Home | History | Annotate | Download | only in drmemory
      1 # This file contains suppressions for the Dr.Memory tool, see
      2 # http://dev.chromium.org/developers/how-tos/using-drmemory
      3 #
      4 # This file should contain suppressions only for the reports happening
      5 # in the 'full' mode (drmemory_full).
      6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
      7 # please use suppressions.txt instead.
      8 
      9 ###############################################################
     10 # Known reports on the third party we have no control over.
     11 UNINITIALIZED READ
     12 name=deflate UNINIT
     13 ...
     14 *!deflate_*
     15 *!MOZ_Z_deflate
     16 
     17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
     18 LEAK
     19 name=http://code.google.com/p/drmemory/issues/detail?id=406
     20 ADVAPI32.dll!WmiOpenBlock
     21 ADVAPI32.dll!WmiOpenBlock
     22 
     23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
     24 LEAK
     25 name=GoogleDesktop LEAK
     26 ...
     27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
     28 
     29 # They deliberately use uninit local var in sqlite random generator
     30 UNINITIALIZED READ
     31 name=sqlite3_randomness UNINIT
     32 *!randomByte
     33 *!sqlite3_randomness
     34 
     35 # Intentional leak in WebKit Template Framework for ThreadData.
     36 LEAK
     37 name=intentional WTF ThreadData leak
     38 ...
     39 *!WTF::wtfThreadData
     40 
     41 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
     42 LEAK
     43 name=http://crbug.com/125558 a
     44 KERNELBASE.dll!LocalAlloc
     45 SECHOST.dll!...
     46 SECHOST.dll!NotifyServiceStatusChange
     47 WINHTTP.dll!...
     48 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
     49 *!net::ProxyResolverWinHttp::GetProxyForURL
     50 
     51 # Tiny locale-related leaks in ntdll.  Probably system bug.
     52 LEAK
     53 name=http://crbug.com/125558 b
     54 ntdll.dll!...
     55 ntdll.dll!*
     56 KERNELBASE.dll!...
     57 KERNELBASE.dll!GetCPInfoExW
     58 webio.dll!*
     59 webio.dll!*
     60 webio.dll!*
     61 WINHTTP.dll!...
     62 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
     63 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig
     64 
     65 ###############################################################
     66 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
     67 # assumptions or unhandled syscalls
     68 
     69 # Please note: the following suppressions were written in the abscense of
     70 # private symbols so may need to be updated when we switch to auto-loading PDBs
     71 UNINITIALIZED READ
     72 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1)
     73 ntdll.dll!Rtl*
     74 ntdll.dll!Rtl*
     75 ntdll.dll!RtlFindActivationContextSectionString
     76 
     77 UNINITIALIZED READ
     78 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2)
     79 ...
     80 SHELL32.dll!SHFileOperation*
     81 
     82 UNINITIALIZED READ
     83 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3)
     84 ...
     85 SHELL32.dll!SHGetFolderPath*
     86 
     87 LEAK
     88 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4)
     89 ...
     90 SHELL32.dll!SHGetFolderPath*
     91 
     92 UNINITIALIZED READ
     93 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5)
     94 ...
     95 SHELL32.dll!SHCreateDirectory*
     96 
     97 UNINITIALIZED READ
     98 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6)
     99 ...
    100 SHELL32.dll!ILLoadFromStream*
    101 
    102 UNINITIALIZED READ
    103 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7)
    104 ...
    105 SHELL32.dll!ILSaveToStream*
    106 
    107 LEAK
    108 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8)
    109 ...
    110 SHELL32.dll!SHFileOperation*
    111 
    112 UNINITIALIZED READ
    113 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9)
    114 ...
    115 SHELL32.dll!SHGetItemFromDataObject
    116 
    117 LEAK
    118 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10)
    119 ...
    120 SHELL32.dll!SHGetItemFromDataObject
    121 
    122 LEAK
    123 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11)
    124 ...
    125 ole32.dll!*
    126 SHELL32.dll!SHChangeNotifySuspendResume
    127 
    128 UNINITIALIZED READ
    129 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1)
    130 ...
    131 *!CreateProcess*
    132 
    133 LEAK
    134 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2)
    135 ...
    136 *!CreateProcess*
    137 
    138 UNINITIALIZED READ
    139 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3)
    140 ...
    141 *!base::LaunchApp*
    142 
    143 UNINITIALIZED READ
    144 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1)
    145 ...
    146 *!CreateWindow*
    147 
    148 POSSIBLE LEAK
    149 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2)
    150 GDI32.dll!*
    151 GDI32.dll!CreateFontIndirectExW
    152 GDI32.dll!CreateFontIndirectW
    153 
    154 LEAK
    155 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3)
    156 KERNELBASE.dll!LocalAlloc
    157 ...
    158 USER32.dll!CreateWindow*
    159 
    160 UNINITIALIZED READ
    161 name=http://code.google.com/p/drmemory/issues/detail?id=18 a
    162 ...
    163 *!CoInitialize*
    164 
    165 UNINITIALIZED READ
    166 name=http://code.google.com/p/drmemory/issues/detail?id=18 b
    167 ...
    168 *!CoCreateInstance*
    169 
    170 UNINITIALIZED READ
    171 name=http://code.google.com/p/drmemory/issues/detail?id=18 c
    172 ...
    173 *!CoUninitialize*
    174 
    175 UNINITIALIZED READ
    176 name=http://code.google.com/p/drmemory/issues/detail?id=18 d
    177 ...
    178 UxTheme.dll!*
    179 
    180 UNINITIALIZED READ
    181 name=http://code.google.com/p/drmemory/issues/detail?id=40 a
    182 ...
    183 WINSPOOL.DRV!*
    184 
    185 LEAK
    186 name=http://code.google.com/p/drmemory/issues/detail?id=40 b
    187 ...
    188 WINSPOOL.DRV!*
    189 
    190 UNINITIALIZED READ
    191 name=http://code.google.com/p/drmemory/issues/detail?id=48 a
    192 system call NtContinue
    193 ...
    194 *!*SetThreadName
    195 
    196 UNINITIALIZED READ
    197 name=http://code.google.com/p/drmemory/issues/detail?id=48 b
    198 system call NtContinue
    199 *!WTF::initializeCurrentThreadInternal
    200 
    201 UNINITIALIZED READ
    202 name=http://code.google.com/p/drmemory/issues/detail?id=52 a
    203 ...
    204 DBGHELP.dll!SymInitialize
    205 
    206 UNINITIALIZED READ
    207 name=http://code.google.com/p/drmemory/issues/detail?id=52 b
    208 ...
    209 DBGHELP.dll!SymEnumSourceFiles
    210 
    211 UNINITIALIZED READ
    212 name=http://code.google.com/p/drmemory/issues/detail?id=52 c
    213 ...
    214 msvcrt.dll!_RTDynamicCast
    215 
    216 UNINITIALIZED READ
    217 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp
    218 instruction=test   0x*(%*) $0x??
    219 DBGHELP.dll!SymUnloadModule64
    220 
    221 UNINITIALIZED READ
    222 name=http://code.google.com/p/drmemory/issues/detail?id=53
    223 ADVAPI32.dll!WmiMofEnumerateResourcesA
    224 ADVAPI32.dll!WmiMofEnumerateResourcesA
    225 ADVAPI32.dll!Sta*TraceW
    226 
    227 UNINITIALIZED READ
    228 name=http://code.google.com/p/drmemory/issues/detail?id=58
    229 ...
    230 *!_cfltcvt_l
    231 
    232 UNINITIALIZED READ
    233 name=http://code.google.com/p/drmemory/issues/detail?id=60
    234 USP10.dll!*
    235 ...
    236 USP10.dll!ScriptStringAnalyse
    237 
    238 LEAK
    239 IMM32.dll!ImmGetIMCCSize
    240 IMM32.dll!ImmLockClientImc
    241 IMM32.dll!ImmDisableIME
    242 IMM32.dll!ImmSetActiveContext
    243 USER32.dll!IMPSetIMEA
    244 
    245 UNINITIALIZED READ
    246 name=http://code.google.com/p/drmemory/issues/detail?id=65 a
    247 ...
    248 *!SystemFunction036
    249 
    250 UNINITIALIZED READ
    251 name=http://code.google.com/p/drmemory/issues/detail?id=65 b
    252 ...
    253 *!talk_base::CreateRandomString
    254 
    255 UNINITIALIZED READ
    256 name=http://code.google.com/p/drmemory/issues/detail?id=68 a
    257 ...
    258 WS2_32.dll!*
    259 
    260 UNINITIALIZED READ
    261 name=http://code.google.com/p/drmemory/issues/detail?id=68 b
    262 ...
    263 ADVAPI32.dll!SetSecurityDescriptorDacl
    264 
    265 UNINITIALIZED READ
    266 name=http://code.google.com/p/drmemory/issues/detail?id=68 c
    267 ...
    268 MSWSOCK.dll!WSPStartup
    269 
    270 UNINITIALIZED READ
    271 name=http://code.google.com/p/drmemory/issues/detail?id=68 d
    272 ...
    273 ntdll.dll!RtlValidateUnicodeString
    274 
    275 LEAK
    276 name=http://code.google.com/p/drmemory/issues/detail?id=256
    277 *!_mtinit
    278 *!__tmainCRTStartup
    279 *!mainCRTStartup
    280 
    281 POSSIBLE LEAK
    282 name=http://code.google.com/p/drmemory/issues/detail?id=274 a
    283 ...
    284 GDI32.dll!CreateDCW
    285 
    286 LEAK
    287 name=http://code.google.com/p/drmemory/issues/detail?id=274 b
    288 ...
    289 GDI32.dll!CreateDCW
    290 
    291 LEAK
    292 name=http://code.google.com/p/drmemory/issues/detail?id=275
    293 ...
    294 *!_getptd*
    295 
    296 UNINITIALIZED READ
    297 name=http://code.google.com/p/drmemory/issues/detail?id=276
    298 ...
    299 ntdll.dll!RtlConvertUlongToLargeInteger
    300 ntdll.dll!RtlConvertUlongToLargeInteger
    301 ntdll.dll!KiUserExceptionDispatcher
    302 
    303 LEAK
    304 name=http://code.google.com/p/drmemory/issues/detail?id=305
    305 *!free
    306 *!free
    307 *!operator new
    308 ...
    309 *!MiniDumpWriteDump
    310 
    311 UNINITIALIZED READ
    312 name=http://code.google.com/p/drmemory/issues/detail?id=346 a
    313 ...
    314 GDI32.dll!CloseEnhMetaFile
    315 
    316 UNINITIALIZED READ
    317 name=http://code.google.com/p/drmemory/issues/detail?id=346 b
    318 GDI32.dll!SetPolyFillMode
    319 GDI32.dll!CreateICW
    320 
    321 UNINITIALIZED READ
    322 name=http://code.google.com/p/drmemory/issues/detail?id=362
    323 USER32.dll!UnregisterClass*
    324 
    325 LEAK
    326 name=http://code.google.com/p/drmemory/issues/detail?id=382
    327 ...
    328 ntdll.dll!CsrNewThread
    329 
    330 UNINITIALIZED READ
    331 name=http://code.google.com/p/drmemory/issues/detail?id=397
    332 system call NtDeviceIoControlFile InputBuffer
    333 ADVAPI32.dll!ImpersonateAnonymousToken
    334 
    335 UNINITIALIZED READ
    336 name=http://code.google.com/p/drmemory/issues/detail?id=407 a
    337 system call NtRequestWaitReplyPort
    338 RPCRT4.dll!I_RpcSendReceive
    339 RPCRT4.dll!NdrSendReceive
    340 
    341 UNINITIALIZED READ
    342 name=http://code.google.com/p/drmemory/issues/detail?id=407 b
    343 IMM32.dll!*
    344 ntdll.dll!LdrInitializeThunk
    345 ntdll.dll!LdrShutdownThread
    346 
    347 UNINITIALIZED READ
    348 name=http://code.google.com/p/drmemory/issues/detail?id=412 a
    349 ADVAPI32.dll!RegDeleteValue*
    350 
    351 UNINITIALIZED READ
    352 name=http://code.google.com/p/drmemory/issues/detail?id=412 b
    353 ...
    354 ADVAPI32.dll!Crypt*
    355 
    356 UNINITIALIZED READ
    357 name=http://code.google.com/p/drmemory/issues/detail?id=412 c
    358 ...
    359 RPCRT4.dll!NdrClientCall2
    360 
    361 LEAK
    362 name=http://code.google.com/p/drmemory/issues/detail?id=412 d
    363 RSAENH.dll!DllUnregisterServer
    364 ...
    365 ADVAPI32.dll!CryptAcquireContextA
    366 CRYPT32.dll!CryptEnumOIDFunction
    367 ...
    368 CRYPT32.dll!CertFindCertificateInStore
    369 
    370 UNINITIALIZED READ
    371 name=http://code.google.com/p/drmemory/issues/detail?id=412 e
    372 ...
    373 RSAENH.dll!CPGenRandom
    374 
    375 UNINITIALIZED READ
    376 name=http://code.google.com/p/drmemory/issues/detail?id=412 f
    377 ...
    378 CRYPT??.dll!Crypt*
    379 
    380 UNINITIALIZED READ
    381 name=http://code.google.com/p/drmemory/issues/detail?id=412 g
    382 *!replace_memcmp
    383 ...
    384 *!testing::internal::CmpHelperEQ*
    385 ...
    386 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
    387 
    388 # We get these sometimes from AesEncrypt and AesExpandKey.  AesEncrypt doesn't
    389 # have frame pointers, and we have trouble unwinding from it.  Therefore, we use
    390 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
    391 UNINITIALIZED READ
    392 name=http://code.google.com/p/drmemory/issues/detail?id=412 h
    393 RSAENH.dll!*
    394 
    395 UNINITIALIZED READ
    396 name=http://code.google.com/p/drmemory/issues/detail?id=425 a
    397 CLBCatQ.DLL!DestroyStgDatabase
    398 CLBCatQ.DLL!PostError
    399 CLBCatQ.DLL!PostError
    400 
    401 LEAK
    402 name=http://code.google.com/p/drmemory/issues/detail?id=425 b
    403 RPCRT4.dll!I_RpcBCacheFree
    404 RPCRT4.dll!I_RpcBCacheFree
    405 ...
    406 RPCRT4.dll!NdrClientCall2
    407 
    408 UNINITIALIZED READ
    409 name=http://code.google.com/p/drmemory/issues/detail?id=425 c
    410 msdmo.dll!*
    411 msdmo.dll!*
    412 DEVENUM.DLL!*
    413 
    414 UNINITIALIZED READ
    415 name=http://code.google.com/p/drmemory/issues/detail?id=435 a
    416 ...
    417 ntdll.dll!RtlSetSecurityObject
    418 ntdll.dll!RtlNewSecurityObjectEx
    419 ADVAPI32.dll!CreatePrivateObjectSecurityEx
    420 NTMARTA.dll!AccRewriteSetNamedRights
    421 
    422 POSSIBLE LEAK
    423 name=http://code.google.com/p/drmemory/issues/detail?id=435 b
    424 WLDAP32.dll!Ordinal325
    425 ...
    426 WLDAP32.dll!Ordinal325
    427 ntdll.dll!LdrInitializeThunk
    428 ntdll.dll!LdrFindResourceDirectory_U
    429 ntdll.dll!RtlValidateUnicodeString
    430 ntdll.dll!LdrLoadDll
    431 KERNEL32.dll!LoadLibraryExW
    432 
    433 # mod+offs suppression because the symbolic makes no sense and changes
    434 # completely in the presence of WS2_32.dll symbols.
    435 LEAK
    436 name=http://code.google.com/p/drmemory/issues/detail?id=438
    437 <WS2_32.dll+0x260c>
    438 <WS2_32.dll+0x2b76>
    439 <WS2_32.dll+0x2c61>
    440 
    441 UNINITIALIZED READ
    442 name=http://code.google.com/p/drmemory/issues/detail?id=454 a
    443 ...
    444 WINMM.dll!wave*GetNumDevs
    445 
    446 LEAK
    447 name=http://code.google.com/p/drmemory/issues/detail?id=454 b
    448 ...
    449 WINMM.dll!wave*GetNumDevs
    450 
    451 LEAK
    452 name=http://code.google.com/p/drmemory/issues/detail?id=466
    453 ntdll.dll!RtlRunOnceBeginInitialize
    454 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
    455 
    456 UNINITIALIZED READ
    457 name=http://code.google.com/p/drmemory/issues/detail?id=471 a
    458 *!media::AudioRendererAlgorithmOLA::Crossfade<unsigned char>
    459 *!media::AudioRendererAlgorithmOLA::FillBuffer
    460 *!media::AudioRendererAlgorithmOLATest_FillBuffer_*
    461 
    462 # Uninit reported in copy ctor.  Would be nice if we could specify which ctor
    463 # overload to suppress.
    464 UNINITIALIZED READ
    465 name=http://code.google.com/p/drmemory/issues/detail?id=471 b
    466 *!WebCore::FormDataElement::FormDataElement
    467 
    468 # Another default copy ctor uninit.
    469 UNINITIALIZED READ
    470 name=http://code.google.com/p/drmemory/issues/detail?id=471 c
    471 *!WebCore::CachedResourceLoader::InitiatorInfo::InitiatorInfo
    472 ...
    473 *!WTF::Hash*
    474 
    475 UNINITIALIZED READ
    476 name=http://code.google.com/p/drmemory/issues/detail?id=473 a
    477 system call NtDeviceIoControlFile InputBuffer
    478 ...
    479 iphlpapi.dll!GetAdaptersAddresses
    480 
    481 POSSIBLE LEAK
    482 name=http://code.google.com/p/drmemory/issues/detail?id=473 b
    483 ESENT.dll!*
    484 ESENT.dll!*
    485 ESENT.dll!*
    486 ntdll.dll!Ldr*Init*
    487 ntdll.dll!Ldr*
    488 ntdll.dll!*
    489 ntdll.dll!LdrLoadDll
    490 ...
    491 iphlpapi.dll!GetPerAdapterInfo
    492 ...
    493 iphlpapi.dll!GetAdaptersAddresses
    494 
    495 POSSIBLE LEAK
    496 name=http://code.google.com/p/drmemory/issues/detail?id=473 c
    497 RPCRT4.dll!*
    498 RPCRT4.dll!*
    499 ...
    500 IPHLPAPI.DLL!GetAdaptersAddresses
    501 
    502 LEAK
    503 name=http://code.google.com/p/drmemory/issues/detail?id=475
    504 ...
    505 ADVAPI32.dll!CryptAcquireContextA
    506 ...
    507 CRYPT32.dll!CryptMsgOpenToDecode
    508 ...
    509 CRYPT32.dll!CryptQueryObject
    510 
    511 # Lots of leaks from our interactions with the system certificate store.  May be
    512 # worth reviewing our use of their API.
    513 LEAK
    514 name=http://code.google.com/p/drmemory/issues/detail?id=476 a
    515 KERNEL*.dll!LocalAlloc
    516 ...
    517 CRYPT32.dll!CertGetCRLContextProperty
    518 
    519 LEAK
    520 name=http://code.google.com/p/drmemory/issues/detail?id=476 b
    521 KERNEL*.dll!LocalAlloc
    522 ...
    523 CRYPT32.dll!CertAddCRLContextToStore
    524 
    525 LEAK
    526 name=http://code.google.com/p/drmemory/issues/detail?id=476 c
    527 KERNEL*.dll!LocalAlloc
    528 ...
    529 CRYPT32.dll!CertOpenStore
    530 
    531 LEAK
    532 name=http://code.google.com/p/drmemory/issues/detail?id=476 d
    533 ...
    534 CRYPT32.dll!CertOpenSystemStore?
    535 
    536 LEAK
    537 name=http://code.google.com/p/drmemory/issues/detail?id=476 e
    538 ...
    539 CRYPT32.dll!CertGetCertificateChain
    540 
    541 LEAK
    542 name=http://code.google.com/p/drmemory/issues/detail?id=476 f
    543 ...
    544 CRYPT32.dll!CertCompareIntegerBlob
    545 
    546 LEAK
    547 name=http://code.google.com/p/drmemory/issues/detail?id=476 g
    548 ...
    549 CRYPT32.dll!CryptUnprotectData
    550 
    551 LEAK
    552 name=http://code.google.com/p/drmemory/issues/detail?id=476 h
    553 KERNEL*.dll!LocalAlloc
    554 ...
    555 CRYPT32.dll!CertEnumCertificatesInStore
    556 
    557 LEAK
    558 name=http://code.google.com/p/drmemory/issues/detail?id=476 i
    559 ...
    560 CRYPT32.dll!CryptProtectData
    561 
    562 LEAK
    563 name=http://code.google.com/p/drmemory/issues/detail?id=476 j
    564 ...
    565 CRYPT32.dll!CryptExportPublicKeyInfoEx
    566 
    567 UNINITIALIZED READ
    568 name=http://code.google.com/p/drmemory/issues/detail?id=502 a
    569 system call NtSecureConnectPort parameter #3
    570 GDI32.dll!*
    571 GDI32.dll!*
    572 
    573 UNINITIALIZED READ
    574 name=http://code.google.com/p/drmemory/issues/detail?id=502 b
    575 system call NtGdiEnumFonts parameter #6
    576 GDI32.dll!*
    577 GDI32.dll!*
    578 
    579 UNINITIALIZED READ
    580 name=http://code.google.com/p/drmemory/issues/detail?id=511 a
    581 RPCRT4.dll!...
    582 ole32.dll!*
    583 
    584 UNINITIALIZED READ
    585 name=http://code.google.com/p/drmemory/issues/detail?id=511 b
    586 ole32.dll!*
    587 ole32.dll!*
    588 ole32.dll!StringFromGUID2
    589 
    590 UNINITIALIZED READ
    591 name=http://code.google.com/p/drmemory/issues/detail?id=512 a
    592 ...
    593 *!browser_sync::Cryptographer::PackBootstrapToken
    594 *!browser_sync::Cryptographer::GetBootstrapToken
    595 
    596 UNINITIALIZED READ
    597 name=http://code.google.com/p/drmemory/issues/detail?id=512 b
    598 ...
    599 *!Encrypt*
    600 
    601 UNINITIALIZED READ
    602 name=http://code.google.com/p/drmemory/issues/detail?id=513 a
    603 *!v8*
    604 
    605 UNINITIALIZED READ
    606 name=http://code.google.com/p/drmemory/issues/detail?id=513 b
    607 *!*
    608 *!v8*
    609 
    610 UNINITIALIZED READ
    611 name=http://code.google.com/p/drmemory/issues/detail?id=513 c
    612 <not in a module>
    613 ...
    614 *!v8*
    615 
    616 UNINITIALIZED READ
    617 name=http://code.google.com/p/drmemory/issues/detail?id=546
    618 ...
    619 mscms.dll!*
    620 ...
    621 GDI32.dll!*
    622 *!IconUtil::Create*HICON*
    623 
    624 LEAK
    625 name=http://crbug.com/92152
    626 ...
    627 USER32.dll!CreateWindowExW
    628 *!views::TooltipManagerWin::Init
    629 *!views::TooltipManagerWin::TooltipManagerWin
    630 
    631 UNINITIALIZED READ
    632 name=http://code.google.com/p/drmemory/issues/detail?id=567 a
    633 dbghelp.dll!*
    634 ...
    635 dbghelp.dll!StackWalk64
    636 
    637 LEAK
    638 name=http://code.google.com/p/drmemory/issues/detail?id=567 b
    639 *!*
    640 dbghelp.dll!*
    641 ...
    642 dbghelp.dll!StackWalk64
    643 
    644 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
    645 # TppWorkerThread w/ syms.  We used to use mod+offs here, but that was too
    646 # brittle, so we switched to RPCRT4.dll!*.
    647 LEAK
    648 name=http://code.google.com/p/drmemory/issues/detail?id=569
    649 RPCRT4.dll!...
    650 ntdll.dll!*
    651 ntdll.dll!*
    652 KERNEL*.dll!BaseThreadInitThunk
    653 
    654 # TODO(timurrrr): investigate these
    655 UNINITIALIZED READ
    656 name=http://crbug.com/TODO a
    657 ...
    658 *!win_util::GetLogonSessionOnlyDACL
    659 
    660 UNINITIALIZED READ
    661 name=http://crbug.com/TODO b
    662 ...
    663 ntshrui.dll!IsPathSharedW
    664 
    665 UNINITIALIZED READ
    666 name=http://crbug.com/TODO c
    667 ...
    668 *!NetApiBufferFree
    669 
    670 UNINITIALIZED READ
    671 name=http://crbug.com/TODO d
    672 ...
    673 *!ShellExecute*
    674 
    675 UNINITIALIZED READ
    676 name=http://crbug.com/TODO e
    677 ...
    678 *!SHParseDisplayName
    679 
    680 UNINITIALIZED READ
    681 name=http://crbug.com/TODO f
    682 ...
    683 *!GetCanonicalPathInfo*
    684 
    685 UNINITIALIZED READ
    686 name=http://crbug.com/TODO g
    687 ...
    688 SHELL32.dll!Ordinal*
    689 
    690 UNINITIALIZED READ
    691 name=http://crbug.com/TODO h
    692 ...
    693 GDI32.dll!GetTextExtentPoint32*
    694 
    695 UNINITIALIZED READ
    696 name=http://crbug.com/TODO i
    697 ...
    698 *!SyncSocketClientListener::OnMsgClassResponse
    699 
    700 UNINITIALIZED READ
    701 name=http://crbug.com/TODO j
    702 ...
    703 *!*NSPRInitSingleton*
    704 
    705 UNINITIALIZED READ
    706 name=http://crbug.com/TODO k
    707 *!NdrSimpleStructFree
    708 
    709 UNINITIALIZED READ
    710 name=http://crbug.com/TODO l
    711 ntdll.dll!RtlpNtOpenKey
    712 ntdll.dll!RtlMakeSelfRelativeSD
    713 ntdll.dll!RtlAbsoluteToSelfRelativeSD
    714 ADVAPI32.dll!MakeSelfRelativeSD
    715 
    716 UNINITIALIZED READ
    717 name=http://crbug.com/TODO m
    718 ...
    719 CRYPT32.dll!I_CertSyncStore
    720 
    721 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
    722 # a leak.  Must be some early thread initialization.  Doesn't look like
    723 # bit-level though.
    724 UNINITIALIZED READ
    725 name=http://crbug.com/TODO n
    726 RPCRT4.dll!*
    727 RPCRT4.dll!*
    728 RPCRT4.dll!*
    729 ntdll.dll!*
    730 ntdll.dll!*
    731 KERNEL*.dll!BaseThreadInitThunk
    732 
    733 # No idea where this is from, but Chrome isn't even on the stack.
    734 POSSIBLE LEAK
    735 name=http://crbug.com/TODO o
    736 RPCRT4.dll!...
    737 ole32.dll!OleInitialize
    738 ole32.dll!...
    739 KERNEL32.dll!BaseThreadInitThunk
    740 
    741 # Matches lots of RPC related leaks.  So far RPC handles have been mostly owned
    742 # by system libraries and are not something we can fix easily.
    743 POSSIBLE LEAK
    744 name=http://crbug.com/TODO p
    745 RPCRT4.dll!*
    746 RPCRT4.dll!*
    747 RPCRT4.dll!NDRCContextBinding
    748 
    749 # No idea, but all system code, not interesting.
    750 POSSIBLE LEAK
    751 name=http://crbug.com/TODO q
    752 RPCRT4.dll!...
    753 RPCRT4.dll!*
    754 RPCRT4.dll!*
    755 ole32.dll!...
    756 ole32.dll!*
    757 ole32.dll!*
    758 ...
    759 SHELL32.dll!*
    760 
    761 LEAK
    762 name=http://crbug.com/109278 video device COM leaks
    763 ...
    764 *!media::VideoCaptureDevice::*
    765 
    766 LEAK
    767 name=http://crbug.com/109278 audio device COM leaks
    768 ...
    769 *!media::GetInputDeviceNamesWin
    770 
    771 # False pos uninit in shell32 when resolving links.
    772 UNINITIALIZED READ
    773 name=http://code.google.com/p/drmemory/issues/detail?id=745
    774 SHELL*.dll!*
    775 ...
    776 SHELL*.dll!*
    777 *!file_util::ResolveShortcut
    778 
    779 # Probable false pos uninit in ffmpeg.  Probably due to running off the end of a
    780 # buffer with SSE/MMX instructions whose results are then masked out later.
    781 UNINITIALIZED READ
    782 name=http://code.google.com/p/drmemory/issues/detail?id=747 a
    783 *!ff_pred4x4_vertical_vp8_mmxext
    784 
    785 UNINITIALIZED READ
    786 name=http://code.google.com/p/drmemory/issues/detail?id=747 b
    787 *!ff_pred4x4_down_left_mmxext
    788 
    789 UNINITIALIZED READ
    790 name=http://code.google.com/p/drmemory/issues/detail?id=747 c
    791 *!ff_vorbis_floor1_render_list
    792 
    793 UNINITIALIZED READ
    794 name=http://code.google.com/p/drmemory/issues/detail?id=747 d
    795 *!ff_put_vp8_epel8_h6_ssse3
    796 
    797 UNINITIALIZED READ
    798 name=http://code.google.com/p/drmemory/issues/detail?id=747 e
    799 *!ff_put_vp8_epel8_h4_ssse3
    800 
    801 UNINITIALIZED READ
    802 name=http://code.google.com/p/drmemory/issues/detail?id=747 f
    803 *!ff_fft_permute_sse
    804 
    805 UNINITIALIZED READ
    806 name=http://code.google.com/p/drmemory/issues/detail?id=747 g
    807 *!ff_simple_idct_add_mmx
    808 
    809 # ffmpeg seems to leak a pthread condition variable.
    810 LEAK
    811 name=http://crbug.com/110042
    812 *!ptw32_new
    813 *!pthread_self
    814 *!sem_wait
    815 *!pthread_cond_wait
    816 *!ff_thread_decode_frame
    817 *!avcodec_decode_video2
    818 
    819 # Improperly handled ioctl in bcrypt.
    820 UNINITIALIZED READ
    821 name=http://code.google.com/p/drmemory/issues/detail?id=748
    822 system call NtDeviceIoControlFile InputBuffer
    823 bcrypt.dll!BCryptUnregisterConfigChangeNotify
    824 bcrypt.dll!BCryptGetFipsAlgorithmMode
    825 ntdll.dll!RtlQueryEnvironmentVariable
    826 
    827 # Not sure what this is.
    828 POSSIBLE LEAK
    829 name=http://code.google.com/p/drmemory/issues/detail?id=749
    830 ...
    831 fwpuclnt.dll!*
    832 ...
    833 RPCRT4.dll!*
    834 ...
    835 fwpuclnt.dll!*
    836 ...
    837 WS2_32.dll!*
    838 *!talk_base::SafeGetHostByName
    839 *!talk_base::SocketAddress::GetLocalIPs
    840 *!talk_base::SocketAddress::IsLocalIP
    841 *!cricket::Transport::VerifyCandidate
    842 *!cricket::Session::OnRemoteCandidates
    843 *!cricket::Session::OnTransportInfoMessage
    844 *!cricket::Session::OnIncomingMessage
    845 *!cricket::SessionManager::OnIncomingMessage
    846 
    847 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
    848 UNINITIALIZED READ
    849 name=http://code.google.com/p/drmemory/issues/detail?id=529
    850 RPCRT4.dll!*
    851 ...
    852 *!base::LaunchProcess
    853 
    854 # System leak from CreateEnvironmentBlock.
    855 LEAK
    856 name=http://code.google.com/p/drmemory/issues/detail?id=757
    857 ...
    858 USERENV.dll!CreateEnvironmentBlock
    859 
    860 # Looks like another instance of 753
    861 LEAK
    862 name=http://code.google.com/p/drmemory/issues/detail?id=753
    863 ...
    864 ntdll.dll!RtlLoadString
    865 
    866 # More bit manip fps
    867 UNINITIALIZED READ
    868 name=http://code.google.com/p/drmemory/issues/detail?id=493
    869 USP10.dll!ScriptPositionSingleGlyph
    870 
    871 # Various TLS leaks that we don't understand yet.  We should be finding a root
    872 # for these.
    873 LEAK
    874 name=http://code.google.com/p/drmemory/issues/detail?id=778 a
    875 KERNELBASE.dll!TlsSetValue
    876 
    877 # Originally filed as: http://crbug.com/109281
    878 LEAK
    879 name=http://code.google.com/p/drmemory/issues/detail?id=778 b
    880 *!operator new
    881 *!operator new[]
    882 *!*::ConstructTlsVector
    883 *!base::ThreadLocalStorage::StaticSlot::Get
    884 
    885 # This is an NSS PRThread object installed in TLS.  Why isn't this detected as a
    886 # root?  See also http://crbug.com/32624
    887 LEAK
    888 name=http://code.google.com/p/drmemory/issues/detail?id=778 c
    889 *!PR_Calloc
    890 *!_PR_AttachThread
    891 *!_PRI_AttachThread
    892 
    893 # Bit-level fps in rich edit layer.
    894 UNINITIALIZED READ
    895 name=http://code.google.com/p/drmemory/issues/detail?id=791
    896 RICHED20.dll!*
    897 RICHED20.dll!*
    898 
    899 # Already suppressed by drmemory default supp we don't have yet.
    900 LEAK
    901 name=i#757: RPC binding leaks in sspicli.dll
    902 RPCRT4.dll!*
    903 ...
    904 SspiCli.dll!*
    905 SspiCli.dll!Cre*
    906 
    907 # Async NtReadFile false positives.  This was fixed in drmemory r772, remove
    908 # this supp when we pull that rev.
    909 UNADDRESSABLE ACCESS
    910 name=http://code.google.com/p/drmemory/issues/detail?id=798
    911 system call NtReadFile parameter #5
    912 KERNEL32.dll!ReadFile
    913 
    914 # Probable syscall false positive.
    915 UNADDRESSABLE ACCESS
    916 name=http://code.google.com/p/drmemory/issues/detail?id=809
    917 system call NtGdiPolyPolyDraw parameter #1
    918 *!gfx::Path::CreateNativeRegion
    919 
    920 # Very wide suppression for all uninits in rpcrt4.dll.  We get bad stack traces
    921 # coming out of this module (sometimes only one frame), which makes it hard to
    922 # write precise suppressions.  Until we have bit-level tracking (DRMi#113) we
    923 # should keep this.
    924 UNINITIALIZED READ
    925 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard
    926 RPCRT4.dll!*
    927 
    928 UNINITIALIZED READ
    929 name=http://code.google.com/p/drmemory/issues/detail?id=841 a
    930 ...
    931 CRYPTNET.dll!I_CryptNetGetConnectivity
    932 
    933 UNINITIALIZED READ
    934 name=http://code.google.com/p/drmemory/issues/detail?id=841 b
    935 ...
    936 webio.dll!*
    937 
    938 UNINITIALIZED READ
    939 name=http://code.google.com/p/drmemory/issues/detail?id=841 c
    940 ...
    941 winhttp.dll!*
    942 
    943 LEAK
    944 name=http://code.google.com/p/drmemory/issues/detail?id=841 d
    945 ...
    946 CRYPTNET.dll!I_CryptNetGetConnectivity
    947 
    948 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
    949 UNINITIALIZED READ
    950 name=http://code.google.com/p/drmemory/issues/detail?id=810
    951 instruction=test   %edx %edx
    952 USER32.dll!GetClassLongW
    953 ...
    954 *!ui::CenterAndSizeWindow
    955 
    956 UNINITIALIZED READ
    957 name=http://code.google.com/p/drmemory/issues/detail?id=815
    958 KERNEL*.dll!...
    959 dxgi.dll!*
    960 USER32.dll!GetMonitorInfoA
    961 ntdll.dll!KiUserCallbackDispatcher
    962 dxgi.dll!*
    963 WinSATAPI.DLL!*
    964 
    965 # Suppress anything in cmd.exe.  It's safer to suppress these than disable
    966 # following, since someone might launch a Chrome process via cmd.exe.
    967 LEAK
    968 name=cmd.exe
    969 ...
    970 cmd.exe!*
    971 
    972 # Possible true system use after free.
    973 UNADDRESSABLE ACCESS
    974 name=http://code.google.com/p/drmemory/issues/detail?id=623
    975 KERNELBASE.dll!TlsGetValue
    976 OLEAUT32.dll!SysFreeString
    977 OLEAUT32.dll!SysAllocStringByteLen
    978 OLEACC.dll!*
    979 OLEACC.dll!*
    980 OLEACC.dll!*
    981 OLEACC.dll!*
    982 
    983 # basic_streambuf seems to leak something in creating a std::_Mutex
    984 LEAK
    985 name=http://code.google.com/p/drmemory/issues/detail?id=857
    986 ntdll.dll!...
    987 ntdll.dll!RtlInitializeCriticalSection
    988 *!_Mtxinit
    989 *!std::_Mutex::_Mutex
    990 *!std::basic_streambuf<*>
    991 
    992 # stdext::hash_map<> seems to swap uninitialized floats.
    993 UNINITIALIZED READ
    994 name=http://code.google.com/p/drmemory/issues/detail?id=931
    995 *!std::swap<float>
    996 *!std::_Hash<*
    997 
    998 # syscall false positive on handling NtQuerySystemInformation, fix in soon.
    999 UNINITIALIZED READ
   1000 name=http://code.google.com/p/drmemory/issues/detail?id=932
   1001 KERNEL32.dll!K32GetPerformanceInfo
   1002 
   1003 # Seems to create a DC, sometimes.  GetTextMetrics returns no pointers, though.
   1004 LEAK
   1005 name=GDI SetBrushOrgEx leak
   1006 GDI32.dll!...
   1007 GDI32.dll!GetTextMetricsW
   1008 *!gfx::PlatformFontWin::CreateHFontRef
   1009 *!gfx::PlatformFontWin::GetBaseFontRef
   1010 
   1011 ###############################################################
   1012 # Benign issues in Chromium
   1013 
   1014 # This test intentionally leaks an object and checks that it's never deleted.
   1015 LEAK
   1016 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
   1017 ...
   1018 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
   1019 
   1020 LEAK
   1021 name=deliberate histogram leak
   1022 ...
   1023 *!replace_operator_new
   1024 ...
   1025 *!*::*Histogram::FactoryGet
   1026 
   1027 LEAK
   1028 name=deliberate LazyInstance leak
   1029 ...
   1030 *!*LeakyLazyInstance*
   1031 ...
   1032 *!base::LazyInstance*::Pointer
   1033 
   1034 LEAK
   1035 name=http://crbug.com/79933 (1)
   1036 ...
   1037 *!TestURLRequestContext::Init
   1038 
   1039 LEAK
   1040 name=http://crbug.com/79933 (2)
   1041 ...
   1042 *!TestURLRequestContext::TestURLRequestContext
   1043 *!TestURLRequestContextGetter::GetURLRequestContext
   1044 *!notifier::SingleLoginAttempt::SingleLoginAttempt
   1045 *!notifier::Login::StartConnection
   1046 *!syncer::InvalidationNotifier::UpdateCredentials
   1047 *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials
   1048 
   1049 LEAK
   1050 name=http://crbug.com/79933 (3)
   1051 ...
   1052 *!TestURLRequestContext::TestURLRequestContext
   1053 *!TestURLRequestContextGetter::GetURLRequestContext
   1054 *!URLFetcher::Core::StartURLRequest
   1055 
   1056 LEAK
   1057 name=http://crbug.com/79933 (4)
   1058 *!generic_cpp_alloc
   1059 *!operator new
   1060 *!std::_Allocate<net::SSLConfigService::Observer *>
   1061 *!std::allocator<net::SSLConfigService::Observer *>::allocate
   1062 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::_Insert_n
   1063 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::insert
   1064 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::push_back
   1065 *!ObserverListBase<net::SSLConfigService::Observer>::AddObserver
   1066 ...
   1067 *!net::HttpNetworkSession::HttpNetworkSession
   1068 *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
   1069 *!notifier::XmppClientSocketFactory::CreateTransportClientSocket
   1070 *!notifier::ChromeAsyncSocket::Connect
   1071 *!buzz::XmppClient::ProcessStartXmppLogin
   1072 *!buzz::XmppClient::Process
   1073 *!talk_base::Task::Step
   1074 *!talk_base::TaskRunner::InternalRunTasks
   1075 *!talk_base::TaskRunner::RunTasks
   1076 *!notifier::TaskPump::CheckAndRunTasks
   1077 *!base::internal::RunnableAdapter<void (__thiscall notifier::TaskPump::*)(void)>::Run
   1078 
   1079 # Test intentionally leaks an object.
   1080 LEAK
   1081 name=http://crbug.com/86301
   1082 *!replace_operator_new
   1083 ...
   1084 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody
   1085 
   1086 # Leak in a binary copy of Firefox 3's NSS dll.  Not much we can do about it.
   1087 LEAK
   1088 name=Firefox 3 NSS dll leak
   1089 nspr4.dll!*
   1090 ...
   1091 *!NSSDecryptor::~NSSDecryptor
   1092 
   1093 # We get uninit reports inside GMock when it prints the bytes of references to
   1094 # partially initialized objects passed to unexpected method calls.
   1095 UNINITIALIZED READ
   1096 name=GMock printing uninit data
   1097 ...
   1098 *!testing::internal2::PrintBytesInObjectTo
   1099 
   1100 ###############################################################
   1101 # Real issues in Chromium
   1102 
   1103 LEAK
   1104 name=http://crbug.com/32085
   1105 ...
   1106 chrome.dll!NotificationRegistrar::Add
   1107 
   1108 LEAK
   1109 name=http://crbug.com/32623
   1110 ...
   1111 *!ssl3_HandleHandshakeMessage
   1112 *!ssl3_HandleHandshake
   1113 *!ssl3_HandleRecord
   1114 *!ssl3_GatherCompleteHandshake
   1115 ...
   1116 *!SSL_ForceHandshake
   1117 *!net::SSLServerSocketNSS::DoHandshake
   1118 *!net::SSLServerSocketNSS::DoHandshakeLoop
   1119 
   1120 UNINITIALIZED READ
   1121 name=http://crbug.com/57266 (1)
   1122 ...
   1123 *!remoting::EncoderVp8::Encode
   1124 
   1125 UNINITIALIZED READ
   1126 name=http://crbug.com/57266 (2)
   1127 ...
   1128 *!vp8_*
   1129 
   1130 LEAK
   1131 name=http://crbug.com/70062
   1132 *!PR_Calloc
   1133 *!PR_NewLock
   1134 ...
   1135 *!InitSessionCacheLocks
   1136 *!initSessionCacheLocksLazily
   1137 *!PR_CallOnce
   1138 *!ssl_InitSessionCacheLocks
   1139 *!lock_cache
   1140 *!ssl_LookupSID
   1141 *!ssl2_BeginClientHandshake
   1142 *!ssl_Do1stHandshake
   1143 *!SSL_ForceHandshake
   1144 *!net::SSL*SocketNSS::DoHandshake
   1145 *!net::SSL*SocketNSS::DoHandshakeLoop
   1146 
   1147 LEAK
   1148 name=http://crbug.com/74417 a
   1149 *!replace_operator_new
   1150 *!disk_cache::BackendImpl::CreateEntryImpl
   1151 
   1152 LEAK
   1153 name=http://crbug.com/74417 b
   1154 *!replace_operator_new
   1155 *!disk_cache::BackendImpl::NewEntry
   1156 
   1157 # One more disk_cache::BackendImpl leak.  See also http://crbug.com/87500.
   1158 LEAK
   1159 name=http://crbug.com/74417 c
   1160 *!replace_operator_new
   1161 ...
   1162 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
   1163 
   1164 LEAK
   1165 name=http://crbug.com/75247
   1166 ...
   1167 *!replace_operator_new
   1168 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
   1169 
   1170 LEAK
   1171 name=http://crbug.com/78784
   1172 *!generic_cpp_alloc
   1173 *!operator new
   1174 *!TestingProfile::CreateRequestContext
   1175 *!*ProfileSyncService*::SetUp
   1176 
   1177 LEAK
   1178 name=http://crbug.com/80550 (1)
   1179 ...
   1180 *!RenderWidgetHost::WasHidden
   1181 
   1182 LEAK
   1183 name=http://crbug.com/80550 (2)
   1184 ...
   1185 *!RenderWidgetHost::WasRestored
   1186 
   1187 LEAK
   1188 name=http://crbug.com/87612
   1189 ...
   1190 *!SSL_ConfigSecureServer
   1191 *!net::SSLServerSocketNSS::InitializeSSLOptions
   1192 *!net::SSLServerSocketNSS::Handshake
   1193 
   1194 LEAK
   1195 name=http://crbug.com/88640
   1196 *!generic_cpp_alloc
   1197 *!operator new
   1198 *!ProfileImpl::InitRegisteredProtocolHandlers
   1199 *!ProfileImpl::DoFinalInit
   1200 *!ProfileImpl::OnPrefsLoaded
   1201 
   1202 LEAK
   1203 name=http://crbug.com/91465
   1204 *!generic_cpp_alloc
   1205 *!operator new
   1206 *!browser_sync::internal::WeakHandleCore<browser_sync::JsBackend>::*
   1207 *!browser_sync::WeakHandle<browser_sync::JsBackend>::*
   1208 *!syncer::SyncManager::SyncInternal::Init
   1209 
   1210 LEAK
   1211 name=http://crbug.com/91491
   1212 ...
   1213 *!CrxUpdateService::ProcessPendingItems
   1214 
   1215 UNINITIALIZED READ
   1216 name=http://crbug.com/92026 (1)
   1217 softokn3.dll!FC_GetFunctionList
   1218 ...
   1219 softokn3.dll!NSC_ModuleDBFunc
   1220 
   1221 UNINITIALIZED READ
   1222 name=http://crbug.com/92026 (2)
   1223 freebl3.dll!FREEBL_GetVector
   1224 ...
   1225 softokn3.dll!NSC_ModuleDBFunc
   1226 
   1227 LEAK
   1228 name=http://crbug.com/92166
   1229 ...
   1230 *!replace_operator_new
   1231 *!views::NativeWidgetWin::OnCreate
   1232 
   1233 # Possible real Chromium issue in DoCrossfade.
   1234 UNINITIALIZED READ
   1235 name=http://crbug.com/110049
   1236 *!media::DoCrossfade<*>
   1237 *!media::Crossfade
   1238 *!media::AudioRendererAlgorithmBase::FillBuffer
   1239 
   1240 # Known sqlite3 leaks.
   1241 LEAK
   1242 name=http://crbug.com/113847 (1)
   1243 ...
   1244 *!sqlite3MemMalloc
   1245 *!mallocWithAlarm
   1246 *!sqlite3Malloc
   1247 ...
   1248 *!yy_reduce
   1249 
   1250 LEAK
   1251 name=http://crbug.com/113847 (2)
   1252 ...
   1253 *!openDatabase
   1254 *!sqlite3_open
   1255 
   1256 LEAK
   1257 name=http://crbug.com/115328
   1258 ...
   1259 *!GenericInfoViewTest_GenericInfoView_Test::TestBody
   1260 
   1261 UNINITIALIZED READ
   1262 name=http://crbug.com/116277
   1263 *!MOZ_Z_deflate
   1264 *!zipCloseFileInZipRaw64
   1265 
   1266 LEAK
   1267 name=http://crbug.com/117427 a
   1268 ...
   1269 *!net::HostCache::Set
   1270 *!net::HostResolverImpl::CacheResult
   1271 *!net::HostResolverImpl::Job::CompleteRequests
   1272 *!net::HostResolverImpl::Job::OnProcTaskComplete
   1273 *!base::internal::RunnableAdapter<void (__thiscall net::HostResolverImpl::Job::*)(int,net::AddressList const &)>::Run
   1274 
   1275 # Probably related to 117427.  Someone is not tearing down DNS resolution during
   1276 # testing.
   1277 LEAK
   1278 name=http://crbug.com/117427 b
   1279 *!generic_cpp_alloc
   1280 *!operator new
   1281 *!base::internal::WeakReferenceOwner::GetRef
   1282 *!base::SupportsWeakPtr<net::HostResolverImpl>::AsWeakPtr
   1283 *!net::HostResolverImpl::Job::Job
   1284 *!net::HostResolverImpl::Resolve
   1285 *!net::SingleRequestHostResolver::Resolve
   1286 *!net::TransportConnectJob::DoResolveHost
   1287 *!net::TransportConnectJob::DoLoop
   1288 *!net::TransportConnectJob::ConnectInternal
   1289 *!net::ConnectJob::Connect
   1290 *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
   1291 *!net::internal::ClientSocketPoolBaseHelper::RequestSocket
   1292 *!net::ClientSocketPoolBase<net::TransportSocketParams>::RequestSocket
   1293 *!net::TransportClientSocketPool::RequestSocket
   1294 *!net::ClientSocketHandle::Init<net::TransportSocketParams,net::TransportClientSocketPool>
   1295 *!net::`anonymous namespace'::InitSocketPoolHelper
   1296 *!net::InitSocketHandleForRawConnect
   1297 *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
   1298 *!base::internal::RunnableAdapter<void (__thiscall notifier::ProxyResolvingClientSocket::*)(int)>::Run
   1299 
   1300 # IE frame possible leak of COM object.
   1301 LEAK
   1302 name=http://crbug.com/122399
   1303 ole32.dll!...
   1304 ole32.dll!CoTaskMemAlloc
   1305 urlmon.dll!...
   1306 urlmon.dll!CreateUri
   1307 IEFRAME.dll!*
   1308 
   1309 # RenderWidgetHelper leak in DelayProfileDestruction test.
   1310 LEAK
   1311 name=http://crbug.com/125565
   1312 *!generic_cpp_alloc
   1313 *!operator new
   1314 *!RenderProcessHostImpl::RenderProcessHostImpl
   1315 *!SiteInstanceImpl::GetProcess
   1316 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
   1317 
   1318 LEAK
   1319 name=http://crbug.com/125807
   1320 *!generic_cpp_alloc
   1321 *!operator new
   1322 *!TransportSecurityPersister::TransportSecurityPersister
   1323 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest
   1324