate |
| 478 ole32.dll!* | 515 ole32.dll!* |
| 479 | 516 |
| 480 UNINITIALIZED READ | 517 UNINITIALIZED READ |
| 481 name=http://code.google.com/p/drmemory/issues/detail?id=511 b | 518 name=http://code.google.com/p/drmemory/issues/detail?id=511 b |
| 482 ole32.dll!* | 519 ole32.dll!* |
| (...skipping 124 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 607 ntdll.dll!RtlpNtOpenKey | 644 ntdll.dll!RtlpNtOpenKey |
| 608 ntdll.dll!RtlMakeSelfRelativeSD | 645 ntdll.dll!RtlMakeSelfRelativeSD |
| 609 ntdll.dll!RtlAbsoluteToSelfRelativeSD | 646 ntdll.dll!RtlAbsoluteToSelfRelativeSD |
| 610 ADVAPI32.dll!MakeSelfRelativeSD | 647 ADVAPI32.dll!MakeSelfRelativeSD |
| 611 | 648 |
| 612 UNINITIALIZED READ | 649 UNINITIALIZED READ |
| 613 name=http://crbug.com/TODO m | 650 name=http://crbug.com/TODO m |
| 614 ... | 651 ... |
| 615 CRYPT32.dll!I_CertSyncStore | 652 CRYPT32.dll!I_CertSyncStore |
| 616 | 653 |
| 617 # This test intentionally leaks an object and checks that it's never deleted | 654 # WTF? |
| 618 LEAK | 655 LEAK |
| 619 name=http://crbug.com/TODO n | 656 name=http://crbug.com/TODO n |
| 620 ... | 657 KERNELBASE.dll!TlsSetValue |
| 621 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody | 658 RSAENH.dll!* |
| 659 RSAENH.dll!* | |
| 660 | |
| 661 # This matches the same stack as DrMem i#751, but it's an uninit read instead of | |
| 662 # a leak. Must be some early thread initialization. Doesn't look like | |
| 663 # bit-level though. | |
| 664 UNINITIALIZED READ | |
| 665 name=http://crbug.com/TODO o | |
| 666 RPCRT4.dll!* | |
| 667 RPCRT4.dll!* | |
| 668 RPCRT4.dll!* | |
| 669 ntdll.dll!* | |
| 670 ntdll.dll!* | |
| 671 KERNEL*.dll!BaseThreadInitThunk | |
| 622 | 672 |
| 623 LEAK | 673 LEAK |
| 624 name=http://crbug.com/109278 video device COM leaks | 674 name=http://crbug.com/109278 video device COM leaks |
| 625 ... | 675 ... |
| 626 *!media::VideoCaptureDevice::* | 676 *!media::VideoCaptureDevice::* |
| 627 | 677 |
| 628 LEAK | 678 LEAK |
| 629 name=http://crbug.com/109278 audio device COM leaks | 679 name=http://crbug.com/109278 audio device COM leaks |
| 630 ... | 680 ... |
| 631 *!GetInputDeviceNamesWin | 681 *!GetInputDeviceNamesWin |
| (...skipping 107 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 739 ntdll.dll!RtlLoadString | 789 ntdll.dll!RtlLoadString |
| 740 | 790 |
| 741 # More bit manip fps | 791 # More bit manip fps |
| 742 UNINITIALIZED READ | 792 UNINITIALIZED READ |
| 743 name=http://code.google.com/p/drmemory/issues/detail?id=493 | 793 name=http://code.google.com/p/drmemory/issues/detail?id=493 |
| 744 USP10.dll!ScriptPositionSingleGlyph | 794 USP10.dll!ScriptPositionSingleGlyph |
| 745 | 795 |
| 746 ############################################################### | 796 ############################################################### |
| 747 # Benign issues in Chromium | 797 # Benign issues in Chromium |
| 748 | 798 |
| 799 # This test intentionally leaks an object and checks that it's never deleted. | |
| 800 LEAK | |
| 801 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak | |
| 802 ... | |
| 803 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody | |
| 804 | |
| 749 LEAK | 805 LEAK |
| 750 name=deliberate histogram leak | 806 name=deliberate histogram leak |
| 751 ... | 807 ... |
| 752 *!operator new* | 808 *!operator new* |
| 753 ... | 809 ... |
| 754 *!*::*Histogram::FactoryGet | 810 *!*::*Histogram::FactoryGet |
| 755 | 811 |
| 756 LEAK | 812 LEAK |
| 757 name=deliberate LazyInstance leak | 813 name=deliberate LazyInstance leak |
| 758 ... | 814 ... |
| (...skipping 72 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 831 *!ssl_InitSessionCacheLocks | 887 *!ssl_InitSessionCacheLocks |
| 832 *!lock_cache | 888 *!lock_cache |
| 833 *!ssl_LookupSID | 889 *!ssl_LookupSID |
| 834 *!ssl2_BeginClientHandshake | 890 *!ssl2_BeginClientHandshake |
| 835 *!ssl_Do1stHandshake | 891 *!ssl_Do1stHandshake |
| 836 *!SSL_ForceHandshake | 892 *!SSL_ForceHandshake |
| 837 *!net::SSL*SocketNSS::DoHandshake | 893 *!net::SSL*SocketNSS::DoHandshake |
| 838 *!net::SSL*SocketNSS::DoHandshakeLoop | 894 *!net::SSL*SocketNSS::DoHandshakeLoop |
| 839 | 895 |
| 840 LEAK | 896 LEAK |
| 841 name=http://crbug.com/74417 | 897 name=http://crbug.com/74417 a |
| 842 *!operator new | 898 *!operator new |
| 843 *!disk_cache::BackendImpl::CreateEntryImpl | 899 *!disk_cache::BackendImpl::CreateEntryImpl |
| 844 | 900 |
| 845 LEAK | 901 LEAK |
| 846 name=http://crbug.com/74425 | 902 name=http://crbug.com/74417 b |
| 847 *!operator new | 903 *!operator new |
| 848 *!disk_cache::BackendImpl::NewEntry | 904 *!disk_cache::BackendImpl::NewEntry |
| 849 | 905 |
| 906 # One more disk_cache::BackendImpl leak. See also http://crbug.com/87500. | |
| 907 LEAK | |
| 908 name=http://crbug.com/74417 c | |
| 909 *!operator new | |
| 910 ... | |
| 911 *!disk_cache::EntryImpl::UserBuffer::UserBuffer | |
| 912 | |
| 850 LEAK | 913 LEAK |
| 851 name=http://crbug.com/75247 | 914 name=http://crbug.com/75247 |
| 852 ... | 915 ... |
| 853 *!operator new | 916 *!operator new |
| 854 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper | 917 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper |
| 855 | 918 |
| 856 LEAK | 919 LEAK |
| 857 name=http://crbug.com/78784 | 920 name=http://crbug.com/78784 |
| 858 *!generic_cpp_alloc | 921 *!generic_cpp_alloc |
| 859 *!operator new | 922 *!operator new |
| (...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 915 ... | 978 ... |
| 916 *!operator new | 979 *!operator new |
| 917 *!views::NativeWidgetWin::OnCreate | 980 *!views::NativeWidgetWin::OnCreate |
| 918 | 981 |
| 919 # Possible real Chromium issue in DoCrossfade. | 982 # Possible real Chromium issue in DoCrossfade. |
| 920 UNINITIALIZED READ | 983 UNINITIALIZED READ |
| 921 name=http://crbug.com/110049 | 984 name=http://crbug.com/110049 |
| 922 *!media::DoCrossfade<*> | 985 *!media::DoCrossfade<*> |
| 923 *!media::Crossfade | 986 *!media::Crossfade |
| 924 *!media::AudioRendererAlgorithmBase::FillBuffer | 987 *!media::AudioRendererAlgorithmBase::FillBuffer |
| 988 | |
| 989 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a | |
| 990 # root? | |
| 991 LEAK | |
| 992 name=http://crbug.com/32624 | |
|
Timur Iskhodzhanov
2012/02/09 10:50:18
Might be worth filing a separate bug if you believ
Reid Kleckner
2012/02/09 15:17:37
Yeah, I think there's some underlying issue. You
| |
| 993 *!PR_Calloc | |
| 994 *!_PR_AttachThread | |
| 995 *!_PRI_AttachThread | |
| OLD | NEW |