1 # This file contains suppressions for the Dr.Memory tool, see 2 # http://dev.chromium.org/developers/how-tos/using-drmemory 3 # 4 # This file should contain suppressions only for the reports happening 5 # in the 'full' mode (drmemory_full). 6 # For the reports that can happen in the light mode (a.k.a. drmemory_light), 7 # please use suppressions.txt instead. 8 9 ############################################################### 10 # Known reports on the third party we have no control over. 11 UNINITIALIZED READ 12 name=deflate UNINIT 13 ... 14 *!deflate_* 15 *!MOZ_Z_deflate 16 17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. 18 LEAK 19 name=http://code.google.com/p/drmemory/issues/detail?id=406 20 ADVAPI32.dll!WmiOpenBlock 21 ADVAPI32.dll!WmiOpenBlock 22 23 # Leaks inside GoogleDesktop - it injects into our processes for some reason 24 LEAK 25 name=GoogleDesktop LEAK 26 ... 27 GoogleDesktopNetwork3.DLL!DllUnregisterServer 28 29 # They deliberately use uninit local var in sqlite random generator 30 UNINITIALIZED READ 31 name=sqlite3_randomness UNINIT 32 *!randomByte 33 *!sqlite3_randomness 34 35 # Intentional leak in WebKit Template Framework for ThreadData. 36 LEAK 37 name=intentional WTF ThreadData leak 38 ... 39 *!WTF::wtfThreadData 40 41 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT. 42 LEAK 43 name=http://crbug.com/125558 a 44 KERNELBASE.dll!LocalAlloc 45 SECHOST.dll!... 46 SECHOST.dll!NotifyServiceStatusChange 47 WINHTTP.dll!... 48 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl 49 *!net::ProxyResolverWinHttp::GetProxyForURL 50 51 # Tiny locale-related leaks in ntdll. Probably system bug. 52 LEAK 53 name=http://crbug.com/125558 b 54 ntdll.dll!... 55 ntdll.dll!* 56 KERNELBASE.dll!... 57 KERNELBASE.dll!GetCPInfoExW 58 webio.dll!* 59 webio.dll!* 60 webio.dll!* 61 WINHTTP.dll!... 62 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser 63 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig 64 65 ############################################################### 66 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis 67 # assumptions or unhandled syscalls 68 69 # Please note: the following suppressions were written in the abscense of 70 # private symbols so may need to be updated when we switch to auto-loading PDBs 71 UNINITIALIZED READ 72 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1) 73 ntdll.dll!Rtl* 74 ntdll.dll!Rtl* 75 ntdll.dll!RtlFindActivationContextSectionString 76 77 UNINITIALIZED READ 78 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2) 79 ... 80 SHELL32.dll!SHFileOperation* 81 82 UNINITIALIZED READ 83 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3) 84 ... 85 SHELL32.dll!SHGetFolderPath* 86 87 LEAK 88 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4) 89 ... 90 SHELL32.dll!SHGetFolderPath* 91 92 UNINITIALIZED READ 93 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5) 94 ... 95 SHELL32.dll!SHCreateDirectory* 96 97 UNINITIALIZED READ 98 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6) 99 ... 100 SHELL32.dll!ILLoadFromStream* 101 102 UNINITIALIZED READ 103 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7) 104 ... 105 SHELL32.dll!ILSaveToStream* 106 107 LEAK 108 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8) 109 ... 110 SHELL32.dll!SHFileOperation* 111 112 UNINITIALIZED READ 113 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9) 114 ... 115 SHELL32.dll!SHGetItemFromDataObject 116 117 LEAK 118 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10) 119 ... 120 SHELL32.dll!SHGetItemFromDataObject 121 122 LEAK 123 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11) 124 ... 125 ole32.dll!* 126 SHELL32.dll!SHChangeNotifySuspendResume 127 128 UNINITIALIZED READ 129 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1) 130 ... 131 *!CreateProcess* 132 133 LEAK 134 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2) 135 ... 136 *!CreateProcess* 137 138 UNINITIALIZED READ 139 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3) 140 ... 141 *!base::LaunchApp* 142 143 UNINITIALIZED READ 144 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1) 145 ... 146 *!CreateWindow* 147 148 POSSIBLE LEAK 149 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2) 150 GDI32.dll!* 151 GDI32.dll!CreateFontIndirectExW 152 GDI32.dll!CreateFontIndirectW 153 154 LEAK 155 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3) 156 KERNELBASE.dll!LocalAlloc 157 ... 158 USER32.dll!CreateWindow* 159 160 UNINITIALIZED READ 161 name=http://code.google.com/p/drmemory/issues/detail?id=18 a 162 ... 163 *!CoInitialize* 164 165 UNINITIALIZED READ 166 name=http://code.google.com/p/drmemory/issues/detail?id=18 b 167 ... 168 *!CoCreateInstance* 169 170 UNINITIALIZED READ 171 name=http://code.google.com/p/drmemory/issues/detail?id=18 c 172 ... 173 *!CoUninitialize* 174 175 UNINITIALIZED READ 176 name=http://code.google.com/p/drmemory/issues/detail?id=18 d 177 ... 178 UxTheme.dll!* 179 180 UNINITIALIZED READ 181 name=http://code.google.com/p/drmemory/issues/detail?id=40 a 182 ... 183 WINSPOOL.DRV!* 184 185 LEAK 186 name=http://code.google.com/p/drmemory/issues/detail?id=40 b 187 ... 188 WINSPOOL.DRV!* 189 190 UNINITIALIZED READ 191 name=http://code.google.com/p/drmemory/issues/detail?id=48 a 192 system call NtContinue 193 ... 194 *!*SetThreadName 195 196 UNINITIALIZED READ 197 name=http://code.google.com/p/drmemory/issues/detail?id=48 b 198 system call NtContinue 199 *!WTF::initializeCurrentThreadInternal 200 201 UNINITIALIZED READ 202 name=http://code.google.com/p/drmemory/issues/detail?id=52 a 203 ... 204 DBGHELP.dll!SymInitialize 205 206 UNINITIALIZED READ 207 name=http://code.google.com/p/drmemory/issues/detail?id=52 b 208 ... 209 DBGHELP.dll!SymEnumSourceFiles 210 211 UNINITIALIZED READ 212 name=http://code.google.com/p/drmemory/issues/detail?id=52 c 213 ... 214 msvcrt.dll!_RTDynamicCast 215 216 UNINITIALIZED READ 217 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp 218 instruction=test 0x*(%*) $0x?? 219 DBGHELP.dll!SymUnloadModule64 220 221 UNINITIALIZED READ 222 name=http://code.google.com/p/drmemory/issues/detail?id=53 223 ADVAPI32.dll!WmiMofEnumerateResourcesA 224 ADVAPI32.dll!WmiMofEnumerateResourcesA 225 ADVAPI32.dll!Sta*TraceW 226 227 UNINITIALIZED READ 228 name=http://code.google.com/p/drmemory/issues/detail?id=58 229 ... 230 *!_cfltcvt_l 231 232 UNINITIALIZED READ 233 name=http://code.google.com/p/drmemory/issues/detail?id=60 234 USP10.dll!* 235 ... 236 USP10.dll!ScriptStringAnalyse 237 238 LEAK 239 IMM32.dll!ImmGetIMCCSize 240 IMM32.dll!ImmLockClientImc 241 IMM32.dll!ImmDisableIME 242 IMM32.dll!ImmSetActiveContext 243 USER32.dll!IMPSetIMEA 244 245 UNINITIALIZED READ 246 name=http://code.google.com/p/drmemory/issues/detail?id=65 a 247 ... 248 *!SystemFunction036 249 250 UNINITIALIZED READ 251 name=http://code.google.com/p/drmemory/issues/detail?id=65 b 252 ... 253 *!talk_base::CreateRandomString 254 255 UNINITIALIZED READ 256 name=http://code.google.com/p/drmemory/issues/detail?id=68 a 257 ... 258 WS2_32.dll!* 259 260 UNINITIALIZED READ 261 name=http://code.google.com/p/drmemory/issues/detail?id=68 b 262 ... 263 ADVAPI32.dll!SetSecurityDescriptorDacl 264 265 UNINITIALIZED READ 266 name=http://code.google.com/p/drmemory/issues/detail?id=68 c 267 ... 268 MSWSOCK.dll!WSPStartup 269 270 UNINITIALIZED READ 271 name=http://code.google.com/p/drmemory/issues/detail?id=68 d 272 ... 273 ntdll.dll!RtlValidateUnicodeString 274 275 LEAK 276 name=http://code.google.com/p/drmemory/issues/detail?id=256 277 *!_mtinit 278 *!__tmainCRTStartup 279 *!mainCRTStartup 280 281 POSSIBLE LEAK 282 name=http://code.google.com/p/drmemory/issues/detail?id=274 a 283 ... 284 GDI32.dll!CreateDCW 285 286 LEAK 287 name=http://code.google.com/p/drmemory/issues/detail?id=274 b 288 ... 289 GDI32.dll!CreateDCW 290 291 LEAK 292 name=http://code.google.com/p/drmemory/issues/detail?id=275 293 ... 294 *!_getptd* 295 296 UNINITIALIZED READ 297 name=http://code.google.com/p/drmemory/issues/detail?id=276 298 ... 299 ntdll.dll!RtlConvertUlongToLargeInteger 300 ntdll.dll!RtlConvertUlongToLargeInteger 301 ntdll.dll!KiUserExceptionDispatcher 302 303 LEAK 304 name=http://code.google.com/p/drmemory/issues/detail?id=305 305 *!free 306 *!free 307 *!operator new 308 ... 309 *!MiniDumpWriteDump 310 311 UNINITIALIZED READ 312 name=http://code.google.com/p/drmemory/issues/detail?id=346 a 313 ... 314 GDI32.dll!CloseEnhMetaFile 315 316 UNINITIALIZED READ 317 name=http://code.google.com/p/drmemory/issues/detail?id=346 b 318 GDI32.dll!SetPolyFillMode 319 GDI32.dll!CreateICW 320 321 UNINITIALIZED READ 322 name=http://code.google.com/p/drmemory/issues/detail?id=362 323 USER32.dll!UnregisterClass* 324 325 LEAK 326 name=http://code.google.com/p/drmemory/issues/detail?id=382 327 ... 328 ntdll.dll!CsrNewThread 329 330 UNINITIALIZED READ 331 name=http://code.google.com/p/drmemory/issues/detail?id=397 332 system call NtDeviceIoControlFile InputBuffer 333 ADVAPI32.dll!ImpersonateAnonymousToken 334 335 UNINITIALIZED READ 336 name=http://code.google.com/p/drmemory/issues/detail?id=407 a 337 system call NtRequestWaitReplyPort 338 RPCRT4.dll!I_RpcSendReceive 339 RPCRT4.dll!NdrSendReceive 340 341 UNINITIALIZED READ 342 name=http://code.google.com/p/drmemory/issues/detail?id=407 b 343 IMM32.dll!* 344 ntdll.dll!LdrInitializeThunk 345 ntdll.dll!LdrShutdownThread 346 347 UNINITIALIZED READ 348 name=http://code.google.com/p/drmemory/issues/detail?id=412 a 349 ADVAPI32.dll!RegDeleteValue* 350 351 UNINITIALIZED READ 352 name=http://code.google.com/p/drmemory/issues/detail?id=412 b 353 ... 354 ADVAPI32.dll!Crypt* 355 356 UNINITIALIZED READ 357 name=http://code.google.com/p/drmemory/issues/detail?id=412 c 358 ... 359 RPCRT4.dll!NdrClientCall2 360 361 LEAK 362 name=http://code.google.com/p/drmemory/issues/detail?id=412 d 363 RSAENH.dll!DllUnregisterServer 364 ... 365 ADVAPI32.dll!CryptAcquireContextA 366 CRYPT32.dll!CryptEnumOIDFunction 367 ... 368 CRYPT32.dll!CertFindCertificateInStore 369 370 UNINITIALIZED READ 371 name=http://code.google.com/p/drmemory/issues/detail?id=412 e 372 ... 373 RSAENH.dll!CPGenRandom 374 375 UNINITIALIZED READ 376 name=http://code.google.com/p/drmemory/issues/detail?id=412 f 377 ... 378 CRYPT??.dll!Crypt* 379 380 UNINITIALIZED READ 381 name=http://code.google.com/p/drmemory/issues/detail?id=412 g 382 *!replace_memcmp 383 ... 384 *!testing::internal::CmpHelperEQ* 385 ... 386 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody 387 388 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't 389 # have frame pointers, and we have trouble unwinding from it. Therefore, we use 390 # this broad suppression, effectively disabling uninit checks in rsaenh.dll. 391 UNINITIALIZED READ 392 name=http://code.google.com/p/drmemory/issues/detail?id=412 h 393 RSAENH.dll!* 394 395 UNINITIALIZED READ 396 name=http://code.google.com/p/drmemory/issues/detail?id=425 a 397 CLBCatQ.DLL!DestroyStgDatabase 398 CLBCatQ.DLL!PostError 399 CLBCatQ.DLL!PostError 400 401 LEAK 402 name=http://code.google.com/p/drmemory/issues/detail?id=425 b 403 RPCRT4.dll!I_RpcBCacheFree 404 RPCRT4.dll!I_RpcBCacheFree 405 ... 406 RPCRT4.dll!NdrClientCall2 407 408 UNINITIALIZED READ 409 name=http://code.google.com/p/drmemory/issues/detail?id=425 c 410 msdmo.dll!* 411 msdmo.dll!* 412 DEVENUM.DLL!* 413 414 UNINITIALIZED READ 415 name=http://code.google.com/p/drmemory/issues/detail?id=435 a 416 ... 417 ntdll.dll!RtlSetSecurityObject 418 ntdll.dll!RtlNewSecurityObjectEx 419 ADVAPI32.dll!CreatePrivateObjectSecurityEx 420 NTMARTA.dll!AccRewriteSetNamedRights 421 422 POSSIBLE LEAK 423 name=http://code.google.com/p/drmemory/issues/detail?id=435 b 424 WLDAP32.dll!Ordinal325 425 ... 426 WLDAP32.dll!Ordinal325 427 ntdll.dll!LdrInitializeThunk 428 ntdll.dll!LdrFindResourceDirectory_U 429 ntdll.dll!RtlValidateUnicodeString 430 ntdll.dll!LdrLoadDll 431 KERNEL32.dll!LoadLibraryExW 432 433 # mod+offs suppression because the symbolic makes no sense and changes 434 # completely in the presence of WS2_32.dll symbols. 435 LEAK 436 name=http://code.google.com/p/drmemory/issues/detail?id=438 437 <WS2_32.dll+0x260c> 438 <WS2_32.dll+0x2b76> 439 <WS2_32.dll+0x2c61> 440 441 UNINITIALIZED READ 442 name=http://code.google.com/p/drmemory/issues/detail?id=454 a 443 ... 444 WINMM.dll!wave*GetNumDevs 445 446 LEAK 447 name=http://code.google.com/p/drmemory/issues/detail?id=454 b 448 ... 449 WINMM.dll!wave*GetNumDevs 450 451 LEAK 452 name=http://code.google.com/p/drmemory/issues/detail?id=466 453 ntdll.dll!RtlRunOnceBeginInitialize 454 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount 455 456 UNINITIALIZED READ 457 name=http://code.google.com/p/drmemory/issues/detail?id=471 a 458 *!media::AudioRendererAlgorithmOLA::Crossfade<unsigned char> 459 *!media::AudioRendererAlgorithmOLA::FillBuffer 460 *!media::AudioRendererAlgorithmOLATest_FillBuffer_* 461 462 # Uninit reported in copy ctor. Would be nice if we could specify which ctor 463 # overload to suppress. 464 UNINITIALIZED READ 465 name=http://code.google.com/p/drmemory/issues/detail?id=471 b 466 *!WebCore::FormDataElement::FormDataElement 467 468 # Another default copy ctor uninit. 469 UNINITIALIZED READ 470 name=http://code.google.com/p/drmemory/issues/detail?id=471 c 471 *!WebCore::CachedResourceLoader::InitiatorInfo::InitiatorInfo 472 ... 473 *!WTF::Hash* 474 475 UNINITIALIZED READ 476 name=http://code.google.com/p/drmemory/issues/detail?id=473 a 477 system call NtDeviceIoControlFile InputBuffer 478 ... 479 iphlpapi.dll!GetAdaptersAddresses 480 481 POSSIBLE LEAK 482 name=http://code.google.com/p/drmemory/issues/detail?id=473 b 483 ESENT.dll!* 484 ESENT.dll!* 485 ESENT.dll!* 486 ntdll.dll!Ldr*Init* 487 ntdll.dll!Ldr* 488 ntdll.dll!* 489 ntdll.dll!LdrLoadDll 490 ... 491 iphlpapi.dll!GetPerAdapterInfo 492 ... 493 iphlpapi.dll!GetAdaptersAddresses 494 495 POSSIBLE LEAK 496 name=http://code.google.com/p/drmemory/issues/detail?id=473 c 497 RPCRT4.dll!* 498 RPCRT4.dll!* 499 ... 500 IPHLPAPI.DLL!GetAdaptersAddresses 501 502 LEAK 503 name=http://code.google.com/p/drmemory/issues/detail?id=475 504 ... 505 ADVAPI32.dll!CryptAcquireContextA 506 ... 507 CRYPT32.dll!CryptMsgOpenToDecode 508 ... 509 CRYPT32.dll!CryptQueryObject 510 511 # Lots of leaks from our interactions with the system certificate store. May be 512 # worth reviewing our use of their API. 513 LEAK 514 name=http://code.google.com/p/drmemory/issues/detail?id=476 a 515 KERNEL*.dll!LocalAlloc 516 ... 517 CRYPT32.dll!CertGetCRLContextProperty 518 519 LEAK 520 name=http://code.google.com/p/drmemory/issues/detail?id=476 b 521 KERNEL*.dll!LocalAlloc 522 ... 523 CRYPT32.dll!CertAddCRLContextToStore 524 525 LEAK 526 name=http://code.google.com/p/drmemory/issues/detail?id=476 c 527 KERNEL*.dll!LocalAlloc 528 ... 529 CRYPT32.dll!CertOpenStore 530 531 LEAK 532 name=http://code.google.com/p/drmemory/issues/detail?id=476 d 533 ... 534 CRYPT32.dll!CertOpenSystemStore? 535 536 LEAK 537 name=http://code.google.com/p/drmemory/issues/detail?id=476 e 538 ... 539 CRYPT32.dll!CertGetCertificateChain 540 541 LEAK 542 name=http://code.google.com/p/drmemory/issues/detail?id=476 f 543 ... 544 CRYPT32.dll!CertCompareIntegerBlob 545 546 LEAK 547 name=http://code.google.com/p/drmemory/issues/detail?id=476 g 548 ... 549 CRYPT32.dll!CryptUnprotectData 550 551 LEAK 552 name=http://code.google.com/p/drmemory/issues/detail?id=476 h 553 KERNEL*.dll!LocalAlloc 554 ... 555 CRYPT32.dll!CertEnumCertificatesInStore 556 557 LEAK 558 name=http://code.google.com/p/drmemory/issues/detail?id=476 i 559 ... 560 CRYPT32.dll!CryptProtectData 561 562 LEAK 563 name=http://code.google.com/p/drmemory/issues/detail?id=476 j 564 ... 565 CRYPT32.dll!CryptExportPublicKeyInfoEx 566 567 UNINITIALIZED READ 568 name=http://code.google.com/p/drmemory/issues/detail?id=502 a 569 system call NtSecureConnectPort parameter #3 570 GDI32.dll!* 571 GDI32.dll!* 572 573 UNINITIALIZED READ 574 name=http://code.google.com/p/drmemory/issues/detail?id=502 b 575 system call NtGdiEnumFonts parameter #6 576 GDI32.dll!* 577 GDI32.dll!* 578 579 UNINITIALIZED READ 580 name=http://code.google.com/p/drmemory/issues/detail?id=511 a 581 RPCRT4.dll!... 582 ole32.dll!* 583 584 UNINITIALIZED READ 585 name=http://code.google.com/p/drmemory/issues/detail?id=511 b 586 ole32.dll!* 587 ole32.dll!* 588 ole32.dll!StringFromGUID2 589 590 UNINITIALIZED READ 591 name=http://code.google.com/p/drmemory/issues/detail?id=512 a 592 ... 593 *!browser_sync::Cryptographer::PackBootstrapToken 594 *!browser_sync::Cryptographer::GetBootstrapToken 595 596 UNINITIALIZED READ 597 name=http://code.google.com/p/drmemory/issues/detail?id=512 b 598 ... 599 *!Encrypt* 600 601 UNINITIALIZED READ 602 name=http://code.google.com/p/drmemory/issues/detail?id=513 a 603 *!v8* 604 605 UNINITIALIZED READ 606 name=http://code.google.com/p/drmemory/issues/detail?id=513 b 607 *!* 608 *!v8* 609 610 UNINITIALIZED READ 611 name=http://code.google.com/p/drmemory/issues/detail?id=513 c 612 <not in a module> 613 ... 614 *!v8* 615 616 UNINITIALIZED READ 617 name=http://code.google.com/p/drmemory/issues/detail?id=546 618 ... 619 mscms.dll!* 620 ... 621 GDI32.dll!* 622 *!IconUtil::Create*HICON* 623 624 LEAK 625 name=http://crbug.com/92152 626 ... 627 USER32.dll!CreateWindowExW 628 *!views::TooltipManagerWin::Init 629 *!views::TooltipManagerWin::TooltipManagerWin 630 631 UNINITIALIZED READ 632 name=http://code.google.com/p/drmemory/issues/detail?id=567 a 633 dbghelp.dll!* 634 ... 635 dbghelp.dll!StackWalk64 636 637 LEAK 638 name=http://code.google.com/p/drmemory/issues/detail?id=567 b 639 *!* 640 dbghelp.dll!* 641 ... 642 dbghelp.dll!StackWalk64 643 644 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and 645 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too 646 # brittle, so we switched to RPCRT4.dll!*. 647 LEAK 648 name=http://code.google.com/p/drmemory/issues/detail?id=569 649 RPCRT4.dll!... 650 ntdll.dll!* 651 ntdll.dll!* 652 KERNEL*.dll!BaseThreadInitThunk 653 654 # TODO(timurrrr): investigate these 655 UNINITIALIZED READ 656 name=http://crbug.com/TODO a 657 ... 658 *!win_util::GetLogonSessionOnlyDACL 659 660 UNINITIALIZED READ 661 name=http://crbug.com/TODO b 662 ... 663 ntshrui.dll!IsPathSharedW 664 665 UNINITIALIZED READ 666 name=http://crbug.com/TODO c 667 ... 668 *!NetApiBufferFree 669 670 UNINITIALIZED READ 671 name=http://crbug.com/TODO d 672 ... 673 *!ShellExecute* 674 675 UNINITIALIZED READ 676 name=http://crbug.com/TODO e 677 ... 678 *!SHParseDisplayName 679 680 UNINITIALIZED READ 681 name=http://crbug.com/TODO f 682 ... 683 *!GetCanonicalPathInfo* 684 685 UNINITIALIZED READ 686 name=http://crbug.com/TODO g 687 ... 688 SHELL32.dll!Ordinal* 689 690 UNINITIALIZED READ 691 name=http://crbug.com/TODO h 692 ... 693 GDI32.dll!GetTextExtentPoint32* 694 695 UNINITIALIZED READ 696 name=http://crbug.com/TODO i 697 ... 698 *!SyncSocketClientListener::OnMsgClassResponse 699 700 UNINITIALIZED READ 701 name=http://crbug.com/TODO j 702 ... 703 *!*NSPRInitSingleton* 704 705 UNINITIALIZED READ 706 name=http://crbug.com/TODO k 707 *!NdrSimpleStructFree 708 709 UNINITIALIZED READ 710 name=http://crbug.com/TODO l 711 ntdll.dll!RtlpNtOpenKey 712 ntdll.dll!RtlMakeSelfRelativeSD 713 ntdll.dll!RtlAbsoluteToSelfRelativeSD 714 ADVAPI32.dll!MakeSelfRelativeSD 715 716 UNINITIALIZED READ 717 name=http://crbug.com/TODO m 718 ... 719 CRYPT32.dll!I_CertSyncStore 720 721 # This matches the same stack as DrMem i#751, but it's an uninit read instead of 722 # a leak. Must be some early thread initialization. Doesn't look like 723 # bit-level though. 724 UNINITIALIZED READ 725 name=http://crbug.com/TODO n 726 RPCRT4.dll!* 727 RPCRT4.dll!* 728 RPCRT4.dll!* 729 ntdll.dll!* 730 ntdll.dll!* 731 KERNEL*.dll!BaseThreadInitThunk 732 733 # No idea where this is from, but Chrome isn't even on the stack. 734 POSSIBLE LEAK 735 name=http://crbug.com/TODO o 736 RPCRT4.dll!... 737 ole32.dll!OleInitialize 738 ole32.dll!... 739 KERNEL32.dll!BaseThreadInitThunk 740 741 # Matches lots of RPC related leaks. So far RPC handles have been mostly owned 742 # by system libraries and are not something we can fix easily. 743 POSSIBLE LEAK 744 name=http://crbug.com/TODO p 745 RPCRT4.dll!* 746 RPCRT4.dll!* 747 RPCRT4.dll!NDRCContextBinding 748 749 # No idea, but all system code, not interesting. 750 POSSIBLE LEAK 751 name=http://crbug.com/TODO q 752 RPCRT4.dll!... 753 RPCRT4.dll!* 754 RPCRT4.dll!* 755 ole32.dll!... 756 ole32.dll!* 757 ole32.dll!* 758 ... 759 SHELL32.dll!* 760 761 LEAK 762 name=http://crbug.com/109278 video device COM leaks 763 ... 764 *!media::VideoCaptureDevice::* 765 766 LEAK 767 name=http://crbug.com/109278 audio device COM leaks 768 ... 769 *!media::GetInputDeviceNamesWin 770 771 # False pos uninit in shell32 when resolving links. 772 UNINITIALIZED READ 773 name=http://code.google.com/p/drmemory/issues/detail?id=745 774 SHELL*.dll!* 775 ... 776 SHELL*.dll!* 777 *!file_util::ResolveShortcut 778 779 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a 780 # buffer with SSE/MMX instructions whose results are then masked out later. 781 UNINITIALIZED READ 782 name=http://code.google.com/p/drmemory/issues/detail?id=747 a 783 *!ff_pred4x4_vertical_vp8_mmxext 784 785 UNINITIALIZED READ 786 name=http://code.google.com/p/drmemory/issues/detail?id=747 b 787 *!ff_pred4x4_down_left_mmxext 788 789 UNINITIALIZED READ 790 name=http://code.google.com/p/drmemory/issues/detail?id=747 c 791 *!ff_vorbis_floor1_render_list 792 793 UNINITIALIZED READ 794 name=http://code.google.com/p/drmemory/issues/detail?id=747 d 795 *!ff_put_vp8_epel8_h6_ssse3 796 797 UNINITIALIZED READ 798 name=http://code.google.com/p/drmemory/issues/detail?id=747 e 799 *!ff_put_vp8_epel8_h4_ssse3 800 801 UNINITIALIZED READ 802 name=http://code.google.com/p/drmemory/issues/detail?id=747 f 803 *!ff_fft_permute_sse 804 805 UNINITIALIZED READ 806 name=http://code.google.com/p/drmemory/issues/detail?id=747 g 807 *!ff_simple_idct_add_mmx 808 809 # ffmpeg seems to leak a pthread condition variable. 810 LEAK 811 name=http://crbug.com/110042 812 *!ptw32_new 813 *!pthread_self 814 *!sem_wait 815 *!pthread_cond_wait 816 *!ff_thread_decode_frame 817 *!avcodec_decode_video2 818 819 # Improperly handled ioctl in bcrypt. 820 UNINITIALIZED READ 821 name=http://code.google.com/p/drmemory/issues/detail?id=748 822 system call NtDeviceIoControlFile InputBuffer 823 bcrypt.dll!BCryptUnregisterConfigChangeNotify 824 bcrypt.dll!BCryptGetFipsAlgorithmMode 825 ntdll.dll!RtlQueryEnvironmentVariable 826 827 # Not sure what this is. 828 POSSIBLE LEAK 829 name=http://code.google.com/p/drmemory/issues/detail?id=749 830 ... 831 fwpuclnt.dll!* 832 ... 833 RPCRT4.dll!* 834 ... 835 fwpuclnt.dll!* 836 ... 837 WS2_32.dll!* 838 *!talk_base::SafeGetHostByName 839 *!talk_base::SocketAddress::GetLocalIPs 840 *!talk_base::SocketAddress::IsLocalIP 841 *!cricket::Transport::VerifyCandidate 842 *!cricket::Session::OnRemoteCandidates 843 *!cricket::Session::OnTransportInfoMessage 844 *!cricket::Session::OnIncomingMessage 845 *!cricket::SessionManager::OnIncomingMessage 846 847 # More uninit false pos in rpcrt4.dll not caught by default suppressions. 848 UNINITIALIZED READ 849 name=http://code.google.com/p/drmemory/issues/detail?id=529 850 RPCRT4.dll!* 851 ... 852 *!base::LaunchProcess 853 854 # System leak from CreateEnvironmentBlock. 855 LEAK 856 name=http://code.google.com/p/drmemory/issues/detail?id=757 857 ... 858 USERENV.dll!CreateEnvironmentBlock 859 860 # Looks like another instance of 753 861 LEAK 862 name=http://code.google.com/p/drmemory/issues/detail?id=753 863 ... 864 ntdll.dll!RtlLoadString 865 866 # More bit manip fps 867 UNINITIALIZED READ 868 name=http://code.google.com/p/drmemory/issues/detail?id=493 869 USP10.dll!ScriptPositionSingleGlyph 870 871 # Various TLS leaks that we don't understand yet. We should be finding a root 872 # for these. 873 LEAK 874 name=http://code.google.com/p/drmemory/issues/detail?id=778 a 875 KERNELBASE.dll!TlsSetValue 876 877 # Originally filed as: http://crbug.com/109281 878 LEAK 879 name=http://code.google.com/p/drmemory/issues/detail?id=778 b 880 *!operator new 881 *!operator new[] 882 *!*::ConstructTlsVector 883 *!base::ThreadLocalStorage::StaticSlot::Get 884 885 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a 886 # root? See also http://crbug.com/32624 887 LEAK 888 name=http://code.google.com/p/drmemory/issues/detail?id=778 c 889 *!PR_Calloc 890 *!_PR_AttachThread 891 *!_PRI_AttachThread 892 893 # Bit-level fps in rich edit layer. 894 UNINITIALIZED READ 895 name=http://code.google.com/p/drmemory/issues/detail?id=791 896 RICHED20.dll!* 897 RICHED20.dll!* 898 899 # Already suppressed by drmemory default supp we don't have yet. 900 LEAK 901 name=i#757: RPC binding leaks in sspicli.dll 902 RPCRT4.dll!* 903 ... 904 SspiCli.dll!* 905 SspiCli.dll!Cre* 906 907 # Async NtReadFile false positives. This was fixed in drmemory r772, remove 908 # this supp when we pull that rev. 909 UNADDRESSABLE ACCESS 910 name=http://code.google.com/p/drmemory/issues/detail?id=798 911 system call NtReadFile parameter #5 912 KERNEL32.dll!ReadFile 913 914 # Probable syscall false positive. 915 UNADDRESSABLE ACCESS 916 name=http://code.google.com/p/drmemory/issues/detail?id=809 917 system call NtGdiPolyPolyDraw parameter #1 918 *!gfx::Path::CreateNativeRegion 919 920 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces 921 # coming out of this module (sometimes only one frame), which makes it hard to 922 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we 923 # should keep this. 924 UNINITIALIZED READ 925 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard 926 RPCRT4.dll!* 927 928 UNINITIALIZED READ 929 name=http://code.google.com/p/drmemory/issues/detail?id=841 a 930 ... 931 CRYPTNET.dll!I_CryptNetGetConnectivity 932 933 UNINITIALIZED READ 934 name=http://code.google.com/p/drmemory/issues/detail?id=841 b 935 ... 936 webio.dll!* 937 938 UNINITIALIZED READ 939 name=http://code.google.com/p/drmemory/issues/detail?id=841 c 940 ... 941 winhttp.dll!* 942 943 LEAK 944 name=http://code.google.com/p/drmemory/issues/detail?id=841 d 945 ... 946 CRYPTNET.dll!I_CryptNetGetConnectivity 947 948 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame. 949 UNINITIALIZED READ 950 name=http://code.google.com/p/drmemory/issues/detail?id=810 951 instruction=test %edx %edx 952 USER32.dll!GetClassLongW 953 ... 954 *!ui::CenterAndSizeWindow 955 956 UNINITIALIZED READ 957 name=http://code.google.com/p/drmemory/issues/detail?id=815 958 KERNEL*.dll!... 959 dxgi.dll!* 960 USER32.dll!GetMonitorInfoA 961 ntdll.dll!KiUserCallbackDispatcher 962 dxgi.dll!* 963 WinSATAPI.DLL!* 964 965 # Suppress anything in cmd.exe. It's safer to suppress these than disable 966 # following, since someone might launch a Chrome process via cmd.exe. 967 LEAK 968 name=cmd.exe 969 ... 970 cmd.exe!* 971 972 # Possible true system use after free. 973 UNADDRESSABLE ACCESS 974 name=http://code.google.com/p/drmemory/issues/detail?id=623 975 KERNELBASE.dll!TlsGetValue 976 OLEAUT32.dll!SysFreeString 977 OLEAUT32.dll!SysAllocStringByteLen 978 OLEACC.dll!* 979 OLEACC.dll!* 980 OLEACC.dll!* 981 OLEACC.dll!* 982 983 # basic_streambuf seems to leak something in creating a std::_Mutex 984 LEAK 985 name=http://code.google.com/p/drmemory/issues/detail?id=857 986 ntdll.dll!... 987 ntdll.dll!RtlInitializeCriticalSection 988 *!_Mtxinit 989 *!std::_Mutex::_Mutex 990 *!std::basic_streambuf<*> 991 992 # stdext::hash_map<> seems to swap uninitialized floats. 993 UNINITIALIZED READ 994 name=http://code.google.com/p/drmemory/issues/detail?id=931 995 *!std::swap<float> 996 *!std::_Hash<* 997 998 # syscall false positive on handling NtQuerySystemInformation, fix in soon. 999 UNINITIALIZED READ 1000 name=http://code.google.com/p/drmemory/issues/detail?id=932 1001 KERNEL32.dll!K32GetPerformanceInfo 1002 1003 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. 1004 LEAK 1005 name=GDI SetBrushOrgEx leak 1006 GDI32.dll!... 1007 GDI32.dll!GetTextMetricsW 1008 *!gfx::PlatformFontWin::CreateHFontRef 1009 *!gfx::PlatformFontWin::GetBaseFontRef 1010 1011 ############################################################### 1012 # Benign issues in Chromium 1013 1014 # This test intentionally leaks an object and checks that it's never deleted. 1015 LEAK 1016 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak 1017 ... 1018 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody 1019 1020 LEAK 1021 name=deliberate histogram leak 1022 ... 1023 *!replace_operator_new 1024 ... 1025 *!*::*Histogram::FactoryGet 1026 1027 LEAK 1028 name=deliberate LazyInstance leak 1029 ... 1030 *!*LeakyLazyInstance* 1031 ... 1032 *!base::LazyInstance*::Pointer 1033 1034 LEAK 1035 name=http://crbug.com/79933 (1) 1036 ... 1037 *!TestURLRequestContext::Init 1038 1039 LEAK 1040 name=http://crbug.com/79933 (2) 1041 ... 1042 *!TestURLRequestContext::TestURLRequestContext 1043 *!TestURLRequestContextGetter::GetURLRequestContext 1044 *!notifier::SingleLoginAttempt::SingleLoginAttempt 1045 *!notifier::Login::StartConnection 1046 *!syncer::InvalidationNotifier::UpdateCredentials 1047 *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials 1048 1049 LEAK 1050 name=http://crbug.com/79933 (3) 1051 ... 1052 *!TestURLRequestContext::TestURLRequestContext 1053 *!TestURLRequestContextGetter::GetURLRequestContext 1054 *!URLFetcher::Core::StartURLRequest 1055 1056 LEAK 1057 name=http://crbug.com/79933 (4) 1058 *!generic_cpp_alloc 1059 *!operator new 1060 *!std::_Allocate<net::SSLConfigService::Observer *> 1061 *!std::allocator<net::SSLConfigService::Observer *>::allocate 1062 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::_Insert_n 1063 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::insert 1064 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::push_back 1065 *!ObserverListBase<net::SSLConfigService::Observer>::AddObserver 1066 ... 1067 *!net::HttpNetworkSession::HttpNetworkSession 1068 *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket 1069 *!notifier::XmppClientSocketFactory::CreateTransportClientSocket 1070 *!notifier::ChromeAsyncSocket::Connect 1071 *!buzz::XmppClient::ProcessStartXmppLogin 1072 *!buzz::XmppClient::Process 1073 *!talk_base::Task::Step 1074 *!talk_base::TaskRunner::InternalRunTasks 1075 *!talk_base::TaskRunner::RunTasks 1076 *!notifier::TaskPump::CheckAndRunTasks 1077 *!base::internal::RunnableAdapter<void (__thiscall notifier::TaskPump::*)(void)>::Run 1078 1079 # Test intentionally leaks an object. 1080 LEAK 1081 name=http://crbug.com/86301 1082 *!replace_operator_new 1083 ... 1084 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody 1085 1086 # Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it. 1087 LEAK 1088 name=Firefox 3 NSS dll leak 1089 nspr4.dll!* 1090 ... 1091 *!NSSDecryptor::~NSSDecryptor 1092 1093 # We get uninit reports inside GMock when it prints the bytes of references to 1094 # partially initialized objects passed to unexpected method calls. 1095 UNINITIALIZED READ 1096 name=GMock printing uninit data 1097 ... 1098 *!testing::internal2::PrintBytesInObjectTo 1099 1100 ############################################################### 1101 # Real issues in Chromium 1102 1103 LEAK 1104 name=http://crbug.com/32085 1105 ... 1106 chrome.dll!NotificationRegistrar::Add 1107 1108 LEAK 1109 name=http://crbug.com/32623 1110 ... 1111 *!ssl3_HandleHandshakeMessage 1112 *!ssl3_HandleHandshake 1113 *!ssl3_HandleRecord 1114 *!ssl3_GatherCompleteHandshake 1115 ... 1116 *!SSL_ForceHandshake 1117 *!net::SSLServerSocketNSS::DoHandshake 1118 *!net::SSLServerSocketNSS::DoHandshakeLoop 1119 1120 UNINITIALIZED READ 1121 name=http://crbug.com/57266 (1) 1122 ... 1123 *!remoting::EncoderVp8::Encode 1124 1125 UNINITIALIZED READ 1126 name=http://crbug.com/57266 (2) 1127 ... 1128 *!vp8_* 1129 1130 LEAK 1131 name=http://crbug.com/70062 1132 *!PR_Calloc 1133 *!PR_NewLock 1134 ... 1135 *!InitSessionCacheLocks 1136 *!initSessionCacheLocksLazily 1137 *!PR_CallOnce 1138 *!ssl_InitSessionCacheLocks 1139 *!lock_cache 1140 *!ssl_LookupSID 1141 *!ssl2_BeginClientHandshake 1142 *!ssl_Do1stHandshake 1143 *!SSL_ForceHandshake 1144 *!net::SSL*SocketNSS::DoHandshake 1145 *!net::SSL*SocketNSS::DoHandshakeLoop 1146 1147 LEAK 1148 name=http://crbug.com/74417 a 1149 *!replace_operator_new 1150 *!disk_cache::BackendImpl::CreateEntryImpl 1151 1152 LEAK 1153 name=http://crbug.com/74417 b 1154 *!replace_operator_new 1155 *!disk_cache::BackendImpl::NewEntry 1156 1157 # One more disk_cache::BackendImpl leak. See also http://crbug.com/87500. 1158 LEAK 1159 name=http://crbug.com/74417 c 1160 *!replace_operator_new 1161 ... 1162 *!disk_cache::EntryImpl::UserBuffer::UserBuffer 1163 1164 LEAK 1165 name=http://crbug.com/75247 1166 ... 1167 *!replace_operator_new 1168 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper 1169 1170 LEAK 1171 name=http://crbug.com/78784 1172 *!generic_cpp_alloc 1173 *!operator new 1174 *!TestingProfile::CreateRequestContext 1175 *!*ProfileSyncService*::SetUp 1176 1177 LEAK 1178 name=http://crbug.com/80550 (1) 1179 ... 1180 *!RenderWidgetHost::WasHidden 1181 1182 LEAK 1183 name=http://crbug.com/80550 (2) 1184 ... 1185 *!RenderWidgetHost::WasRestored 1186 1187 LEAK 1188 name=http://crbug.com/87612 1189 ... 1190 *!SSL_ConfigSecureServer 1191 *!net::SSLServerSocketNSS::InitializeSSLOptions 1192 *!net::SSLServerSocketNSS::Handshake 1193 1194 LEAK 1195 name=http://crbug.com/88640 1196 *!generic_cpp_alloc 1197 *!operator new 1198 *!ProfileImpl::InitRegisteredProtocolHandlers 1199 *!ProfileImpl::DoFinalInit 1200 *!ProfileImpl::OnPrefsLoaded 1201 1202 LEAK 1203 name=http://crbug.com/91465 1204 *!generic_cpp_alloc 1205 *!operator new 1206 *!browser_sync::internal::WeakHandleCore<browser_sync::JsBackend>::* 1207 *!browser_sync::WeakHandle<browser_sync::JsBackend>::* 1208 *!syncer::SyncManager::SyncInternal::Init 1209 1210 LEAK 1211 name=http://crbug.com/91491 1212 ... 1213 *!CrxUpdateService::ProcessPendingItems 1214 1215 UNINITIALIZED READ 1216 name=http://crbug.com/92026 (1) 1217 softokn3.dll!FC_GetFunctionList 1218 ... 1219 softokn3.dll!NSC_ModuleDBFunc 1220 1221 UNINITIALIZED READ 1222 name=http://crbug.com/92026 (2) 1223 freebl3.dll!FREEBL_GetVector 1224 ... 1225 softokn3.dll!NSC_ModuleDBFunc 1226 1227 LEAK 1228 name=http://crbug.com/92166 1229 ... 1230 *!replace_operator_new 1231 *!views::NativeWidgetWin::OnCreate 1232 1233 # Possible real Chromium issue in DoCrossfade. 1234 UNINITIALIZED READ 1235 name=http://crbug.com/110049 1236 *!media::DoCrossfade<*> 1237 *!media::Crossfade 1238 *!media::AudioRendererAlgorithmBase::FillBuffer 1239 1240 # Known sqlite3 leaks. 1241 LEAK 1242 name=http://crbug.com/113847 (1) 1243 ... 1244 *!sqlite3MemMalloc 1245 *!mallocWithAlarm 1246 *!sqlite3Malloc 1247 ... 1248 *!yy_reduce 1249 1250 LEAK 1251 name=http://crbug.com/113847 (2) 1252 ... 1253 *!openDatabase 1254 *!sqlite3_open 1255 1256 LEAK 1257 name=http://crbug.com/115328 1258 ... 1259 *!GenericInfoViewTest_GenericInfoView_Test::TestBody 1260 1261 UNINITIALIZED READ 1262 name=http://crbug.com/116277 1263 *!MOZ_Z_deflate 1264 *!zipCloseFileInZipRaw64 1265 1266 LEAK 1267 name=http://crbug.com/117427 a 1268 ... 1269 *!net::HostCache::Set 1270 *!net::HostResolverImpl::CacheResult 1271 *!net::HostResolverImpl::Job::CompleteRequests 1272 *!net::HostResolverImpl::Job::OnProcTaskComplete 1273 *!base::internal::RunnableAdapter<void (__thiscall net::HostResolverImpl::Job::*)(int,net::AddressList const &)>::Run 1274 1275 # Probably related to 117427. Someone is not tearing down DNS resolution during 1276 # testing. 1277 LEAK 1278 name=http://crbug.com/117427 b 1279 *!generic_cpp_alloc 1280 *!operator new 1281 *!base::internal::WeakReferenceOwner::GetRef 1282 *!base::SupportsWeakPtr<net::HostResolverImpl>::AsWeakPtr 1283 *!net::HostResolverImpl::Job::Job 1284 *!net::HostResolverImpl::Resolve 1285 *!net::SingleRequestHostResolver::Resolve 1286 *!net::TransportConnectJob::DoResolveHost 1287 *!net::TransportConnectJob::DoLoop 1288 *!net::TransportConnectJob::ConnectInternal 1289 *!net::ConnectJob::Connect 1290 *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal 1291 *!net::internal::ClientSocketPoolBaseHelper::RequestSocket 1292 *!net::ClientSocketPoolBase<net::TransportSocketParams>::RequestSocket 1293 *!net::TransportClientSocketPool::RequestSocket 1294 *!net::ClientSocketHandle::Init<net::TransportSocketParams,net::TransportClientSocketPool> 1295 *!net::`anonymous namespace'::InitSocketPoolHelper 1296 *!net::InitSocketHandleForRawConnect 1297 *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone 1298 *!base::internal::RunnableAdapter<void (__thiscall notifier::ProxyResolvingClientSocket::*)(int)>::Run 1299 1300 # IE frame possible leak of COM object. 1301 LEAK 1302 name=http://crbug.com/122399 1303 ole32.dll!... 1304 ole32.dll!CoTaskMemAlloc 1305 urlmon.dll!... 1306 urlmon.dll!CreateUri 1307 IEFRAME.dll!* 1308 1309 # RenderWidgetHelper leak in DelayProfileDestruction test. 1310 LEAK 1311 name=http://crbug.com/125565 1312 *!generic_cpp_alloc 1313 *!operator new 1314 *!RenderProcessHostImpl::RenderProcessHostImpl 1315 *!SiteInstanceImpl::GetProcess 1316 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody 1317 1318 LEAK 1319 name=http://crbug.com/125807 1320 *!generic_cpp_alloc 1321 *!operator new 1322 *!TransportSecurityPersister::TransportSecurityPersister 1323 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest 1324