1 # This file contains suppressions for the Dr.Memory tool, see
2 # http://dev.chromium.org/developers/how-tos/using-drmemory
4 # This file should contain suppressions only for the reports happening
5 # in the 'full' mode (drmemory_full).
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
7 # please use suppressions.txt instead.
9 ###############################################################
10 # Known reports on the third party we have no control over.
13 name=http://crbug.com/116277
17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
19 name=http://code.google.com/p/drmemory/issues/detail?id=406
20 ADVAPI32.dll!WmiOpenBlock
21 ADVAPI32.dll!WmiOpenBlock
23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
25 name=GoogleDesktop LEAK
27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
29 # They deliberately use uninit local var in sqlite random generator.
30 # Random bytes may mess up the call stack between randomByte and
31 # sqlite3_* frames (http://code.google.com/p/drmemory/issues/detail?id=1514)
32 # so we just look for randomByte.
34 name=sqlite3_randomness UNINIT
37 # Intentional leak in WebKit Template Framework for ThreadData.
39 name=intentional WTF ThreadData leak
43 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
45 name=http://crbug.com/125558 a
46 KERNELBASE.dll!LocalAlloc
48 SECHOST.dll!NotifyServiceStatusChange
50 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
51 *!net::ProxyResolverWinHttp::GetProxyForURL
53 # Tiny locale-related leaks in ntdll. Probably system bug.
55 name=http://crbug.com/125558 b
59 KERNELBASE.dll!GetCPInfoExW
64 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
65 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig
68 name=http://crbug.com/30704 #f
69 libpng.dll!wk_png_write_find_filter
70 libpng.dll!wk_png_write_row
72 ###############################################################
73 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
74 # assumptions or unhandled syscalls
76 # Please note: the following suppressions were written in the abscense of
77 # private symbols so may need to be updated when we switch to auto-loading PDBs
79 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1)
82 ntdll.dll!RtlFindActivationContextSectionString
85 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2)
87 SHELL32.dll!SHFileOperation*
90 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3)
92 SHELL32.dll!SHGetFolderPath*
95 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4)
97 SHELL32.dll!SHGetFolderPath*
100 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5)
102 SHELL32.dll!SHCreateDirectory*
105 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6)
107 SHELL32.dll!ILLoadFromStream*
110 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7)
112 SHELL32.dll!ILSaveToStream*
115 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8)
117 SHELL32.dll!SHFileOperation*
120 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9)
122 SHELL32.dll!SHGetItemFromDataObject
125 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10)
127 SHELL32.dll!SHGetItemFromDataObject
130 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11)
133 SHELL32.dll!SHChangeNotifySuspendResume
136 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1)
141 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2)
146 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3)
151 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1)
156 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2)
158 GDI32.dll!CreateFontIndirectExW
159 GDI32.dll!CreateFontIndirectW
162 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3)
163 KERNELBASE.dll!LocalAlloc
165 USER32.dll!CreateWindow*
168 name=http://code.google.com/p/drmemory/issues/detail?id=18 a
173 name=http://code.google.com/p/drmemory/issues/detail?id=18 b
178 name=http://code.google.com/p/drmemory/issues/detail?id=18 c
183 name=http://code.google.com/p/drmemory/issues/detail?id=18 d
188 name=http://code.google.com/p/drmemory/issues/detail?id=40 a
193 name=http://code.google.com/p/drmemory/issues/detail?id=40 b
198 name=http://code.google.com/p/drmemory/issues/detail?id=48 a
199 system call NtContinue
204 name=http://code.google.com/p/drmemory/issues/detail?id=48 b
205 system call NtContinue
206 *!WTF::initializeCurrentThreadInternal
209 name=http://code.google.com/p/drmemory/issues/detail?id=52 a
211 DBGHELP.dll!SymInitialize
214 name=http://code.google.com/p/drmemory/issues/detail?id=52 b
216 DBGHELP.dll!SymEnumSourceFiles
219 name=http://code.google.com/p/drmemory/issues/detail?id=52 c
221 msvcrt.dll!_RTDynamicCast
224 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp
225 instruction=test 0x*(%*) $0x??
226 DBGHELP.dll!SymUnloadModule64
229 name=http://code.google.com/p/drmemory/issues/detail?id=53
230 ADVAPI32.dll!WmiMofEnumerateResourcesA
231 ADVAPI32.dll!WmiMofEnumerateResourcesA
232 ADVAPI32.dll!Sta*TraceW
235 name=http://code.google.com/p/drmemory/issues/detail?id=58
240 name=http://code.google.com/p/drmemory/issues/detail?id=60
243 USP10.dll!ScriptStringAnalyse
246 IMM32.dll!ImmGetIMCCSize
247 IMM32.dll!ImmLockClientImc
248 IMM32.dll!ImmDisableIME
249 IMM32.dll!ImmSetActiveContext
250 USER32.dll!IMPSetIMEA
253 name=http://code.google.com/p/drmemory/issues/detail?id=65 a
258 name=http://code.google.com/p/drmemory/issues/detail?id=65 b
260 *!talk_base::CreateRandomString
263 name=http://code.google.com/p/drmemory/issues/detail?id=68 a
268 name=http://code.google.com/p/drmemory/issues/detail?id=68 b
270 ADVAPI32.dll!SetSecurityDescriptorDacl
273 name=http://code.google.com/p/drmemory/issues/detail?id=68 c
275 MSWSOCK.dll!WSPStartup
278 name=http://code.google.com/p/drmemory/issues/detail?id=68 d
280 ntdll.dll!RtlValidateUnicodeString
283 name=http://code.google.com/p/drmemory/issues/detail?id=256
289 name=http://code.google.com/p/drmemory/issues/detail?id=274 a
294 name=http://code.google.com/p/drmemory/issues/detail?id=274 b
299 name=http://code.google.com/p/drmemory/issues/detail?id=275
304 name=http://code.google.com/p/drmemory/issues/detail?id=276
306 ntdll.dll!RtlConvertUlongToLargeInteger
307 ntdll.dll!RtlConvertUlongToLargeInteger
308 ntdll.dll!KiUserExceptionDispatcher
311 name=http://code.google.com/p/drmemory/issues/detail?id=305
319 name=http://code.google.com/p/drmemory/issues/detail?id=346 a
321 GDI32.dll!CloseEnhMetaFile
324 name=http://code.google.com/p/drmemory/issues/detail?id=346 b
325 GDI32.dll!SetPolyFillMode
329 name=http://code.google.com/p/drmemory/issues/detail?id=362
330 USER32.dll!UnregisterClass*
333 name=http://code.google.com/p/drmemory/issues/detail?id=382
335 ntdll.dll!CsrNewThread
338 name=http://code.google.com/p/drmemory/issues/detail?id=397
339 system call NtDeviceIoControlFile InputBuffer
340 ADVAPI32.dll!ImpersonateAnonymousToken
343 name=http://code.google.com/p/drmemory/issues/detail?id=407 a
344 system call NtRequestWaitReplyPort
345 RPCRT4.dll!I_RpcSendReceive
346 RPCRT4.dll!NdrSendReceive
349 name=http://code.google.com/p/drmemory/issues/detail?id=407 b
351 ntdll.dll!LdrInitializeThunk
352 ntdll.dll!LdrShutdownThread
355 name=http://code.google.com/p/drmemory/issues/detail?id=412 a
356 ADVAPI32.dll!RegDeleteValue*
359 name=http://code.google.com/p/drmemory/issues/detail?id=412 b
364 name=http://code.google.com/p/drmemory/issues/detail?id=412 c
366 RPCRT4.dll!NdrClientCall2
369 name=http://code.google.com/p/drmemory/issues/detail?id=412 d
370 RSAENH.dll!DllUnregisterServer
372 ADVAPI32.dll!CryptAcquireContextA
373 CRYPT32.dll!CryptEnumOIDFunction
375 CRYPT32.dll!CertFindCertificateInStore
378 name=http://code.google.com/p/drmemory/issues/detail?id=412 e
380 RSAENH.dll!CPGenRandom
383 name=http://code.google.com/p/drmemory/issues/detail?id=412 f
388 name=http://code.google.com/p/drmemory/issues/detail?id=412 g
391 *!testing::internal::CmpHelperEQ*
393 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
395 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't
396 # have frame pointers, and we have trouble unwinding from it. Therefore, we use
397 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
399 name=http://code.google.com/p/drmemory/issues/detail?id=412 h
403 name=http://code.google.com/p/drmemory/issues/detail?id=425 a
404 CLBCatQ.DLL!DestroyStgDatabase
405 CLBCatQ.DLL!PostError
406 CLBCatQ.DLL!PostError
409 name=http://code.google.com/p/drmemory/issues/detail?id=425 b
410 RPCRT4.dll!I_RpcBCacheFree
411 RPCRT4.dll!I_RpcBCacheFree
413 RPCRT4.dll!NdrClientCall2
416 name=http://code.google.com/p/drmemory/issues/detail?id=425 c
422 name=http://code.google.com/p/drmemory/issues/detail?id=435 a
424 ntdll.dll!RtlSetSecurityObject
425 ntdll.dll!RtlNewSecurityObjectEx
426 ADVAPI32.dll!CreatePrivateObjectSecurityEx
427 NTMARTA.dll!AccRewriteSetNamedRights
430 name=http://code.google.com/p/drmemory/issues/detail?id=435 b
431 WLDAP32.dll!Ordinal325
433 WLDAP32.dll!Ordinal325
434 ntdll.dll!LdrInitializeThunk
435 ntdll.dll!LdrFindResourceDirectory_U
436 ntdll.dll!RtlValidateUnicodeString
438 KERNEL32.dll!LoadLibraryExW
440 # mod+offs suppression because the symbolic makes no sense and changes
441 # completely in the presence of WS2_32.dll symbols.
443 name=http://code.google.com/p/drmemory/issues/detail?id=438
449 name=http://code.google.com/p/drmemory/issues/detail?id=454 a
451 WINMM.dll!wave*GetNumDevs
454 name=http://code.google.com/p/drmemory/issues/detail?id=454 b
456 WINMM.dll!wave*GetNumDevs
459 name=http://code.google.com/p/drmemory/issues/detail?id=466
460 ntdll.dll!RtlRunOnceBeginInitialize
461 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
464 name=http://code.google.com/p/drmemory/issues/detail?id=473 a
465 system call NtDeviceIoControlFile InputBuffer
467 iphlpapi.dll!GetAdaptersAddresses
470 name=http://code.google.com/p/drmemory/issues/detail?id=473 b
479 iphlpapi.dll!GetPerAdapterInfo
481 iphlpapi.dll!GetAdaptersAddresses
484 name=http://code.google.com/p/drmemory/issues/detail?id=473 c
488 IPHLPAPI.DLL!GetAdaptersAddresses
491 name=http://code.google.com/p/drmemory/issues/detail?id=475
493 ADVAPI32.dll!CryptAcquireContextA
495 CRYPT32.dll!CryptMsgOpenToDecode
497 CRYPT32.dll!CryptQueryObject
499 # Lots of leaks from our interactions with the system certificate store. May be
500 # worth reviewing our use of their API.
502 name=http://code.google.com/p/drmemory/issues/detail?id=476 a
503 KERNEL*.dll!LocalAlloc
505 CRYPT32.dll!CertGetCRLContextProperty
508 name=http://code.google.com/p/drmemory/issues/detail?id=476 b
509 KERNEL*.dll!LocalAlloc
511 CRYPT32.dll!CertAddCRLContextToStore
514 name=http://code.google.com/p/drmemory/issues/detail?id=476 c
515 KERNEL*.dll!LocalAlloc
517 CRYPT32.dll!CertOpenStore
520 name=http://code.google.com/p/drmemory/issues/detail?id=476 d
522 CRYPT32.dll!CertOpenSystemStore?
525 name=http://code.google.com/p/drmemory/issues/detail?id=476 e
527 CRYPT32.dll!CertGetCertificateChain
530 name=http://code.google.com/p/drmemory/issues/detail?id=476 f
532 CRYPT32.dll!CertCompareIntegerBlob
535 name=http://code.google.com/p/drmemory/issues/detail?id=476 g
537 CRYPT32.dll!CryptUnprotectData
540 name=http://code.google.com/p/drmemory/issues/detail?id=476 h
541 KERNEL*.dll!LocalAlloc
543 CRYPT32.dll!CertEnumCertificatesInStore
546 name=http://code.google.com/p/drmemory/issues/detail?id=476 i
548 CRYPT32.dll!CryptProtectData
551 name=http://code.google.com/p/drmemory/issues/detail?id=476 j
553 CRYPT32.dll!CryptExportPublicKeyInfoEx
556 name=http://code.google.com/p/drmemory/issues/detail?id=502 a
557 system call NtSecureConnectPort parameter #3
562 name=http://code.google.com/p/drmemory/issues/detail?id=502 b
563 system call NtGdiEnumFonts parameter #6
568 name=http://code.google.com/p/drmemory/issues/detail?id=511 a
573 name=http://code.google.com/p/drmemory/issues/detail?id=511 b
576 ole32.dll!StringFromGUID2
579 name=http://code.google.com/p/drmemory/issues/detail?id=512 a
581 *!browser_sync::Cryptographer::PackBootstrapToken
582 *!browser_sync::Cryptographer::GetBootstrapToken
585 name=http://code.google.com/p/drmemory/issues/detail?id=512 b
589 # TODO(bruening): remove these once we have v8 bitfields handled
591 name=http://code.google.com/p/drmemory/issues/detail?id=513 a
595 name=http://code.google.com/p/drmemory/issues/detail?id=513 b
600 name=http://code.google.com/p/drmemory/issues/detail?id=513 c
605 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll
606 # has no symbols. These are all on the bots using component build, so we use
607 # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue.
609 name=http://code.google.com/p/drmemory/issues/detail?id=513 d
613 name=http://code.google.com/p/drmemory/issues/detail?id=513 e
619 name=http://code.google.com/p/drmemory/issues/detail?id=546
624 *!IconUtil::Create*HICON*
627 name=http://crbug.com/92152
629 USER32.dll!CreateWindowExW
630 *!views::TooltipManagerWin::Init
631 *!views::TooltipManagerWin::TooltipManagerWin
634 name=http://code.google.com/p/drmemory/issues/detail?id=567 a
637 dbghelp.dll!StackWalk64
640 name=http://code.google.com/p/drmemory/issues/detail?id=567 b
644 dbghelp.dll!StackWalk64
646 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
647 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too
648 # brittle, so we switched to RPCRT4.dll!*.
650 name=http://code.google.com/p/drmemory/issues/detail?id=569
654 KERNEL*.dll!BaseThreadInitThunk
656 # TODO(timurrrr): investigate these
658 name=http://crbug.com/TODO a
660 *!win_util::GetLogonSessionOnlyDACL
663 name=http://crbug.com/TODO b
665 ntshrui.dll!IsPathSharedW
668 name=http://crbug.com/TODO c
673 name=http://crbug.com/TODO d
678 name=http://crbug.com/TODO e
683 name=http://crbug.com/TODO f
685 *!GetCanonicalPathInfo*
688 name=http://crbug.com/TODO g
693 name=http://crbug.com/TODO h
695 GDI32.dll!GetTextExtentPoint32*
698 name=http://crbug.com/TODO i
700 *!SyncSocketClientListener::OnMsgClassResponse
703 name=http://crbug.com/TODO j
705 *!*NSPRInitSingleton*
708 name=http://crbug.com/TODO k
709 *!NdrSimpleStructFree
712 name=http://crbug.com/TODO l
713 ntdll.dll!RtlpNtOpenKey
714 ntdll.dll!RtlMakeSelfRelativeSD
715 ntdll.dll!RtlAbsoluteToSelfRelativeSD
716 ADVAPI32.dll!MakeSelfRelativeSD
719 name=http://crbug.com/TODO m
721 CRYPT32.dll!I_CertSyncStore
723 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
724 # a leak. Must be some early thread initialization. Doesn't look like
727 name=http://crbug.com/TODO n
733 KERNEL*.dll!BaseThreadInitThunk
735 # No idea where this is from, but Chrome isn't even on the stack.
737 name=http://crbug.com/TODO o
739 ole32.dll!OleInitialize
741 KERNEL32.dll!BaseThreadInitThunk
743 # Matches lots of RPC related leaks. So far RPC handles have been mostly owned
744 # by system libraries and are not something we can fix easily.
746 name=http://crbug.com/TODO p
749 RPCRT4.dll!NDRCContextBinding
751 # No idea, but all system code, not interesting.
753 name=http://crbug.com/TODO q
764 name=http://crbug.com/109278 video device COM leaks
766 *!media::VideoCaptureDevice::*
769 name=http://crbug.com/109278 audio device COM leaks
771 *!media::GetInputDeviceNamesWin
773 # False pos uninit in shell32 when resolving links.
775 name=http://code.google.com/p/drmemory/issues/detail?id=745
779 *!file_util::ResolveShortcut
781 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a
782 # buffer with SSE/MMX instructions whose results are then masked out later.
784 name=http://code.google.com/p/drmemory/issues/detail?id=747 a
785 *!ff_pred4x4_vertical_vp8_mmxext
788 name=http://code.google.com/p/drmemory/issues/detail?id=747 b
789 *!ff_pred4x4_down_left_mmxext
792 name=http://code.google.com/p/drmemory/issues/detail?id=747 c
793 *!ff_vorbis_floor1_render_list
796 name=http://code.google.com/p/drmemory/issues/detail?id=747 d
797 *!ff_put_vp8_epel8_h6_ssse3
800 name=http://code.google.com/p/drmemory/issues/detail?id=747 e
801 *!ff_put_vp8_epel8_h4_ssse3
804 name=http://code.google.com/p/drmemory/issues/detail?id=747 f
808 name=http://code.google.com/p/drmemory/issues/detail?id=747 g
809 *!ff_simple_idct_add_mmx
811 # ffmpeg seems to leak a pthread condition variable.
813 name=http://crbug.com/110042
818 *!ff_thread_decode_frame
819 *!avcodec_decode_video2
821 # Improperly handled ioctl in bcrypt.
823 name=http://code.google.com/p/drmemory/issues/detail?id=748
824 system call NtDeviceIoControlFile InputBuffer
826 bcrypt.dll!BCryptUnregisterConfigChangeNotify
827 bcrypt.dll!BCryptGetFipsAlgorithmMode
828 ntdll.dll!RtlQueryEnvironmentVariable
830 # Not sure what this is.
832 name=http://code.google.com/p/drmemory/issues/detail?id=749
841 *!talk_base::SafeGetHostByName
842 *!talk_base::SocketAddress::GetLocalIPs
843 *!talk_base::SocketAddress::IsLocalIP
844 *!cricket::Transport::VerifyCandidate
845 *!cricket::Session::OnRemoteCandidates
846 *!cricket::Session::OnTransportInfoMessage
847 *!cricket::Session::OnIncomingMessage
848 *!cricket::SessionManager::OnIncomingMessage
850 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
852 name=http://code.google.com/p/drmemory/issues/detail?id=529
855 *!base::LaunchProcess
857 # System leak from CreateEnvironmentBlock.
859 name=http://code.google.com/p/drmemory/issues/detail?id=757
861 USERENV.dll!CreateEnvironmentBlock
863 # Looks like another instance of 753
865 name=http://code.google.com/p/drmemory/issues/detail?id=753
867 ntdll.dll!RtlLoadString
871 name=http://code.google.com/p/drmemory/issues/detail?id=493
872 USP10.dll!ScriptPositionSingleGlyph
874 # Various TLS leaks that we don't understand yet. We should be finding a root
877 name=http://code.google.com/p/drmemory/issues/detail?id=778 a
878 KERNELBASE.dll!TlsSetValue
880 # Originally filed as: http://crbug.com/109281
882 name=http://code.google.com/p/drmemory/issues/detail?id=778 b
885 *!*::ConstructTlsVector
886 *!base::ThreadLocalStorage::StaticSlot::Get
888 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a
889 # root? See also http://crbug.com/32624
891 name=http://code.google.com/p/drmemory/issues/detail?id=778 c
896 # Bit-level fps in rich edit layer.
898 name=http://code.google.com/p/drmemory/issues/detail?id=791
902 # Already suppressed by drmemory default supp we don't have yet.
904 name=i#757: RPC binding leaks in sspicli.dll
910 # Async NtReadFile false positives. This was fixed in drmemory r772, remove
911 # this supp when we pull that rev.
913 name=http://code.google.com/p/drmemory/issues/detail?id=798
914 system call NtReadFile parameter #5
915 KERNEL32.dll!ReadFile
917 # Probable syscall false positive.
919 name=http://code.google.com/p/drmemory/issues/detail?id=809
920 system call NtGdiPolyPolyDraw parameter #1
921 *!gfx::Path::CreateNativeRegion
923 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces
924 # coming out of this module (sometimes only one frame), which makes it hard to
925 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we
928 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard
932 name=http://code.google.com/p/drmemory/issues/detail?id=841 a
934 CRYPTNET.dll!I_CryptNetGetConnectivity
937 name=http://code.google.com/p/drmemory/issues/detail?id=841 b
942 name=http://code.google.com/p/drmemory/issues/detail?id=841 c
947 name=http://code.google.com/p/drmemory/issues/detail?id=841 d
949 CRYPTNET.dll!I_CryptNetGetConnectivity
951 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
953 name=http://code.google.com/p/drmemory/issues/detail?id=810
954 instruction=test %edx %edx
955 USER32.dll!GetClassLongW
957 *!ui::CenterAndSizeWindow
960 name=http://code.google.com/p/drmemory/issues/detail?id=815
963 USER32.dll!GetMonitorInfoA
964 ntdll.dll!KiUserCallbackDispatcher
968 # Suppress anything in cmd.exe. It's safer to suppress these than disable
969 # following, since someone might launch a Chrome process via cmd.exe.
975 # Possible true system use after free.
977 name=http://code.google.com/p/drmemory/issues/detail?id=623
978 KERNELBASE.dll!TlsGetValue
979 OLEAUT32.dll!SysFreeString
980 OLEAUT32.dll!SysAllocStringByteLen
986 # basic_streambuf seems to leak something in creating a std::_Mutex
988 name=http://code.google.com/p/drmemory/issues/detail?id=857
990 ntdll.dll!RtlInitializeCriticalSection
992 *!std::_Mutex::_Mutex
993 *!std::basic_streambuf<>
995 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though.
997 name=GDI SetBrushOrgEx leak
999 GDI32.dll!GetTextMetricsW
1000 *!gfx::PlatformFontWin::CreateHFontRef
1001 *!gfx::PlatformFontWin::GetBaseFontRef
1003 ###############################################################
1004 # Benign issues in Chromium
1006 # This test intentionally leaks an object and checks that it's never deleted.
1008 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
1010 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
1013 name=deliberate histogram leak
1015 *!replace_operator_new
1017 *!*::*Histogram::FactoryGet
1020 name=deliberate leak for SampleMap
1022 *!base::SampleMap::Accumulate
1023 *!base::SparseHistogram::Add
1026 name=deliberate LazyInstance leak
1028 *!*LeakyLazyInstance*
1030 *!base::LazyInstance*::Pointer
1033 name=http://crbug.com/79933 (1)
1035 *!TestURLRequestContext::Init
1038 name=http://crbug.com/79933 (2)
1040 *!TestURLRequestContext::TestURLRequestContext
1041 *!TestURLRequestContextGetter::GetURLRequestContext
1042 *!notifier::SingleLoginAttempt::SingleLoginAttempt
1043 *!notifier::Login::StartConnection
1044 *!syncer::InvalidationNotifier::UpdateCredentials
1045 *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials
1048 name=http://crbug.com/79933 (3)
1050 *!TestURLRequestContext::TestURLRequestContext
1051 *!TestURLRequestContextGetter::GetURLRequestContext
1052 *!URLFetcher::Core::StartURLRequest
1055 name=http://crbug.com/79933 (4)
1059 *!std::allocator<>::allocate
1060 *!std::vector<>::_Insert_n
1061 *!std::vector<>::insert
1062 *!std::vector<>::push_back
1063 *!ObserverListBase<>::AddObserver
1065 *!net::HttpNetworkSession::HttpNetworkSession
1066 *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
1067 *!notifier::XmppClientSocketFactory::CreateTransportClientSocket
1068 *!notifier::ChromeAsyncSocket::Connect
1069 *!buzz::XmppClient::ProcessStartXmppLogin
1070 *!buzz::XmppClient::Process
1071 *!talk_base::Task::Step
1072 *!talk_base::TaskRunner::InternalRunTasks
1073 *!talk_base::TaskRunner::RunTasks
1074 *!notifier::TaskPump::CheckAndRunTasks
1075 *!base::internal::RunnableAdapter<>::Run
1077 # Test intentionally leaks an object.
1079 name=http://crbug.com/86301
1080 *!replace_operator_new
1082 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody
1084 # Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it.
1086 name=Firefox 3 NSS dll leak
1089 *!NSSDecryptor::~NSSDecryptor
1091 # We get uninit reports inside GMock when it prints the bytes of references to
1092 # partially initialized objects passed to unexpected method calls.
1094 name=http://crbug.com/64887 (GMock printing uninit data)
1096 *!testing::*::PrintBytesInObjectTo*
1098 ###############################################################
1099 # Proactively borrowed from memcheck/suppressions.txt.
1100 # We have not yet seen these, but we are expanding the sets of tests
1101 # we're running, and we've hit redness in the past that could have
1102 # been avoided by already having the Memcheck suppressions.
1103 # TODO(bruening): review the entire file (not just these) once we're
1104 # at the peak set of tests we plan to run and remove the unused ones.
1108 *!WebCore::base64Encode
1109 *!WebCore::base64Encode
1110 *!WebCore::ImageToDataURL<>
1116 *!gfx::PNGCodec::Decode*
1121 *!base::Base64Encode*
1122 *!web_ui_util::GetImageDataUrl
1123 *!::NetworkInfoDictionary::set_icon
1128 *!SkScan::AntiFillPath
1129 *!SkScan::AntiFillPath
1131 *!SkDevice::drawPath
1132 *!SkDraw::drawTextOnPath
1133 *!SkDevice::drawTextOnPath
1134 *!SkCanvas::drawTextOnPath
1135 *!WebCore::Font::drawGlyphs
1136 *!WebCore::Font::drawGlyphBuffer
1141 *!SkScan::AntiFillRect
1142 *!SkScan::AntiFillRect
1144 *!SkDevice::drawRect
1145 *!SkCanvas::drawRect
1146 *!WebCore::GraphicsContext::fillRect
1147 *!WebCore::GraphicsContext::drawHighlightForText
1154 *!SkDraw::drawTextOnPath
1155 *!SkDevice::drawTextOnPath
1156 *!SkCanvas::drawTextOnPath
1157 *!WebCore::Font::drawGlyphs
1158 *!WebCore::Font::drawGlyphBuffer
1159 *!WebCore::Font::drawSimpleText
1160 *!WebCore::Font::drawText
1161 *!WebCore::GraphicsContext::drawText
1168 *!process_data_simple_main
1169 *!chromium_jpeg_write_scanlines
1170 *!gfx::JPEGCodec::Encode
1171 *!gfx::JPEGEncodedDataFromImage
1172 *!history::TopSites::EncodeBitmap
1173 *!history::TopSites::SetPageThumbnail
1174 *!history::ExpireHistoryTest::AddExampleData
1175 *!history::ExpireHistoryTest::*
1179 *!testing::AssertionResult testing::internal::CmpHelperGE<>
1180 *!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody
1185 *!skia::BGRAConvolve2D
1186 *!skia::ImageOperations::ResizeBasic*
1187 *!skia::ImageOperations::Resize*
1191 *!WebCore::RenderMarquee::updateMarqueeStyle
1192 *!WebCore::RenderLayer::styleChanged
1193 *!WebCore::RenderBoxModelObject::styleDidChange
1194 *!WebCore::RenderBox::styleDidChange
1195 *!WebCore::RenderBlock::styleDidChange
1196 *!WebCore::RenderObject::setStyle
1200 *!WebCore::ComplexTextController*
1202 *!WebCore::Font::selectionRectForComplexText
1203 *!WebCore::Font::selectionRectForText
1204 *!WebCore::InlineTextBox::positionForOffset
1205 *!WebCore::RenderText::localCaretRect
1206 *!WebCore::VisiblePosition::localCaretRect
1207 *!WebCore::CaretBase::updateCaretRect
1208 *!WebCore::FrameSelection::localCaretRect
1209 *!WebCore::FrameSelection::recomputeCaretRect
1210 *!WebCore::FrameSelection::updateAppearance
1214 *!WebCore::ComplexTextController*
1216 *!WebCore::Font::drawComplexText
1217 *!WebCore::Font::drawText
1218 *!WebCore::GraphicsContext::drawText
1219 *!WebCore::paintTextWithShadows
1221 *!WebCore::RenderLineBoxList::paint
1222 *!WebCore::RenderBlock::paintContents
1223 *!WebCore::RenderBlock::paintObject
1224 *!WebCore::RenderBlock::paint
1229 *!JSONStringValueSerializer::SerializeInternal
1230 *!JSONStringValueSerializer::Serialize
1231 *!JsonPrefStore::SerializeData
1232 *!ImportantFileWriter::DoScheduledWrite
1233 *!JsonPrefStore::CommitPendingWrite
1234 *!JsonPrefStore::~JsonPrefStore
1235 *!base::RefCounted<>::Release
1236 *!scoped_refptr<>::operator=
1237 *!PrefService::~PrefService
1238 *!scoped_ptr<>::~scoped_ptr
1239 *!TestingProfile::~TestingProfile
1240 *!ExtensionTestingProfile::~ExtensionTestingProfile
1245 *!SkDraw::drawPosText
1246 *!SkDevice::drawPosText
1247 *!SkCanvas::drawPosText
1248 *!WebCore::Font::drawGlyphs
1249 *!WebCore::Font::drawGlyphBuffer
1250 *!WebCore::Font::drawSimpleText
1251 *!WebCore::Font::drawText
1255 *!WebCore::PlatformEvent::PlatformEvent
1256 *!WebCore::PlatformMouseEvent::PlatformMouseEvent
1257 *!WebCore::EventHandler::fakeMouseMoveEventTimerFired
1258 *!WebCore::Timer<>::fired
1259 *!WebCore::ThreadTimers::sharedTimerFiredInternal
1260 *!WebCore::ThreadTimers::sharedTimerFired
1261 *!webkit_glue::WebKitPlatformSupportImpl::DoTimeout
1262 *!base::BaseTimer<>::TimerTask::Run
1267 *!WebCore::ImageBuffer::platformTransformColorSpace
1268 *!WebCore::ImageBuffer::transformColorSpace
1269 *!WebCore::RenderSVGResourceFilter::postApplyResource
1271 *!WebCore::RenderSVGShape::paint*
1273 *!WebCore::RenderSVGRoot*_Zpaint*_ZL9PaintInfoERKNS_*
1277 *!fetch_texel_2d_f_rgba8888
1282 *!_mesa_execute_program
1284 *!_swrast_exec_fragment_program
1285 *!shade_texture_span
1286 *!_swrast_write_rgba_span
1288 *!_swrast_validate_triangle
1291 *!_tnl_render_triangles_elts
1295 *!_tnl_vbo_draw_prims
1296 *!vbo_validated_drawrangeelements
1297 *!vbo_exec_DrawElements
1298 *!neutral_DrawElements
1302 *!fetch_texel_2d_f_rgba8888
1307 *!_mesa_execute_program
1309 *!_swrast_exec_fragment_program
1310 *!shade_texture_span
1311 *!_swrast_write_rgba_span
1320 *!_tnl_vbo_draw_prims
1324 *!fetch_texel_2d_f_rgba8888
1326 *!fast_read_rgba_pixels
1328 *!_swrast_ReadPixels
1331 *!gpu::gles2::GLES2DecoderImpl::HandleReadPixels
1332 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1333 *!gpu::CommandParser::ProcessCommand
1334 *!gpu::GpuScheduler::PutChanged
1335 *!webkit::gpu::GLInProcessContext::PumpCommands
1340 *!_mesa_remove_extra_move_use
1341 *!_mesa_optimize_program
1343 *!_mesa_ir_link_shader
1344 *!_mesa_glsl_link_shader
1346 *!_mesa_LinkProgramARB
1349 *!gpu::gles2::GLES2DecoderImpl::DoLinkProgram*
1350 *!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram*
1351 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1352 *!gpu::CommandParser::ProcessCommand
1353 *!gpu::GpuScheduler::PutChanged
1354 *!webkit::gpu::GLInProcessContext::PumpCommands
1359 *!base::Histogram::BucketIndex
1360 *!base::Histogram::Add
1361 *!webkit_glue::WebKitPlatformSupportImpl::histogramCustomCounts
1362 *!WebCore::PlatformSupport::histogramCustomCounts
1363 *!WebCore::CCLayerTreeHostImpl::optimizeRenderPasses*
1364 *!WebCore::CCLayerTreeHostImpl::drawLayers
1365 *!WebCore::CCSingleThreadProxy::doComposite
1370 *!SkScalerContext::internalGetPath
1371 *!SkScalerContext::getMetrics
1372 *!SkGlyphCache::lookupMetrics
1378 *!SkScalerContext::getMetrics
1379 *!SkGlyphCache::lookupMetrics
1380 *!SkGlyphCache::getGlyphIDMetrics
1381 *!sk_getMetrics_glyph_00
1382 *!SkDraw::drawPosText
1383 *!SkDevice::drawPosText
1384 *!SkGpuDevice::drawPosText
1385 *!SkCanvas::drawPosText
1386 *!WebCore::Font::drawGlyphs
1387 *!WebCore::Font::drawGlyphBuffer
1388 *!WebCore::Font::drawSimpleText
1389 *!WebCore::Font::drawText
1390 *!WebCore::GraphicsContext::drawBidiText
1391 *!WebCore::CanvasRenderingContext2D::drawTextInternal
1392 *!WebCore::CanvasRenderingContext2D::strokeText
1393 *!WebCore::CanvasRenderingContext2DInternal::strokeTextCallback
1394 *!v8::internal::HandleApiCallHelper<>
1395 *!v8::internal::Builtin_HandleApiCall
1400 *!WebCore::WebVTTParser::constructTreeFromToken
1401 *!WebCore::WebVTTParser::createDocumentFragmentFromCueText
1402 *!WebCore::TextTrackCue::getCueAsHTML
1403 *!WebCore::TextTrackCue::updateDisplayTree
1404 *!WebCore::HTMLMediaElement::updateActiveTextTrackCues
1408 *!WebCore::HTMLInputElement::dataList
1409 *!WebCore::HTMLInputElement::list
1410 *!WebCore::RenderSliderContainer::layout
1411 *!WebCore::RenderBlock::layoutBlockChild
1412 *!WebCore::RenderBlock::layoutBlockChildren
1413 *!WebCore::RenderBlock::layoutBlock
1414 *!WebCore::RenderBlock::layout
1415 *!WebCore::RenderSlider::layout
1419 *!WebCore::HTMLInputElement::dataList
1420 *!WebCore::HTMLInputElement::list
1421 *!WebCore::RenderTheme::paintSliderTicks
1422 *!WebCore::RenderThemeChromiumLinux::paintSliderTrack
1423 *!WebCore::RenderTheme::paint
1424 *!WebCore::RenderBox::paintBoxDecorations
1425 *!WebCore::RenderBlock::paintObject
1429 *!WebCore::AccessibilityTable::roleValue
1430 *!WebCore::AccessibilityRenderObject::ariaLiveRegionStatus
1431 *!WebCore::AccessibilityObject::supportsARIALiveRegion
1432 *!WebCore::AccessibilityObject::supportsARIAAttributes
1433 *!WebCore::AccessibilityRenderObject::determineAccessibilityRole
1434 *!WebCore::AccessibilityNodeObject::init
1435 *!WebCore::AccessibilityRenderObject::init
1436 *!WebCore::AccessibilityTable::init
1440 *!SkDescriptor::equals
1441 *!SkGlyphCache::VisitCache
1443 *!SkPaint::descriptorProc
1447 *!aura::RootWindow::ShowCursor
1448 *!ash::Shell::ShowCursor
1449 *!ash::CursorManager::ShowCursor
1450 *!ash::test::AshTestBase::SetUp
1454 *!WebCore::StyleRuleImport::requestStyleSheet
1455 *!WebCore::StyleSheetContents::requestImportedStyleSheets
1459 *!WebCore::RenderTable::layout
1461 *!WebCore::RenderBlock::layout
1465 *!WebCore::RenderMarquee::updateMarqueeStyle
1466 *!WebCore::RenderLayer::styleChanged
1467 *!WebCore::RenderLayerModelObject::styleDidChange
1468 *!WebCore::RenderBox::styleDidChange
1469 *!WebCore::RenderBlock::styleDidChange
1470 *!WebCore::RenderObject::setStyle
1475 *!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator<
1476 *!std::less<>::operator
1480 *!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
1484 *!WebCore::RenderBox::paintFillLayers
1486 *!WebCore::RenderBlock::paintObject
1487 *!WebCore::RenderBlock::paint
1488 *!WebCore::RenderLayer::paintLayerContents
1489 *!WebCore::RenderLayer::paintLayerContentsAndReflection
1490 *!WebCore::RenderLayer::paintLayer
1491 *!WebCore::RenderLayer::paintList
1492 *!WebCore::RenderLayer::paintLayerContents
1493 *!WebCore::RenderLayer::paintLayerContentsAndReflection
1494 *!WebCore::RenderLayer::paintLayer
1498 *!WTF::AtomicString::add
1499 *!WTF::AtomicString::AtomicString
1500 *!WebCore::HTMLPreloadScanner::processToken
1501 *!WebCore::HTMLPreloadScanner::scan
1502 *!WebCore::HTMLDocumentParser::pumpTokenizer
1503 *!WebCore::HTMLDocumentParser::pumpTokenizerIfPossible
1504 *!WebCore::HTMLDocumentParser::append
1505 *!WebCore::DecodedDataDocumentParser::flush
1506 *!WebCore::DocumentWriter::end
1507 *!WebCore::DocumentLoader::finishedLoading
1511 *!WebViewHost::didCreateDataSource
1512 *!blink::FrameLoaderClientImpl::createDocumentLoader
1513 *!WebCore::FrameLoader::init
1514 *!WebCore::Frame::init
1515 *!blink::WebFrameImpl::initializeAsMainFrame
1516 *!blink::WebViewImpl::initializeMainFrame
1517 *!TestShell::createNewWindow
1518 *!TestShell::createMainWindow
1519 *!TestShell::initialize
1524 *!cc::LayerTreeDebugState::equal
1525 *!cc::LayerTreeHost::setDebugState
1526 *!blink::WebLayerTreeViewImpl*_Zset*
1527 *!blink::WebViewImpl::setIsAcceleratedCompositingActive
1528 *!blink::WebViewImpl::setRootGraphicsLayer
1529 *!blink::ChromeClientImpl::attachRootGraphicsLayer
1530 *!WebCore::RenderLayerCompositor::attachRootLayer
1531 *!WebCore::RenderLayerCompositor::ensureRootLayer
1532 *!WebCore::RenderLayerCompositor::enableCompositingMode
1533 *!WebCore::RenderLayerCompositor::updateBacking
1534 *!WebCore::RenderLayerCompositor::updateLayerCompositingState
1535 *!WebCore::RenderLayer::styleChanged
1536 *!WebCore::RenderLayerModelObject::styleDidChange
1537 *!WebCore::RenderBox::styleDidChange
1541 *!cc::LayerTreeHost::setDebugState
1543 *!blink::WebLayerTreeViewImpl*
1547 *!cc::LayerTreeDebugState::recordRenderingStats
1551 *!WebTestRunner::WebTestProxyBase::didCreateDataSource
1552 *!WebTestRunner::WebTestProxy<>::didCreateDataSource
1553 *!blink::FrameLoaderClientImpl::createDocumentLoader
1554 *!WebCore::FrameLoader::init
1555 *!WebCore::Frame::init
1556 *!blink::WebFrameImpl::initializeAsMainFrame
1557 *!blink::WebViewImpl::initializeMainFrame
1558 *!TestShell::createNewWindow
1559 *!TestShell::createMainWindow
1560 *!TestShell::initialize
1564 *!WebTestRunner::TestRunner::reset
1565 *!WebTestRunner::TestInterfaces::resetAll
1566 *!WebTestRunner::WebTestInterfaces::resetAll
1567 *!TestShell::resetTestController
1572 *!v8::internal::ScavengeVisitor::ScavengePointer
1573 *!v8::internal::ScavengeVisitor::VisitPointers
1574 *!v8::internal::StandardFrame::IterateExpressions
1576 *!v8::internal::Heap::Scavenge
1577 *!v8::internal::Heap::PerformGarbageCollection*
1582 *!content::CompositingIOSurfaceTransformerTest::RunResizeTest
1583 *!content::CompositingIOSurfaceTransformerTest_ResizesTexturesCorrectly_Test::TestBody
1588 *!content::CompositingIOSurfaceTransformerTest::RunTransformRGBToYV12Test
1589 *!content::CompositingIOSurfaceTransformerTest_TransformsRGBToYV12_Test::TestBody
1594 *!RegistersReInterfere
1596 *!glpPPShaderLinearizeStreamMgr
1597 *!glpPPShaderLinearize
1598 *!glePrepareShaderForEmulation
1599 *!gleSetVPTransformFuncAll
1600 *!gleVPRenderQuadsSmooth
1601 *!gleDrawArraysOrElements_ExecCore
1604 *!content::::DrawQuad
1605 *!content::CompositingIOSurfaceTransformer::ResizeBilinear
1606 *!content::CompositingIOSurfaceTransformerTest::RunResizeTest
1607 *!content::CompositingIOSurfaceTransformerTest_ResizesTexturesCorrectly_Test::TestBody
1613 *!content::::SetTransformationsForOffScreenRendering
1614 *!content::CompositingIOSurfaceTransformer::TransformRGBToYV12
1615 *!content::CompositingIOSurfaceTransformerTest::RunTransformRGBToYV12Test
1616 *!content::CompositingIOSurfaceTransformerTest_TransformsRGBToYV12_Test::TestBody
1620 *!WebCore::ElementRuleCollector::collectMatchingRules
1621 *!WebCore::ElementRuleCollector::hasAnyMatchingRules
1625 *!WebCore::ElementRuleCollector::collectMatchingRules
1626 *!WebCore::StyleResolver::matchAuthorRules
1630 *!WebCore::ReplaceSelectionCommand::doApply
1631 *!WebCore::CompositeEditCommand::apply
1632 *!WebCore::applyCommand
1636 *!WebCore::Settings::setOpenGLMultisamplingEnabled
1637 *!blink::WebSettingsImpl::setOpenGLMultisamplingEnabled
1638 *!content::ApplyWebPreferences
1639 *!content::RenderViewImpl::OnUpdateWebPreferences
1640 *!content::RenderViewImpl::SetWebkitPreferences
1644 *!WebCore::Settings::setOpenGLMultisamplingEnabled
1645 *!blink::WebSettingsImpl::setOpenGLMultisamplingEnabled
1646 *!content::ApplyWebPreferences
1648 *!content::RenderViewImpl::Initialize
1649 *!content::RenderViewImpl::Create*
1650 *!content::RenderThreadImpl::OnCreateNewView
1654 *!WebCore::::adjustAttributes
1655 *!WebCore::WebGLRenderingContext::maybeRestoreContext
1656 *!WebCore::Timer<>::fired
1657 *!WebCore::ThreadTimers::sharedTimerFiredInternal
1658 *!WebCore::ThreadTimers::sharedTimerFired
1659 *!webkit_glue::WebKitPlatformSupportImpl::DoTimeout
1663 *!GrGradientEffect::onIsEqual
1665 *!GrEffectStage::DeferredStage::isEqual
1666 *!GrDrawState::DeferredState::isEqual
1667 *!GrInOrderDrawBuffer::needsNewState
1668 *!GrInOrderDrawBuffer::onDraw
1669 *!GrDrawTarget::drawIndexedInstances
1670 *!GrTextContext::flushGlyphs
1674 *!WebCore::AudioContext::scheduleNodeDeletion
1675 *!WebCore::AudioContext::handlePostRenderTasks
1676 *!WebCore::AudioDestinationNode::render
1677 *!WebCore::OfflineAudioDestinationNode::offlineRender
1681 *!base::MD5DigestToBase16
1682 *!content::WebKitTestRunner::CaptureDumpPixels
1687 *!WebCore::TypeConversionsV8Internal*AttributeGetter*
1691 *!GrConfigConversionEffect::TestForPreservingPMConversions
1692 *!::test_pm_conversions
1693 *!GrContext::createPMToUPMEffect
1694 *!GrContext::readRenderTargetPixels
1695 *!SkGpuDevice::onReadPixels
1696 *!SkBaseDevice::readPixels
1697 *!SkCanvas::readPixels
1698 *!DeferredDevice::onReadPixels
1699 *!SkBaseDevice::readPixels
1700 *!SkCanvas::readPixels
1701 *!WebCore::GraphicsContext::readPixels
1703 *!WebCore::ImageBuffer::getUnmultipliedImageData
1704 *!WebCore::CanvasRenderingContext2D::getImageData
1705 *!WebCore::CanvasRenderingContext2D::getImageData
1706 *!WebCore::CanvasRenderingContext2DV8Internal::getImageDataMethod
1707 *!WebCore::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback
1708 *!v8::internal::FunctionCallbackArguments::Call
1709 *!v8::internal::HandleApiCallHelper<>
1713 *!WebTestRunner::EventSender::reset
1714 *!WebTestRunner::TestInterfaces::resetTestHelperControllers
1715 *!WebTestRunner::TestInterfaces::resetAll
1717 *!content::ShellRenderProcessObserver::WebKitInitialized
1718 *!content::RenderThreadImpl::EnsureWebKitInitialized
1719 *!content::RenderThreadImpl::OnCreateNewView
1724 *!WebCore::RenderTextControl::computeIntrinsicLogicalWidths
1725 *!WebCore::RenderTextControl::computePreferredLogicalWidths
1727 *!WebCore::RenderBlock::layout
1731 *!WebCore::StyleSheetContents::isCacheable
1732 *!WebCore::LinkStyle::setCSSStyleSheet
1733 *!WebCore::CSSStyleSheetResource::checkNotify
1735 *!webkit_glue::WebURLLoaderImpl::Context::OnCompletedRequest
1737 ###############################################################
1738 # Real issues in Chromium
1741 name=http://crbug.com/32085
1743 chrome.dll!NotificationRegistrar::Add
1746 name=http://crbug.com/32623
1748 *!ssl3_HandleHandshakeMessage
1749 *!ssl3_HandleHandshake
1751 *!ssl3_GatherCompleteHandshake
1753 *!SSL_ForceHandshake
1754 *!net::SSLServerSocketNSS::DoHandshake
1755 *!net::SSLServerSocketNSS::DoHandshakeLoop
1758 name=http://crbug.com/57266 (1)
1760 *!remoting::EncoderVp8::Encode
1763 name=http://crbug.com/57266 (2)
1768 name=http://crbug.com/70062
1772 *!InitSessionCacheLocks
1773 *!initSessionCacheLocksLazily
1775 *!ssl_InitSessionCacheLocks
1778 *!ssl2_BeginClientHandshake
1779 *!ssl_Do1stHandshake
1780 *!SSL_ForceHandshake
1781 *!net::SSL*SocketNSS::DoHandshake
1782 *!net::SSL*SocketNSS::DoHandshakeLoop
1785 name=http://crbug.com/74417 a
1786 *!replace_operator_new
1787 *!disk_cache::BackendImpl::CreateEntryImpl
1790 name=http://crbug.com/74417 b
1791 *!replace_operator_new
1792 *!disk_cache::BackendImpl::NewEntry
1794 # One more disk_cache::BackendImpl leak. See also http://crbug.com/87500.
1796 name=http://crbug.com/74417 c
1797 *!replace_operator_new
1799 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
1802 name=http://crbug.com/75247
1804 *!replace_operator_new
1805 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
1808 name=http://crbug.com/78784
1811 *!TestingProfile::CreateRequestContext
1812 *!*ProfileSyncService*::SetUp
1815 name=http://crbug.com/80550 (1)
1817 *!RenderWidgetHost::WasHidden
1820 name=http://crbug.com/80550 (2)
1822 *!RenderWidgetHost::WasRestored
1825 name=http://crbug.com/87612
1827 *!SSL_ConfigSecureServer
1828 *!net::SSLServerSocketNSS::InitializeSSLOptions
1829 *!net::SSLServerSocketNSS::Handshake
1832 name=http://crbug.com/88640
1835 *!ProfileImpl::InitRegisteredProtocolHandlers
1836 *!ProfileImpl::DoFinalInit
1837 *!ProfileImpl::OnPrefsLoaded
1840 name=http://crbug.com/91465
1843 *!browser_sync::internal::WeakHandleCore<>::*
1844 *!browser_sync::WeakHandle<>::*
1845 *!syncer::SyncManager::SyncInternal::Init
1848 name=http://crbug.com/91491
1850 *!CrxUpdateService::ProcessPendingItems
1853 name=http://crbug.com/92026 (1)
1854 softokn3.dll!FC_GetFunctionList
1856 softokn3.dll!NSC_ModuleDBFunc
1859 name=http://crbug.com/92026 (2)
1860 freebl3.dll!FREEBL_GetVector
1862 softokn3.dll!NSC_ModuleDBFunc
1864 # Possible real Chromium issue in DoCrossfade.
1866 name=http://crbug.com/110049
1867 *!media::DoCrossfade<>
1869 *!media::AudioRendererAlgorithmBase::FillBuffer
1871 # Known sqlite3 leaks.
1873 name=http://crbug.com/113847 (1)
1882 name=http://crbug.com/113847 (2)
1888 name=http://crbug.com/115328
1890 *!GenericInfoViewTest_GenericInfoView_Test::TestBody
1893 name=http://crbug.com/117427 a
1895 *!net::HostCache::Set
1896 *!net::HostResolverImpl::CacheResult
1897 *!net::HostResolverImpl::Job::CompleteRequests
1898 *!net::HostResolverImpl::Job::OnProcTaskComplete
1899 *!base::internal::RunnableAdapter<>::Run
1901 # Probably related to 117427. Someone is not tearing down DNS resolution during
1904 name=http://crbug.com/117427 b
1907 *!base::internal::WeakReferenceOwner::GetRef
1908 *!base::SupportsWeakPtr<>::AsWeakPtr
1909 *!net::HostResolverImpl::Job::Job
1910 *!net::HostResolverImpl::Resolve
1911 *!net::SingleRequestHostResolver::Resolve
1912 *!net::TransportConnectJob::DoResolveHost
1913 *!net::TransportConnectJob::DoLoop
1914 *!net::TransportConnectJob::ConnectInternal
1915 *!net::ConnectJob::Connect
1916 *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
1917 *!net::internal::ClientSocketPoolBaseHelper::RequestSocket
1918 *!net::ClientSocketPoolBase<>::RequestSocket
1919 *!net::TransportClientSocketPool::RequestSocket
1920 *!net::ClientSocketHandle::Init<>
1921 *!net::`anonymous namespace'::InitSocketPoolHelper
1922 *!net::InitSocketHandleForRawConnect
1923 *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
1924 *!base::internal::RunnableAdapter<>::Run
1926 # IE frame possible leak of COM object.
1928 name=http://crbug.com/122399
1930 ole32.dll!CoTaskMemAlloc
1932 urlmon.dll!CreateUri
1935 # RenderWidgetHelper leak in DelayProfileDestruction test.
1937 name=http://crbug.com/125565
1940 *!RenderProcessHostImpl::RenderProcessHostImpl
1941 *!SiteInstanceImpl::GetProcess
1942 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
1945 name=http://crbug.com/125807
1948 *!TransportSecurityPersister::TransportSecurityPersister
1949 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest
1953 *!media::ConvertYUVToRGB32_C
1954 *!media::LinearScaleYUVToRGB32RowWithRange_C
1955 *!media::ScaleYUVToRGB32WithRect
1960 osmesa.dll!INTERP_4F
1961 osmesa.dll!_tnl_generic_interp
1966 *!WebCore::ThreadState::visitStack
1967 *!WebCore::ThreadState::trace
1968 *!WebCore::ThreadState::visitRoots
1972 blink_web.dll!WebCore::RenderBlock::computeInlinePreferredLogicalWidths
1977 blink_web.dll!WebCore::MediaQueryExp::create
1978 blink_web.dll!WebCore::BisonCSSParser::createFloatingMediaQueryExp
1979 blink_web.dll!cssyyparse
1983 blink_web.dll!WebCore::BisonCSSParser::parseFlex
1984 blink_web.dll!WebCore::BisonCSSParser::parseValue
1985 blink_web.dll!cssyyparse
1987 UNADDRESSABLE ACCESS
1989 blink_web.dll!WebCore::Node::getFlag
1990 blink_web.dll!WebCore::Node::inDocument
1991 blink_web.dll!WebCore::Node::isDescendantOf
1992 blink_web.dll!WebCore::CompositeEditCommand::cloneParagraphUnderNewElement
1993 blink_web.dll!WebCore::CompositeEditCommand::moveParagraphWithClones
1997 blink_web.dll!WebCore::Editor::canSmartReplaceWithPasteboard
1998 blink_web.dll!WebCore::Editor::pasteAsPlainTextWithPasteboard
1999 blink_web.dll!WebCore::Editor::pasteAsPlainText
2000 blink_web.dll!WebCore::executePasteAndMatchStyle
2001 blink_web.dll!WebCore::Editor::Command::execute
2002 blink_web.dll!WebCore::Document::execCommand
2008 content.dll!content::BrowserAccessibilityManagerWin::*
2012 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB*
2013 # variety) that it's a performance hit. We avoid that by requesting
2014 # whole-module suppression
2015 # (see https://code.google.com/p/drmemory/issues/detail?id=1529).
2017 name=bug_347967_all_osmesa
2022 osmesa.dll!unpack_RGB*888
2023 osmesa.dll!_mesa_unpack_rgba_row
2024 osmesa.dll!slow_read_rgba_pixels
2025 osmesa.dll!read_rgba_pixels
2026 osmesa.dll!_mesa_readpixels
2028 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
2029 gpu.dll!gpu::CommandParser::ProcessCommand
2030 gpu.dll!gpu::GpuScheduler::PutChanged
2033 name=bug_347967,bug_348357
2034 osmesa.dll!clip_span
2035 osmesa.dll!_swrast_write_rgba_span
2036 osmesa.dll!general_triangle
2038 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements
2039 gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements
2040 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
2041 gpu.dll!gpu::CommandParser::ProcessCommand
2046 skia.dll!SkA8_Shader_Blitter::blitH
2047 skia.dll!SkBlitter::blitRect
2049 skia.dll!SkScan::FillIRect
2051 skia.dll!SkDraw::drawRect
2052 skia.dll!SkDraw::drawBitmap
2053 skia.dll!SkBitmapDevice::drawBitmap
2054 skia.dll!SkCanvas::internalDrawBitmap
2055 skia.dll!SkCanvas::drawBitmap
2056 content.dll!content::ScreenshotData::EncodeOnWorker
2060 blink_web.dll!WebCore::RenderLayerCompositor::updateIfNeeded
2061 blink_web.dll!WebCore::RenderLayerCompositor::updateIfNeededRecursive
2062 blink_web.dll!WebCore::FrameView::updateLayoutAndStyleForPainting
2063 blink_web.dll!WebCore::PageAnimator::updateLayoutAndStyleForPainting
2067 blink_web.dll!WebCore::AutoTableLayout::layout
2068 blink_web.dll!WebCore::RenderTable::layout
2069 blink_web.dll!WebCore::RenderBlockFlow::layoutBlockChild
2070 blink_web.dll!WebCore::RenderBlockFlow::layoutBlockChildren
2071 blink_web.dll!WebCore::RenderBlockFlow::layoutBlockFlow
2072 blink_web.dll!WebCore::RenderBlockFlow::layoutBlock
2073 blink_web.dll!WebCore::RenderBlock::layout
2077 *!device::BluetoothAdapterWin::AdapterStateChanged
2083 net_with_v8.dll!net::ProxyResolverV8::Context::*
2087 *!CLD2::UTF8GenericReplaceInternal
2088 *!CLD2::UTF8GenericReplace
2089 *!CLD2::ScriptScanner::LowerScriptSpan
2090 *!CLD2::ScriptScanner::GetOneScriptSpanLower
2091 *!CLD2::DetectLanguageSummaryV2
2092 *!CLD2::DetectLanguageSummary
2102 *!WebCore::RenderLayerClipper::updateClipRects
2103 *!WebCore::RenderLayerClipper::parentClipRects
2104 *!WebCore::RenderLayerClipper::backgroundClipRect
2108 system call NtCreateEvent
2109 KERNELBASE.dll!CreateEventExW
2110 KERNELBASE.dll!CreateEventW
2111 base.dll!base::WaitableEvent::WaitableEvent
2112 gpu.dll!gpu::InProcessCommandBuffer::Initialize
2113 gl_in_process_context.dll!gpu::`anonymous namespace'::GLInProcessContextImpl::Initialize
2114 gl_in_process_context.dll!gpu::GLInProcessContext::CreateContext
2118 *!content::GamepadProvider::PadState::Match
2119 *!content::GamepadProvider::DoPoll
2123 media.dll!ConvertYUVToRGB32Row_SSE
2124 media.dll!media::ConvertYUVToRGB32_SSE
2125 media.dll!media::ConvertVideoFrameToBitmap
2126 media.dll!media::SkCanvasVideoRenderer::Paint
2127 cc.dll!cc::VideoResourceUpdater::CreateForSoftwarePlanes
2128 cc.dll!cc::VideoResourceUpdater::CreateExternalResourcesFromVideoFrame
2129 cc.dll!cc::VideoLayerImpl::WillDraw
2133 system call NtUserSetKeyboardState parameter #0
2134 *!content::MockKeyboardDriverWin::~MockKeyboardDriverWin
2138 content.dll!webrtc::PeerConnection::DoInitialize
2139 content.dll!webrtc::PeerConnection::Initialize
2140 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection_s
2141 content.dll!webrtc::PeerConnectionFactory::OnMessage
2142 content.dll!jingle_glue::JingleThreadWrapper::Send
2143 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection
2144 content.dll!webrtc::PeerConnectionFactoryInterface::CreatePeerConnection