Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(229)

Unified Diff: tools/valgrind/drmemory/suppressions_full.txt

Issue 9323045: Suppress all reports from waterfall_drmem.sh. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Drop suppression for leak I fixed in separate CL. Created 8 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | tools/valgrind/test_suppressions.py » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: tools/valgrind/drmemory/suppressions_full.txt
diff --git a/tools/valgrind/drmemory/suppressions_full.txt b/tools/valgrind/drmemory/suppressions_full.txt
index 0073c0e5a63d8f516193ddfa6ce68fdf2407c730..e0bc60b6d934384e77530860eb37dc74059b90ab 100644
--- a/tools/valgrind/drmemory/suppressions_full.txt
+++ b/tools/valgrind/drmemory/suppressions_full.txt
@@ -351,6 +351,13 @@ name=http://code.google.com/p/drmemory/issues/detail?id=412 g
...
*!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
+# We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't
+# have frame pointers, and we have trouble unwinding from it. Therefore, we use
+# this broad suppression, effectively disabling uninit checks in rsaenh.dll.
+UNINITIALIZED READ
+name=http://code.google.com/p/drmemory/issues/detail?id=712 h
Timur Iskhodzhanov 2012/02/09 10:50:18 I prefer to sort the issues by their IDs. Why "h"
Reid Kleckner 2012/02/09 15:17:37 Should be issue 412, and h follows g.
+RSAENH.dll!*
+
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=425 a
CLBCatQ.DLL!DestroyStgDatabase
@@ -438,6 +445,13 @@ iphlpapi.dll!GetPerAdapterInfo
...
iphlpapi.dll!GetAdaptersAddresses
+POSSIBLE LEAK
+name=http://code.google.com/p/drmemory/issues/detail?id=473 c
+RPCRT4.dll!*
+RPCRT4.dll!*
+...
+IPHLPAPI.DLL!GetAdaptersAddresses
+
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=475
...
@@ -447,29 +461,52 @@ CRYPT32.dll!CryptMsgOpenToDecode
...
CRYPT32.dll!CryptQueryObject
+# Lots of leaks from our interactions with the system certificate store. May be
+# worth reviewing our use of their API.
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=476 a
+KERNEL*.dll!LocalAlloc
...
-RPCRT4.dll!RpcBindingFromStringBindingW
-...
-NETAPI32.dll!DsRoleGetPrimaryDomainInformation
+CRYPT32.dll!CertGetCRLContextProperty
+
+LEAK
+name=http://code.google.com/p/drmemory/issues/detail?id=476 b
+KERNEL*.dll!LocalAlloc
...
-USERENV.dll!CreateEnvironmentBlock
+CRYPT32.dll!CertAddCRLContextToStore
+
+LEAK
+name=http://code.google.com/p/drmemory/issues/detail?id=476 c
+KERNEL*.dll!LocalAlloc
...
CRYPT32.dll!CertOpenStore
-...
-CRYPT32.dll!CertCreateCertificateChainEngine
LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=476 b
-KERNEL32.dll!LocalAlloc
+name=http://code.google.com/p/drmemory/issues/detail?id=476 d
+RSAENH.dll!*
...
-CRYPT32.dll!CryptDecodeObjectEx
+CRYPT32.dll!CertGetCertificateChain
+
+LEAK
+name=http://code.google.com/p/drmemory/issues/detail?id=476 e
+RPCRT4.dll!*
...
-CRYPT32.dll!CertGetCRLContextProperty
+CRYPT32.dll!CertGetCertificateChain
+
+LEAK
+name=http://code.google.com/p/drmemory/issues/detail?id=476 f
+KERNELBASE.dll!LocalAlloc
+SETUPAPI.dll!*
...
CRYPT32.dll!CertGetCertificateChain
+LEAK
+name=http://code.google.com/p/drmemory/issues/detail?id=476 g
+RPCRT4.dll!*
+RPCRT4.dll!*
+...
+CRYPT32.dll!CertCompareIntegerBlob
+
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=511 a
RPCRT4.dll!*
@@ -614,11 +651,24 @@ name=http://crbug.com/TODO m
...
CRYPT32.dll!I_CertSyncStore
-# This test intentionally leaks an object and checks that it's never deleted
+# WTF?
LEAK
name=http://crbug.com/TODO n
-...
-*!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
+KERNELBASE.dll!TlsSetValue
+RSAENH.dll!*
+RSAENH.dll!*
+
+# This matches the same stack as DrMem i#751, but it's an uninit read instead of
+# a leak. Must be some early thread initialization. Doesn't look like
+# bit-level though.
+UNINITIALIZED READ
+name=http://crbug.com/TODO o
+RPCRT4.dll!*
+RPCRT4.dll!*
+RPCRT4.dll!*
+ntdll.dll!*
+ntdll.dll!*
+KERNEL*.dll!BaseThreadInitThunk
LEAK
name=http://crbug.com/109278 video device COM leaks
@@ -746,6 +796,12 @@ USP10.dll!ScriptPositionSingleGlyph
###############################################################
# Benign issues in Chromium
+# This test intentionally leaks an object and checks that it's never deleted.
+LEAK
+name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
+...
+*!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
+
LEAK
name=deliberate histogram leak
...
@@ -838,15 +894,22 @@ name=http://crbug.com/70062
*!net::SSL*SocketNSS::DoHandshakeLoop
LEAK
-name=http://crbug.com/74417
+name=http://crbug.com/74417 a
*!operator new
*!disk_cache::BackendImpl::CreateEntryImpl
LEAK
-name=http://crbug.com/74425
+name=http://crbug.com/74417 b
*!operator new
*!disk_cache::BackendImpl::NewEntry
+# One more disk_cache::BackendImpl leak. See also http://crbug.com/87500.
+LEAK
+name=http://crbug.com/74417 c
+*!operator new
+...
+*!disk_cache::EntryImpl::UserBuffer::UserBuffer
+
LEAK
name=http://crbug.com/75247
...
@@ -922,3 +985,11 @@ name=http://crbug.com/110049
*!media::DoCrossfade<*>
*!media::Crossfade
*!media::AudioRendererAlgorithmBase::FillBuffer
+
+# This is an NSS PRThread object installed in TLS. Why isn't this detected as a
+# root?
+LEAK
+name=http://crbug.com/32624
Timur Iskhodzhanov 2012/02/09 10:50:18 Might be worth filing a separate bug if you believ
Reid Kleckner 2012/02/09 15:17:37 Yeah, I think there's some underlying issue. You
+*!PR_Calloc
+*!_PR_AttachThread
+*!_PRI_AttachThread
« no previous file with comments | « no previous file | tools/valgrind/test_suppressions.py » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698