1 # This file contains suppressions for the Dr.Memory tool, see 2 # http://dev.chromium.org/developers/how-tos/using-drmemory 3 # 4 # This file should contain suppressions only for the reports happening 5 # in the 'full' mode (drmemory_full). 6 # For the reports that can happen in the light mode (a.k.a. drmemory_light), 7 # please use suppressions.txt instead. 8 9 ############################################################### 10 # Known reports on the third party we have no control over. 11 12 UNINITIALIZED READ 13 name=http://crbug.com/116277 14 ... 15 *!MOZ_Z_deflate 16 17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. 18 LEAK 19 name=http://code.google.com/p/drmemory/issues/detail?id=406 20 ADVAPI32.dll!WmiOpenBlock 21 ADVAPI32.dll!WmiOpenBlock 22 23 # Leaks inside GoogleDesktop - it injects into our processes for some reason 24 LEAK 25 name=GoogleDesktop LEAK 26 ... 27 GoogleDesktopNetwork3.DLL!DllUnregisterServer 28 29 # They deliberately use uninit local var in sqlite random generator. 30 # Random bytes may mess up the call stack between randomByte and 31 # sqlite3_* frames (http://code.google.com/p/drmemory/issues/detail?id=1514) 32 # so we just look for randomByte. 33 UNINITIALIZED READ 34 name=sqlite3_randomness UNINIT 35 *!randomByte 36 37 # Intentional leak in WebKit Template Framework for ThreadData. 38 LEAK 39 name=intentional WTF ThreadData leak 40 ... 41 *!WTF::wtfThreadData 42 43 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT. 44 LEAK 45 name=http://crbug.com/125558 a 46 KERNELBASE.dll!LocalAlloc 47 SECHOST.dll!... 48 SECHOST.dll!NotifyServiceStatusChange 49 WINHTTP.dll!... 50 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl 51 *!net::ProxyResolverWinHttp::GetProxyForURL 52 53 # Tiny locale-related leaks in ntdll. Probably system bug. 54 LEAK 55 name=http://crbug.com/125558 b 56 ntdll.dll!... 57 ntdll.dll!* 58 KERNELBASE.dll!... 59 KERNELBASE.dll!GetCPInfoExW 60 webio.dll!* 61 webio.dll!* 62 webio.dll!* 63 WINHTTP.dll!... 64 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser 65 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig 66 67 UNINITIALIZED READ 68 name=http://crbug.com/30704 #f 69 libpng.dll!wk_png_write_find_filter 70 libpng.dll!wk_png_write_row 71 72 ############################################################### 73 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis 74 # assumptions or unhandled syscalls 75 76 # Please note: the following suppressions were written in the abscense of 77 # private symbols so may need to be updated when we switch to auto-loading PDBs 78 UNINITIALIZED READ 79 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1) 80 ntdll.dll!Rtl* 81 ntdll.dll!Rtl* 82 ntdll.dll!RtlFindActivationContextSectionString 83 84 UNINITIALIZED READ 85 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2) 86 ... 87 SHELL32.dll!SHFileOperation* 88 89 UNINITIALIZED READ 90 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3) 91 ... 92 SHELL32.dll!SHGetFolderPath* 93 94 LEAK 95 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4) 96 ... 97 SHELL32.dll!SHGetFolderPath* 98 99 UNINITIALIZED READ 100 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5) 101 ... 102 SHELL32.dll!SHCreateDirectory* 103 104 UNINITIALIZED READ 105 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6) 106 ... 107 SHELL32.dll!ILLoadFromStream* 108 109 UNINITIALIZED READ 110 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7) 111 ... 112 SHELL32.dll!ILSaveToStream* 113 114 LEAK 115 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8) 116 ... 117 SHELL32.dll!SHFileOperation* 118 119 UNINITIALIZED READ 120 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9) 121 ... 122 SHELL32.dll!SHGetItemFromDataObject 123 124 LEAK 125 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10) 126 ... 127 SHELL32.dll!SHGetItemFromDataObject 128 129 LEAK 130 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11) 131 ... 132 ole32.dll!* 133 SHELL32.dll!SHChangeNotifySuspendResume 134 135 UNINITIALIZED READ 136 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1) 137 ... 138 *!CreateProcess* 139 140 LEAK 141 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2) 142 ... 143 *!CreateProcess* 144 145 UNINITIALIZED READ 146 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3) 147 ... 148 *!base::LaunchApp* 149 150 UNINITIALIZED READ 151 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1) 152 ... 153 *!CreateWindow* 154 155 POSSIBLE LEAK 156 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2) 157 GDI32.dll!* 158 GDI32.dll!CreateFontIndirectExW 159 GDI32.dll!CreateFontIndirectW 160 161 LEAK 162 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3) 163 KERNELBASE.dll!LocalAlloc 164 ... 165 USER32.dll!CreateWindow* 166 167 UNINITIALIZED READ 168 name=http://code.google.com/p/drmemory/issues/detail?id=18 a 169 ... 170 *!CoInitialize* 171 172 UNINITIALIZED READ 173 name=http://code.google.com/p/drmemory/issues/detail?id=18 b 174 ... 175 *!CoCreateInstance* 176 177 UNINITIALIZED READ 178 name=http://code.google.com/p/drmemory/issues/detail?id=18 c 179 ... 180 *!CoUninitialize* 181 182 UNINITIALIZED READ 183 name=http://code.google.com/p/drmemory/issues/detail?id=18 d 184 ... 185 UxTheme.dll!* 186 187 UNINITIALIZED READ 188 name=http://code.google.com/p/drmemory/issues/detail?id=40 a 189 ... 190 WINSPOOL.DRV!* 191 192 LEAK 193 name=http://code.google.com/p/drmemory/issues/detail?id=40 b 194 ... 195 WINSPOOL.DRV!* 196 197 UNINITIALIZED READ 198 name=http://code.google.com/p/drmemory/issues/detail?id=48 a 199 system call NtContinue 200 ... 201 *!*SetThreadName 202 203 UNINITIALIZED READ 204 name=http://code.google.com/p/drmemory/issues/detail?id=48 b 205 system call NtContinue 206 *!WTF::initializeCurrentThreadInternal 207 208 UNINITIALIZED READ 209 name=http://code.google.com/p/drmemory/issues/detail?id=52 a 210 ... 211 DBGHELP.dll!SymInitialize 212 213 UNINITIALIZED READ 214 name=http://code.google.com/p/drmemory/issues/detail?id=52 b 215 ... 216 DBGHELP.dll!SymEnumSourceFiles 217 218 UNINITIALIZED READ 219 name=http://code.google.com/p/drmemory/issues/detail?id=52 c 220 ... 221 msvcrt.dll!_RTDynamicCast 222 223 UNINITIALIZED READ 224 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp 225 instruction=test 0x*(%*) $0x?? 226 DBGHELP.dll!SymUnloadModule64 227 228 UNINITIALIZED READ 229 name=http://code.google.com/p/drmemory/issues/detail?id=53 230 ADVAPI32.dll!WmiMofEnumerateResourcesA 231 ADVAPI32.dll!WmiMofEnumerateResourcesA 232 ADVAPI32.dll!Sta*TraceW 233 234 UNINITIALIZED READ 235 name=http://code.google.com/p/drmemory/issues/detail?id=58 236 ... 237 *!_cfltcvt_l 238 239 UNINITIALIZED READ 240 name=http://code.google.com/p/drmemory/issues/detail?id=60 241 USP10.dll!* 242 ... 243 USP10.dll!ScriptStringAnalyse 244 245 LEAK 246 IMM32.dll!ImmGetIMCCSize 247 IMM32.dll!ImmLockClientImc 248 IMM32.dll!ImmDisableIME 249 IMM32.dll!ImmSetActiveContext 250 USER32.dll!IMPSetIMEA 251 252 UNINITIALIZED READ 253 name=http://code.google.com/p/drmemory/issues/detail?id=65 a 254 ... 255 *!SystemFunction036 256 257 UNINITIALIZED READ 258 name=http://code.google.com/p/drmemory/issues/detail?id=65 b 259 ... 260 *!talk_base::CreateRandomString 261 262 UNINITIALIZED READ 263 name=http://code.google.com/p/drmemory/issues/detail?id=68 a 264 ... 265 WS2_32.dll!* 266 267 UNINITIALIZED READ 268 name=http://code.google.com/p/drmemory/issues/detail?id=68 b 269 ... 270 ADVAPI32.dll!SetSecurityDescriptorDacl 271 272 UNINITIALIZED READ 273 name=http://code.google.com/p/drmemory/issues/detail?id=68 c 274 ... 275 MSWSOCK.dll!WSPStartup 276 277 UNINITIALIZED READ 278 name=http://code.google.com/p/drmemory/issues/detail?id=68 d 279 ... 280 ntdll.dll!RtlValidateUnicodeString 281 282 LEAK 283 name=http://code.google.com/p/drmemory/issues/detail?id=256 284 *!_mtinit 285 *!__tmainCRTStartup 286 *!mainCRTStartup 287 288 POSSIBLE LEAK 289 name=http://code.google.com/p/drmemory/issues/detail?id=274 a 290 ... 291 GDI32.dll!CreateDCW 292 293 LEAK 294 name=http://code.google.com/p/drmemory/issues/detail?id=274 b 295 ... 296 GDI32.dll!CreateDCW 297 298 LEAK 299 name=http://code.google.com/p/drmemory/issues/detail?id=275 300 ... 301 *!_getptd* 302 303 UNINITIALIZED READ 304 name=http://code.google.com/p/drmemory/issues/detail?id=276 305 ... 306 ntdll.dll!RtlConvertUlongToLargeInteger 307 ntdll.dll!RtlConvertUlongToLargeInteger 308 ntdll.dll!KiUserExceptionDispatcher 309 310 LEAK 311 name=http://code.google.com/p/drmemory/issues/detail?id=305 312 *!free 313 *!free 314 *!operator new 315 ... 316 *!MiniDumpWriteDump 317 318 UNINITIALIZED READ 319 name=http://code.google.com/p/drmemory/issues/detail?id=346 a 320 ... 321 GDI32.dll!CloseEnhMetaFile 322 323 UNINITIALIZED READ 324 name=http://code.google.com/p/drmemory/issues/detail?id=346 b 325 GDI32.dll!SetPolyFillMode 326 GDI32.dll!CreateICW 327 328 UNINITIALIZED READ 329 name=http://code.google.com/p/drmemory/issues/detail?id=362 330 USER32.dll!UnregisterClass* 331 332 LEAK 333 name=http://code.google.com/p/drmemory/issues/detail?id=382 334 ... 335 ntdll.dll!CsrNewThread 336 337 UNINITIALIZED READ 338 name=http://code.google.com/p/drmemory/issues/detail?id=397 339 system call NtDeviceIoControlFile InputBuffer 340 ADVAPI32.dll!ImpersonateAnonymousToken 341 342 UNINITIALIZED READ 343 name=http://code.google.com/p/drmemory/issues/detail?id=407 a 344 system call NtRequestWaitReplyPort 345 RPCRT4.dll!I_RpcSendReceive 346 RPCRT4.dll!NdrSendReceive 347 348 UNINITIALIZED READ 349 name=http://code.google.com/p/drmemory/issues/detail?id=407 b 350 IMM32.dll!* 351 ntdll.dll!LdrInitializeThunk 352 ntdll.dll!LdrShutdownThread 353 354 UNINITIALIZED READ 355 name=http://code.google.com/p/drmemory/issues/detail?id=412 a 356 ADVAPI32.dll!RegDeleteValue* 357 358 UNINITIALIZED READ 359 name=http://code.google.com/p/drmemory/issues/detail?id=412 b 360 ... 361 ADVAPI32.dll!Crypt* 362 363 UNINITIALIZED READ 364 name=http://code.google.com/p/drmemory/issues/detail?id=412 c 365 ... 366 RPCRT4.dll!NdrClientCall2 367 368 LEAK 369 name=http://code.google.com/p/drmemory/issues/detail?id=412 d 370 RSAENH.dll!DllUnregisterServer 371 ... 372 ADVAPI32.dll!CryptAcquireContextA 373 CRYPT32.dll!CryptEnumOIDFunction 374 ... 375 CRYPT32.dll!CertFindCertificateInStore 376 377 UNINITIALIZED READ 378 name=http://code.google.com/p/drmemory/issues/detail?id=412 e 379 ... 380 RSAENH.dll!CPGenRandom 381 382 UNINITIALIZED READ 383 name=http://code.google.com/p/drmemory/issues/detail?id=412 f 384 ... 385 CRYPT??.dll!Crypt* 386 387 UNINITIALIZED READ 388 name=http://code.google.com/p/drmemory/issues/detail?id=412 g 389 *!replace_memcmp 390 ... 391 *!testing::internal::CmpHelperEQ* 392 ... 393 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody 394 395 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't 396 # have frame pointers, and we have trouble unwinding from it. Therefore, we use 397 # this broad suppression, effectively disabling uninit checks in rsaenh.dll. 398 UNINITIALIZED READ 399 name=http://code.google.com/p/drmemory/issues/detail?id=412 h 400 RSAENH.dll!* 401 402 UNINITIALIZED READ 403 name=http://code.google.com/p/drmemory/issues/detail?id=425 a 404 CLBCatQ.DLL!DestroyStgDatabase 405 CLBCatQ.DLL!PostError 406 CLBCatQ.DLL!PostError 407 408 LEAK 409 name=http://code.google.com/p/drmemory/issues/detail?id=425 b 410 RPCRT4.dll!I_RpcBCacheFree 411 RPCRT4.dll!I_RpcBCacheFree 412 ... 413 RPCRT4.dll!NdrClientCall2 414 415 UNINITIALIZED READ 416 name=http://code.google.com/p/drmemory/issues/detail?id=425 c 417 msdmo.dll!* 418 msdmo.dll!* 419 DEVENUM.DLL!* 420 421 UNINITIALIZED READ 422 name=http://code.google.com/p/drmemory/issues/detail?id=435 a 423 ... 424 ntdll.dll!RtlSetSecurityObject 425 ntdll.dll!RtlNewSecurityObjectEx 426 ADVAPI32.dll!CreatePrivateObjectSecurityEx 427 NTMARTA.dll!AccRewriteSetNamedRights 428 429 POSSIBLE LEAK 430 name=http://code.google.com/p/drmemory/issues/detail?id=435 b 431 WLDAP32.dll!Ordinal325 432 ... 433 WLDAP32.dll!Ordinal325 434 ntdll.dll!LdrInitializeThunk 435 ntdll.dll!LdrFindResourceDirectory_U 436 ntdll.dll!RtlValidateUnicodeString 437 ntdll.dll!LdrLoadDll 438 KERNEL32.dll!LoadLibraryExW 439 440 # mod+offs suppression because the symbolic makes no sense and changes 441 # completely in the presence of WS2_32.dll symbols. 442 LEAK 443 name=http://code.google.com/p/drmemory/issues/detail?id=438 444 <WS2_32.dll+0x260c> 445 <WS2_32.dll+0x2b76> 446 <WS2_32.dll+0x2c61> 447 448 UNINITIALIZED READ 449 name=http://code.google.com/p/drmemory/issues/detail?id=454 a 450 ... 451 WINMM.dll!wave*GetNumDevs 452 453 LEAK 454 name=http://code.google.com/p/drmemory/issues/detail?id=454 b 455 ... 456 WINMM.dll!wave*GetNumDevs 457 458 LEAK 459 name=http://code.google.com/p/drmemory/issues/detail?id=466 460 ntdll.dll!RtlRunOnceBeginInitialize 461 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount 462 463 UNINITIALIZED READ 464 name=http://code.google.com/p/drmemory/issues/detail?id=473 a 465 system call NtDeviceIoControlFile InputBuffer 466 ... 467 iphlpapi.dll!GetAdaptersAddresses 468 469 POSSIBLE LEAK 470 name=http://code.google.com/p/drmemory/issues/detail?id=473 b 471 ESENT.dll!* 472 ESENT.dll!* 473 ESENT.dll!* 474 ntdll.dll!Ldr*Init* 475 ntdll.dll!Ldr* 476 ntdll.dll!* 477 ntdll.dll!LdrLoadDll 478 ... 479 iphlpapi.dll!GetPerAdapterInfo 480 ... 481 iphlpapi.dll!GetAdaptersAddresses 482 483 POSSIBLE LEAK 484 name=http://code.google.com/p/drmemory/issues/detail?id=473 c 485 RPCRT4.dll!* 486 RPCRT4.dll!* 487 ... 488 IPHLPAPI.DLL!GetAdaptersAddresses 489 490 LEAK 491 name=http://code.google.com/p/drmemory/issues/detail?id=475 492 ... 493 ADVAPI32.dll!CryptAcquireContextA 494 ... 495 CRYPT32.dll!CryptMsgOpenToDecode 496 ... 497 CRYPT32.dll!CryptQueryObject 498 499 # Lots of leaks from our interactions with the system certificate store. May be 500 # worth reviewing our use of their API. 501 LEAK 502 name=http://code.google.com/p/drmemory/issues/detail?id=476 a 503 KERNEL*.dll!LocalAlloc 504 ... 505 CRYPT32.dll!CertGetCRLContextProperty 506 507 LEAK 508 name=http://code.google.com/p/drmemory/issues/detail?id=476 b 509 KERNEL*.dll!LocalAlloc 510 ... 511 CRYPT32.dll!CertAddCRLContextToStore 512 513 LEAK 514 name=http://code.google.com/p/drmemory/issues/detail?id=476 c 515 KERNEL*.dll!LocalAlloc 516 ... 517 CRYPT32.dll!CertOpenStore 518 519 LEAK 520 name=http://code.google.com/p/drmemory/issues/detail?id=476 d 521 ... 522 CRYPT32.dll!CertOpenSystemStore? 523 524 LEAK 525 name=http://code.google.com/p/drmemory/issues/detail?id=476 e 526 ... 527 CRYPT32.dll!CertGetCertificateChain 528 529 LEAK 530 name=http://code.google.com/p/drmemory/issues/detail?id=476 f 531 ... 532 CRYPT32.dll!CertCompareIntegerBlob 533 534 LEAK 535 name=http://code.google.com/p/drmemory/issues/detail?id=476 g 536 ... 537 CRYPT32.dll!CryptUnprotectData 538 539 LEAK 540 name=http://code.google.com/p/drmemory/issues/detail?id=476 h 541 KERNEL*.dll!LocalAlloc 542 ... 543 CRYPT32.dll!CertEnumCertificatesInStore 544 545 LEAK 546 name=http://code.google.com/p/drmemory/issues/detail?id=476 i 547 ... 548 CRYPT32.dll!CryptProtectData 549 550 LEAK 551 name=http://code.google.com/p/drmemory/issues/detail?id=476 j 552 ... 553 CRYPT32.dll!CryptExportPublicKeyInfoEx 554 555 UNINITIALIZED READ 556 name=http://code.google.com/p/drmemory/issues/detail?id=502 a 557 system call NtSecureConnectPort parameter #3 558 GDI32.dll!* 559 GDI32.dll!* 560 561 UNINITIALIZED READ 562 name=http://code.google.com/p/drmemory/issues/detail?id=502 b 563 system call NtGdiEnumFonts parameter #6 564 GDI32.dll!* 565 GDI32.dll!* 566 567 UNINITIALIZED READ 568 name=http://code.google.com/p/drmemory/issues/detail?id=511 a 569 RPCRT4.dll!... 570 ole32.dll!* 571 572 UNINITIALIZED READ 573 name=http://code.google.com/p/drmemory/issues/detail?id=511 b 574 ole32.dll!* 575 ole32.dll!* 576 ole32.dll!StringFromGUID2 577 578 UNINITIALIZED READ 579 name=http://code.google.com/p/drmemory/issues/detail?id=512 a 580 ... 581 *!browser_sync::Cryptographer::PackBootstrapToken 582 *!browser_sync::Cryptographer::GetBootstrapToken 583 584 UNINITIALIZED READ 585 name=http://code.google.com/p/drmemory/issues/detail?id=512 b 586 ... 587 *!Encrypt* 588 589 # TODO(bruening): remove these once we have v8 bitfields handled 590 UNINITIALIZED READ 591 name=http://code.google.com/p/drmemory/issues/detail?id=513 a 592 *!v8* 593 594 UNINITIALIZED READ 595 name=http://code.google.com/p/drmemory/issues/detail?id=513 b 596 *!* 597 *!v8* 598 599 UNINITIALIZED READ 600 name=http://code.google.com/p/drmemory/issues/detail?id=513 c 601 <not in a module> 602 ... 603 *!v8* 604 605 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll 606 # has no symbols. These are all on the bots using component build, so we use 607 # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue. 608 UNINITIALIZED READ 609 name=http://code.google.com/p/drmemory/issues/detail?id=513 d 610 v8.dll!* 611 612 UNINITIALIZED READ 613 name=http://code.google.com/p/drmemory/issues/detail?id=513 e 614 <not in a module> 615 ... 616 v8.dll!* 617 618 UNINITIALIZED READ 619 name=http://code.google.com/p/drmemory/issues/detail?id=546 620 ... 621 mscms.dll!* 622 ... 623 GDI32.dll!* 624 *!IconUtil::Create*HICON* 625 626 LEAK 627 name=http://crbug.com/92152 628 ... 629 USER32.dll!CreateWindowExW 630 *!views::TooltipManagerWin::Init 631 *!views::TooltipManagerWin::TooltipManagerWin 632 633 UNINITIALIZED READ 634 name=http://code.google.com/p/drmemory/issues/detail?id=567 a 635 dbghelp.dll!* 636 ... 637 dbghelp.dll!StackWalk64 638 639 LEAK 640 name=http://code.google.com/p/drmemory/issues/detail?id=567 b 641 *!* 642 dbghelp.dll!* 643 ... 644 dbghelp.dll!StackWalk64 645 646 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and 647 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too 648 # brittle, so we switched to RPCRT4.dll!*. 649 LEAK 650 name=http://code.google.com/p/drmemory/issues/detail?id=569 651 RPCRT4.dll!... 652 ntdll.dll!* 653 ntdll.dll!* 654 KERNEL*.dll!BaseThreadInitThunk 655 656 # TODO(timurrrr): investigate these 657 UNINITIALIZED READ 658 name=http://crbug.com/TODO a 659 ... 660 *!win_util::GetLogonSessionOnlyDACL 661 662 UNINITIALIZED READ 663 name=http://crbug.com/TODO b 664 ... 665 ntshrui.dll!IsPathSharedW 666 667 UNINITIALIZED READ 668 name=http://crbug.com/TODO c 669 ... 670 *!NetApiBufferFree 671 672 UNINITIALIZED READ 673 name=http://crbug.com/TODO d 674 ... 675 *!ShellExecute* 676 677 UNINITIALIZED READ 678 name=http://crbug.com/TODO e 679 ... 680 *!SHParseDisplayName 681 682 UNINITIALIZED READ 683 name=http://crbug.com/TODO f 684 ... 685 *!GetCanonicalPathInfo* 686 687 UNINITIALIZED READ 688 name=http://crbug.com/TODO g 689 ... 690 SHELL32.dll!Ordinal* 691 692 UNINITIALIZED READ 693 name=http://crbug.com/TODO h 694 ... 695 GDI32.dll!GetTextExtentPoint32* 696 697 UNINITIALIZED READ 698 name=http://crbug.com/TODO i 699 ... 700 *!SyncSocketClientListener::OnMsgClassResponse 701 702 UNINITIALIZED READ 703 name=http://crbug.com/TODO j 704 ... 705 *!*NSPRInitSingleton* 706 707 UNINITIALIZED READ 708 name=http://crbug.com/TODO k 709 *!NdrSimpleStructFree 710 711 UNINITIALIZED READ 712 name=http://crbug.com/TODO l 713 ntdll.dll!RtlpNtOpenKey 714 ntdll.dll!RtlMakeSelfRelativeSD 715 ntdll.dll!RtlAbsoluteToSelfRelativeSD 716 ADVAPI32.dll!MakeSelfRelativeSD 717 718 UNINITIALIZED READ 719 name=http://crbug.com/TODO m 720 ... 721 CRYPT32.dll!I_CertSyncStore 722 723 # This matches the same stack as DrMem i#751, but it's an uninit read instead of 724 # a leak. Must be some early thread initialization. Doesn't look like 725 # bit-level though. 726 UNINITIALIZED READ 727 name=http://crbug.com/TODO n 728 RPCRT4.dll!* 729 RPCRT4.dll!* 730 RPCRT4.dll!* 731 ntdll.dll!* 732 ntdll.dll!* 733 KERNEL*.dll!BaseThreadInitThunk 734 735 # No idea where this is from, but Chrome isn't even on the stack. 736 POSSIBLE LEAK 737 name=http://crbug.com/TODO o 738 RPCRT4.dll!... 739 ole32.dll!OleInitialize 740 ole32.dll!... 741 KERNEL32.dll!BaseThreadInitThunk 742 743 # Matches lots of RPC related leaks. So far RPC handles have been mostly owned 744 # by system libraries and are not something we can fix easily. 745 POSSIBLE LEAK 746 name=http://crbug.com/TODO p 747 RPCRT4.dll!* 748 RPCRT4.dll!* 749 RPCRT4.dll!NDRCContextBinding 750 751 # No idea, but all system code, not interesting. 752 POSSIBLE LEAK 753 name=http://crbug.com/TODO q 754 RPCRT4.dll!... 755 RPCRT4.dll!* 756 RPCRT4.dll!* 757 ole32.dll!... 758 ole32.dll!* 759 ole32.dll!* 760 ... 761 SHELL32.dll!* 762 763 LEAK 764 name=http://crbug.com/109278 video device COM leaks 765 ... 766 *!media::VideoCaptureDevice::* 767 768 LEAK 769 name=http://crbug.com/109278 audio device COM leaks 770 ... 771 *!media::GetInputDeviceNamesWin 772 773 # False pos uninit in shell32 when resolving links. 774 UNINITIALIZED READ 775 name=http://code.google.com/p/drmemory/issues/detail?id=745 776 SHELL*.dll!* 777 ... 778 SHELL*.dll!* 779 *!file_util::ResolveShortcut 780 781 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a 782 # buffer with SSE/MMX instructions whose results are then masked out later. 783 UNINITIALIZED READ 784 name=http://code.google.com/p/drmemory/issues/detail?id=747 a 785 *!ff_pred4x4_vertical_vp8_mmxext 786 787 UNINITIALIZED READ 788 name=http://code.google.com/p/drmemory/issues/detail?id=747 b 789 *!ff_pred4x4_down_left_mmxext 790 791 UNINITIALIZED READ 792 name=http://code.google.com/p/drmemory/issues/detail?id=747 c 793 *!ff_vorbis_floor1_render_list 794 795 UNINITIALIZED READ 796 name=http://code.google.com/p/drmemory/issues/detail?id=747 d 797 *!ff_put_vp8_epel8_h6_ssse3 798 799 UNINITIALIZED READ 800 name=http://code.google.com/p/drmemory/issues/detail?id=747 e 801 *!ff_put_vp8_epel8_h4_ssse3 802 803 UNINITIALIZED READ 804 name=http://code.google.com/p/drmemory/issues/detail?id=747 f 805 *!ff_fft_permute_sse 806 807 UNINITIALIZED READ 808 name=http://code.google.com/p/drmemory/issues/detail?id=747 g 809 *!ff_simple_idct_add_mmx 810 811 # ffmpeg seems to leak a pthread condition variable. 812 LEAK 813 name=http://crbug.com/110042 814 *!ptw32_new 815 *!pthread_self 816 *!sem_wait 817 *!pthread_cond_wait 818 *!ff_thread_decode_frame 819 *!avcodec_decode_video2 820 821 # Improperly handled ioctl in bcrypt. 822 UNINITIALIZED READ 823 name=http://code.google.com/p/drmemory/issues/detail?id=748 824 system call NtDeviceIoControlFile InputBuffer 825 ... 826 bcrypt.dll!BCryptUnregisterConfigChangeNotify 827 bcrypt.dll!BCryptGetFipsAlgorithmMode 828 ntdll.dll!RtlQueryEnvironmentVariable 829 830 # Not sure what this is. 831 POSSIBLE LEAK 832 name=http://code.google.com/p/drmemory/issues/detail?id=749 833 ... 834 fwpuclnt.dll!* 835 ... 836 RPCRT4.dll!* 837 ... 838 fwpuclnt.dll!* 839 ... 840 WS2_32.dll!* 841 *!talk_base::SafeGetHostByName 842 *!talk_base::SocketAddress::GetLocalIPs 843 *!talk_base::SocketAddress::IsLocalIP 844 *!cricket::Transport::VerifyCandidate 845 *!cricket::Session::OnRemoteCandidates 846 *!cricket::Session::OnTransportInfoMessage 847 *!cricket::Session::OnIncomingMessage 848 *!cricket::SessionManager::OnIncomingMessage 849 850 # More uninit false pos in rpcrt4.dll not caught by default suppressions. 851 UNINITIALIZED READ 852 name=http://code.google.com/p/drmemory/issues/detail?id=529 853 RPCRT4.dll!* 854 ... 855 *!base::LaunchProcess 856 857 # System leak from CreateEnvironmentBlock. 858 LEAK 859 name=http://code.google.com/p/drmemory/issues/detail?id=757 860 ... 861 USERENV.dll!CreateEnvironmentBlock 862 863 # Looks like another instance of 753 864 LEAK 865 name=http://code.google.com/p/drmemory/issues/detail?id=753 866 ... 867 ntdll.dll!RtlLoadString 868 869 # More bit manip fps 870 UNINITIALIZED READ 871 name=http://code.google.com/p/drmemory/issues/detail?id=493 872 USP10.dll!ScriptPositionSingleGlyph 873 874 # Various TLS leaks that we don't understand yet. We should be finding a root 875 # for these. 876 LEAK 877 name=http://code.google.com/p/drmemory/issues/detail?id=778 a 878 KERNELBASE.dll!TlsSetValue 879 880 # Originally filed as: http://crbug.com/109281 881 LEAK 882 name=http://code.google.com/p/drmemory/issues/detail?id=778 b 883 *!operator new 884 *!operator new[] 885 *!*::ConstructTlsVector 886 *!base::ThreadLocalStorage::StaticSlot::Get 887 888 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a 889 # root? See also http://crbug.com/32624 890 LEAK 891 name=http://code.google.com/p/drmemory/issues/detail?id=778 c 892 *!PR_Calloc 893 *!_PR_AttachThread 894 *!_PRI_AttachThread 895 896 # Bit-level fps in rich edit layer. 897 UNINITIALIZED READ 898 name=http://code.google.com/p/drmemory/issues/detail?id=791 899 RICHED20.dll!* 900 RICHED20.dll!* 901 902 # Already suppressed by drmemory default supp we don't have yet. 903 LEAK 904 name=i#757: RPC binding leaks in sspicli.dll 905 RPCRT4.dll!* 906 ... 907 SspiCli.dll!* 908 SspiCli.dll!Cre* 909 910 # Async NtReadFile false positives. This was fixed in drmemory r772, remove 911 # this supp when we pull that rev. 912 UNADDRESSABLE ACCESS 913 name=http://code.google.com/p/drmemory/issues/detail?id=798 914 system call NtReadFile parameter #5 915 KERNEL32.dll!ReadFile 916 917 # Probable syscall false positive. 918 UNADDRESSABLE ACCESS 919 name=http://code.google.com/p/drmemory/issues/detail?id=809 920 system call NtGdiPolyPolyDraw parameter #1 921 *!gfx::Path::CreateNativeRegion 922 923 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces 924 # coming out of this module (sometimes only one frame), which makes it hard to 925 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we 926 # should keep this. 927 UNINITIALIZED READ 928 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard 929 RPCRT4.dll!* 930 931 UNINITIALIZED READ 932 name=http://code.google.com/p/drmemory/issues/detail?id=841 a 933 ... 934 CRYPTNET.dll!I_CryptNetGetConnectivity 935 936 UNINITIALIZED READ 937 name=http://code.google.com/p/drmemory/issues/detail?id=841 b 938 ... 939 webio.dll!* 940 941 UNINITIALIZED READ 942 name=http://code.google.com/p/drmemory/issues/detail?id=841 c 943 ... 944 winhttp.dll!* 945 946 LEAK 947 name=http://code.google.com/p/drmemory/issues/detail?id=841 d 948 ... 949 CRYPTNET.dll!I_CryptNetGetConnectivity 950 951 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame. 952 UNINITIALIZED READ 953 name=http://code.google.com/p/drmemory/issues/detail?id=810 954 instruction=test %edx %edx 955 USER32.dll!GetClassLongW 956 ... 957 *!ui::CenterAndSizeWindow 958 959 UNINITIALIZED READ 960 name=http://code.google.com/p/drmemory/issues/detail?id=815 961 KERNEL*.dll!... 962 dxgi.dll!* 963 USER32.dll!GetMonitorInfoA 964 ntdll.dll!KiUserCallbackDispatcher 965 dxgi.dll!* 966 WinSATAPI.DLL!* 967 968 # Suppress anything in cmd.exe. It's safer to suppress these than disable 969 # following, since someone might launch a Chrome process via cmd.exe. 970 LEAK 971 name=cmd.exe 972 ... 973 cmd.exe!* 974 975 # Possible true system use after free. 976 UNADDRESSABLE ACCESS 977 name=http://code.google.com/p/drmemory/issues/detail?id=623 978 KERNELBASE.dll!TlsGetValue 979 OLEAUT32.dll!SysFreeString 980 OLEAUT32.dll!SysAllocStringByteLen 981 OLEACC.dll!* 982 OLEACC.dll!* 983 OLEACC.dll!* 984 OLEACC.dll!* 985 986 # basic_streambuf seems to leak something in creating a std::_Mutex 987 LEAK 988 name=http://code.google.com/p/drmemory/issues/detail?id=857 989 ntdll.dll!... 990 ntdll.dll!RtlInitializeCriticalSection 991 *!_Mtxinit 992 *!std::_Mutex::_Mutex 993 *!std::basic_streambuf<> 994 995 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. 996 LEAK 997 name=GDI SetBrushOrgEx leak 998 GDI32.dll!... 999 GDI32.dll!GetTextMetricsW 1000 *!gfx::PlatformFontWin::CreateHFontRef 1001 *!gfx::PlatformFontWin::GetBaseFontRef 1002 1003 ############################################################### 1004 # Benign issues in Chromium 1005 1006 # This test intentionally leaks an object and checks that it's never deleted. 1007 LEAK 1008 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak 1009 ... 1010 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody 1011 1012 LEAK 1013 name=deliberate histogram leak 1014 ... 1015 *!replace_operator_new 1016 ... 1017 *!*::*Histogram::FactoryGet 1018 1019 LEAK 1020 name=deliberate leak for SampleMap 1021 ... 1022 *!base::SampleMap::Accumulate 1023 *!base::SparseHistogram::Add 1024 1025 LEAK 1026 name=deliberate LazyInstance leak 1027 ... 1028 *!*LeakyLazyInstance* 1029 ... 1030 *!base::LazyInstance*::Pointer 1031 1032 LEAK 1033 name=http://crbug.com/79933 (2) 1034 ... 1035 *!TestURLRequestContext::TestURLRequestContext 1036 *!TestURLRequestContextGetter::GetURLRequestContext 1037 *!notifier::SingleLoginAttempt::SingleLoginAttempt 1038 *!notifier::Login::StartConnection 1039 *!syncer::InvalidationNotifier::UpdateCredentials 1040 *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials 1041 1042 LEAK 1043 name=http://crbug.com/79933 (3) 1044 ... 1045 *!TestURLRequestContext::TestURLRequestContext 1046 *!TestURLRequestContextGetter::GetURLRequestContext 1047 *!URLFetcher::Core::StartURLRequest 1048 1049 LEAK 1050 name=http://crbug.com/79933 (4) 1051 *!generic_cpp_alloc 1052 *!operator new 1053 *!std::_Allocate<> 1054 *!std::allocator<>::allocate 1055 *!std::vector<>::_Insert_n 1056 *!std::vector<>::insert 1057 *!std::vector<>::push_back 1058 *!ObserverListBase<>::AddObserver 1059 ... 1060 *!net::HttpNetworkSession::HttpNetworkSession 1061 *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket 1062 *!notifier::XmppClientSocketFactory::CreateTransportClientSocket 1063 *!notifier::ChromeAsyncSocket::Connect 1064 *!buzz::XmppClient::ProcessStartXmppLogin 1065 *!buzz::XmppClient::Process 1066 *!talk_base::Task::Step 1067 *!talk_base::TaskRunner::InternalRunTasks 1068 *!talk_base::TaskRunner::RunTasks 1069 *!notifier::TaskPump::CheckAndRunTasks 1070 *!base::internal::RunnableAdapter<>::Run 1071 1072 # Test intentionally leaks an object. 1073 LEAK 1074 name=http://crbug.com/86301 1075 *!replace_operator_new 1076 ... 1077 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody 1078 1079 # Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it. 1080 LEAK 1081 name=Firefox 3 NSS dll leak 1082 nspr4.dll!* 1083 ... 1084 *!NSSDecryptor::~NSSDecryptor 1085 1086 # We get uninit reports inside GMock when it prints the bytes of references to 1087 # partially initialized objects passed to unexpected method calls. 1088 UNINITIALIZED READ 1089 name=http://crbug.com/64887 (GMock printing uninit data) 1090 ... 1091 *!testing::*::PrintBytesInObjectTo* 1092 1093 ############################################################### 1094 # Proactively borrowed from memcheck/suppressions.txt. 1095 # We have not yet seen these, but we are expanding the sets of tests 1096 # we're running, and we've hit redness in the past that could have 1097 # been avoided by already having the Memcheck suppressions. 1098 # TODO(bruening): review the entire file (not just these) once we're 1099 # at the peak set of tests we plan to run and remove the unused ones. 1100 1101 UNINITIALIZED READ 1102 name=bug_99307 1103 *!modp_b64_encode 1104 *!base::Base64Encode* 1105 *!web_ui_util::GetImageDataUrl 1106 *!::NetworkInfoDictionary::set_icon 1107 1108 UNINITIALIZED READ 1109 name=bug_101781 1110 *!encode_one_block 1111 *!encode_mcu_huff 1112 *!compress_data 1113 *!process_data_simple_main 1114 *!chromium_jpeg_write_scanlines 1115 *!gfx::JPEGCodec::Encode 1116 *!gfx::JPEGEncodedDataFromImage 1117 *!history::TopSites::EncodeBitmap 1118 *!history::TopSites::SetPageThumbnail 1119 *!history::ExpireHistoryTest::AddExampleData 1120 *!history::ExpireHistoryTest::* 1121 1122 UNINITIALIZED READ 1123 name=bug_101781_d 1124 *!testing::AssertionResult testing::internal::CmpHelperGE<> 1125 *!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody 1126 1127 UNINITIALIZED READ 1128 name=bug_105907 1129 ... 1130 *!skia::BGRAConvolve2D 1131 *!skia::ImageOperations::ResizeBasic* 1132 *!skia::ImageOperations::Resize* 1133 1134 UNINITIALIZED READ 1135 name=bug_112278 1136 *!fetch_texel_2d_f_rgba8888 1137 *!sample_2d_linear 1138 *!sample_linear_2d 1139 *!fetch_texel_lod 1140 *!fetch_texel 1141 *!_mesa_execute_program 1142 *!run_program 1143 *!_swrast_exec_fragment_program 1144 *!shade_texture_span 1145 *!_swrast_write_rgba_span 1146 *!general_triangle 1147 *!_swrast_validate_triangle 1148 *!_swrast_Triangle 1149 *!triangle_rgba 1150 *!_tnl_render_triangles_elts 1151 *!run_render 1152 *!_tnl_run_pipeline 1153 *!_tnl_draw_prims 1154 *!_tnl_vbo_draw_prims 1155 *!vbo_validated_drawrangeelements 1156 *!vbo_exec_DrawElements 1157 *!neutral_DrawElements 1158 1159 UNINITIALIZED READ 1160 name=bug_112278b 1161 *!fetch_texel_2d_f_rgba8888 1162 *!sample_2d_nearest 1163 *!sample_nearest_2d 1164 *!fetch_texel_lod 1165 *!fetch_texel 1166 *!_mesa_execute_program 1167 *!run_program 1168 *!_swrast_exec_fragment_program 1169 *!shade_texture_span 1170 *!_swrast_write_rgba_span 1171 *!general_triangle 1172 ... 1173 *!_swrast_Triangle 1174 *!triangle_rgba 1175 ... 1176 *!run_render 1177 *!_tnl_run_pipeline 1178 *!_tnl_draw_prims 1179 *!_tnl_vbo_draw_prims 1180 1181 UNINITIALIZED READ 1182 name=bug_115419_1 1183 *!fetch_texel_2d_f_rgba8888 1184 *!texture_get_row 1185 *!fast_read_rgba_pixels 1186 *!read_rgba_pixels 1187 *!_swrast_ReadPixels 1188 *!_mesa_ReadPixels 1189 *!glReadPixels 1190 *!gpu::gles2::GLES2DecoderImpl::HandleReadPixels 1191 *!gpu::gles2::GLES2DecoderImpl::DoCommand 1192 *!gpu::CommandParser::ProcessCommand 1193 *!gpu::GpuScheduler::PutChanged 1194 *!webkit::gpu::GLInProcessContext::PumpCommands 1195 1196 UNINITIALIZED READ 1197 name=bug_115419_2 1198 *!get_src_arg_mask 1199 *!_mesa_remove_extra_move_use 1200 *!_mesa_optimize_program 1201 *!get_mesa_program 1202 *!_mesa_ir_link_shader 1203 *!_mesa_glsl_link_shader 1204 *!link_program 1205 *!_mesa_LinkProgramARB 1206 *!glLinkProgram 1207 ... 1208 *!gpu::gles2::GLES2DecoderImpl::DoLinkProgram* 1209 *!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram* 1210 *!gpu::gles2::GLES2DecoderImpl::DoCommand 1211 *!gpu::CommandParser::ProcessCommand 1212 *!gpu::GpuScheduler::PutChanged 1213 *!webkit::gpu::GLInProcessContext::PumpCommands 1214 1215 UNINITIALIZED READ 1216 name=bug_138058 1217 ... 1218 *!blink::WebVTTParser::constructTreeFromToken 1219 *!blink::WebVTTParser::createDocumentFragmentFromCueText 1220 *!blink::TextTrackCue::getCueAsHTML 1221 *!blink::TextTrackCue::updateDisplayTree 1222 *!blink::HTMLMediaElement::updateActiveTextTrackCues 1223 1224 UNINITIALIZED READ 1225 name=bug_138220_a 1226 *!blink::HTMLInputElement::dataList 1227 *!blink::HTMLInputElement::list 1228 *!blink::RenderSliderContainer::layout 1229 *!blink::RenderBlock::layoutBlockChild 1230 *!blink::RenderBlock::layoutBlockChildren 1231 *!blink::RenderBlock::layoutBlock 1232 *!blink::RenderBlock::layout 1233 *!blink::RenderSlider::layout 1234 1235 UNINITIALIZED READ 1236 name=bug_138220_b 1237 *!blink::HTMLInputElement::dataList 1238 *!blink::HTMLInputElement::list 1239 *!blink::RenderTheme::paintSliderTicks 1240 *!blink::RenderThemeChromiumLinux::paintSliderTrack 1241 *!blink::RenderTheme::paint 1242 *!blink::RenderBox::paintBoxDecorations 1243 *!blink::RenderBlock::paintObject 1244 1245 UNINITIALIZED READ 1246 name=bug_162825 1247 *!bcmp 1248 *!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator< 1249 *!std::less<>::operator 1250 ... 1251 *!std::map<>::find 1252 ... 1253 *!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator 1254 1255 UNINITIALIZED READ 1256 name=bug_176616_a 1257 *!WebTestRunner::WebTestProxyBase::didCreateDataSource 1258 *!WebTestRunner::WebTestProxy<>::didCreateDataSource 1259 *!blink::FrameLoaderClientImpl::createDocumentLoader 1260 *!blink::FrameLoader::init 1261 *!blink::Frame::init 1262 *!blink::WebFrameImpl::initializeAsMainFrame 1263 *!blink::WebViewImpl::initializeMainFrame 1264 *!TestShell::createNewWindow 1265 *!TestShell::createMainWindow 1266 *!TestShell::initialize 1267 1268 UNINITIALIZED READ 1269 name=bug_176616_b 1270 *!WebTestRunner::TestRunner::reset 1271 *!WebTestRunner::TestInterfaces::resetAll 1272 *!WebTestRunner::WebTestInterfaces::resetAll 1273 *!TestShell::resetTestController 1274 *!runTest 1275 1276 UNINITIALIZED READ 1277 name=bug_222883 1278 *!v8::internal::ScavengeVisitor::ScavengePointer 1279 *!v8::internal::ScavengeVisitor::VisitPointers 1280 *!v8::internal::StandardFrame::IterateExpressions 1281 ... 1282 *!v8::internal::Heap::Scavenge 1283 *!v8::internal::Heap::PerformGarbageCollection* 1284 1285 UNINITIALIZED READ 1286 name=bug_238170a 1287 *!blink::ElementRuleCollector::collectMatchingRules 1288 *!blink::ElementRuleCollector::hasAnyMatchingRules 1289 1290 UNINITIALIZED READ 1291 name=bug_238170b 1292 *!blink::ElementRuleCollector::collectMatchingRules 1293 *!blink::StyleResolver::matchAuthorRules 1294 1295 UNINITIALIZED READ 1296 name=bug_238170c 1297 *!blink::ReplaceSelectionCommand::doApply 1298 *!blink::CompositeEditCommand::apply 1299 *!blink::applyCommand 1300 1301 UNINITIALIZED READ 1302 name=bug_259789 1303 *!blink::::adjustAttributes 1304 *!blink::WebGLRenderingContext::maybeRestoreContext 1305 *!blink::Timer<>::fired 1306 *!blink::ThreadTimers::sharedTimerFiredInternal 1307 *!blink::ThreadTimers::sharedTimerFired 1308 *!content::BlinkPlatformImpl::DoTimeout 1309 1310 UNINITIALIZED READ 1311 name=bug_290405 1312 *!GrGradientEffect::onIsEqual 1313 *!GrEffect::isEqual 1314 *!GrEffectStage::DeferredStage::isEqual 1315 *!GrDrawState::DeferredState::isEqual 1316 *!GrInOrderDrawBuffer::needsNewState 1317 *!GrInOrderDrawBuffer::onDraw 1318 *!GrDrawTarget::drawIndexedInstances 1319 *!GrTextContext::flushGlyphs 1320 1321 UNINITIALIZED READ 1322 name=bug_290435 1323 *!blink::AudioContext::scheduleNodeDeletion 1324 *!blink::AudioContext::handlePostRenderTasks 1325 *!blink::AudioDestinationNode::render 1326 *!blink::OfflineAudioDestinationNode::offlineRender 1327 1328 UNINITIALIZED READ 1329 name=bug_364724 1330 *!base::MD5DigestToBase16 1331 *!content::WebKitTestRunner::CaptureDumpPixels 1332 1333 UNINITIALIZED READ 1334 name=bug_298143 1335 ... 1336 *!blink::TypeConversionsV8Internal*AttributeGetter* 1337 1338 UNINITIALIZED READ 1339 name=bug_299804 1340 *!GrConfigConversionEffect::TestForPreservingPMConversions 1341 *!::test_pm_conversions 1342 *!GrContext::createPMToUPMEffect 1343 *!GrContext::readRenderTargetPixels 1344 *!SkGpuDevice::onReadPixels 1345 *!SkBaseDevice::readPixels 1346 *!SkCanvas::readPixels 1347 *!DeferredDevice::onReadPixels 1348 *!SkBaseDevice::readPixels 1349 *!SkCanvas::readPixels 1350 *!blink::GraphicsContext::readPixels 1351 *!WTF::PassRefPtr<> 1352 *!blink::ImageBuffer::getUnmultipliedImageData 1353 *!blink::CanvasRenderingContext2D::getImageData 1354 *!blink::CanvasRenderingContext2D::getImageData 1355 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethod 1356 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback 1357 *!v8::internal::FunctionCallbackArguments::Call 1358 *!v8::internal::HandleApiCallHelper<> 1359 1360 UNINITIALIZED READ 1361 name=bug_309477 1362 *!WebTestRunner::EventSender::reset 1363 *!WebTestRunner::TestInterfaces::resetTestHelperControllers 1364 *!WebTestRunner::TestInterfaces::resetAll 1365 ... 1366 *!content::ShellRenderProcessObserver::WebKitInitialized 1367 *!content::RenderThreadImpl::EnsureWebKitInitialized 1368 *!content::RenderThreadImpl::OnCreateNewView 1369 1370 ############################################################### 1371 # Real issues in Chromium 1372 1373 LEAK 1374 name=http://crbug.com/32085 1375 ... 1376 chrome.dll!NotificationRegistrar::Add 1377 1378 UNINITIALIZED READ 1379 name=http://crbug.com/57266 (1) 1380 ... 1381 *!remoting::EncoderVp8::Encode 1382 1383 UNINITIALIZED READ 1384 name=http://crbug.com/57266 (2) 1385 ... 1386 *!vp8_* 1387 1388 LEAK 1389 name=http://crbug.com/70062 1390 *!PR_Calloc 1391 *!PR_NewLock 1392 ... 1393 *!InitSessionCacheLocks 1394 *!initSessionCacheLocksLazily 1395 *!PR_CallOnce 1396 *!ssl_InitSessionCacheLocks 1397 *!lock_cache 1398 *!ssl_LookupSID 1399 *!ssl2_BeginClientHandshake 1400 *!ssl_Do1stHandshake 1401 *!SSL_ForceHandshake 1402 *!net::SSL*SocketNSS::DoHandshake 1403 *!net::SSL*SocketNSS::DoHandshakeLoop 1404 1405 LEAK 1406 name=http://crbug.com/74417 a 1407 *!replace_operator_new 1408 *!disk_cache::BackendImpl::CreateEntryImpl 1409 1410 LEAK 1411 name=http://crbug.com/74417 b 1412 *!replace_operator_new 1413 *!disk_cache::BackendImpl::NewEntry 1414 1415 # One more disk_cache::BackendImpl leak. See also http://crbug.com/87500. 1416 LEAK 1417 name=http://crbug.com/74417 c 1418 *!replace_operator_new 1419 ... 1420 *!disk_cache::EntryImpl::UserBuffer::UserBuffer 1421 1422 LEAK 1423 name=http://crbug.com/75247 1424 ... 1425 *!replace_operator_new 1426 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper 1427 1428 LEAK 1429 name=http://crbug.com/78784 1430 *!generic_cpp_alloc 1431 *!operator new 1432 *!TestingProfile::CreateRequestContext 1433 *!*ProfileSyncService*::SetUp 1434 1435 LEAK 1436 name=http://crbug.com/80550 (1) 1437 ... 1438 *!RenderWidgetHost::WasHidden 1439 1440 LEAK 1441 name=http://crbug.com/80550 (2) 1442 ... 1443 *!RenderWidgetHost::WasRestored 1444 1445 LEAK 1446 name=http://crbug.com/87612 1447 ... 1448 *!SSL_ConfigSecureServer 1449 *!net::SSLServerSocketNSS::InitializeSSLOptions 1450 *!net::SSLServerSocketNSS::Handshake 1451 1452 LEAK 1453 name=http://crbug.com/88640 1454 *!generic_cpp_alloc 1455 *!operator new 1456 *!ProfileImpl::InitRegisteredProtocolHandlers 1457 *!ProfileImpl::DoFinalInit 1458 *!ProfileImpl::OnPrefsLoaded 1459 1460 LEAK 1461 name=http://crbug.com/91465 1462 *!generic_cpp_alloc 1463 *!operator new 1464 *!browser_sync::internal::WeakHandleCore<>::* 1465 *!browser_sync::WeakHandle<>::* 1466 *!syncer::SyncManager::SyncInternal::Init 1467 1468 LEAK 1469 name=http://crbug.com/91491 1470 ... 1471 *!CrxUpdateService::ProcessPendingItems 1472 1473 UNINITIALIZED READ 1474 name=http://crbug.com/92026 (1) 1475 softokn3.dll!FC_GetFunctionList 1476 ... 1477 softokn3.dll!NSC_ModuleDBFunc 1478 1479 UNINITIALIZED READ 1480 name=http://crbug.com/92026 (2) 1481 freebl3.dll!FREEBL_GetVector 1482 ... 1483 softokn3.dll!NSC_ModuleDBFunc 1484 1485 # Possible real Chromium issue in DoCrossfade. 1486 UNINITIALIZED READ 1487 name=http://crbug.com/110049 1488 *!media::DoCrossfade<> 1489 *!media::Crossfade 1490 *!media::AudioRendererAlgorithmBase::FillBuffer 1491 1492 # Known sqlite3 leaks. 1493 LEAK 1494 name=http://crbug.com/113847 (1) 1495 ... 1496 *!sqlite3MemMalloc 1497 *!mallocWithAlarm 1498 *!sqlite3Malloc 1499 ... 1500 *!yy_reduce 1501 1502 LEAK 1503 name=http://crbug.com/113847 (2) 1504 ... 1505 *!openDatabase 1506 *!sqlite3_open 1507 1508 LEAK 1509 name=http://crbug.com/115328 1510 ... 1511 *!GenericInfoViewTest_GenericInfoView_Test::TestBody 1512 1513 LEAK 1514 name=http://crbug.com/117427 a 1515 ... 1516 *!net::HostCache::Set 1517 *!net::HostResolverImpl::CacheResult 1518 *!net::HostResolverImpl::Job::CompleteRequests 1519 *!net::HostResolverImpl::Job::OnProcTaskComplete 1520 *!base::internal::RunnableAdapter<>::Run 1521 1522 # Probably related to 117427. Someone is not tearing down DNS resolution during 1523 # testing. 1524 LEAK 1525 name=http://crbug.com/117427 b 1526 *!generic_cpp_alloc 1527 *!operator new 1528 *!base::internal::WeakReferenceOwner::GetRef 1529 *!base::SupportsWeakPtr<>::AsWeakPtr 1530 *!net::HostResolverImpl::Job::Job 1531 *!net::HostResolverImpl::Resolve 1532 *!net::SingleRequestHostResolver::Resolve 1533 *!net::TransportConnectJob::DoResolveHost 1534 *!net::TransportConnectJob::DoLoop 1535 *!net::TransportConnectJob::ConnectInternal 1536 *!net::ConnectJob::Connect 1537 *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal 1538 *!net::internal::ClientSocketPoolBaseHelper::RequestSocket 1539 *!net::ClientSocketPoolBase<>::RequestSocket 1540 *!net::TransportClientSocketPool::RequestSocket 1541 *!net::ClientSocketHandle::Init<> 1542 *!net::`anonymous namespace'::InitSocketPoolHelper 1543 *!net::InitSocketHandleForRawConnect 1544 *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone 1545 *!base::internal::RunnableAdapter<>::Run 1546 1547 # IE frame possible leak of COM object. 1548 LEAK 1549 name=http://crbug.com/122399 1550 ole32.dll!... 1551 ole32.dll!CoTaskMemAlloc 1552 urlmon.dll!... 1553 urlmon.dll!CreateUri 1554 IEFRAME.dll!* 1555 1556 # RenderWidgetHelper leak in DelayProfileDestruction test. 1557 LEAK 1558 name=http://crbug.com/125565 1559 *!generic_cpp_alloc 1560 *!operator new 1561 *!RenderProcessHostImpl::RenderProcessHostImpl 1562 *!SiteInstanceImpl::GetProcess 1563 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody 1564 1565 LEAK 1566 name=http://crbug.com/125807 1567 *!generic_cpp_alloc 1568 *!operator new 1569 *!TransportSecurityPersister::TransportSecurityPersister 1570 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest 1571 1572 UNINITIALIZED READ 1573 name=bug_113076 1574 *!media::ConvertYUVToRGB32_C 1575 *!media::LinearScaleYUVToRGB32RowWithRange_C 1576 *!media::ScaleYUVToRGB32WithRect 1577 1578 UNINITIALIZED READ 1579 name=bug_343248 1580 osmesa.dll!LINTERP 1581 osmesa.dll!INTERP_4F 1582 osmesa.dll!_tnl_generic_interp 1583 1584 UNINITIALIZED READ 1585 name=bug_340752 1586 ... 1587 *!*::ThreadState::visitStack 1588 1589 UNINITIALIZED READ 1590 name=bug_343663 1591 blink_web.dll!blink::RenderBlock::computeInlinePreferredLogicalWidths 1592 1593 UNINITIALIZED READ 1594 name=bug_343797 1595 ... 1596 blink_web.dll!blink::MediaQueryExp::create 1597 blink_web.dll!blink::BisonCSSParser::createFloatingMediaQueryExp 1598 blink_web.dll!cssyyparse 1599 1600 UNINITIALIZED READ 1601 name=bug_343915 1602 blink_web.dll!blink::BisonCSSParser::parseFlex 1603 blink_web.dll!blink::BisonCSSParser::parseValue 1604 blink_web.dll!cssyyparse 1605 1606 UNADDRESSABLE ACCESS 1607 name=BUG_343958 1608 blink_web.dll!blink::Node::getFlag 1609 blink_web.dll!blink::Node::inDocument 1610 blink_web.dll!blink::Node::isDescendantOf 1611 blink_web.dll!blink::CompositeEditCommand::cloneParagraphUnderNewElement 1612 blink_web.dll!blink::CompositeEditCommand::moveParagraphWithClones 1613 1614 UNINITIALIZED READ 1615 name=BUG_344076 1616 blink_web.dll!blink::Editor::canSmartReplaceWithPasteboard 1617 blink_web.dll!blink::Editor::pasteAsPlainTextWithPasteboard 1618 blink_web.dll!blink::Editor::pasteAsPlainText 1619 blink_web.dll!blink::executePasteAndMatchStyle 1620 blink_web.dll!blink::Editor::Command::execute 1621 blink_web.dll!blink::Document::execCommand 1622 1623 UNINITIALIZED READ 1624 name=BUG_349128 1625 content.dll!std::* 1626 ... 1627 content.dll!content::BrowserAccessibilityManagerWin::* 1628 ... 1629 *!*::UpdateNode 1630 1631 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB* 1632 # variety) that it's a performance hit. We avoid that by requesting 1633 # whole-module suppression 1634 # (see https://code.google.com/p/drmemory/issues/detail?id=1529). 1635 UNINITIALIZED READ 1636 name=bug_347967_all_osmesa 1637 osmesa.dll!* 1638 1639 UNINITIALIZED READ 1640 name=bug_347967 1641 osmesa.dll!unpack_RGB*888 1642 osmesa.dll!_mesa_unpack_rgba_row 1643 osmesa.dll!slow_read_rgba_pixels 1644 osmesa.dll!read_rgba_pixels 1645 osmesa.dll!_mesa_readpixels 1646 ... 1647 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand 1648 gpu.dll!gpu::CommandParser::ProcessCommand 1649 gpu.dll!gpu::GpuScheduler::PutChanged 1650 1651 UNINITIALIZED READ 1652 name=bug_347967,bug_348357 1653 osmesa.dll!clip_span 1654 osmesa.dll!_swrast_write_rgba_span 1655 osmesa.dll!general_triangle 1656 ... 1657 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements 1658 gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements 1659 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand 1660 gpu.dll!gpu::CommandParser::ProcessCommand 1661 1662 UNINITIALIZED READ 1663 name=bug_361594 1664 ... 1665 skia.dll!SkA8_Shader_Blitter::blitH 1666 skia.dll!SkBlitter::blitRect 1667 skia.dll!blitrect 1668 skia.dll!SkScan::FillIRect 1669 ... 1670 skia.dll!SkDraw::drawRect 1671 skia.dll!SkDraw::drawBitmap 1672 skia.dll!SkBitmapDevice::drawBitmap 1673 skia.dll!SkCanvas::internalDrawBitmap 1674 skia.dll!SkCanvas::drawBitmap 1675 content.dll!content::ScreenshotData::EncodeOnWorker 1676 1677 UNINITIALIZED READ 1678 name=bug_363487 1679 blink_web.dll!blink::RenderLayerCompositor::updateIfNeeded 1680 blink_web.dll!blink::RenderLayerCompositor::updateIfNeededRecursive 1681 blink_web.dll!blink::FrameView::updateLayoutAndStyleForPainting 1682 blink_web.dll!blink::PageAnimator::updateLayoutAndStyleForPainting 1683 1684 UNINITIALIZED READ 1685 name=bug_365101 1686 *!device::BluetoothAdapterWin::AdapterStateChanged 1687 1688 UNINITIALIZED READ 1689 name=bug_364146 1690 ... 1691 v8.dll!* 1692 net_with_v8.dll!net::ProxyResolverV8::Context::* 1693 1694 UNINITIALIZED READ 1695 name=bug_334448 1696 *!CLD2::UTF8GenericReplaceInternal 1697 *!CLD2::UTF8GenericReplace 1698 *!CLD2::ScriptScanner::LowerScriptSpan 1699 *!CLD2::ScriptScanner::GetOneScriptSpanLower 1700 *!CLD2::DetectLanguageSummaryV2 1701 *!CLD2::DetectLanguageSummary 1702 1703 UNINITIALIZED READ 1704 name=bug_42043 1705 ... 1706 QuickTime.qts!* 1707 1708 UNINITIALIZED READ 1709 name=bug_369141 1710 ... 1711 *!blink::RenderLayerClipper::updateClipRects 1712 *!blink::RenderLayerClipper::parentClipRects 1713 *!blink::RenderLayerClipper::backgroundClipRect 1714 1715 HANDLE LEAK 1716 name=bug_370178 1717 system call NtCreateEvent 1718 KERNELBASE.dll!CreateEventExW 1719 KERNELBASE.dll!CreateEventW 1720 base.dll!base::WaitableEvent::WaitableEvent 1721 gpu.dll!gpu::InProcessCommandBuffer::Initialize 1722 gl_in_process_context.dll!gpu::`anonymous namespace'::GLInProcessContextImpl::Initialize 1723 gl_in_process_context.dll!gpu::GLInProcessContext::CreateContext 1724 1725 UNINITIALIZED READ 1726 name=bug_371844 1727 *!content::GamepadProvider::PadState::Match 1728 *!content::GamepadProvider::DoPoll 1729 1730 UNINITIALIZED READ 1731 name=bug_371950 1732 media.dll!ConvertYUVToRGB32Row_SSE 1733 media.dll!media::ConvertYUVToRGB32_SSE 1734 media.dll!media::ConvertVideoFrameToBitmap 1735 media.dll!media::SkCanvasVideoRenderer::Paint 1736 cc.dll!cc::VideoResourceUpdater::CreateForSoftwarePlanes 1737 cc.dll!cc::VideoResourceUpdater::CreateExternalResourcesFromVideoFrame 1738 cc.dll!cc::VideoLayerImpl::WillDraw 1739 1740 UNINITIALIZED READ 1741 name=bug_371959 1742 content.dll!webrtc::PeerConnection::DoInitialize 1743 content.dll!webrtc::PeerConnection::Initialize 1744 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection_s 1745 content.dll!webrtc::PeerConnectionFactory::OnMessage 1746 content.dll!jingle_glue::JingleThreadWrapper::Send 1747 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection 1748 content.dll!webrtc::PeerConnectionFactoryInterface::CreatePeerConnection 1749 1750 # This suppression is deliberately general, as bugs reported in 1751 # ProcessOutgoingMessages are difficult to track down until we 1752 # get our annotations in place. 1753 # TODO(bruening): add annotations once we have the infrastructure. 1754 UNINITIALIZED READ 1755 name=bug_371991 1756 system call NtWriteFile parameter #5 1757 KERNELBASE.dll!WriteFile 1758 KERNEL32.dll!WriteFile* 1759 *!IPC::Channel*::ProcessOutgoingMessages 1760 1761 UNINITIALIZED READ 1762 name=bug_372254 1763 *!content::*::NotifyPluginProcessHostHelper 1764 1765 UNINITIALIZED READ 1766 name=drm_i#1546 1767 *!testing::internal::CmpHelperEQ<> 1768 ... 1769 *!content::BrowserPluginTest_ResizeFlowControl_Test::TestBody 1770 1771 UNINITIALIZED READ 1772 name=bug_374105a 1773 ... 1774 gpu.dll!gpu::gles2::ShaderTranslatorCache::GetTranslator 1775 gpu.dll!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator 1776 gpu.dll!gpu::gles2::GLES2DecoderImpl::Initialize 1777 1778 UNINITIALIZED READ 1779 name=bug_374105b 1780 ... 1781 gpu.dll!gpu::gles2::ShaderTranslator::GetStringForOptionsThatWouldAffectCompilation 1782 *!gpu::gles2::ShaderTranslatorTest_OptionsString_Test::TestBody 1783 1784 UNINITIALIZED READ 1785 name=bug_374410 1786 *!ui::NativeThemeWin::PaintScrollbarTrack 1787 *!ui::NativeThemeWin::PaintDirect 1788 1789 UNINITIALIZED READ 1790 name=bug_377728 1791 ... 1792 *!Hunspell::suggest 1793 *!HunspellEngine::FillSuggestionList 1794 *!SpellcheckLanguage::SpellCheckWord 1795 *!SpellCheck::SpellCheckWord 1796 1797 UNINITIALIZED READ 1798 name=bug_387373 1799 *!blink::WebEmbeddedWorkerImpl::startWorkerContext 1800 *!content::EmbeddedWorkerDispatcher::OnStartWorker 1801 *!EmbeddedWorkerMsg_StartWorker::Dispatch<> 1802 1803 UNADDRESSABLE ACCESS 1804 name=bug_389132 1805 content.dll!crypto_kernel_do_load_cipher_type 1806 content.dll!crypto_kernel_load_cipher_type 1807 content.dll!crypto_kernel_init 1808 content.dll!cricket::SrtpSession::SetKey 1809 content.dll!cricket::SrtpSession::SetSend 1810 content.dll!cricket::SrtpFilter::SetRtpParams 1811 content.dll!cricket::BaseChannel::SetupDtlsSrtp 1812 content.dll!cricket::BaseChannel::ChannelWritable_w 1813 content.dll!cricket::BaseChannel::OnWritableState 1814 1815 UNINITIALIZED READ 1816 name=bug_392585 1817 system call NtCreateFile parameter #9 1818 *!testing::internal::HandleExceptionsInMethodIfSupported<> 1819 1820 UNADDRESSABLE ACCESS 1821 name=bug_398850 1822 ... 1823 wtf.dll!WTF::PlatformCondition::timedWait 1824 1825 UNINITIALIZED READ 1826 name=bug_399293 1827 blink_web.dll!blink::InputMethodController::extendSelectionAndDelete 1828 blink_web.dll!blink::WebLocalFrameImpl::extendSelectionAndDelete 1829 content.dll!content::RenderFrameImpl::OnExtendSelectionAndDelete 1830 *!content::RenderViewImplTest_OnExtendSelectionAndDelete_Test::TestBody 1831 *!testing::internal::HandleExceptionsInMethodIfSupported<> 1832 1833 UNINITIALIZED READ 1834 name=bug_398547 1835 system call NtWriteFile parameter #5 1836 KERNELBASE.dll!WriteFile 1837 KERNEL32.dll!WriteFile 1838 mojo_system_impl.dll!mojo::system::`anonymous namespace'::RawChannelWin::WriteNoLock 1839 1840 HANDLE LEAK 1841 name=bug_403544 1842 system call NtCreateSemaphore 1843 KERNELBASE.dll!CreateSemaphoreExW 1844 ... 1845 v8.dll!v8::internal::SweeperThread::SweeperThread 1846 ... 1847 blink_web.dll!blink::WorkerScriptController::WorkerScriptController 1848 blink_web.dll!blink::WorkerGlobalScope::WorkerGlobalScope 1849 blink_web.dll!blink::ServiceWorkerGlobalScope::ServiceWorkerGlobalScope 1850 1851 1852 HANDLE LEAK 1853 name=bug_403681 1854 system call NtCreateTimer 1855 KERNELBASE.dll!CreateWaitableTimerExW 1856 KERNEL32.dll!CreateWaitableTimerW 1857 content.dll!rtc::Timing::Timing 1858 content.dll!content::RenderProcessHostImpl::CreateMessageFilters 1859 ... 1860 content.dll!content::RenderViewHostImpl::CreateRenderView 1861 content.dll!content::WebContentsImpl::CreateRenderViewForRenderManager 1862 ... 1863 content.dll!content::NavigationControllerImpl::LoadEntry 1864 ... 1865 *!extensions::ExtensionHost::LoadInitialURL 1866 1867 UNINITIALIZED READ 1868 name=bug_414268 1869 pdf.dll!chrome_pdf::PDFiumEngine::OnMouseMove 1870 pdf.dll!chrome_pdf::PDFiumEngine::HandleEvent 1871 pdf.dll!chrome_pdf::OutOfProcessInstance::HandleInputEvent 1872 pdf.dll!pp::InputEvent_HandleEvent 1873 ppapi_proxy.dll!ppapi::CallWhileUnlocked<> 1874 ppapi_proxy.dll!ppapi::proxy::PPP_InputEvent_Proxy::OnMsgHandleFilteredInputEvent 1875 1876