A newer version of this document is available. Customers should click here to go to the newest version.
Third-party Suppression Files
The command line interface convert-suppression-file action converts suppression files from the following products to the current Intel Inspector suppression file format:
Third-party software
IBM Rational* PurifyPlus* suppression files (Linux* OS only)
Valgrind* suppression files (Linux OS only)
Previous versions of the Intel Inspector suppression files (Linux and Windows* OS)
During conversion, the Intel Inspector:
- Reads the suppression file to internal structures.
 - Converts third-party product messages/errors to Intel Inspector problem types.
 - Skips suppression rules that cannot be converted.
 - Writes the converted data to an Intel Inspector suppression file.
 - Reports all errors encountered during processing.
 
Even with a completely successful conversion, you may still need to fine-tune the contents of the converted suppression file using a text editor.
PurifyPlus Message to Intel Inspector Problem Type Mapping
PurifyPlus messages map to Intel Inspector problem Types in the following manner during conversion:
PurifyPlus Message  |  
        Message Description  |  
        Intel Inspector Analog  |  
       
|---|---|---|
ABR  |  
        Array Bounds Read  |  
        invalid_memory_access  |  
       
ABW  |  
        Array Bounds Write  |  
        invalid_memory_access  |  
       
ABWL  |  
        Late Array Bounds Write  |  
        invalid_memory_access  |  
       
BRK  |  
        Misuse of BRK or SBRK (Using BRK or SBRK directly to allocate memory)  |  
        None  |  
       
BSR  |  
        Beyond Stack Read  |  
        invalid_memory_access  |  
       
BSW  |  
        Beyond Stack Write  |  
        invalid_memory_access  |  
       
COR  |  
        Core Dump Imminent  |  
        None  |  
       
FFM  |  
        Freeing Freed Memory  |  
        invalid_deallocation  |  
       
FIM  |  
        Freeing Invalid Memory  |  
        invalid_deallocation  |  
       
FIU  |  
        File Descriptors In Use  |  
        None  |  
       
FMM  |  
        Freeing Mismatched Memory  |  
        invalid_deallocation  |  
       
FMR  |  
        Free Memory Read (Read from heap memory that has already been freed)  |  
        invalid_memory_access  |  
       
FMW  |  
        Free Memory Write (Write to heap memory that has already been freed)  |  
        invalid_memory_access  |  
       
FMWL  |  
        Free Memory Write Late (Write to heap memory that has already been freed)  |  
        invalid_memory_access  |  
       
FNH  |  
        Freeing Non Heap Memory  |  
        invalid_deallocation  |  
       
FUM  |  
        Freeing Unallocated Memory  |  
        invalid_deallocation  |  
       
IPR  |  
        Invalid Pointer Read  |  
        invalid_memory_access  |  
       
IPW  |  
        Invalid Pointer Write  |  
        invalid_memory_access  |  
       
MAF  |  
        Malloc Failure  |  
        None  |  
       
MIU  |  
        Memory In-Use  |  
        None  |  
       
MLK  |  
        Memory Leak  |  
        unreachable_memory_leak  |  
       
MRE  |  
        Malloc Reentrancy Error  |  
        Not applicable  |  
       
MSE  |  
        Memory Segment Error  |  
        invalid_memory_access  |  
       
NPR  |  
        Null Pointer Read (SEGV signal)  |  
        invalid_memory_access  |  
       
NPW  |  
        Null Pointer Write (SEGV signal)  |  
        invalid_memory_access  |  
       
PAR  |  
        Bad Parameter  |  
        Not applicable  |  
       
PLK  |  
        Potential Memory Leak - Heap memory that potentially might be leaked (program has pointers only to the middle of the region)  |  
        Not applicable  |  
       
SBR  |  
        Stack Array Bounds Read (concerns local variables) - Only generated on SPARC; not on Linux* or Windows* OS  |  
        None  |  
       
SBW  |  
        Stack Array Bounds Write (concerns local variables) - Only generated on SPARC; not on Linux or Windows OS  |  
        None  |  
       
SIG  |  
        Signal  |  
        None  |  
       
SOF  |  
        Stack Overflow  |  
        None  |  
       
UMC  |  
        Uninitialized Memory Copy  |  
        uninitialized_memory_access  |  
       
UMR  |  
        Uninitialized Memory Read  |  
        uninitialized_memory_access  |  
       
WPF  |  
        Watchpoint Free  |  
        Not applicable  |  
       
WPM  |  
        Watchpoint Malloc  |  
        Not applicable  |  
       
WPN  |  
        Watchpoint Entry  |  
        Not applicable  |  
       
WPR  |  
        Watchpoint Read  |  
        Not applicable  |  
       
WPW  |  
        Watchpoint Write  |  
        Not applicable  |  
       
WPX  |  
        Watchpoint Exit  |  
        Not applicable  |  
       
ZPR  |  
        Zero Page Read (read from a bad pointer)  |  
        invalid_memory_access  |  
       
ZPW  |  
        Zero Page Write (write to a bad pointer)  |  
        invalid_memory_access  |  
       
Valgrind Error to Intel Inspector Problem Type Mapping
Valgrind errors map to Intel Inspector problem Types in the following manner during conversion:
Valgrind Error  |  
        Problem Description  |  
        Intel Inspector Analog  |  
       
|---|---|---|
AddrN  |  
        Invalid memory access  |  
        invalid_memory_access  |  
       
ValueN  |  
        Uninitialized memory access  |  
        uninitialized_memory_access  |  
       
Cond  |  
        Use of an uninitialized CPU condition code  |  
        Not applicable  |  
       
Jump  |  
        Jump to an unaddressable location error  |  
        Not applicable  |  
       
Param  |  
        Invalid system call parameter error  |  
        invalid_call  |  
       
Overlap  |  
        Src/dest overlap in memcpy or similar function  |  
        invalid_call  |  
       
Free  |  
        Freeing error or mismatched deallocation  |  
        invalid_deallocation, mismatched_deallocation, invalid_deallocation_mapped  |  
       
Leak  |  
        Memory leak  |  
        unreachable_memory_leak  |  
       
Valgrind software detects uninitialized memory problems differently than the Intel Inspector. This difference impacts the stacks each product detects, which impacts the corresponding suppression files.