Home | History | Annotate | Download | only in drmemory
      1 # This file contains suppressions for the Dr.Memory tool, see
      2 # http://dev.chromium.org/developers/how-tos/using-drmemory
      3 #
      4 # This file should contain suppressions only for the reports happening
      5 # in the 'full' mode (drmemory_full).
      6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
      7 # please use suppressions.txt instead.
      8 
      9 ###############################################################
     10 # Known reports on the third party we have no control over.
     11 
     12 UNINITIALIZED READ
     13 name=http://crbug.com/116277
     14 ...
     15 *!MOZ_Z_deflate
     16 
     17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
     18 LEAK
     19 name=http://code.google.com/p/drmemory/issues/detail?id=406
     20 ADVAPI32.dll!WmiOpenBlock
     21 ADVAPI32.dll!WmiOpenBlock
     22 
     23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
     24 LEAK
     25 name=GoogleDesktop LEAK
     26 ...
     27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
     28 
     29 # They deliberately use uninit local var in sqlite random generator.
     30 # Random bytes may mess up the call stack between randomByte and
     31 # sqlite3_* frames (http://code.google.com/p/drmemory/issues/detail?id=1514)
     32 # so we just look for randomByte.
     33 UNINITIALIZED READ
     34 name=sqlite3_randomness UNINIT
     35 *!randomByte
     36 
     37 # Intentional leak in WebKit Template Framework for ThreadData.
     38 LEAK
     39 name=intentional WTF ThreadData leak
     40 ...
     41 *!WTF::wtfThreadData
     42 
     43 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
     44 LEAK
     45 name=http://crbug.com/125558 a
     46 KERNELBASE.dll!LocalAlloc
     47 SECHOST.dll!...
     48 SECHOST.dll!NotifyServiceStatusChange
     49 WINHTTP.dll!...
     50 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
     51 *!net::ProxyResolverWinHttp::GetProxyForURL
     52 
     53 # Tiny locale-related leaks in ntdll.  Probably system bug.
     54 LEAK
     55 name=http://crbug.com/125558 b
     56 ntdll.dll!...
     57 ntdll.dll!*
     58 KERNELBASE.dll!...
     59 KERNELBASE.dll!GetCPInfoExW
     60 webio.dll!*
     61 webio.dll!*
     62 webio.dll!*
     63 WINHTTP.dll!...
     64 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
     65 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig
     66 
     67 UNINITIALIZED READ
     68 name=http://crbug.com/30704 #f
     69 libpng.dll!wk_png_write_find_filter
     70 libpng.dll!wk_png_write_row
     71 
     72 ###############################################################
     73 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
     74 # assumptions or unhandled syscalls
     75 
     76 # Please note: the following suppressions were written in the abscense of
     77 # private symbols so may need to be updated when we switch to auto-loading PDBs
     78 UNINITIALIZED READ
     79 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1)
     80 ntdll.dll!Rtl*
     81 ntdll.dll!Rtl*
     82 ntdll.dll!RtlFindActivationContextSectionString
     83 
     84 UNINITIALIZED READ
     85 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2)
     86 ...
     87 SHELL32.dll!SHFileOperation*
     88 
     89 UNINITIALIZED READ
     90 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3)
     91 ...
     92 SHELL32.dll!SHGetFolderPath*
     93 
     94 LEAK
     95 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4)
     96 ...
     97 SHELL32.dll!SHGetFolderPath*
     98 
     99 UNINITIALIZED READ
    100 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5)
    101 ...
    102 SHELL32.dll!SHCreateDirectory*
    103 
    104 UNINITIALIZED READ
    105 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6)
    106 ...
    107 SHELL32.dll!ILLoadFromStream*
    108 
    109 UNINITIALIZED READ
    110 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7)
    111 ...
    112 SHELL32.dll!ILSaveToStream*
    113 
    114 LEAK
    115 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8)
    116 ...
    117 SHELL32.dll!SHFileOperation*
    118 
    119 UNINITIALIZED READ
    120 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9)
    121 ...
    122 SHELL32.dll!SHGetItemFromDataObject
    123 
    124 LEAK
    125 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10)
    126 ...
    127 SHELL32.dll!SHGetItemFromDataObject
    128 
    129 LEAK
    130 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11)
    131 ...
    132 ole32.dll!*
    133 SHELL32.dll!SHChangeNotifySuspendResume
    134 
    135 UNINITIALIZED READ
    136 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1)
    137 ...
    138 *!CreateProcess*
    139 
    140 LEAK
    141 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2)
    142 ...
    143 *!CreateProcess*
    144 
    145 UNINITIALIZED READ
    146 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3)
    147 ...
    148 *!base::LaunchApp*
    149 
    150 UNINITIALIZED READ
    151 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1)
    152 ...
    153 *!CreateWindow*
    154 
    155 POSSIBLE LEAK
    156 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2)
    157 GDI32.dll!*
    158 GDI32.dll!CreateFontIndirectExW
    159 GDI32.dll!CreateFontIndirectW
    160 
    161 LEAK
    162 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3)
    163 KERNELBASE.dll!LocalAlloc
    164 ...
    165 USER32.dll!CreateWindow*
    166 
    167 UNINITIALIZED READ
    168 name=http://code.google.com/p/drmemory/issues/detail?id=18 a
    169 ...
    170 *!CoInitialize*
    171 
    172 UNINITIALIZED READ
    173 name=http://code.google.com/p/drmemory/issues/detail?id=18 b
    174 ...
    175 *!CoCreateInstance*
    176 
    177 UNINITIALIZED READ
    178 name=http://code.google.com/p/drmemory/issues/detail?id=18 c
    179 ...
    180 *!CoUninitialize*
    181 
    182 UNINITIALIZED READ
    183 name=http://code.google.com/p/drmemory/issues/detail?id=18 d
    184 ...
    185 UxTheme.dll!*
    186 
    187 UNINITIALIZED READ
    188 name=http://code.google.com/p/drmemory/issues/detail?id=40 a
    189 ...
    190 WINSPOOL.DRV!*
    191 
    192 LEAK
    193 name=http://code.google.com/p/drmemory/issues/detail?id=40 b
    194 ...
    195 WINSPOOL.DRV!*
    196 
    197 UNINITIALIZED READ
    198 name=http://code.google.com/p/drmemory/issues/detail?id=48 a
    199 system call NtContinue
    200 ...
    201 *!*SetThreadName
    202 
    203 UNINITIALIZED READ
    204 name=http://code.google.com/p/drmemory/issues/detail?id=48 b
    205 system call NtContinue
    206 *!WTF::initializeCurrentThreadInternal
    207 
    208 UNINITIALIZED READ
    209 name=http://code.google.com/p/drmemory/issues/detail?id=52 a
    210 ...
    211 DBGHELP.dll!SymInitialize
    212 
    213 UNINITIALIZED READ
    214 name=http://code.google.com/p/drmemory/issues/detail?id=52 b
    215 ...
    216 DBGHELP.dll!SymEnumSourceFiles
    217 
    218 UNINITIALIZED READ
    219 name=http://code.google.com/p/drmemory/issues/detail?id=52 c
    220 ...
    221 msvcrt.dll!_RTDynamicCast
    222 
    223 UNINITIALIZED READ
    224 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp
    225 instruction=test   0x*(%*) $0x??
    226 DBGHELP.dll!SymUnloadModule64
    227 
    228 UNINITIALIZED READ
    229 name=http://code.google.com/p/drmemory/issues/detail?id=53
    230 ADVAPI32.dll!WmiMofEnumerateResourcesA
    231 ADVAPI32.dll!WmiMofEnumerateResourcesA
    232 ADVAPI32.dll!Sta*TraceW
    233 
    234 UNINITIALIZED READ
    235 name=http://code.google.com/p/drmemory/issues/detail?id=58
    236 ...
    237 *!_cfltcvt_l
    238 
    239 UNINITIALIZED READ
    240 name=http://code.google.com/p/drmemory/issues/detail?id=60
    241 USP10.dll!*
    242 ...
    243 USP10.dll!ScriptStringAnalyse
    244 
    245 LEAK
    246 IMM32.dll!ImmGetIMCCSize
    247 IMM32.dll!ImmLockClientImc
    248 IMM32.dll!ImmDisableIME
    249 IMM32.dll!ImmSetActiveContext
    250 USER32.dll!IMPSetIMEA
    251 
    252 UNINITIALIZED READ
    253 name=http://code.google.com/p/drmemory/issues/detail?id=65 a
    254 ...
    255 *!SystemFunction036
    256 
    257 UNINITIALIZED READ
    258 name=http://code.google.com/p/drmemory/issues/detail?id=65 b
    259 ...
    260 *!talk_base::CreateRandomString
    261 
    262 UNINITIALIZED READ
    263 name=http://code.google.com/p/drmemory/issues/detail?id=68 a
    264 ...
    265 WS2_32.dll!*
    266 
    267 UNINITIALIZED READ
    268 name=http://code.google.com/p/drmemory/issues/detail?id=68 b
    269 ...
    270 ADVAPI32.dll!SetSecurityDescriptorDacl
    271 
    272 UNINITIALIZED READ
    273 name=http://code.google.com/p/drmemory/issues/detail?id=68 c
    274 ...
    275 MSWSOCK.dll!WSPStartup
    276 
    277 UNINITIALIZED READ
    278 name=http://code.google.com/p/drmemory/issues/detail?id=68 d
    279 ...
    280 ntdll.dll!RtlValidateUnicodeString
    281 
    282 LEAK
    283 name=http://code.google.com/p/drmemory/issues/detail?id=256
    284 *!_mtinit
    285 *!__tmainCRTStartup
    286 *!mainCRTStartup
    287 
    288 POSSIBLE LEAK
    289 name=http://code.google.com/p/drmemory/issues/detail?id=274 a
    290 ...
    291 GDI32.dll!CreateDCW
    292 
    293 LEAK
    294 name=http://code.google.com/p/drmemory/issues/detail?id=274 b
    295 ...
    296 GDI32.dll!CreateDCW
    297 
    298 LEAK
    299 name=http://code.google.com/p/drmemory/issues/detail?id=275
    300 ...
    301 *!_getptd*
    302 
    303 UNINITIALIZED READ
    304 name=http://code.google.com/p/drmemory/issues/detail?id=276
    305 ...
    306 ntdll.dll!RtlConvertUlongToLargeInteger
    307 ntdll.dll!RtlConvertUlongToLargeInteger
    308 ntdll.dll!KiUserExceptionDispatcher
    309 
    310 LEAK
    311 name=http://code.google.com/p/drmemory/issues/detail?id=305
    312 *!free
    313 *!free
    314 *!operator new
    315 ...
    316 *!MiniDumpWriteDump
    317 
    318 UNINITIALIZED READ
    319 name=http://code.google.com/p/drmemory/issues/detail?id=346 a
    320 ...
    321 GDI32.dll!CloseEnhMetaFile
    322 
    323 UNINITIALIZED READ
    324 name=http://code.google.com/p/drmemory/issues/detail?id=346 b
    325 GDI32.dll!SetPolyFillMode
    326 GDI32.dll!CreateICW
    327 
    328 UNINITIALIZED READ
    329 name=http://code.google.com/p/drmemory/issues/detail?id=362
    330 USER32.dll!UnregisterClass*
    331 
    332 LEAK
    333 name=http://code.google.com/p/drmemory/issues/detail?id=382
    334 ...
    335 ntdll.dll!CsrNewThread
    336 
    337 UNINITIALIZED READ
    338 name=http://code.google.com/p/drmemory/issues/detail?id=397
    339 system call NtDeviceIoControlFile InputBuffer
    340 ADVAPI32.dll!ImpersonateAnonymousToken
    341 
    342 UNINITIALIZED READ
    343 name=http://code.google.com/p/drmemory/issues/detail?id=407 a
    344 system call NtRequestWaitReplyPort
    345 RPCRT4.dll!I_RpcSendReceive
    346 RPCRT4.dll!NdrSendReceive
    347 
    348 UNINITIALIZED READ
    349 name=http://code.google.com/p/drmemory/issues/detail?id=407 b
    350 IMM32.dll!*
    351 ntdll.dll!LdrInitializeThunk
    352 ntdll.dll!LdrShutdownThread
    353 
    354 UNINITIALIZED READ
    355 name=http://code.google.com/p/drmemory/issues/detail?id=412 a
    356 ADVAPI32.dll!RegDeleteValue*
    357 
    358 UNINITIALIZED READ
    359 name=http://code.google.com/p/drmemory/issues/detail?id=412 b
    360 ...
    361 ADVAPI32.dll!Crypt*
    362 
    363 UNINITIALIZED READ
    364 name=http://code.google.com/p/drmemory/issues/detail?id=412 c
    365 ...
    366 RPCRT4.dll!NdrClientCall2
    367 
    368 LEAK
    369 name=http://code.google.com/p/drmemory/issues/detail?id=412 d
    370 RSAENH.dll!DllUnregisterServer
    371 ...
    372 ADVAPI32.dll!CryptAcquireContextA
    373 CRYPT32.dll!CryptEnumOIDFunction
    374 ...
    375 CRYPT32.dll!CertFindCertificateInStore
    376 
    377 UNINITIALIZED READ
    378 name=http://code.google.com/p/drmemory/issues/detail?id=412 e
    379 ...
    380 RSAENH.dll!CPGenRandom
    381 
    382 UNINITIALIZED READ
    383 name=http://code.google.com/p/drmemory/issues/detail?id=412 f
    384 ...
    385 CRYPT??.dll!Crypt*
    386 
    387 UNINITIALIZED READ
    388 name=http://code.google.com/p/drmemory/issues/detail?id=412 g
    389 *!replace_memcmp
    390 ...
    391 *!testing::internal::CmpHelperEQ*
    392 ...
    393 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
    394 
    395 # We get these sometimes from AesEncrypt and AesExpandKey.  AesEncrypt doesn't
    396 # have frame pointers, and we have trouble unwinding from it.  Therefore, we use
    397 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
    398 UNINITIALIZED READ
    399 name=http://code.google.com/p/drmemory/issues/detail?id=412 h
    400 RSAENH.dll!*
    401 
    402 UNINITIALIZED READ
    403 name=http://code.google.com/p/drmemory/issues/detail?id=425 a
    404 CLBCatQ.DLL!DestroyStgDatabase
    405 CLBCatQ.DLL!PostError
    406 CLBCatQ.DLL!PostError
    407 
    408 LEAK
    409 name=http://code.google.com/p/drmemory/issues/detail?id=425 b
    410 RPCRT4.dll!I_RpcBCacheFree
    411 RPCRT4.dll!I_RpcBCacheFree
    412 ...
    413 RPCRT4.dll!NdrClientCall2
    414 
    415 UNINITIALIZED READ
    416 name=http://code.google.com/p/drmemory/issues/detail?id=425 c
    417 msdmo.dll!*
    418 msdmo.dll!*
    419 DEVENUM.DLL!*
    420 
    421 UNINITIALIZED READ
    422 name=http://code.google.com/p/drmemory/issues/detail?id=435 a
    423 ...
    424 ntdll.dll!RtlSetSecurityObject
    425 ntdll.dll!RtlNewSecurityObjectEx
    426 ADVAPI32.dll!CreatePrivateObjectSecurityEx
    427 NTMARTA.dll!AccRewriteSetNamedRights
    428 
    429 POSSIBLE LEAK
    430 name=http://code.google.com/p/drmemory/issues/detail?id=435 b
    431 WLDAP32.dll!Ordinal325
    432 ...
    433 WLDAP32.dll!Ordinal325
    434 ntdll.dll!LdrInitializeThunk
    435 ntdll.dll!LdrFindResourceDirectory_U
    436 ntdll.dll!RtlValidateUnicodeString
    437 ntdll.dll!LdrLoadDll
    438 KERNEL32.dll!LoadLibraryExW
    439 
    440 # mod+offs suppression because the symbolic makes no sense and changes
    441 # completely in the presence of WS2_32.dll symbols.
    442 LEAK
    443 name=http://code.google.com/p/drmemory/issues/detail?id=438
    444 <WS2_32.dll+0x260c>
    445 <WS2_32.dll+0x2b76>
    446 <WS2_32.dll+0x2c61>
    447 
    448 UNINITIALIZED READ
    449 name=http://code.google.com/p/drmemory/issues/detail?id=454 a
    450 ...
    451 WINMM.dll!wave*GetNumDevs
    452 
    453 LEAK
    454 name=http://code.google.com/p/drmemory/issues/detail?id=454 b
    455 ...
    456 WINMM.dll!wave*GetNumDevs
    457 
    458 LEAK
    459 name=http://code.google.com/p/drmemory/issues/detail?id=466
    460 ntdll.dll!RtlRunOnceBeginInitialize
    461 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
    462 
    463 UNINITIALIZED READ
    464 name=http://code.google.com/p/drmemory/issues/detail?id=473 a
    465 system call NtDeviceIoControlFile InputBuffer
    466 ...
    467 iphlpapi.dll!GetAdaptersAddresses
    468 
    469 POSSIBLE LEAK
    470 name=http://code.google.com/p/drmemory/issues/detail?id=473 b
    471 ESENT.dll!*
    472 ESENT.dll!*
    473 ESENT.dll!*
    474 ntdll.dll!Ldr*Init*
    475 ntdll.dll!Ldr*
    476 ntdll.dll!*
    477 ntdll.dll!LdrLoadDll
    478 ...
    479 iphlpapi.dll!GetPerAdapterInfo
    480 ...
    481 iphlpapi.dll!GetAdaptersAddresses
    482 
    483 POSSIBLE LEAK
    484 name=http://code.google.com/p/drmemory/issues/detail?id=473 c
    485 RPCRT4.dll!*
    486 RPCRT4.dll!*
    487 ...
    488 IPHLPAPI.DLL!GetAdaptersAddresses
    489 
    490 LEAK
    491 name=http://code.google.com/p/drmemory/issues/detail?id=475
    492 ...
    493 ADVAPI32.dll!CryptAcquireContextA
    494 ...
    495 CRYPT32.dll!CryptMsgOpenToDecode
    496 ...
    497 CRYPT32.dll!CryptQueryObject
    498 
    499 # Lots of leaks from our interactions with the system certificate store.  May be
    500 # worth reviewing our use of their API.
    501 LEAK
    502 name=http://code.google.com/p/drmemory/issues/detail?id=476 a
    503 KERNEL*.dll!LocalAlloc
    504 ...
    505 CRYPT32.dll!CertGetCRLContextProperty
    506 
    507 LEAK
    508 name=http://code.google.com/p/drmemory/issues/detail?id=476 b
    509 KERNEL*.dll!LocalAlloc
    510 ...
    511 CRYPT32.dll!CertAddCRLContextToStore
    512 
    513 LEAK
    514 name=http://code.google.com/p/drmemory/issues/detail?id=476 c
    515 KERNEL*.dll!LocalAlloc
    516 ...
    517 CRYPT32.dll!CertOpenStore
    518 
    519 LEAK
    520 name=http://code.google.com/p/drmemory/issues/detail?id=476 d
    521 ...
    522 CRYPT32.dll!CertOpenSystemStore?
    523 
    524 LEAK
    525 name=http://code.google.com/p/drmemory/issues/detail?id=476 e
    526 ...
    527 CRYPT32.dll!CertGetCertificateChain
    528 
    529 LEAK
    530 name=http://code.google.com/p/drmemory/issues/detail?id=476 f
    531 ...
    532 CRYPT32.dll!CertCompareIntegerBlob
    533 
    534 LEAK
    535 name=http://code.google.com/p/drmemory/issues/detail?id=476 g
    536 ...
    537 CRYPT32.dll!CryptUnprotectData
    538 
    539 LEAK
    540 name=http://code.google.com/p/drmemory/issues/detail?id=476 h
    541 KERNEL*.dll!LocalAlloc
    542 ...
    543 CRYPT32.dll!CertEnumCertificatesInStore
    544 
    545 LEAK
    546 name=http://code.google.com/p/drmemory/issues/detail?id=476 i
    547 ...
    548 CRYPT32.dll!CryptProtectData
    549 
    550 LEAK
    551 name=http://code.google.com/p/drmemory/issues/detail?id=476 j
    552 ...
    553 CRYPT32.dll!CryptExportPublicKeyInfoEx
    554 
    555 UNINITIALIZED READ
    556 name=http://code.google.com/p/drmemory/issues/detail?id=502 a
    557 system call NtSecureConnectPort parameter #3
    558 GDI32.dll!*
    559 GDI32.dll!*
    560 
    561 UNINITIALIZED READ
    562 name=http://code.google.com/p/drmemory/issues/detail?id=502 b
    563 system call NtGdiEnumFonts parameter #6
    564 GDI32.dll!*
    565 GDI32.dll!*
    566 
    567 UNINITIALIZED READ
    568 name=http://code.google.com/p/drmemory/issues/detail?id=511 a
    569 RPCRT4.dll!...
    570 ole32.dll!*
    571 
    572 UNINITIALIZED READ
    573 name=http://code.google.com/p/drmemory/issues/detail?id=511 b
    574 ole32.dll!*
    575 ole32.dll!*
    576 ole32.dll!StringFromGUID2
    577 
    578 UNINITIALIZED READ
    579 name=http://code.google.com/p/drmemory/issues/detail?id=512 a
    580 ...
    581 *!browser_sync::Cryptographer::PackBootstrapToken
    582 *!browser_sync::Cryptographer::GetBootstrapToken
    583 
    584 UNINITIALIZED READ
    585 name=http://code.google.com/p/drmemory/issues/detail?id=512 b
    586 ...
    587 *!Encrypt*
    588 
    589 # TODO(bruening): remove these once we have v8 bitfields handled
    590 UNINITIALIZED READ
    591 name=http://code.google.com/p/drmemory/issues/detail?id=513 a
    592 *!v8*
    593 
    594 UNINITIALIZED READ
    595 name=http://code.google.com/p/drmemory/issues/detail?id=513 b
    596 *!*
    597 *!v8*
    598 
    599 UNINITIALIZED READ
    600 name=http://code.google.com/p/drmemory/issues/detail?id=513 c
    601 <not in a module>
    602 ...
    603 *!v8*
    604 
    605 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll
    606 # has no symbols.  These are all on the bots using component build, so we use
    607 # v8.dll.  TODO(bruening): remove these once we've fixed the symbol issue.
    608 UNINITIALIZED READ
    609 name=http://code.google.com/p/drmemory/issues/detail?id=513 d
    610 v8.dll!*
    611 
    612 UNINITIALIZED READ
    613 name=http://code.google.com/p/drmemory/issues/detail?id=513 e
    614 <not in a module>
    615 ...
    616 v8.dll!*
    617 
    618 UNINITIALIZED READ
    619 name=http://code.google.com/p/drmemory/issues/detail?id=546
    620 ...
    621 mscms.dll!*
    622 ...
    623 GDI32.dll!*
    624 *!IconUtil::Create*HICON*
    625 
    626 LEAK
    627 name=http://crbug.com/92152
    628 ...
    629 USER32.dll!CreateWindowExW
    630 *!views::TooltipManagerWin::Init
    631 *!views::TooltipManagerWin::TooltipManagerWin
    632 
    633 UNINITIALIZED READ
    634 name=http://code.google.com/p/drmemory/issues/detail?id=567 a
    635 dbghelp.dll!*
    636 ...
    637 dbghelp.dll!StackWalk64
    638 
    639 LEAK
    640 name=http://code.google.com/p/drmemory/issues/detail?id=567 b
    641 *!*
    642 dbghelp.dll!*
    643 ...
    644 dbghelp.dll!StackWalk64
    645 
    646 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
    647 # TppWorkerThread w/ syms.  We used to use mod+offs here, but that was too
    648 # brittle, so we switched to RPCRT4.dll!*.
    649 LEAK
    650 name=http://code.google.com/p/drmemory/issues/detail?id=569
    651 RPCRT4.dll!...
    652 ntdll.dll!*
    653 ntdll.dll!*
    654 KERNEL*.dll!BaseThreadInitThunk
    655 
    656 # TODO(timurrrr): investigate these
    657 UNINITIALIZED READ
    658 name=http://crbug.com/TODO a
    659 ...
    660 *!win_util::GetLogonSessionOnlyDACL
    661 
    662 UNINITIALIZED READ
    663 name=http://crbug.com/TODO b
    664 ...
    665 ntshrui.dll!IsPathSharedW
    666 
    667 UNINITIALIZED READ
    668 name=http://crbug.com/TODO c
    669 ...
    670 *!NetApiBufferFree
    671 
    672 UNINITIALIZED READ
    673 name=http://crbug.com/TODO d
    674 ...
    675 *!ShellExecute*
    676 
    677 UNINITIALIZED READ
    678 name=http://crbug.com/TODO e
    679 ...
    680 *!SHParseDisplayName
    681 
    682 UNINITIALIZED READ
    683 name=http://crbug.com/TODO f
    684 ...
    685 *!GetCanonicalPathInfo*
    686 
    687 UNINITIALIZED READ
    688 name=http://crbug.com/TODO g
    689 ...
    690 SHELL32.dll!Ordinal*
    691 
    692 UNINITIALIZED READ
    693 name=http://crbug.com/TODO h
    694 ...
    695 GDI32.dll!GetTextExtentPoint32*
    696 
    697 UNINITIALIZED READ
    698 name=http://crbug.com/TODO i
    699 ...
    700 *!SyncSocketClientListener::OnMsgClassResponse
    701 
    702 UNINITIALIZED READ
    703 name=http://crbug.com/TODO j
    704 ...
    705 *!*NSPRInitSingleton*
    706 
    707 UNINITIALIZED READ
    708 name=http://crbug.com/TODO k
    709 *!NdrSimpleStructFree
    710 
    711 UNINITIALIZED READ
    712 name=http://crbug.com/TODO l
    713 ntdll.dll!RtlpNtOpenKey
    714 ntdll.dll!RtlMakeSelfRelativeSD
    715 ntdll.dll!RtlAbsoluteToSelfRelativeSD
    716 ADVAPI32.dll!MakeSelfRelativeSD
    717 
    718 UNINITIALIZED READ
    719 name=http://crbug.com/TODO m
    720 ...
    721 CRYPT32.dll!I_CertSyncStore
    722 
    723 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
    724 # a leak.  Must be some early thread initialization.  Doesn't look like
    725 # bit-level though.
    726 UNINITIALIZED READ
    727 name=http://crbug.com/TODO n
    728 RPCRT4.dll!*
    729 RPCRT4.dll!*
    730 RPCRT4.dll!*
    731 ntdll.dll!*
    732 ntdll.dll!*
    733 KERNEL*.dll!BaseThreadInitThunk
    734 
    735 # No idea where this is from, but Chrome isn't even on the stack.
    736 POSSIBLE LEAK
    737 name=http://crbug.com/TODO o
    738 RPCRT4.dll!...
    739 ole32.dll!OleInitialize
    740 ole32.dll!...
    741 KERNEL32.dll!BaseThreadInitThunk
    742 
    743 # Matches lots of RPC related leaks.  So far RPC handles have been mostly owned
    744 # by system libraries and are not something we can fix easily.
    745 POSSIBLE LEAK
    746 name=http://crbug.com/TODO p
    747 RPCRT4.dll!*
    748 RPCRT4.dll!*
    749 RPCRT4.dll!NDRCContextBinding
    750 
    751 # No idea, but all system code, not interesting.
    752 POSSIBLE LEAK
    753 name=http://crbug.com/TODO q
    754 RPCRT4.dll!...
    755 RPCRT4.dll!*
    756 RPCRT4.dll!*
    757 ole32.dll!...
    758 ole32.dll!*
    759 ole32.dll!*
    760 ...
    761 SHELL32.dll!*
    762 
    763 LEAK
    764 name=http://crbug.com/109278 video device COM leaks
    765 ...
    766 *!media::VideoCaptureDevice::*
    767 
    768 LEAK
    769 name=http://crbug.com/109278 audio device COM leaks
    770 ...
    771 *!media::GetInputDeviceNamesWin
    772 
    773 # False pos uninit in shell32 when resolving links.
    774 UNINITIALIZED READ
    775 name=http://code.google.com/p/drmemory/issues/detail?id=745
    776 SHELL*.dll!*
    777 ...
    778 SHELL*.dll!*
    779 *!file_util::ResolveShortcut
    780 
    781 # Probable false pos uninit in ffmpeg.  Probably due to running off the end of a
    782 # buffer with SSE/MMX instructions whose results are then masked out later.
    783 UNINITIALIZED READ
    784 name=http://code.google.com/p/drmemory/issues/detail?id=747 a
    785 *!ff_pred4x4_vertical_vp8_mmxext
    786 
    787 UNINITIALIZED READ
    788 name=http://code.google.com/p/drmemory/issues/detail?id=747 b
    789 *!ff_pred4x4_down_left_mmxext
    790 
    791 UNINITIALIZED READ
    792 name=http://code.google.com/p/drmemory/issues/detail?id=747 c
    793 *!ff_vorbis_floor1_render_list
    794 
    795 UNINITIALIZED READ
    796 name=http://code.google.com/p/drmemory/issues/detail?id=747 d
    797 *!ff_put_vp8_epel8_h6_ssse3
    798 
    799 UNINITIALIZED READ
    800 name=http://code.google.com/p/drmemory/issues/detail?id=747 e
    801 *!ff_put_vp8_epel8_h4_ssse3
    802 
    803 UNINITIALIZED READ
    804 name=http://code.google.com/p/drmemory/issues/detail?id=747 f
    805 *!ff_fft_permute_sse
    806 
    807 UNINITIALIZED READ
    808 name=http://code.google.com/p/drmemory/issues/detail?id=747 g
    809 *!ff_simple_idct_add_mmx
    810 
    811 # ffmpeg seems to leak a pthread condition variable.
    812 LEAK
    813 name=http://crbug.com/110042
    814 *!ptw32_new
    815 *!pthread_self
    816 *!sem_wait
    817 *!pthread_cond_wait
    818 *!ff_thread_decode_frame
    819 *!avcodec_decode_video2
    820 
    821 # Improperly handled ioctl in bcrypt.
    822 UNINITIALIZED READ
    823 name=http://code.google.com/p/drmemory/issues/detail?id=748
    824 system call NtDeviceIoControlFile InputBuffer
    825 ...
    826 bcrypt.dll!BCryptUnregisterConfigChangeNotify
    827 bcrypt.dll!BCryptGetFipsAlgorithmMode
    828 ntdll.dll!RtlQueryEnvironmentVariable
    829 
    830 # Not sure what this is.
    831 POSSIBLE LEAK
    832 name=http://code.google.com/p/drmemory/issues/detail?id=749
    833 ...
    834 fwpuclnt.dll!*
    835 ...
    836 RPCRT4.dll!*
    837 ...
    838 fwpuclnt.dll!*
    839 ...
    840 WS2_32.dll!*
    841 *!talk_base::SafeGetHostByName
    842 *!talk_base::SocketAddress::GetLocalIPs
    843 *!talk_base::SocketAddress::IsLocalIP
    844 *!cricket::Transport::VerifyCandidate
    845 *!cricket::Session::OnRemoteCandidates
    846 *!cricket::Session::OnTransportInfoMessage
    847 *!cricket::Session::OnIncomingMessage
    848 *!cricket::SessionManager::OnIncomingMessage
    849 
    850 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
    851 UNINITIALIZED READ
    852 name=http://code.google.com/p/drmemory/issues/detail?id=529
    853 RPCRT4.dll!*
    854 ...
    855 *!base::LaunchProcess
    856 
    857 # System leak from CreateEnvironmentBlock.
    858 LEAK
    859 name=http://code.google.com/p/drmemory/issues/detail?id=757
    860 ...
    861 USERENV.dll!CreateEnvironmentBlock
    862 
    863 # Looks like another instance of 753
    864 LEAK
    865 name=http://code.google.com/p/drmemory/issues/detail?id=753
    866 ...
    867 ntdll.dll!RtlLoadString
    868 
    869 # More bit manip fps
    870 UNINITIALIZED READ
    871 name=http://code.google.com/p/drmemory/issues/detail?id=493
    872 USP10.dll!ScriptPositionSingleGlyph
    873 
    874 # Various TLS leaks that we don't understand yet.  We should be finding a root
    875 # for these.
    876 LEAK
    877 name=http://code.google.com/p/drmemory/issues/detail?id=778 a
    878 KERNELBASE.dll!TlsSetValue
    879 
    880 # Originally filed as: http://crbug.com/109281
    881 LEAK
    882 name=http://code.google.com/p/drmemory/issues/detail?id=778 b
    883 *!operator new
    884 *!operator new[]
    885 *!*::ConstructTlsVector
    886 *!base::ThreadLocalStorage::StaticSlot::Get
    887 
    888 # This is an NSS PRThread object installed in TLS.  Why isn't this detected as a
    889 # root?  See also http://crbug.com/32624
    890 LEAK
    891 name=http://code.google.com/p/drmemory/issues/detail?id=778 c
    892 *!PR_Calloc
    893 *!_PR_AttachThread
    894 *!_PRI_AttachThread
    895 
    896 # Bit-level fps in rich edit layer.
    897 UNINITIALIZED READ
    898 name=http://code.google.com/p/drmemory/issues/detail?id=791
    899 RICHED20.dll!*
    900 RICHED20.dll!*
    901 
    902 # Already suppressed by drmemory default supp we don't have yet.
    903 LEAK
    904 name=i#757: RPC binding leaks in sspicli.dll
    905 RPCRT4.dll!*
    906 ...
    907 SspiCli.dll!*
    908 SspiCli.dll!Cre*
    909 
    910 # Async NtReadFile false positives.  This was fixed in drmemory r772, remove
    911 # this supp when we pull that rev.
    912 UNADDRESSABLE ACCESS
    913 name=http://code.google.com/p/drmemory/issues/detail?id=798
    914 system call NtReadFile parameter #5
    915 KERNEL32.dll!ReadFile
    916 
    917 # Probable syscall false positive.
    918 UNADDRESSABLE ACCESS
    919 name=http://code.google.com/p/drmemory/issues/detail?id=809
    920 system call NtGdiPolyPolyDraw parameter #1
    921 *!gfx::Path::CreateNativeRegion
    922 
    923 # Very wide suppression for all uninits in rpcrt4.dll.  We get bad stack traces
    924 # coming out of this module (sometimes only one frame), which makes it hard to
    925 # write precise suppressions.  Until we have bit-level tracking (DRMi#113) we
    926 # should keep this.
    927 UNINITIALIZED READ
    928 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard
    929 RPCRT4.dll!*
    930 
    931 UNINITIALIZED READ
    932 name=http://code.google.com/p/drmemory/issues/detail?id=841 a
    933 ...
    934 CRYPTNET.dll!I_CryptNetGetConnectivity
    935 
    936 UNINITIALIZED READ
    937 name=http://code.google.com/p/drmemory/issues/detail?id=841 b
    938 ...
    939 webio.dll!*
    940 
    941 UNINITIALIZED READ
    942 name=http://code.google.com/p/drmemory/issues/detail?id=841 c
    943 ...
    944 winhttp.dll!*
    945 
    946 LEAK
    947 name=http://code.google.com/p/drmemory/issues/detail?id=841 d
    948 ...
    949 CRYPTNET.dll!I_CryptNetGetConnectivity
    950 
    951 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
    952 UNINITIALIZED READ
    953 name=http://code.google.com/p/drmemory/issues/detail?id=810
    954 instruction=test   %edx %edx
    955 USER32.dll!GetClassLongW
    956 ...
    957 *!ui::CenterAndSizeWindow
    958 
    959 UNINITIALIZED READ
    960 name=http://code.google.com/p/drmemory/issues/detail?id=815
    961 KERNEL*.dll!...
    962 dxgi.dll!*
    963 USER32.dll!GetMonitorInfoA
    964 ntdll.dll!KiUserCallbackDispatcher
    965 dxgi.dll!*
    966 WinSATAPI.DLL!*
    967 
    968 # Suppress anything in cmd.exe.  It's safer to suppress these than disable
    969 # following, since someone might launch a Chrome process via cmd.exe.
    970 LEAK
    971 name=cmd.exe
    972 ...
    973 cmd.exe!*
    974 
    975 # Possible true system use after free.
    976 UNADDRESSABLE ACCESS
    977 name=http://code.google.com/p/drmemory/issues/detail?id=623
    978 KERNELBASE.dll!TlsGetValue
    979 OLEAUT32.dll!SysFreeString
    980 OLEAUT32.dll!SysAllocStringByteLen
    981 OLEACC.dll!*
    982 OLEACC.dll!*
    983 OLEACC.dll!*
    984 OLEACC.dll!*
    985 
    986 # basic_streambuf seems to leak something in creating a std::_Mutex
    987 LEAK
    988 name=http://code.google.com/p/drmemory/issues/detail?id=857
    989 ntdll.dll!...
    990 ntdll.dll!RtlInitializeCriticalSection
    991 *!_Mtxinit
    992 *!std::_Mutex::_Mutex
    993 *!std::basic_streambuf<>
    994 
    995 # Seems to create a DC, sometimes.  GetTextMetrics returns no pointers, though.
    996 LEAK
    997 name=GDI SetBrushOrgEx leak
    998 GDI32.dll!...
    999 GDI32.dll!GetTextMetricsW
   1000 *!gfx::PlatformFontWin::CreateHFontRef
   1001 *!gfx::PlatformFontWin::GetBaseFontRef
   1002 
   1003 ###############################################################
   1004 # Benign issues in Chromium
   1005 
   1006 # This test intentionally leaks an object and checks that it's never deleted.
   1007 LEAK
   1008 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
   1009 ...
   1010 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
   1011 
   1012 LEAK
   1013 name=deliberate histogram leak
   1014 ...
   1015 *!replace_operator_new
   1016 ...
   1017 *!*::*Histogram::FactoryGet
   1018 
   1019 LEAK
   1020 name=deliberate leak for SampleMap
   1021 ...
   1022 *!base::SampleMap::Accumulate
   1023 *!base::SparseHistogram::Add
   1024 
   1025 LEAK
   1026 name=deliberate LazyInstance leak
   1027 ...
   1028 *!*LeakyLazyInstance*
   1029 ...
   1030 *!base::LazyInstance*::Pointer
   1031 
   1032 LEAK
   1033 name=http://crbug.com/79933 (2)
   1034 ...
   1035 *!TestURLRequestContext::TestURLRequestContext
   1036 *!TestURLRequestContextGetter::GetURLRequestContext
   1037 *!notifier::SingleLoginAttempt::SingleLoginAttempt
   1038 *!notifier::Login::StartConnection
   1039 *!syncer::InvalidationNotifier::UpdateCredentials
   1040 *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials
   1041 
   1042 LEAK
   1043 name=http://crbug.com/79933 (3)
   1044 ...
   1045 *!TestURLRequestContext::TestURLRequestContext
   1046 *!TestURLRequestContextGetter::GetURLRequestContext
   1047 *!URLFetcher::Core::StartURLRequest
   1048 
   1049 LEAK
   1050 name=http://crbug.com/79933 (4)
   1051 *!generic_cpp_alloc
   1052 *!operator new
   1053 *!std::_Allocate<>
   1054 *!std::allocator<>::allocate
   1055 *!std::vector<>::_Insert_n
   1056 *!std::vector<>::insert
   1057 *!std::vector<>::push_back
   1058 *!ObserverListBase<>::AddObserver
   1059 ...
   1060 *!net::HttpNetworkSession::HttpNetworkSession
   1061 *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
   1062 *!notifier::XmppClientSocketFactory::CreateTransportClientSocket
   1063 *!notifier::ChromeAsyncSocket::Connect
   1064 *!buzz::XmppClient::ProcessStartXmppLogin
   1065 *!buzz::XmppClient::Process
   1066 *!talk_base::Task::Step
   1067 *!talk_base::TaskRunner::InternalRunTasks
   1068 *!talk_base::TaskRunner::RunTasks
   1069 *!notifier::TaskPump::CheckAndRunTasks
   1070 *!base::internal::RunnableAdapter<>::Run
   1071 
   1072 # Test intentionally leaks an object.
   1073 LEAK
   1074 name=http://crbug.com/86301
   1075 *!replace_operator_new
   1076 ...
   1077 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody
   1078 
   1079 # Leak in a binary copy of Firefox 3's NSS dll.  Not much we can do about it.
   1080 LEAK
   1081 name=Firefox 3 NSS dll leak
   1082 nspr4.dll!*
   1083 ...
   1084 *!NSSDecryptor::~NSSDecryptor
   1085 
   1086 # We get uninit reports inside GMock when it prints the bytes of references to
   1087 # partially initialized objects passed to unexpected method calls.
   1088 UNINITIALIZED READ
   1089 name=http://crbug.com/64887 (GMock printing uninit data)
   1090 ...
   1091 *!testing::*::PrintBytesInObjectTo*
   1092 
   1093 ###############################################################
   1094 # Proactively borrowed from memcheck/suppressions.txt.
   1095 # We have not yet seen these, but we are expanding the sets of tests
   1096 # we're running, and we've hit redness in the past that could have
   1097 # been avoided by already having the Memcheck suppressions.
   1098 # TODO(bruening): review the entire file (not just these) once we're
   1099 # at the peak set of tests we plan to run and remove the unused ones.
   1100 
   1101 UNINITIALIZED READ
   1102 name=bug_99307
   1103 *!modp_b64_encode
   1104 *!base::Base64Encode*
   1105 *!web_ui_util::GetImageDataUrl
   1106 *!::NetworkInfoDictionary::set_icon
   1107 
   1108 UNINITIALIZED READ
   1109 name=bug_101781
   1110 *!encode_one_block
   1111 *!encode_mcu_huff
   1112 *!compress_data
   1113 *!process_data_simple_main
   1114 *!chromium_jpeg_write_scanlines
   1115 *!gfx::JPEGCodec::Encode
   1116 *!gfx::JPEGEncodedDataFromImage
   1117 *!history::TopSites::EncodeBitmap
   1118 *!history::TopSites::SetPageThumbnail
   1119 *!history::ExpireHistoryTest::AddExampleData
   1120 *!history::ExpireHistoryTest::*
   1121 
   1122 UNINITIALIZED READ
   1123 name=bug_101781_d
   1124 *!testing::AssertionResult testing::internal::CmpHelperGE<>
   1125 *!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody
   1126 
   1127 UNINITIALIZED READ
   1128 name=bug_105907
   1129 ...
   1130 *!skia::BGRAConvolve2D
   1131 *!skia::ImageOperations::ResizeBasic*
   1132 *!skia::ImageOperations::Resize*
   1133 
   1134 UNINITIALIZED READ
   1135 name=bug_112278
   1136 *!fetch_texel_2d_f_rgba8888
   1137 *!sample_2d_linear
   1138 *!sample_linear_2d
   1139 *!fetch_texel_lod
   1140 *!fetch_texel
   1141 *!_mesa_execute_program
   1142 *!run_program
   1143 *!_swrast_exec_fragment_program
   1144 *!shade_texture_span
   1145 *!_swrast_write_rgba_span
   1146 *!general_triangle
   1147 *!_swrast_validate_triangle
   1148 *!_swrast_Triangle
   1149 *!triangle_rgba
   1150 *!_tnl_render_triangles_elts
   1151 *!run_render
   1152 *!_tnl_run_pipeline
   1153 *!_tnl_draw_prims
   1154 *!_tnl_vbo_draw_prims
   1155 *!vbo_validated_drawrangeelements
   1156 *!vbo_exec_DrawElements
   1157 *!neutral_DrawElements
   1158 
   1159 UNINITIALIZED READ
   1160 name=bug_112278b
   1161 *!fetch_texel_2d_f_rgba8888
   1162 *!sample_2d_nearest
   1163 *!sample_nearest_2d
   1164 *!fetch_texel_lod
   1165 *!fetch_texel
   1166 *!_mesa_execute_program
   1167 *!run_program
   1168 *!_swrast_exec_fragment_program
   1169 *!shade_texture_span
   1170 *!_swrast_write_rgba_span
   1171 *!general_triangle
   1172 ...
   1173 *!_swrast_Triangle
   1174 *!triangle_rgba
   1175 ...
   1176 *!run_render
   1177 *!_tnl_run_pipeline
   1178 *!_tnl_draw_prims
   1179 *!_tnl_vbo_draw_prims
   1180 
   1181 UNINITIALIZED READ
   1182 name=bug_115419_1
   1183 *!fetch_texel_2d_f_rgba8888
   1184 *!texture_get_row
   1185 *!fast_read_rgba_pixels
   1186 *!read_rgba_pixels
   1187 *!_swrast_ReadPixels
   1188 *!_mesa_ReadPixels
   1189 *!glReadPixels
   1190 *!gpu::gles2::GLES2DecoderImpl::HandleReadPixels
   1191 *!gpu::gles2::GLES2DecoderImpl::DoCommand
   1192 *!gpu::CommandParser::ProcessCommand
   1193 *!gpu::GpuScheduler::PutChanged
   1194 *!webkit::gpu::GLInProcessContext::PumpCommands
   1195 
   1196 UNINITIALIZED READ
   1197 name=bug_115419_2
   1198 *!get_src_arg_mask
   1199 *!_mesa_remove_extra_move_use
   1200 *!_mesa_optimize_program
   1201 *!get_mesa_program
   1202 *!_mesa_ir_link_shader
   1203 *!_mesa_glsl_link_shader
   1204 *!link_program
   1205 *!_mesa_LinkProgramARB
   1206 *!glLinkProgram
   1207 ...
   1208 *!gpu::gles2::GLES2DecoderImpl::DoLinkProgram*
   1209 *!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram*
   1210 *!gpu::gles2::GLES2DecoderImpl::DoCommand
   1211 *!gpu::CommandParser::ProcessCommand
   1212 *!gpu::GpuScheduler::PutChanged
   1213 *!webkit::gpu::GLInProcessContext::PumpCommands
   1214 
   1215 UNINITIALIZED READ
   1216 name=bug_138058
   1217 ...
   1218 *!blink::WebVTTParser::constructTreeFromToken
   1219 *!blink::WebVTTParser::createDocumentFragmentFromCueText
   1220 *!blink::TextTrackCue::getCueAsHTML
   1221 *!blink::TextTrackCue::updateDisplayTree
   1222 *!blink::HTMLMediaElement::updateActiveTextTrackCues
   1223 
   1224 UNINITIALIZED READ
   1225 name=bug_138220_a
   1226 *!blink::HTMLInputElement::dataList
   1227 *!blink::HTMLInputElement::list
   1228 *!blink::RenderSliderContainer::layout
   1229 *!blink::RenderBlock::layoutBlockChild
   1230 *!blink::RenderBlock::layoutBlockChildren
   1231 *!blink::RenderBlock::layoutBlock
   1232 *!blink::RenderBlock::layout
   1233 *!blink::RenderSlider::layout
   1234 
   1235 UNINITIALIZED READ
   1236 name=bug_138220_b
   1237 *!blink::HTMLInputElement::dataList
   1238 *!blink::HTMLInputElement::list
   1239 *!blink::RenderTheme::paintSliderTicks
   1240 *!blink::RenderThemeChromiumLinux::paintSliderTrack
   1241 *!blink::RenderTheme::paint
   1242 *!blink::RenderBox::paintBoxDecorations
   1243 *!blink::RenderBlock::paintObject
   1244 
   1245 UNINITIALIZED READ
   1246 name=bug_162825
   1247 *!bcmp
   1248 *!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator<
   1249 *!std::less<>::operator
   1250 ...
   1251 *!std::map<>::find
   1252 ...
   1253 *!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
   1254 
   1255 UNINITIALIZED READ
   1256 name=bug_176616_a
   1257 *!WebTestRunner::WebTestProxyBase::didCreateDataSource
   1258 *!WebTestRunner::WebTestProxy<>::didCreateDataSource
   1259 *!blink::FrameLoaderClientImpl::createDocumentLoader
   1260 *!blink::FrameLoader::init
   1261 *!blink::Frame::init
   1262 *!blink::WebFrameImpl::initializeAsMainFrame
   1263 *!blink::WebViewImpl::initializeMainFrame
   1264 *!TestShell::createNewWindow
   1265 *!TestShell::createMainWindow
   1266 *!TestShell::initialize
   1267 
   1268 UNINITIALIZED READ
   1269 name=bug_176616_b
   1270 *!WebTestRunner::TestRunner::reset
   1271 *!WebTestRunner::TestInterfaces::resetAll
   1272 *!WebTestRunner::WebTestInterfaces::resetAll
   1273 *!TestShell::resetTestController
   1274 *!runTest
   1275 
   1276 UNINITIALIZED READ
   1277 name=bug_222883
   1278 *!v8::internal::ScavengeVisitor::ScavengePointer
   1279 *!v8::internal::ScavengeVisitor::VisitPointers
   1280 *!v8::internal::StandardFrame::IterateExpressions
   1281 ...
   1282 *!v8::internal::Heap::Scavenge
   1283 *!v8::internal::Heap::PerformGarbageCollection*
   1284 
   1285 UNINITIALIZED READ
   1286 name=bug_238170a
   1287 *!blink::ElementRuleCollector::collectMatchingRules
   1288 *!blink::ElementRuleCollector::hasAnyMatchingRules
   1289 
   1290 UNINITIALIZED READ
   1291 name=bug_238170b
   1292 *!blink::ElementRuleCollector::collectMatchingRules
   1293 *!blink::StyleResolver::matchAuthorRules
   1294 
   1295 UNINITIALIZED READ
   1296 name=bug_238170c
   1297 *!blink::ReplaceSelectionCommand::doApply
   1298 *!blink::CompositeEditCommand::apply
   1299 *!blink::applyCommand
   1300 
   1301 UNINITIALIZED READ
   1302 name=bug_259789
   1303 *!blink::::adjustAttributes
   1304 *!blink::WebGLRenderingContext::maybeRestoreContext
   1305 *!blink::Timer<>::fired
   1306 *!blink::ThreadTimers::sharedTimerFiredInternal
   1307 *!blink::ThreadTimers::sharedTimerFired
   1308 *!content::BlinkPlatformImpl::DoTimeout
   1309 
   1310 UNINITIALIZED READ
   1311 name=bug_290405
   1312 *!GrGradientEffect::onIsEqual
   1313 *!GrEffect::isEqual
   1314 *!GrEffectStage::DeferredStage::isEqual
   1315 *!GrDrawState::DeferredState::isEqual
   1316 *!GrInOrderDrawBuffer::needsNewState
   1317 *!GrInOrderDrawBuffer::onDraw
   1318 *!GrDrawTarget::drawIndexedInstances
   1319 *!GrTextContext::flushGlyphs
   1320 
   1321 UNINITIALIZED READ
   1322 name=bug_290435
   1323 *!blink::AudioContext::scheduleNodeDeletion
   1324 *!blink::AudioContext::handlePostRenderTasks
   1325 *!blink::AudioDestinationNode::render
   1326 *!blink::OfflineAudioDestinationNode::offlineRender
   1327 
   1328 UNINITIALIZED READ
   1329 name=bug_364724
   1330 *!base::MD5DigestToBase16
   1331 *!content::WebKitTestRunner::CaptureDumpPixels
   1332 
   1333 UNINITIALIZED READ
   1334 name=bug_298143
   1335 ...
   1336 *!blink::TypeConversionsV8Internal*AttributeGetter*
   1337 
   1338 UNINITIALIZED READ
   1339 name=bug_299804
   1340 *!GrConfigConversionEffect::TestForPreservingPMConversions
   1341 *!::test_pm_conversions
   1342 *!GrContext::createPMToUPMEffect
   1343 *!GrContext::readRenderTargetPixels
   1344 *!SkGpuDevice::onReadPixels
   1345 *!SkBaseDevice::readPixels
   1346 *!SkCanvas::readPixels
   1347 *!DeferredDevice::onReadPixels
   1348 *!SkBaseDevice::readPixels
   1349 *!SkCanvas::readPixels
   1350 *!blink::GraphicsContext::readPixels
   1351 *!WTF::PassRefPtr<>
   1352 *!blink::ImageBuffer::getUnmultipliedImageData
   1353 *!blink::CanvasRenderingContext2D::getImageData
   1354 *!blink::CanvasRenderingContext2D::getImageData
   1355 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethod
   1356 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback
   1357 *!v8::internal::FunctionCallbackArguments::Call
   1358 *!v8::internal::HandleApiCallHelper<>
   1359 
   1360 UNINITIALIZED READ
   1361 name=bug_309477
   1362 *!WebTestRunner::EventSender::reset
   1363 *!WebTestRunner::TestInterfaces::resetTestHelperControllers
   1364 *!WebTestRunner::TestInterfaces::resetAll
   1365 ...
   1366 *!content::ShellRenderProcessObserver::WebKitInitialized
   1367 *!content::RenderThreadImpl::EnsureWebKitInitialized
   1368 *!content::RenderThreadImpl::OnCreateNewView
   1369 
   1370 ###############################################################
   1371 # Real issues in Chromium
   1372 
   1373 LEAK
   1374 name=http://crbug.com/32085
   1375 ...
   1376 chrome.dll!NotificationRegistrar::Add
   1377 
   1378 UNINITIALIZED READ
   1379 name=http://crbug.com/57266 (1)
   1380 ...
   1381 *!remoting::EncoderVp8::Encode
   1382 
   1383 UNINITIALIZED READ
   1384 name=http://crbug.com/57266 (2)
   1385 ...
   1386 *!vp8_*
   1387 
   1388 LEAK
   1389 name=http://crbug.com/70062
   1390 *!PR_Calloc
   1391 *!PR_NewLock
   1392 ...
   1393 *!InitSessionCacheLocks
   1394 *!initSessionCacheLocksLazily
   1395 *!PR_CallOnce
   1396 *!ssl_InitSessionCacheLocks
   1397 *!lock_cache
   1398 *!ssl_LookupSID
   1399 *!ssl2_BeginClientHandshake
   1400 *!ssl_Do1stHandshake
   1401 *!SSL_ForceHandshake
   1402 *!net::SSL*SocketNSS::DoHandshake
   1403 *!net::SSL*SocketNSS::DoHandshakeLoop
   1404 
   1405 LEAK
   1406 name=http://crbug.com/74417 a
   1407 *!replace_operator_new
   1408 *!disk_cache::BackendImpl::CreateEntryImpl
   1409 
   1410 LEAK
   1411 name=http://crbug.com/74417 b
   1412 *!replace_operator_new
   1413 *!disk_cache::BackendImpl::NewEntry
   1414 
   1415 # One more disk_cache::BackendImpl leak.  See also http://crbug.com/87500.
   1416 LEAK
   1417 name=http://crbug.com/74417 c
   1418 *!replace_operator_new
   1419 ...
   1420 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
   1421 
   1422 LEAK
   1423 name=http://crbug.com/75247
   1424 ...
   1425 *!replace_operator_new
   1426 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
   1427 
   1428 LEAK
   1429 name=http://crbug.com/78784
   1430 *!generic_cpp_alloc
   1431 *!operator new
   1432 *!TestingProfile::CreateRequestContext
   1433 *!*ProfileSyncService*::SetUp
   1434 
   1435 LEAK
   1436 name=http://crbug.com/80550 (1)
   1437 ...
   1438 *!RenderWidgetHost::WasHidden
   1439 
   1440 LEAK
   1441 name=http://crbug.com/80550 (2)
   1442 ...
   1443 *!RenderWidgetHost::WasRestored
   1444 
   1445 LEAK
   1446 name=http://crbug.com/87612
   1447 ...
   1448 *!SSL_ConfigSecureServer
   1449 *!net::SSLServerSocketNSS::InitializeSSLOptions
   1450 *!net::SSLServerSocketNSS::Handshake
   1451 
   1452 LEAK
   1453 name=http://crbug.com/88640
   1454 *!generic_cpp_alloc
   1455 *!operator new
   1456 *!ProfileImpl::InitRegisteredProtocolHandlers
   1457 *!ProfileImpl::DoFinalInit
   1458 *!ProfileImpl::OnPrefsLoaded
   1459 
   1460 LEAK
   1461 name=http://crbug.com/91465
   1462 *!generic_cpp_alloc
   1463 *!operator new
   1464 *!browser_sync::internal::WeakHandleCore<>::*
   1465 *!browser_sync::WeakHandle<>::*
   1466 *!syncer::SyncManager::SyncInternal::Init
   1467 
   1468 LEAK
   1469 name=http://crbug.com/91491
   1470 ...
   1471 *!CrxUpdateService::ProcessPendingItems
   1472 
   1473 UNINITIALIZED READ
   1474 name=http://crbug.com/92026 (1)
   1475 softokn3.dll!FC_GetFunctionList
   1476 ...
   1477 softokn3.dll!NSC_ModuleDBFunc
   1478 
   1479 UNINITIALIZED READ
   1480 name=http://crbug.com/92026 (2)
   1481 freebl3.dll!FREEBL_GetVector
   1482 ...
   1483 softokn3.dll!NSC_ModuleDBFunc
   1484 
   1485 # Possible real Chromium issue in DoCrossfade.
   1486 UNINITIALIZED READ
   1487 name=http://crbug.com/110049
   1488 *!media::DoCrossfade<>
   1489 *!media::Crossfade
   1490 *!media::AudioRendererAlgorithmBase::FillBuffer
   1491 
   1492 # Known sqlite3 leaks.
   1493 LEAK
   1494 name=http://crbug.com/113847 (1)
   1495 ...
   1496 *!sqlite3MemMalloc
   1497 *!mallocWithAlarm
   1498 *!sqlite3Malloc
   1499 ...
   1500 *!yy_reduce
   1501 
   1502 LEAK
   1503 name=http://crbug.com/113847 (2)
   1504 ...
   1505 *!openDatabase
   1506 *!sqlite3_open
   1507 
   1508 LEAK
   1509 name=http://crbug.com/115328
   1510 ...
   1511 *!GenericInfoViewTest_GenericInfoView_Test::TestBody
   1512 
   1513 LEAK
   1514 name=http://crbug.com/117427 a
   1515 ...
   1516 *!net::HostCache::Set
   1517 *!net::HostResolverImpl::CacheResult
   1518 *!net::HostResolverImpl::Job::CompleteRequests
   1519 *!net::HostResolverImpl::Job::OnProcTaskComplete
   1520 *!base::internal::RunnableAdapter<>::Run
   1521 
   1522 # Probably related to 117427.  Someone is not tearing down DNS resolution during
   1523 # testing.
   1524 LEAK
   1525 name=http://crbug.com/117427 b
   1526 *!generic_cpp_alloc
   1527 *!operator new
   1528 *!base::internal::WeakReferenceOwner::GetRef
   1529 *!base::SupportsWeakPtr<>::AsWeakPtr
   1530 *!net::HostResolverImpl::Job::Job
   1531 *!net::HostResolverImpl::Resolve
   1532 *!net::SingleRequestHostResolver::Resolve
   1533 *!net::TransportConnectJob::DoResolveHost
   1534 *!net::TransportConnectJob::DoLoop
   1535 *!net::TransportConnectJob::ConnectInternal
   1536 *!net::ConnectJob::Connect
   1537 *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
   1538 *!net::internal::ClientSocketPoolBaseHelper::RequestSocket
   1539 *!net::ClientSocketPoolBase<>::RequestSocket
   1540 *!net::TransportClientSocketPool::RequestSocket
   1541 *!net::ClientSocketHandle::Init<>
   1542 *!net::`anonymous namespace'::InitSocketPoolHelper
   1543 *!net::InitSocketHandleForRawConnect
   1544 *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
   1545 *!base::internal::RunnableAdapter<>::Run
   1546 
   1547 # IE frame possible leak of COM object.
   1548 LEAK
   1549 name=http://crbug.com/122399
   1550 ole32.dll!...
   1551 ole32.dll!CoTaskMemAlloc
   1552 urlmon.dll!...
   1553 urlmon.dll!CreateUri
   1554 IEFRAME.dll!*
   1555 
   1556 # RenderWidgetHelper leak in DelayProfileDestruction test.
   1557 LEAK
   1558 name=http://crbug.com/125565
   1559 *!generic_cpp_alloc
   1560 *!operator new
   1561 *!RenderProcessHostImpl::RenderProcessHostImpl
   1562 *!SiteInstanceImpl::GetProcess
   1563 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
   1564 
   1565 LEAK
   1566 name=http://crbug.com/125807
   1567 *!generic_cpp_alloc
   1568 *!operator new
   1569 *!TransportSecurityPersister::TransportSecurityPersister
   1570 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest
   1571 
   1572 UNINITIALIZED READ
   1573 name=bug_113076
   1574 *!media::ConvertYUVToRGB32_C
   1575 *!media::LinearScaleYUVToRGB32RowWithRange_C
   1576 *!media::ScaleYUVToRGB32WithRect
   1577 
   1578 UNINITIALIZED READ
   1579 name=bug_343248
   1580 osmesa.dll!LINTERP
   1581 osmesa.dll!INTERP_4F
   1582 osmesa.dll!_tnl_generic_interp
   1583 
   1584 UNINITIALIZED READ
   1585 name=bug_340752
   1586 ...
   1587 *!*::ThreadState::visitStack
   1588 
   1589 UNINITIALIZED READ
   1590 name=bug_343663
   1591 blink_web.dll!blink::RenderBlock::computeInlinePreferredLogicalWidths
   1592 
   1593 UNINITIALIZED READ
   1594 name=bug_343797
   1595 ...
   1596 blink_web.dll!blink::MediaQueryExp::create
   1597 blink_web.dll!blink::BisonCSSParser::createFloatingMediaQueryExp
   1598 blink_web.dll!cssyyparse
   1599 
   1600 UNINITIALIZED READ
   1601 name=bug_343915
   1602 blink_web.dll!blink::BisonCSSParser::parseFlex
   1603 blink_web.dll!blink::BisonCSSParser::parseValue
   1604 blink_web.dll!cssyyparse
   1605 
   1606 UNADDRESSABLE ACCESS
   1607 name=BUG_343958
   1608 blink_web.dll!blink::Node::getFlag
   1609 blink_web.dll!blink::Node::inDocument
   1610 blink_web.dll!blink::Node::isDescendantOf
   1611 blink_web.dll!blink::CompositeEditCommand::cloneParagraphUnderNewElement
   1612 blink_web.dll!blink::CompositeEditCommand::moveParagraphWithClones
   1613 
   1614 UNINITIALIZED READ
   1615 name=BUG_344076
   1616 blink_web.dll!blink::Editor::canSmartReplaceWithPasteboard
   1617 blink_web.dll!blink::Editor::pasteAsPlainTextWithPasteboard
   1618 blink_web.dll!blink::Editor::pasteAsPlainText
   1619 blink_web.dll!blink::executePasteAndMatchStyle
   1620 blink_web.dll!blink::Editor::Command::execute
   1621 blink_web.dll!blink::Document::execCommand
   1622 
   1623 UNINITIALIZED READ
   1624 name=BUG_349128
   1625 content.dll!std::*
   1626 ...
   1627 content.dll!content::BrowserAccessibilityManagerWin::*
   1628 ...
   1629 *!*::UpdateNode
   1630 
   1631 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB*
   1632 # variety) that it's a performance hit.  We avoid that by requesting
   1633 # whole-module suppression
   1634 # (see https://code.google.com/p/drmemory/issues/detail?id=1529).
   1635 UNINITIALIZED READ
   1636 name=bug_347967_all_osmesa
   1637 osmesa.dll!*
   1638 
   1639 UNINITIALIZED READ
   1640 name=bug_347967
   1641 osmesa.dll!unpack_RGB*888
   1642 osmesa.dll!_mesa_unpack_rgba_row
   1643 osmesa.dll!slow_read_rgba_pixels
   1644 osmesa.dll!read_rgba_pixels
   1645 osmesa.dll!_mesa_readpixels
   1646 ...
   1647 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
   1648 gpu.dll!gpu::CommandParser::ProcessCommand
   1649 gpu.dll!gpu::GpuScheduler::PutChanged
   1650 
   1651 UNINITIALIZED READ
   1652 name=bug_347967,bug_348357
   1653 osmesa.dll!clip_span
   1654 osmesa.dll!_swrast_write_rgba_span
   1655 osmesa.dll!general_triangle
   1656 ...
   1657 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements
   1658 gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements
   1659 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
   1660 gpu.dll!gpu::CommandParser::ProcessCommand
   1661 
   1662 UNINITIALIZED READ
   1663 name=bug_361594
   1664 ...
   1665 skia.dll!SkA8_Shader_Blitter::blitH
   1666 skia.dll!SkBlitter::blitRect
   1667 skia.dll!blitrect
   1668 skia.dll!SkScan::FillIRect
   1669 ...
   1670 skia.dll!SkDraw::drawRect
   1671 skia.dll!SkDraw::drawBitmap
   1672 skia.dll!SkBitmapDevice::drawBitmap
   1673 skia.dll!SkCanvas::internalDrawBitmap
   1674 skia.dll!SkCanvas::drawBitmap
   1675 content.dll!content::ScreenshotData::EncodeOnWorker
   1676 
   1677 UNINITIALIZED READ
   1678 name=bug_363487
   1679 blink_web.dll!blink::RenderLayerCompositor::updateIfNeeded
   1680 blink_web.dll!blink::RenderLayerCompositor::updateIfNeededRecursive
   1681 blink_web.dll!blink::FrameView::updateLayoutAndStyleForPainting
   1682 blink_web.dll!blink::PageAnimator::updateLayoutAndStyleForPainting
   1683 
   1684 UNINITIALIZED READ
   1685 name=bug_365101
   1686 *!device::BluetoothAdapterWin::AdapterStateChanged
   1687 
   1688 UNINITIALIZED READ
   1689 name=bug_364146
   1690 ...
   1691 v8.dll!*
   1692 net_with_v8.dll!net::ProxyResolverV8::Context::*
   1693 
   1694 UNINITIALIZED READ
   1695 name=bug_334448
   1696 *!CLD2::UTF8GenericReplaceInternal
   1697 *!CLD2::UTF8GenericReplace
   1698 *!CLD2::ScriptScanner::LowerScriptSpan
   1699 *!CLD2::ScriptScanner::GetOneScriptSpanLower
   1700 *!CLD2::DetectLanguageSummaryV2
   1701 *!CLD2::DetectLanguageSummary
   1702 
   1703 UNINITIALIZED READ
   1704 name=bug_42043
   1705 ...
   1706 QuickTime.qts!*
   1707 
   1708 UNINITIALIZED READ
   1709 name=bug_369141
   1710 ...
   1711 *!blink::RenderLayerClipper::updateClipRects
   1712 *!blink::RenderLayerClipper::parentClipRects
   1713 *!blink::RenderLayerClipper::backgroundClipRect
   1714 
   1715 HANDLE LEAK
   1716 name=bug_370178
   1717 system call NtCreateEvent
   1718 KERNELBASE.dll!CreateEventExW
   1719 KERNELBASE.dll!CreateEventW
   1720 base.dll!base::WaitableEvent::WaitableEvent
   1721 gpu.dll!gpu::InProcessCommandBuffer::Initialize
   1722 gl_in_process_context.dll!gpu::`anonymous namespace'::GLInProcessContextImpl::Initialize
   1723 gl_in_process_context.dll!gpu::GLInProcessContext::CreateContext
   1724 
   1725 UNINITIALIZED READ
   1726 name=bug_371844
   1727 *!content::GamepadProvider::PadState::Match
   1728 *!content::GamepadProvider::DoPoll
   1729 
   1730 UNINITIALIZED READ
   1731 name=bug_371950
   1732 media.dll!ConvertYUVToRGB32Row_SSE
   1733 media.dll!media::ConvertYUVToRGB32_SSE
   1734 media.dll!media::ConvertVideoFrameToBitmap
   1735 media.dll!media::SkCanvasVideoRenderer::Paint
   1736 cc.dll!cc::VideoResourceUpdater::CreateForSoftwarePlanes
   1737 cc.dll!cc::VideoResourceUpdater::CreateExternalResourcesFromVideoFrame
   1738 cc.dll!cc::VideoLayerImpl::WillDraw
   1739 
   1740 UNINITIALIZED READ
   1741 name=bug_371959
   1742 content.dll!webrtc::PeerConnection::DoInitialize
   1743 content.dll!webrtc::PeerConnection::Initialize
   1744 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection_s
   1745 content.dll!webrtc::PeerConnectionFactory::OnMessage
   1746 content.dll!jingle_glue::JingleThreadWrapper::Send
   1747 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection
   1748 content.dll!webrtc::PeerConnectionFactoryInterface::CreatePeerConnection
   1749 
   1750 # This suppression is deliberately general, as bugs reported in
   1751 # ProcessOutgoingMessages are difficult to track down until we
   1752 # get our annotations in place.
   1753 # TODO(bruening): add annotations once we have the infrastructure.
   1754 UNINITIALIZED READ
   1755 name=bug_371991
   1756 system call NtWriteFile parameter #5
   1757 KERNELBASE.dll!WriteFile
   1758 KERNEL32.dll!WriteFile*
   1759 *!IPC::Channel*::ProcessOutgoingMessages
   1760 
   1761 UNINITIALIZED READ
   1762 name=bug_372254
   1763 *!content::*::NotifyPluginProcessHostHelper
   1764 
   1765 UNINITIALIZED READ
   1766 name=drm_i#1546
   1767 *!testing::internal::CmpHelperEQ<>
   1768 ...
   1769 *!content::BrowserPluginTest_ResizeFlowControl_Test::TestBody
   1770 
   1771 UNINITIALIZED READ
   1772 name=bug_374105a
   1773 ...
   1774 gpu.dll!gpu::gles2::ShaderTranslatorCache::GetTranslator
   1775 gpu.dll!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
   1776 gpu.dll!gpu::gles2::GLES2DecoderImpl::Initialize
   1777 
   1778 UNINITIALIZED READ
   1779 name=bug_374105b
   1780 ...
   1781 gpu.dll!gpu::gles2::ShaderTranslator::GetStringForOptionsThatWouldAffectCompilation
   1782 *!gpu::gles2::ShaderTranslatorTest_OptionsString_Test::TestBody
   1783 
   1784 UNINITIALIZED READ
   1785 name=bug_374410
   1786 *!ui::NativeThemeWin::PaintScrollbarTrack
   1787 *!ui::NativeThemeWin::PaintDirect
   1788 
   1789 UNINITIALIZED READ
   1790 name=bug_377728
   1791 ...
   1792 *!Hunspell::suggest
   1793 *!HunspellEngine::FillSuggestionList
   1794 *!SpellcheckLanguage::SpellCheckWord
   1795 *!SpellCheck::SpellCheckWord
   1796 
   1797 UNINITIALIZED READ
   1798 name=bug_387373
   1799 *!blink::WebEmbeddedWorkerImpl::startWorkerContext
   1800 *!content::EmbeddedWorkerDispatcher::OnStartWorker
   1801 *!EmbeddedWorkerMsg_StartWorker::Dispatch<>
   1802 
   1803 UNADDRESSABLE ACCESS
   1804 name=bug_389132
   1805 content.dll!crypto_kernel_do_load_cipher_type
   1806 content.dll!crypto_kernel_load_cipher_type
   1807 content.dll!crypto_kernel_init
   1808 content.dll!cricket::SrtpSession::SetKey
   1809 content.dll!cricket::SrtpSession::SetSend
   1810 content.dll!cricket::SrtpFilter::SetRtpParams
   1811 content.dll!cricket::BaseChannel::SetupDtlsSrtp
   1812 content.dll!cricket::BaseChannel::ChannelWritable_w
   1813 content.dll!cricket::BaseChannel::OnWritableState
   1814 
   1815 UNINITIALIZED READ
   1816 name=bug_392585
   1817 system call NtCreateFile parameter #9
   1818 *!testing::internal::HandleExceptionsInMethodIfSupported<>
   1819 
   1820 UNADDRESSABLE ACCESS
   1821 name=bug_398850
   1822 ...
   1823 wtf.dll!WTF::PlatformCondition::timedWait
   1824 
   1825 UNINITIALIZED READ
   1826 name=bug_399293
   1827 blink_web.dll!blink::InputMethodController::extendSelectionAndDelete
   1828 blink_web.dll!blink::WebLocalFrameImpl::extendSelectionAndDelete
   1829 content.dll!content::RenderFrameImpl::OnExtendSelectionAndDelete
   1830 *!content::RenderViewImplTest_OnExtendSelectionAndDelete_Test::TestBody
   1831 *!testing::internal::HandleExceptionsInMethodIfSupported<>
   1832 
   1833 UNINITIALIZED READ
   1834 name=bug_398547
   1835 system call NtWriteFile parameter #5
   1836 KERNELBASE.dll!WriteFile
   1837 KERNEL32.dll!WriteFile
   1838 mojo_system_impl.dll!mojo::system::`anonymous namespace'::RawChannelWin::WriteNoLock
   1839 
   1840 HANDLE LEAK
   1841 name=bug_403544
   1842 system call NtCreateSemaphore
   1843 KERNELBASE.dll!CreateSemaphoreExW
   1844 ...
   1845 v8.dll!v8::internal::SweeperThread::SweeperThread
   1846 ...
   1847 blink_web.dll!blink::WorkerScriptController::WorkerScriptController
   1848 blink_web.dll!blink::WorkerGlobalScope::WorkerGlobalScope
   1849 blink_web.dll!blink::ServiceWorkerGlobalScope::ServiceWorkerGlobalScope
   1850 
   1851 
   1852 HANDLE LEAK
   1853 name=bug_403681
   1854 system call NtCreateTimer
   1855 KERNELBASE.dll!CreateWaitableTimerExW
   1856 KERNEL32.dll!CreateWaitableTimerW
   1857 content.dll!rtc::Timing::Timing
   1858 content.dll!content::RenderProcessHostImpl::CreateMessageFilters
   1859 ...
   1860 content.dll!content::RenderViewHostImpl::CreateRenderView
   1861 content.dll!content::WebContentsImpl::CreateRenderViewForRenderManager
   1862 ...
   1863 content.dll!content::NavigationControllerImpl::LoadEntry
   1864 ...
   1865 *!extensions::ExtensionHost::LoadInitialURL
   1866 
   1867 UNINITIALIZED READ
   1868 name=bug_414268
   1869 pdf.dll!chrome_pdf::PDFiumEngine::OnMouseMove
   1870 pdf.dll!chrome_pdf::PDFiumEngine::HandleEvent
   1871 pdf.dll!chrome_pdf::OutOfProcessInstance::HandleInputEvent
   1872 pdf.dll!pp::InputEvent_HandleEvent
   1873 ppapi_proxy.dll!ppapi::CallWhileUnlocked<>
   1874 ppapi_proxy.dll!ppapi::proxy::PPP_InputEvent_Proxy::OnMsgHandleFilteredInputEvent
   1875 
   1876