Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(14)

Side by Side Diff: tools/valgrind/drmemory/suppressions_full.txt

Issue 9323045: Suppress all reports from waterfall_drmem.sh. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Drop suppression for leak I fixed in separate CL. Created 8 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | tools/valgrind/test_suppressions.py » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # This file contains suppressions for the Dr.Memory tool, see 1 # This file contains suppressions for the Dr.Memory tool, see
2 # http://dev.chromium.org/developers/how-tos/using-drmemory 2 # http://dev.chromium.org/developers/how-tos/using-drmemory
3 # 3 #
4 # This file should contain suppressions only for the reports happening 4 # This file should contain suppressions only for the reports happening
5 # in the 'full' mode (drmemory_full). 5 # in the 'full' mode (drmemory_full).
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light), 6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
7 # please use suppressions.txt instead. 7 # please use suppressions.txt instead.
8 8
9 ############################################################### 9 ###############################################################
10 # Known reports on the third party we have no control over. 10 # Known reports on the third party we have no control over.
(...skipping 333 matching lines...) Expand 10 before | Expand all | Expand 10 after
344 CRYPT??.dll!Crypt* 344 CRYPT??.dll!Crypt*
345 345
346 UNINITIALIZED READ 346 UNINITIALIZED READ
347 name=http://code.google.com/p/drmemory/issues/detail?id=412 g 347 name=http://code.google.com/p/drmemory/issues/detail?id=412 g
348 *!replace_memcmp 348 *!replace_memcmp
349 ... 349 ...
350 *!testing::internal::CmpHelperEQ* 350 *!testing::internal::CmpHelperEQ*
351 ... 351 ...
352 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody 352 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
353 353
354 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't
355 # have frame pointers, and we have trouble unwinding from it. Therefore, we use
356 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
357 UNINITIALIZED READ
358 name=http://code.google.com/p/drmemory/issues/detail?id=712 h
Timur Iskhodzhanov 2012/02/09 10:50:18 I prefer to sort the issues by their IDs. Why "h"
Reid Kleckner 2012/02/09 15:17:37 Should be issue 412, and h follows g.
359 RSAENH.dll!*
360
354 UNINITIALIZED READ 361 UNINITIALIZED READ
355 name=http://code.google.com/p/drmemory/issues/detail?id=425 a 362 name=http://code.google.com/p/drmemory/issues/detail?id=425 a
356 CLBCatQ.DLL!DestroyStgDatabase 363 CLBCatQ.DLL!DestroyStgDatabase
357 CLBCatQ.DLL!PostError 364 CLBCatQ.DLL!PostError
358 CLBCatQ.DLL!PostError 365 CLBCatQ.DLL!PostError
359 366
360 LEAK 367 LEAK
361 name=http://code.google.com/p/drmemory/issues/detail?id=425 b 368 name=http://code.google.com/p/drmemory/issues/detail?id=425 b
362 RPCRT4.dll!I_RpcBCacheFree 369 RPCRT4.dll!I_RpcBCacheFree
363 RPCRT4.dll!I_RpcBCacheFree 370 RPCRT4.dll!I_RpcBCacheFree
(...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after
431 ESENT.dll!* 438 ESENT.dll!*
432 ntdll.dll!Ldr*Init* 439 ntdll.dll!Ldr*Init*
433 ntdll.dll!Ldr* 440 ntdll.dll!Ldr*
434 ntdll.dll!* 441 ntdll.dll!*
435 ntdll.dll!LdrLoadDll 442 ntdll.dll!LdrLoadDll
436 ... 443 ...
437 iphlpapi.dll!GetPerAdapterInfo 444 iphlpapi.dll!GetPerAdapterInfo
438 ... 445 ...
439 iphlpapi.dll!GetAdaptersAddresses 446 iphlpapi.dll!GetAdaptersAddresses
440 447
448 POSSIBLE LEAK
449 name=http://code.google.com/p/drmemory/issues/detail?id=473 c
450 RPCRT4.dll!*
451 RPCRT4.dll!*
452 ...
453 IPHLPAPI.DLL!GetAdaptersAddresses
454
441 LEAK 455 LEAK
442 name=http://code.google.com/p/drmemory/issues/detail?id=475 456 name=http://code.google.com/p/drmemory/issues/detail?id=475
443 ... 457 ...
444 ADVAPI32.dll!CryptAcquireContextA 458 ADVAPI32.dll!CryptAcquireContextA
445 ... 459 ...
446 CRYPT32.dll!CryptMsgOpenToDecode 460 CRYPT32.dll!CryptMsgOpenToDecode
447 ... 461 ...
448 CRYPT32.dll!CryptQueryObject 462 CRYPT32.dll!CryptQueryObject
449 463
464 # Lots of leaks from our interactions with the system certificate store. May be
465 # worth reviewing our use of their API.
450 LEAK 466 LEAK
451 name=http://code.google.com/p/drmemory/issues/detail?id=476 a 467 name=http://code.google.com/p/drmemory/issues/detail?id=476 a
468 KERNEL*.dll!LocalAlloc
452 ... 469 ...
453 RPCRT4.dll!RpcBindingFromStringBindingW 470 CRYPT32.dll!CertGetCRLContextProperty
454 ...
455 NETAPI32.dll!DsRoleGetPrimaryDomainInformation
456 ...
457 USERENV.dll!CreateEnvironmentBlock
458 ...
459 CRYPT32.dll!CertOpenStore
460 ...
461 CRYPT32.dll!CertCreateCertificateChainEngine
462 471
463 LEAK 472 LEAK
464 name=http://code.google.com/p/drmemory/issues/detail?id=476 b 473 name=http://code.google.com/p/drmemory/issues/detail?id=476 b
465 KERNEL32.dll!LocalAlloc 474 KERNEL*.dll!LocalAlloc
466 ... 475 ...
467 CRYPT32.dll!CryptDecodeObjectEx 476 CRYPT32.dll!CertAddCRLContextToStore
477
478 LEAK
479 name=http://code.google.com/p/drmemory/issues/detail?id=476 c
480 KERNEL*.dll!LocalAlloc
468 ... 481 ...
469 CRYPT32.dll!CertGetCRLContextProperty 482 CRYPT32.dll!CertOpenStore
483
484 LEAK
485 name=http://code.google.com/p/drmemory/issues/detail?id=476 d
486 RSAENH.dll!*
470 ... 487 ...
471 CRYPT32.dll!CertGetCertificateChain 488 CRYPT32.dll!CertGetCertificateChain
472 489
490 LEAK
491 name=http://code.google.com/p/drmemory/issues/detail?id=476 e
492 RPCRT4.dll!*
493 ...
494 CRYPT32.dll!CertGetCertificateChain
495
496 LEAK
497 name=http://code.google.com/p/drmemory/issues/detail?id=476 f
498 KERNELBASE.dll!LocalAlloc
499 SETUPAPI.dll!*
500 ...
501 CRYPT32.dll!CertGetCertificateChain
502
503 LEAK
504 name=http://code.google.com/p/drmemory/issues/detail?id=476 g
505 RPCRT4.dll!*
506 RPCRT4.dll!*
507 ...
508 CRYPT32.dll!CertCompareIntegerBlob
509
473 UNINITIALIZED READ 510 UNINITIALIZED READ
474 name=http://code.google.com/p/drmemory/issues/detail?id=511 a 511 name=http://code.google.com/p/drmemory/issues/detail?id=511 a
475 RPCRT4.dll!* 512 RPCRT4.dll!*
476 ... 513 ...
477 RPCRT4.dll!UuidCreate 514 RPCRT4.dll!UuidCreate
478 ole32.dll!* 515 ole32.dll!*
479 516
480 UNINITIALIZED READ 517 UNINITIALIZED READ
481 name=http://code.google.com/p/drmemory/issues/detail?id=511 b 518 name=http://code.google.com/p/drmemory/issues/detail?id=511 b
482 ole32.dll!* 519 ole32.dll!*
(...skipping 124 matching lines...) Expand 10 before | Expand all | Expand 10 after
607 ntdll.dll!RtlpNtOpenKey 644 ntdll.dll!RtlpNtOpenKey
608 ntdll.dll!RtlMakeSelfRelativeSD 645 ntdll.dll!RtlMakeSelfRelativeSD
609 ntdll.dll!RtlAbsoluteToSelfRelativeSD 646 ntdll.dll!RtlAbsoluteToSelfRelativeSD
610 ADVAPI32.dll!MakeSelfRelativeSD 647 ADVAPI32.dll!MakeSelfRelativeSD
611 648
612 UNINITIALIZED READ 649 UNINITIALIZED READ
613 name=http://crbug.com/TODO m 650 name=http://crbug.com/TODO m
614 ... 651 ...
615 CRYPT32.dll!I_CertSyncStore 652 CRYPT32.dll!I_CertSyncStore
616 653
617 # This test intentionally leaks an object and checks that it's never deleted 654 # WTF?
618 LEAK 655 LEAK
619 name=http://crbug.com/TODO n 656 name=http://crbug.com/TODO n
620 ... 657 KERNELBASE.dll!TlsSetValue
621 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody 658 RSAENH.dll!*
659 RSAENH.dll!*
660
661 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
662 # a leak. Must be some early thread initialization. Doesn't look like
663 # bit-level though.
664 UNINITIALIZED READ
665 name=http://crbug.com/TODO o
666 RPCRT4.dll!*
667 RPCRT4.dll!*
668 RPCRT4.dll!*
669 ntdll.dll!*
670 ntdll.dll!*
671 KERNEL*.dll!BaseThreadInitThunk
622 672
623 LEAK 673 LEAK
624 name=http://crbug.com/109278 video device COM leaks 674 name=http://crbug.com/109278 video device COM leaks
625 ... 675 ...
626 *!media::VideoCaptureDevice::* 676 *!media::VideoCaptureDevice::*
627 677
628 LEAK 678 LEAK
629 name=http://crbug.com/109278 audio device COM leaks 679 name=http://crbug.com/109278 audio device COM leaks
630 ... 680 ...
631 *!GetInputDeviceNamesWin 681 *!GetInputDeviceNamesWin
(...skipping 107 matching lines...) Expand 10 before | Expand all | Expand 10 after
739 ntdll.dll!RtlLoadString 789 ntdll.dll!RtlLoadString
740 790
741 # More bit manip fps 791 # More bit manip fps
742 UNINITIALIZED READ 792 UNINITIALIZED READ
743 name=http://code.google.com/p/drmemory/issues/detail?id=493 793 name=http://code.google.com/p/drmemory/issues/detail?id=493
744 USP10.dll!ScriptPositionSingleGlyph 794 USP10.dll!ScriptPositionSingleGlyph
745 795
746 ############################################################### 796 ###############################################################
747 # Benign issues in Chromium 797 # Benign issues in Chromium
748 798
799 # This test intentionally leaks an object and checks that it's never deleted.
800 LEAK
801 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
802 ...
803 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
804
749 LEAK 805 LEAK
750 name=deliberate histogram leak 806 name=deliberate histogram leak
751 ... 807 ...
752 *!operator new* 808 *!operator new*
753 ... 809 ...
754 *!*::*Histogram::FactoryGet 810 *!*::*Histogram::FactoryGet
755 811
756 LEAK 812 LEAK
757 name=deliberate LazyInstance leak 813 name=deliberate LazyInstance leak
758 ... 814 ...
(...skipping 72 matching lines...) Expand 10 before | Expand all | Expand 10 after
831 *!ssl_InitSessionCacheLocks 887 *!ssl_InitSessionCacheLocks
832 *!lock_cache 888 *!lock_cache
833 *!ssl_LookupSID 889 *!ssl_LookupSID
834 *!ssl2_BeginClientHandshake 890 *!ssl2_BeginClientHandshake
835 *!ssl_Do1stHandshake 891 *!ssl_Do1stHandshake
836 *!SSL_ForceHandshake 892 *!SSL_ForceHandshake
837 *!net::SSL*SocketNSS::DoHandshake 893 *!net::SSL*SocketNSS::DoHandshake
838 *!net::SSL*SocketNSS::DoHandshakeLoop 894 *!net::SSL*SocketNSS::DoHandshakeLoop
839 895
840 LEAK 896 LEAK
841 name=http://crbug.com/74417 897 name=http://crbug.com/74417 a
842 *!operator new 898 *!operator new
843 *!disk_cache::BackendImpl::CreateEntryImpl 899 *!disk_cache::BackendImpl::CreateEntryImpl
844 900
845 LEAK 901 LEAK
846 name=http://crbug.com/74425 902 name=http://crbug.com/74417 b
847 *!operator new 903 *!operator new
848 *!disk_cache::BackendImpl::NewEntry 904 *!disk_cache::BackendImpl::NewEntry
849 905
906 # One more disk_cache::BackendImpl leak. See also http://crbug.com/87500.
907 LEAK
908 name=http://crbug.com/74417 c
909 *!operator new
910 ...
911 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
912
850 LEAK 913 LEAK
851 name=http://crbug.com/75247 914 name=http://crbug.com/75247
852 ... 915 ...
853 *!operator new 916 *!operator new
854 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper 917 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
855 918
856 LEAK 919 LEAK
857 name=http://crbug.com/78784 920 name=http://crbug.com/78784
858 *!generic_cpp_alloc 921 *!generic_cpp_alloc
859 *!operator new 922 *!operator new
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after
915 ... 978 ...
916 *!operator new 979 *!operator new
917 *!views::NativeWidgetWin::OnCreate 980 *!views::NativeWidgetWin::OnCreate
918 981
919 # Possible real Chromium issue in DoCrossfade. 982 # Possible real Chromium issue in DoCrossfade.
920 UNINITIALIZED READ 983 UNINITIALIZED READ
921 name=http://crbug.com/110049 984 name=http://crbug.com/110049
922 *!media::DoCrossfade<*> 985 *!media::DoCrossfade<*>
923 *!media::Crossfade 986 *!media::Crossfade
924 *!media::AudioRendererAlgorithmBase::FillBuffer 987 *!media::AudioRendererAlgorithmBase::FillBuffer
988
989 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a
990 # root?
991 LEAK
992 name=http://crbug.com/32624
Timur Iskhodzhanov 2012/02/09 10:50:18 Might be worth filing a separate bug if you believ
Reid Kleckner 2012/02/09 15:17:37 Yeah, I think there's some underlying issue. You
993 *!PR_Calloc
994 *!_PR_AttachThread
995 *!_PRI_AttachThread
OLDNEW
« no previous file with comments | « no previous file | tools/valgrind/test_suppressions.py » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698