Upstream version 6.35.121.0
[platform/framework/web/crosswalk.git] / src / tools / valgrind / drmemory / suppressions_full.txt
1 # This file contains suppressions for the Dr.Memory tool, see
2 # http://dev.chromium.org/developers/how-tos/using-drmemory
3 #
4 # This file should contain suppressions only for the reports happening
5 # in the 'full' mode (drmemory_full).
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
7 # please use suppressions.txt instead.
8
9 ###############################################################
10 # Known reports on the third party we have no control over.
11
12 UNINITIALIZED READ
13 name=http://crbug.com/116277
14 ...
15 *!MOZ_Z_deflate
16
17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
18 LEAK
19 name=http://code.google.com/p/drmemory/issues/detail?id=406
20 ADVAPI32.dll!WmiOpenBlock
21 ADVAPI32.dll!WmiOpenBlock
22
23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
24 LEAK
25 name=GoogleDesktop LEAK
26 ...
27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
28
29 # They deliberately use uninit local var in sqlite random generator.
30 # Random bytes may mess up the call stack between randomByte and
31 # sqlite3_* frames (http://code.google.com/p/drmemory/issues/detail?id=851).
32 UNINITIALIZED READ
33 name=sqlite3_randomness UNINIT
34 *!randomByte
35 ...
36 *!sqlite3*
37
38 # Intentional leak in WebKit Template Framework for ThreadData.
39 LEAK
40 name=intentional WTF ThreadData leak
41 ...
42 *!WTF::wtfThreadData
43
44 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
45 LEAK
46 name=http://crbug.com/125558 a
47 KERNELBASE.dll!LocalAlloc
48 SECHOST.dll!...
49 SECHOST.dll!NotifyServiceStatusChange
50 WINHTTP.dll!...
51 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
52 *!net::ProxyResolverWinHttp::GetProxyForURL
53
54 # Tiny locale-related leaks in ntdll.  Probably system bug.
55 LEAK
56 name=http://crbug.com/125558 b
57 ntdll.dll!...
58 ntdll.dll!*
59 KERNELBASE.dll!...
60 KERNELBASE.dll!GetCPInfoExW
61 webio.dll!*
62 webio.dll!*
63 webio.dll!*
64 WINHTTP.dll!...
65 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
66 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig
67
68 UNINITIALIZED READ
69 name=http://crbug.com/30704 #f
70 libpng.dll!wk_png_write_find_filter
71 libpng.dll!wk_png_write_row
72
73 ###############################################################
74 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
75 # assumptions or unhandled syscalls
76
77 # Please note: the following suppressions were written in the abscense of
78 # private symbols so may need to be updated when we switch to auto-loading PDBs
79 UNINITIALIZED READ
80 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1)
81 ntdll.dll!Rtl*
82 ntdll.dll!Rtl*
83 ntdll.dll!RtlFindActivationContextSectionString
84
85 UNINITIALIZED READ
86 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2)
87 ...
88 SHELL32.dll!SHFileOperation*
89
90 UNINITIALIZED READ
91 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3)
92 ...
93 SHELL32.dll!SHGetFolderPath*
94
95 LEAK
96 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4)
97 ...
98 SHELL32.dll!SHGetFolderPath*
99
100 UNINITIALIZED READ
101 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5)
102 ...
103 SHELL32.dll!SHCreateDirectory*
104
105 UNINITIALIZED READ
106 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6)
107 ...
108 SHELL32.dll!ILLoadFromStream*
109
110 UNINITIALIZED READ
111 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7)
112 ...
113 SHELL32.dll!ILSaveToStream*
114
115 LEAK
116 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8)
117 ...
118 SHELL32.dll!SHFileOperation*
119
120 UNINITIALIZED READ
121 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9)
122 ...
123 SHELL32.dll!SHGetItemFromDataObject
124
125 LEAK
126 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10)
127 ...
128 SHELL32.dll!SHGetItemFromDataObject
129
130 LEAK
131 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11)
132 ...
133 ole32.dll!*
134 SHELL32.dll!SHChangeNotifySuspendResume
135
136 UNINITIALIZED READ
137 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1)
138 ...
139 *!CreateProcess*
140
141 LEAK
142 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2)
143 ...
144 *!CreateProcess*
145
146 UNINITIALIZED READ
147 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3)
148 ...
149 *!base::LaunchApp*
150
151 UNINITIALIZED READ
152 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1)
153 ...
154 *!CreateWindow*
155
156 POSSIBLE LEAK
157 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2)
158 GDI32.dll!*
159 GDI32.dll!CreateFontIndirectExW
160 GDI32.dll!CreateFontIndirectW
161
162 LEAK
163 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3)
164 KERNELBASE.dll!LocalAlloc
165 ...
166 USER32.dll!CreateWindow*
167
168 UNINITIALIZED READ
169 name=http://code.google.com/p/drmemory/issues/detail?id=18 a
170 ...
171 *!CoInitialize*
172
173 UNINITIALIZED READ
174 name=http://code.google.com/p/drmemory/issues/detail?id=18 b
175 ...
176 *!CoCreateInstance*
177
178 UNINITIALIZED READ
179 name=http://code.google.com/p/drmemory/issues/detail?id=18 c
180 ...
181 *!CoUninitialize*
182
183 UNINITIALIZED READ
184 name=http://code.google.com/p/drmemory/issues/detail?id=18 d
185 ...
186 UxTheme.dll!*
187
188 UNINITIALIZED READ
189 name=http://code.google.com/p/drmemory/issues/detail?id=40 a
190 ...
191 WINSPOOL.DRV!*
192
193 LEAK
194 name=http://code.google.com/p/drmemory/issues/detail?id=40 b
195 ...
196 WINSPOOL.DRV!*
197
198 UNINITIALIZED READ
199 name=http://code.google.com/p/drmemory/issues/detail?id=48 a
200 system call NtContinue
201 ...
202 *!*SetThreadName
203
204 UNINITIALIZED READ
205 name=http://code.google.com/p/drmemory/issues/detail?id=48 b
206 system call NtContinue
207 *!WTF::initializeCurrentThreadInternal
208
209 UNINITIALIZED READ
210 name=http://code.google.com/p/drmemory/issues/detail?id=52 a
211 ...
212 DBGHELP.dll!SymInitialize
213
214 UNINITIALIZED READ
215 name=http://code.google.com/p/drmemory/issues/detail?id=52 b
216 ...
217 DBGHELP.dll!SymEnumSourceFiles
218
219 UNINITIALIZED READ
220 name=http://code.google.com/p/drmemory/issues/detail?id=52 c
221 ...
222 msvcrt.dll!_RTDynamicCast
223
224 UNINITIALIZED READ
225 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp
226 instruction=test   0x*(%*) $0x??
227 DBGHELP.dll!SymUnloadModule64
228
229 UNINITIALIZED READ
230 name=http://code.google.com/p/drmemory/issues/detail?id=53
231 ADVAPI32.dll!WmiMofEnumerateResourcesA
232 ADVAPI32.dll!WmiMofEnumerateResourcesA
233 ADVAPI32.dll!Sta*TraceW
234
235 UNINITIALIZED READ
236 name=http://code.google.com/p/drmemory/issues/detail?id=58
237 ...
238 *!_cfltcvt_l
239
240 UNINITIALIZED READ
241 name=http://code.google.com/p/drmemory/issues/detail?id=60
242 USP10.dll!*
243 ...
244 USP10.dll!ScriptStringAnalyse
245
246 LEAK
247 IMM32.dll!ImmGetIMCCSize
248 IMM32.dll!ImmLockClientImc
249 IMM32.dll!ImmDisableIME
250 IMM32.dll!ImmSetActiveContext
251 USER32.dll!IMPSetIMEA
252
253 UNINITIALIZED READ
254 name=http://code.google.com/p/drmemory/issues/detail?id=65 a
255 ...
256 *!SystemFunction036
257
258 UNINITIALIZED READ
259 name=http://code.google.com/p/drmemory/issues/detail?id=65 b
260 ...
261 *!talk_base::CreateRandomString
262
263 UNINITIALIZED READ
264 name=http://code.google.com/p/drmemory/issues/detail?id=68 a
265 ...
266 WS2_32.dll!*
267
268 UNINITIALIZED READ
269 name=http://code.google.com/p/drmemory/issues/detail?id=68 b
270 ...
271 ADVAPI32.dll!SetSecurityDescriptorDacl
272
273 UNINITIALIZED READ
274 name=http://code.google.com/p/drmemory/issues/detail?id=68 c
275 ...
276 MSWSOCK.dll!WSPStartup
277
278 UNINITIALIZED READ
279 name=http://code.google.com/p/drmemory/issues/detail?id=68 d
280 ...
281 ntdll.dll!RtlValidateUnicodeString
282
283 LEAK
284 name=http://code.google.com/p/drmemory/issues/detail?id=256
285 *!_mtinit
286 *!__tmainCRTStartup
287 *!mainCRTStartup
288
289 POSSIBLE LEAK
290 name=http://code.google.com/p/drmemory/issues/detail?id=274 a
291 ...
292 GDI32.dll!CreateDCW
293
294 LEAK
295 name=http://code.google.com/p/drmemory/issues/detail?id=274 b
296 ...
297 GDI32.dll!CreateDCW
298
299 LEAK
300 name=http://code.google.com/p/drmemory/issues/detail?id=275
301 ...
302 *!_getptd*
303
304 UNINITIALIZED READ
305 name=http://code.google.com/p/drmemory/issues/detail?id=276
306 ...
307 ntdll.dll!RtlConvertUlongToLargeInteger
308 ntdll.dll!RtlConvertUlongToLargeInteger
309 ntdll.dll!KiUserExceptionDispatcher
310
311 LEAK
312 name=http://code.google.com/p/drmemory/issues/detail?id=305
313 *!free
314 *!free
315 *!operator new
316 ...
317 *!MiniDumpWriteDump
318
319 UNINITIALIZED READ
320 name=http://code.google.com/p/drmemory/issues/detail?id=346 a
321 ...
322 GDI32.dll!CloseEnhMetaFile
323
324 UNINITIALIZED READ
325 name=http://code.google.com/p/drmemory/issues/detail?id=346 b
326 GDI32.dll!SetPolyFillMode
327 GDI32.dll!CreateICW
328
329 UNINITIALIZED READ
330 name=http://code.google.com/p/drmemory/issues/detail?id=362
331 USER32.dll!UnregisterClass*
332
333 LEAK
334 name=http://code.google.com/p/drmemory/issues/detail?id=382
335 ...
336 ntdll.dll!CsrNewThread
337
338 UNINITIALIZED READ
339 name=http://code.google.com/p/drmemory/issues/detail?id=397
340 system call NtDeviceIoControlFile InputBuffer
341 ADVAPI32.dll!ImpersonateAnonymousToken
342
343 UNINITIALIZED READ
344 name=http://code.google.com/p/drmemory/issues/detail?id=407 a
345 system call NtRequestWaitReplyPort
346 RPCRT4.dll!I_RpcSendReceive
347 RPCRT4.dll!NdrSendReceive
348
349 UNINITIALIZED READ
350 name=http://code.google.com/p/drmemory/issues/detail?id=407 b
351 IMM32.dll!*
352 ntdll.dll!LdrInitializeThunk
353 ntdll.dll!LdrShutdownThread
354
355 UNINITIALIZED READ
356 name=http://code.google.com/p/drmemory/issues/detail?id=412 a
357 ADVAPI32.dll!RegDeleteValue*
358
359 UNINITIALIZED READ
360 name=http://code.google.com/p/drmemory/issues/detail?id=412 b
361 ...
362 ADVAPI32.dll!Crypt*
363
364 UNINITIALIZED READ
365 name=http://code.google.com/p/drmemory/issues/detail?id=412 c
366 ...
367 RPCRT4.dll!NdrClientCall2
368
369 LEAK
370 name=http://code.google.com/p/drmemory/issues/detail?id=412 d
371 RSAENH.dll!DllUnregisterServer
372 ...
373 ADVAPI32.dll!CryptAcquireContextA
374 CRYPT32.dll!CryptEnumOIDFunction
375 ...
376 CRYPT32.dll!CertFindCertificateInStore
377
378 UNINITIALIZED READ
379 name=http://code.google.com/p/drmemory/issues/detail?id=412 e
380 ...
381 RSAENH.dll!CPGenRandom
382
383 UNINITIALIZED READ
384 name=http://code.google.com/p/drmemory/issues/detail?id=412 f
385 ...
386 CRYPT??.dll!Crypt*
387
388 UNINITIALIZED READ
389 name=http://code.google.com/p/drmemory/issues/detail?id=412 g
390 *!replace_memcmp
391 ...
392 *!testing::internal::CmpHelperEQ*
393 ...
394 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
395
396 # We get these sometimes from AesEncrypt and AesExpandKey.  AesEncrypt doesn't
397 # have frame pointers, and we have trouble unwinding from it.  Therefore, we use
398 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
399 UNINITIALIZED READ
400 name=http://code.google.com/p/drmemory/issues/detail?id=412 h
401 RSAENH.dll!*
402
403 UNINITIALIZED READ
404 name=http://code.google.com/p/drmemory/issues/detail?id=425 a
405 CLBCatQ.DLL!DestroyStgDatabase
406 CLBCatQ.DLL!PostError
407 CLBCatQ.DLL!PostError
408
409 LEAK
410 name=http://code.google.com/p/drmemory/issues/detail?id=425 b
411 RPCRT4.dll!I_RpcBCacheFree
412 RPCRT4.dll!I_RpcBCacheFree
413 ...
414 RPCRT4.dll!NdrClientCall2
415
416 UNINITIALIZED READ
417 name=http://code.google.com/p/drmemory/issues/detail?id=425 c
418 msdmo.dll!*
419 msdmo.dll!*
420 DEVENUM.DLL!*
421
422 UNINITIALIZED READ
423 name=http://code.google.com/p/drmemory/issues/detail?id=435 a
424 ...
425 ntdll.dll!RtlSetSecurityObject
426 ntdll.dll!RtlNewSecurityObjectEx
427 ADVAPI32.dll!CreatePrivateObjectSecurityEx
428 NTMARTA.dll!AccRewriteSetNamedRights
429
430 POSSIBLE LEAK
431 name=http://code.google.com/p/drmemory/issues/detail?id=435 b
432 WLDAP32.dll!Ordinal325
433 ...
434 WLDAP32.dll!Ordinal325
435 ntdll.dll!LdrInitializeThunk
436 ntdll.dll!LdrFindResourceDirectory_U
437 ntdll.dll!RtlValidateUnicodeString
438 ntdll.dll!LdrLoadDll
439 KERNEL32.dll!LoadLibraryExW
440
441 # mod+offs suppression because the symbolic makes no sense and changes
442 # completely in the presence of WS2_32.dll symbols.
443 LEAK
444 name=http://code.google.com/p/drmemory/issues/detail?id=438
445 <WS2_32.dll+0x260c>
446 <WS2_32.dll+0x2b76>
447 <WS2_32.dll+0x2c61>
448
449 UNINITIALIZED READ
450 name=http://code.google.com/p/drmemory/issues/detail?id=454 a
451 ...
452 WINMM.dll!wave*GetNumDevs
453
454 LEAK
455 name=http://code.google.com/p/drmemory/issues/detail?id=454 b
456 ...
457 WINMM.dll!wave*GetNumDevs
458
459 LEAK
460 name=http://code.google.com/p/drmemory/issues/detail?id=466
461 ntdll.dll!RtlRunOnceBeginInitialize
462 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
463
464 UNINITIALIZED READ
465 name=http://code.google.com/p/drmemory/issues/detail?id=473 a
466 system call NtDeviceIoControlFile InputBuffer
467 ...
468 iphlpapi.dll!GetAdaptersAddresses
469
470 POSSIBLE LEAK
471 name=http://code.google.com/p/drmemory/issues/detail?id=473 b
472 ESENT.dll!*
473 ESENT.dll!*
474 ESENT.dll!*
475 ntdll.dll!Ldr*Init*
476 ntdll.dll!Ldr*
477 ntdll.dll!*
478 ntdll.dll!LdrLoadDll
479 ...
480 iphlpapi.dll!GetPerAdapterInfo
481 ...
482 iphlpapi.dll!GetAdaptersAddresses
483
484 POSSIBLE LEAK
485 name=http://code.google.com/p/drmemory/issues/detail?id=473 c
486 RPCRT4.dll!*
487 RPCRT4.dll!*
488 ...
489 IPHLPAPI.DLL!GetAdaptersAddresses
490
491 LEAK
492 name=http://code.google.com/p/drmemory/issues/detail?id=475
493 ...
494 ADVAPI32.dll!CryptAcquireContextA
495 ...
496 CRYPT32.dll!CryptMsgOpenToDecode
497 ...
498 CRYPT32.dll!CryptQueryObject
499
500 # Lots of leaks from our interactions with the system certificate store.  May be
501 # worth reviewing our use of their API.
502 LEAK
503 name=http://code.google.com/p/drmemory/issues/detail?id=476 a
504 KERNEL*.dll!LocalAlloc
505 ...
506 CRYPT32.dll!CertGetCRLContextProperty
507
508 LEAK
509 name=http://code.google.com/p/drmemory/issues/detail?id=476 b
510 KERNEL*.dll!LocalAlloc
511 ...
512 CRYPT32.dll!CertAddCRLContextToStore
513
514 LEAK
515 name=http://code.google.com/p/drmemory/issues/detail?id=476 c
516 KERNEL*.dll!LocalAlloc
517 ...
518 CRYPT32.dll!CertOpenStore
519
520 LEAK
521 name=http://code.google.com/p/drmemory/issues/detail?id=476 d
522 ...
523 CRYPT32.dll!CertOpenSystemStore?
524
525 LEAK
526 name=http://code.google.com/p/drmemory/issues/detail?id=476 e
527 ...
528 CRYPT32.dll!CertGetCertificateChain
529
530 LEAK
531 name=http://code.google.com/p/drmemory/issues/detail?id=476 f
532 ...
533 CRYPT32.dll!CertCompareIntegerBlob
534
535 LEAK
536 name=http://code.google.com/p/drmemory/issues/detail?id=476 g
537 ...
538 CRYPT32.dll!CryptUnprotectData
539
540 LEAK
541 name=http://code.google.com/p/drmemory/issues/detail?id=476 h
542 KERNEL*.dll!LocalAlloc
543 ...
544 CRYPT32.dll!CertEnumCertificatesInStore
545
546 LEAK
547 name=http://code.google.com/p/drmemory/issues/detail?id=476 i
548 ...
549 CRYPT32.dll!CryptProtectData
550
551 LEAK
552 name=http://code.google.com/p/drmemory/issues/detail?id=476 j
553 ...
554 CRYPT32.dll!CryptExportPublicKeyInfoEx
555
556 UNINITIALIZED READ
557 name=http://code.google.com/p/drmemory/issues/detail?id=502 a
558 system call NtSecureConnectPort parameter #3
559 GDI32.dll!*
560 GDI32.dll!*
561
562 UNINITIALIZED READ
563 name=http://code.google.com/p/drmemory/issues/detail?id=502 b
564 system call NtGdiEnumFonts parameter #6
565 GDI32.dll!*
566 GDI32.dll!*
567
568 UNINITIALIZED READ
569 name=http://code.google.com/p/drmemory/issues/detail?id=511 a
570 RPCRT4.dll!...
571 ole32.dll!*
572
573 UNINITIALIZED READ
574 name=http://code.google.com/p/drmemory/issues/detail?id=511 b
575 ole32.dll!*
576 ole32.dll!*
577 ole32.dll!StringFromGUID2
578
579 UNINITIALIZED READ
580 name=http://code.google.com/p/drmemory/issues/detail?id=512 a
581 ...
582 *!browser_sync::Cryptographer::PackBootstrapToken
583 *!browser_sync::Cryptographer::GetBootstrapToken
584
585 UNINITIALIZED READ
586 name=http://code.google.com/p/drmemory/issues/detail?id=512 b
587 ...
588 *!Encrypt*
589
590 UNINITIALIZED READ
591 name=http://code.google.com/p/drmemory/issues/detail?id=513 a
592 *!v8*
593
594 UNINITIALIZED READ
595 name=http://code.google.com/p/drmemory/issues/detail?id=513 b
596 *!*
597 *!v8*
598
599 UNINITIALIZED READ
600 name=http://code.google.com/p/drmemory/issues/detail?id=513 c
601 <not in a module>
602 ...
603 *!v8*
604
605 UNINITIALIZED READ
606 name=http://code.google.com/p/drmemory/issues/detail?id=546
607 ...
608 mscms.dll!*
609 ...
610 GDI32.dll!*
611 *!IconUtil::Create*HICON*
612
613 LEAK
614 name=http://crbug.com/92152
615 ...
616 USER32.dll!CreateWindowExW
617 *!views::TooltipManagerWin::Init
618 *!views::TooltipManagerWin::TooltipManagerWin
619
620 UNINITIALIZED READ
621 name=http://code.google.com/p/drmemory/issues/detail?id=567 a
622 dbghelp.dll!*
623 ...
624 dbghelp.dll!StackWalk64
625
626 LEAK
627 name=http://code.google.com/p/drmemory/issues/detail?id=567 b
628 *!*
629 dbghelp.dll!*
630 ...
631 dbghelp.dll!StackWalk64
632
633 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
634 # TppWorkerThread w/ syms.  We used to use mod+offs here, but that was too
635 # brittle, so we switched to RPCRT4.dll!*.
636 LEAK
637 name=http://code.google.com/p/drmemory/issues/detail?id=569
638 RPCRT4.dll!...
639 ntdll.dll!*
640 ntdll.dll!*
641 KERNEL*.dll!BaseThreadInitThunk
642
643 # TODO(timurrrr): investigate these
644 UNINITIALIZED READ
645 name=http://crbug.com/TODO a
646 ...
647 *!win_util::GetLogonSessionOnlyDACL
648
649 UNINITIALIZED READ
650 name=http://crbug.com/TODO b
651 ...
652 ntshrui.dll!IsPathSharedW
653
654 UNINITIALIZED READ
655 name=http://crbug.com/TODO c
656 ...
657 *!NetApiBufferFree
658
659 UNINITIALIZED READ
660 name=http://crbug.com/TODO d
661 ...
662 *!ShellExecute*
663
664 UNINITIALIZED READ
665 name=http://crbug.com/TODO e
666 ...
667 *!SHParseDisplayName
668
669 UNINITIALIZED READ
670 name=http://crbug.com/TODO f
671 ...
672 *!GetCanonicalPathInfo*
673
674 UNINITIALIZED READ
675 name=http://crbug.com/TODO g
676 ...
677 SHELL32.dll!Ordinal*
678
679 UNINITIALIZED READ
680 name=http://crbug.com/TODO h
681 ...
682 GDI32.dll!GetTextExtentPoint32*
683
684 UNINITIALIZED READ
685 name=http://crbug.com/TODO i
686 ...
687 *!SyncSocketClientListener::OnMsgClassResponse
688
689 UNINITIALIZED READ
690 name=http://crbug.com/TODO j
691 ...
692 *!*NSPRInitSingleton*
693
694 UNINITIALIZED READ
695 name=http://crbug.com/TODO k
696 *!NdrSimpleStructFree
697
698 UNINITIALIZED READ
699 name=http://crbug.com/TODO l
700 ntdll.dll!RtlpNtOpenKey
701 ntdll.dll!RtlMakeSelfRelativeSD
702 ntdll.dll!RtlAbsoluteToSelfRelativeSD
703 ADVAPI32.dll!MakeSelfRelativeSD
704
705 UNINITIALIZED READ
706 name=http://crbug.com/TODO m
707 ...
708 CRYPT32.dll!I_CertSyncStore
709
710 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
711 # a leak.  Must be some early thread initialization.  Doesn't look like
712 # bit-level though.
713 UNINITIALIZED READ
714 name=http://crbug.com/TODO n
715 RPCRT4.dll!*
716 RPCRT4.dll!*
717 RPCRT4.dll!*
718 ntdll.dll!*
719 ntdll.dll!*
720 KERNEL*.dll!BaseThreadInitThunk
721
722 # No idea where this is from, but Chrome isn't even on the stack.
723 POSSIBLE LEAK
724 name=http://crbug.com/TODO o
725 RPCRT4.dll!...
726 ole32.dll!OleInitialize
727 ole32.dll!...
728 KERNEL32.dll!BaseThreadInitThunk
729
730 # Matches lots of RPC related leaks.  So far RPC handles have been mostly owned
731 # by system libraries and are not something we can fix easily.
732 POSSIBLE LEAK
733 name=http://crbug.com/TODO p
734 RPCRT4.dll!*
735 RPCRT4.dll!*
736 RPCRT4.dll!NDRCContextBinding
737
738 # No idea, but all system code, not interesting.
739 POSSIBLE LEAK
740 name=http://crbug.com/TODO q
741 RPCRT4.dll!...
742 RPCRT4.dll!*
743 RPCRT4.dll!*
744 ole32.dll!...
745 ole32.dll!*
746 ole32.dll!*
747 ...
748 SHELL32.dll!*
749
750 LEAK
751 name=http://crbug.com/109278 video device COM leaks
752 ...
753 *!media::VideoCaptureDevice::*
754
755 LEAK
756 name=http://crbug.com/109278 audio device COM leaks
757 ...
758 *!media::GetInputDeviceNamesWin
759
760 # False pos uninit in shell32 when resolving links.
761 UNINITIALIZED READ
762 name=http://code.google.com/p/drmemory/issues/detail?id=745
763 SHELL*.dll!*
764 ...
765 SHELL*.dll!*
766 *!file_util::ResolveShortcut
767
768 # Probable false pos uninit in ffmpeg.  Probably due to running off the end of a
769 # buffer with SSE/MMX instructions whose results are then masked out later.
770 UNINITIALIZED READ
771 name=http://code.google.com/p/drmemory/issues/detail?id=747 a
772 *!ff_pred4x4_vertical_vp8_mmxext
773
774 UNINITIALIZED READ
775 name=http://code.google.com/p/drmemory/issues/detail?id=747 b
776 *!ff_pred4x4_down_left_mmxext
777
778 UNINITIALIZED READ
779 name=http://code.google.com/p/drmemory/issues/detail?id=747 c
780 *!ff_vorbis_floor1_render_list
781
782 UNINITIALIZED READ
783 name=http://code.google.com/p/drmemory/issues/detail?id=747 d
784 *!ff_put_vp8_epel8_h6_ssse3
785
786 UNINITIALIZED READ
787 name=http://code.google.com/p/drmemory/issues/detail?id=747 e
788 *!ff_put_vp8_epel8_h4_ssse3
789
790 UNINITIALIZED READ
791 name=http://code.google.com/p/drmemory/issues/detail?id=747 f
792 *!ff_fft_permute_sse
793
794 UNINITIALIZED READ
795 name=http://code.google.com/p/drmemory/issues/detail?id=747 g
796 *!ff_simple_idct_add_mmx
797
798 # ffmpeg seems to leak a pthread condition variable.
799 LEAK
800 name=http://crbug.com/110042
801 *!ptw32_new
802 *!pthread_self
803 *!sem_wait
804 *!pthread_cond_wait
805 *!ff_thread_decode_frame
806 *!avcodec_decode_video2
807
808 # Improperly handled ioctl in bcrypt.
809 UNINITIALIZED READ
810 name=http://code.google.com/p/drmemory/issues/detail?id=748
811 system call NtDeviceIoControlFile InputBuffer
812 ...
813 bcrypt.dll!BCryptUnregisterConfigChangeNotify
814 bcrypt.dll!BCryptGetFipsAlgorithmMode
815 ntdll.dll!RtlQueryEnvironmentVariable
816
817 # Not sure what this is.
818 POSSIBLE LEAK
819 name=http://code.google.com/p/drmemory/issues/detail?id=749
820 ...
821 fwpuclnt.dll!*
822 ...
823 RPCRT4.dll!*
824 ...
825 fwpuclnt.dll!*
826 ...
827 WS2_32.dll!*
828 *!talk_base::SafeGetHostByName
829 *!talk_base::SocketAddress::GetLocalIPs
830 *!talk_base::SocketAddress::IsLocalIP
831 *!cricket::Transport::VerifyCandidate
832 *!cricket::Session::OnRemoteCandidates
833 *!cricket::Session::OnTransportInfoMessage
834 *!cricket::Session::OnIncomingMessage
835 *!cricket::SessionManager::OnIncomingMessage
836
837 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
838 UNINITIALIZED READ
839 name=http://code.google.com/p/drmemory/issues/detail?id=529
840 RPCRT4.dll!*
841 ...
842 *!base::LaunchProcess
843
844 # System leak from CreateEnvironmentBlock.
845 LEAK
846 name=http://code.google.com/p/drmemory/issues/detail?id=757
847 ...
848 USERENV.dll!CreateEnvironmentBlock
849
850 # Looks like another instance of 753
851 LEAK
852 name=http://code.google.com/p/drmemory/issues/detail?id=753
853 ...
854 ntdll.dll!RtlLoadString
855
856 # More bit manip fps
857 UNINITIALIZED READ
858 name=http://code.google.com/p/drmemory/issues/detail?id=493
859 USP10.dll!ScriptPositionSingleGlyph
860
861 # Various TLS leaks that we don't understand yet.  We should be finding a root
862 # for these.
863 LEAK
864 name=http://code.google.com/p/drmemory/issues/detail?id=778 a
865 KERNELBASE.dll!TlsSetValue
866
867 # Originally filed as: http://crbug.com/109281
868 LEAK
869 name=http://code.google.com/p/drmemory/issues/detail?id=778 b
870 *!operator new
871 *!operator new[]
872 *!*::ConstructTlsVector
873 *!base::ThreadLocalStorage::StaticSlot::Get
874
875 # This is an NSS PRThread object installed in TLS.  Why isn't this detected as a
876 # root?  See also http://crbug.com/32624
877 LEAK
878 name=http://code.google.com/p/drmemory/issues/detail?id=778 c
879 *!PR_Calloc
880 *!_PR_AttachThread
881 *!_PRI_AttachThread
882
883 # Bit-level fps in rich edit layer.
884 UNINITIALIZED READ
885 name=http://code.google.com/p/drmemory/issues/detail?id=791
886 RICHED20.dll!*
887 RICHED20.dll!*
888
889 # Already suppressed by drmemory default supp we don't have yet.
890 LEAK
891 name=i#757: RPC binding leaks in sspicli.dll
892 RPCRT4.dll!*
893 ...
894 SspiCli.dll!*
895 SspiCli.dll!Cre*
896
897 # Async NtReadFile false positives.  This was fixed in drmemory r772, remove
898 # this supp when we pull that rev.
899 UNADDRESSABLE ACCESS
900 name=http://code.google.com/p/drmemory/issues/detail?id=798
901 system call NtReadFile parameter #5
902 KERNEL32.dll!ReadFile
903
904 # Probable syscall false positive.
905 UNADDRESSABLE ACCESS
906 name=http://code.google.com/p/drmemory/issues/detail?id=809
907 system call NtGdiPolyPolyDraw parameter #1
908 *!gfx::Path::CreateNativeRegion
909
910 # Very wide suppression for all uninits in rpcrt4.dll.  We get bad stack traces
911 # coming out of this module (sometimes only one frame), which makes it hard to
912 # write precise suppressions.  Until we have bit-level tracking (DRMi#113) we
913 # should keep this.
914 UNINITIALIZED READ
915 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard
916 RPCRT4.dll!*
917
918 UNINITIALIZED READ
919 name=http://code.google.com/p/drmemory/issues/detail?id=841 a
920 ...
921 CRYPTNET.dll!I_CryptNetGetConnectivity
922
923 UNINITIALIZED READ
924 name=http://code.google.com/p/drmemory/issues/detail?id=841 b
925 ...
926 webio.dll!*
927
928 UNINITIALIZED READ
929 name=http://code.google.com/p/drmemory/issues/detail?id=841 c
930 ...
931 winhttp.dll!*
932
933 LEAK
934 name=http://code.google.com/p/drmemory/issues/detail?id=841 d
935 ...
936 CRYPTNET.dll!I_CryptNetGetConnectivity
937
938 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
939 UNINITIALIZED READ
940 name=http://code.google.com/p/drmemory/issues/detail?id=810
941 instruction=test   %edx %edx
942 USER32.dll!GetClassLongW
943 ...
944 *!ui::CenterAndSizeWindow
945
946 UNINITIALIZED READ
947 name=http://code.google.com/p/drmemory/issues/detail?id=815
948 KERNEL*.dll!...
949 dxgi.dll!*
950 USER32.dll!GetMonitorInfoA
951 ntdll.dll!KiUserCallbackDispatcher
952 dxgi.dll!*
953 WinSATAPI.DLL!*
954
955 # Suppress anything in cmd.exe.  It's safer to suppress these than disable
956 # following, since someone might launch a Chrome process via cmd.exe.
957 LEAK
958 name=cmd.exe
959 ...
960 cmd.exe!*
961
962 # Possible true system use after free.
963 UNADDRESSABLE ACCESS
964 name=http://code.google.com/p/drmemory/issues/detail?id=623
965 KERNELBASE.dll!TlsGetValue
966 OLEAUT32.dll!SysFreeString
967 OLEAUT32.dll!SysAllocStringByteLen
968 OLEACC.dll!*
969 OLEACC.dll!*
970 OLEACC.dll!*
971 OLEACC.dll!*
972
973 # basic_streambuf seems to leak something in creating a std::_Mutex
974 LEAK
975 name=http://code.google.com/p/drmemory/issues/detail?id=857
976 ntdll.dll!...
977 ntdll.dll!RtlInitializeCriticalSection
978 *!_Mtxinit
979 *!std::_Mutex::_Mutex
980 *!std::basic_streambuf<>
981
982 # Seems to create a DC, sometimes.  GetTextMetrics returns no pointers, though.
983 LEAK
984 name=GDI SetBrushOrgEx leak
985 GDI32.dll!...
986 GDI32.dll!GetTextMetricsW
987 *!gfx::PlatformFontWin::CreateHFontRef
988 *!gfx::PlatformFontWin::GetBaseFontRef
989
990 ###############################################################
991 # Benign issues in Chromium
992
993 # This test intentionally leaks an object and checks that it's never deleted.
994 LEAK
995 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
996 ...
997 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
998
999 LEAK
1000 name=deliberate histogram leak
1001 ...
1002 *!replace_operator_new
1003 ...
1004 *!*::*Histogram::FactoryGet
1005
1006 LEAK
1007 name=deliberate leak for SampleMap
1008 ...
1009 *!base::SampleMap::Accumulate
1010 *!base::SparseHistogram::Add
1011
1012 LEAK
1013 name=deliberate LazyInstance leak
1014 ...
1015 *!*LeakyLazyInstance*
1016 ...
1017 *!base::LazyInstance*::Pointer
1018
1019 LEAK
1020 name=http://crbug.com/79933 (1)
1021 ...
1022 *!TestURLRequestContext::Init
1023
1024 LEAK
1025 name=http://crbug.com/79933 (2)
1026 ...
1027 *!TestURLRequestContext::TestURLRequestContext
1028 *!TestURLRequestContextGetter::GetURLRequestContext
1029 *!notifier::SingleLoginAttempt::SingleLoginAttempt
1030 *!notifier::Login::StartConnection
1031 *!syncer::InvalidationNotifier::UpdateCredentials
1032 *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials
1033
1034 LEAK
1035 name=http://crbug.com/79933 (3)
1036 ...
1037 *!TestURLRequestContext::TestURLRequestContext
1038 *!TestURLRequestContextGetter::GetURLRequestContext
1039 *!URLFetcher::Core::StartURLRequest
1040
1041 LEAK
1042 name=http://crbug.com/79933 (4)
1043 *!generic_cpp_alloc
1044 *!operator new
1045 *!std::_Allocate<>
1046 *!std::allocator<>::allocate
1047 *!std::vector<>::_Insert_n
1048 *!std::vector<>::insert
1049 *!std::vector<>::push_back
1050 *!ObserverListBase<>::AddObserver
1051 ...
1052 *!net::HttpNetworkSession::HttpNetworkSession
1053 *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
1054 *!notifier::XmppClientSocketFactory::CreateTransportClientSocket
1055 *!notifier::ChromeAsyncSocket::Connect
1056 *!buzz::XmppClient::ProcessStartXmppLogin
1057 *!buzz::XmppClient::Process
1058 *!talk_base::Task::Step
1059 *!talk_base::TaskRunner::InternalRunTasks
1060 *!talk_base::TaskRunner::RunTasks
1061 *!notifier::TaskPump::CheckAndRunTasks
1062 *!base::internal::RunnableAdapter<>::Run
1063
1064 # Test intentionally leaks an object.
1065 LEAK
1066 name=http://crbug.com/86301
1067 *!replace_operator_new
1068 ...
1069 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody
1070
1071 # Leak in a binary copy of Firefox 3's NSS dll.  Not much we can do about it.
1072 LEAK
1073 name=Firefox 3 NSS dll leak
1074 nspr4.dll!*
1075 ...
1076 *!NSSDecryptor::~NSSDecryptor
1077
1078 # We get uninit reports inside GMock when it prints the bytes of references to
1079 # partially initialized objects passed to unexpected method calls.
1080 UNINITIALIZED READ
1081 name=http://crbug.com/64887 (GMock printing uninit data)
1082 ...
1083 *!testing::*::PrintBytesInObjectTo*
1084
1085 ###############################################################
1086 # Proactively borrowed from memcheck/suppressions.txt.
1087 # We have not yet seen these, but we are expanding the sets of tests
1088 # we're running, and we've hit redness in the past that could have
1089 # been avoided by already having the Memcheck suppressions.
1090 # TODO(bruening): review the entire file (not just these) once we're
1091 # at the peak set of tests we plan to run and remove the unused ones.
1092
1093 UNINITIALIZED READ
1094 name=bug_87232
1095 *!WebCore::base64Encode
1096 *!WebCore::base64Encode
1097 *!WebCore::ImageToDataURL<>
1098
1099 UNINITIALIZED READ
1100 name=bug_75127
1101 ...
1102 *!png_process_data
1103 *!gfx::PNGCodec::Decode*
1104
1105 UNINITIALIZED READ
1106 name=bug_99307
1107 *!modp_b64_encode
1108 *!base::Base64Encode*
1109 *!web_ui_util::GetImageDataUrl
1110 *!::NetworkInfoDictionary::set_icon
1111
1112 UNINITIALIZED READ
1113 name=bug_101125a
1114 ...
1115 *!SkScan::AntiFillPath
1116 *!SkScan::AntiFillPath
1117 *!SkDraw::drawPath
1118 *!SkDevice::drawPath
1119 *!SkDraw::drawTextOnPath
1120 *!SkDevice::drawTextOnPath
1121 *!SkCanvas::drawTextOnPath
1122 *!WebCore::Font::drawGlyphs
1123 *!WebCore::Font::drawGlyphBuffer
1124
1125 UNINITIALIZED READ
1126 name=bug_101125b
1127 ...
1128 *!SkScan::AntiFillRect
1129 *!SkScan::AntiFillRect
1130 *!SkDraw::drawRect
1131 *!SkDevice::drawRect
1132 *!SkCanvas::drawRect
1133 *!WebCore::GraphicsContext::fillRect
1134 *!WebCore::GraphicsContext::drawHighlightForText
1135
1136 UNINITIALIZED READ
1137 name=bug_101125c
1138 ...
1139 *!morphpoints
1140 *!morphpath
1141 *!SkDraw::drawTextOnPath
1142 *!SkDevice::drawTextOnPath
1143 *!SkCanvas::drawTextOnPath
1144 *!WebCore::Font::drawGlyphs
1145 *!WebCore::Font::drawGlyphBuffer
1146 *!WebCore::Font::drawSimpleText
1147 *!WebCore::Font::drawText
1148 *!WebCore::GraphicsContext::drawText
1149
1150 UNINITIALIZED READ
1151 name=bug_101781
1152 *!encode_one_block
1153 *!encode_mcu_huff
1154 *!compress_data
1155 *!process_data_simple_main
1156 *!chromium_jpeg_write_scanlines
1157 *!gfx::JPEGCodec::Encode
1158 *!gfx::JPEGEncodedDataFromImage
1159 *!history::TopSites::EncodeBitmap
1160 *!history::TopSites::SetPageThumbnail
1161 *!history::ExpireHistoryTest::AddExampleData
1162 *!history::ExpireHistoryTest::*
1163
1164 UNINITIALIZED READ
1165 name=bug_101781_d
1166 *!testing::AssertionResult testing::internal::CmpHelperGE<>
1167 *!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody
1168
1169 UNINITIALIZED READ
1170 name=bug_105907
1171 ...
1172 *!skia::BGRAConvolve2D
1173 *!skia::ImageOperations::ResizeBasic*
1174 *!skia::ImageOperations::Resize*
1175
1176 UNINITIALIZED READ
1177 name=bug_106183a
1178 *!WebCore::RenderMarquee::updateMarqueeStyle
1179 *!WebCore::RenderLayer::styleChanged
1180 *!WebCore::RenderBoxModelObject::styleDidChange
1181 *!WebCore::RenderBox::styleDidChange
1182 *!WebCore::RenderBlock::styleDidChange
1183 *!WebCore::RenderObject::setStyle
1184
1185 UNINITIALIZED READ
1186 name=bug_106183b
1187 *!WebCore::ComplexTextController*
1188 ...
1189 *!WebCore::Font::selectionRectForComplexText
1190 *!WebCore::Font::selectionRectForText
1191 *!WebCore::InlineTextBox::positionForOffset
1192 *!WebCore::RenderText::localCaretRect
1193 *!WebCore::VisiblePosition::localCaretRect
1194 *!WebCore::CaretBase::updateCaretRect
1195 *!WebCore::FrameSelection::localCaretRect
1196 *!WebCore::FrameSelection::recomputeCaretRect
1197 *!WebCore::FrameSelection::updateAppearance
1198
1199 UNINITIALIZED READ
1200 name=bug_106183c
1201 *!WebCore::ComplexTextController*
1202 ...
1203 *!WebCore::Font::drawComplexText
1204 *!WebCore::Font::drawText
1205 *!WebCore::GraphicsContext::drawText
1206 *!WebCore::paintTextWithShadows
1207 ...
1208 *!WebCore::RenderLineBoxList::paint
1209 *!WebCore::RenderBlock::paintContents
1210 *!WebCore::RenderBlock::paintObject
1211 *!WebCore::RenderBlock::paint
1212
1213 UNINITIALIZED READ
1214 name=bug_106552
1215 ...
1216 *!JSONStringValueSerializer::SerializeInternal
1217 *!JSONStringValueSerializer::Serialize
1218 *!JsonPrefStore::SerializeData
1219 *!ImportantFileWriter::DoScheduledWrite
1220 *!JsonPrefStore::CommitPendingWrite
1221 *!JsonPrefStore::~JsonPrefStore
1222 *!base::RefCounted<>::Release
1223 *!scoped_refptr<>::operator=
1224 *!PrefService::~PrefService
1225 *!scoped_ptr<>::~scoped_ptr
1226 *!TestingProfile::~TestingProfile
1227 *!ExtensionTestingProfile::~ExtensionTestingProfile
1228
1229 UNINITIALIZED READ
1230 name=bug_108147
1231 ...
1232 *!SkDraw::drawPosText
1233 *!SkDevice::drawPosText
1234 *!SkCanvas::drawPosText
1235 *!WebCore::Font::drawGlyphs
1236 *!WebCore::Font::drawGlyphBuffer
1237 *!WebCore::Font::drawSimpleText
1238 *!WebCore::Font::drawText
1239
1240 UNINITIALIZED READ
1241 name=bug_108620
1242 *!WebCore::PlatformEvent::PlatformEvent
1243 *!WebCore::PlatformMouseEvent::PlatformMouseEvent
1244 *!WebCore::EventHandler::fakeMouseMoveEventTimerFired
1245 *!WebCore::Timer<>::fired
1246 *!WebCore::ThreadTimers::sharedTimerFiredInternal
1247 *!WebCore::ThreadTimers::sharedTimerFired
1248 *!webkit_glue::WebKitPlatformSupportImpl::DoTimeout
1249 *!base::BaseTimer<>::TimerTask::Run
1250
1251 UNINITIALIZED READ
1252 name=bug_109496
1253 ...
1254 *!WebCore::ImageBuffer::platformTransformColorSpace
1255 *!WebCore::ImageBuffer::transformColorSpace
1256 *!WebCore::RenderSVGResourceFilter::postApplyResource
1257 ...
1258 *!WebCore::RenderSVGShape::paint*
1259 ...
1260 *!WebCore::RenderSVGRoot*_Zpaint*_ZL9PaintInfoERKNS_*
1261
1262 UNINITIALIZED READ
1263 name=bug_112278
1264 *!fetch_texel_2d_f_rgba8888
1265 *!sample_2d_linear
1266 *!sample_linear_2d
1267 *!fetch_texel_lod
1268 *!fetch_texel
1269 *!_mesa_execute_program
1270 *!run_program
1271 *!_swrast_exec_fragment_program
1272 *!shade_texture_span
1273 *!_swrast_write_rgba_span
1274 *!general_triangle
1275 *!_swrast_validate_triangle
1276 *!_swrast_Triangle
1277 *!triangle_rgba
1278 *!_tnl_render_triangles_elts
1279 *!run_render
1280 *!_tnl_run_pipeline
1281 *!_tnl_draw_prims
1282 *!_tnl_vbo_draw_prims
1283 *!vbo_validated_drawrangeelements
1284 *!vbo_exec_DrawElements
1285 *!neutral_DrawElements
1286
1287 UNINITIALIZED READ
1288 name=bug_112278b
1289 *!fetch_texel_2d_f_rgba8888
1290 *!sample_2d_nearest
1291 *!sample_nearest_2d
1292 *!fetch_texel_lod
1293 *!fetch_texel
1294 *!_mesa_execute_program
1295 *!run_program
1296 *!_swrast_exec_fragment_program
1297 *!shade_texture_span
1298 *!_swrast_write_rgba_span
1299 *!general_triangle
1300 ...
1301 *!_swrast_Triangle
1302 *!triangle_rgba
1303 ...
1304 *!run_render
1305 *!_tnl_run_pipeline
1306 *!_tnl_draw_prims
1307 *!_tnl_vbo_draw_prims
1308
1309 UNINITIALIZED READ
1310 name=bug_115419_1
1311 *!fetch_texel_2d_f_rgba8888
1312 *!texture_get_row
1313 *!fast_read_rgba_pixels
1314 *!read_rgba_pixels
1315 *!_swrast_ReadPixels
1316 *!_mesa_ReadPixels
1317 *!glReadPixels
1318 *!gpu::gles2::GLES2DecoderImpl::HandleReadPixels
1319 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1320 *!gpu::CommandParser::ProcessCommand
1321 *!gpu::GpuScheduler::PutChanged
1322 *!webkit::gpu::GLInProcessContext::PumpCommands
1323
1324 UNINITIALIZED READ
1325 name=bug_115419_2
1326 *!get_src_arg_mask
1327 *!_mesa_remove_extra_move_use
1328 *!_mesa_optimize_program
1329 *!get_mesa_program
1330 *!_mesa_ir_link_shader
1331 *!_mesa_glsl_link_shader
1332 *!link_program
1333 *!_mesa_LinkProgramARB
1334 *!glLinkProgram
1335 ...
1336 *!gpu::gles2::GLES2DecoderImpl::DoLinkProgram*
1337 *!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram*
1338 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1339 *!gpu::CommandParser::ProcessCommand
1340 *!gpu::GpuScheduler::PutChanged
1341 *!webkit::gpu::GLInProcessContext::PumpCommands
1342
1343 UNINITIALIZED READ
1344 name=bug_116475
1345 ...
1346 *!base::Histogram::BucketIndex
1347 *!base::Histogram::Add
1348 *!webkit_glue::WebKitPlatformSupportImpl::histogramCustomCounts
1349 *!WebCore::PlatformSupport::histogramCustomCounts
1350 *!WebCore::CCLayerTreeHostImpl::optimizeRenderPasses*
1351 *!WebCore::CCLayerTreeHostImpl::drawLayers
1352 *!WebCore::CCSingleThreadProxy::doComposite
1353
1354 UNINITIALIZED READ
1355 name=bug_122245a
1356 ...
1357 *!SkScalerContext::internalGetPath
1358 *!SkScalerContext::getMetrics
1359 *!SkGlyphCache::lookupMetrics
1360
1361 UNINITIALIZED READ
1362 name=bug_122245b
1363 ...
1364 *!SkRect::roundOut
1365 *!SkScalerContext::getMetrics
1366 *!SkGlyphCache::lookupMetrics
1367 *!SkGlyphCache::getGlyphIDMetrics
1368 *!sk_getMetrics_glyph_00
1369 *!SkDraw::drawPosText
1370 *!SkDevice::drawPosText
1371 *!SkGpuDevice::drawPosText
1372 *!SkCanvas::drawPosText
1373 *!WebCore::Font::drawGlyphs
1374 *!WebCore::Font::drawGlyphBuffer
1375 *!WebCore::Font::drawSimpleText
1376 *!WebCore::Font::drawText
1377 *!WebCore::GraphicsContext::drawBidiText
1378 *!WebCore::CanvasRenderingContext2D::drawTextInternal
1379 *!WebCore::CanvasRenderingContext2D::strokeText
1380 *!WebCore::CanvasRenderingContext2DInternal::strokeTextCallback
1381 *!v8::internal::HandleApiCallHelper<>
1382 *!v8::internal::Builtin_HandleApiCall
1383
1384 UNINITIALIZED READ
1385 name=bug_138058
1386 ...
1387 *!WebCore::WebVTTParser::constructTreeFromToken
1388 *!WebCore::WebVTTParser::createDocumentFragmentFromCueText
1389 *!WebCore::TextTrackCue::getCueAsHTML
1390 *!WebCore::TextTrackCue::updateDisplayTree
1391 *!WebCore::HTMLMediaElement::updateActiveTextTrackCues
1392
1393 UNINITIALIZED READ
1394 name=bug_138220_a
1395 *!WebCore::HTMLInputElement::dataList
1396 *!WebCore::HTMLInputElement::list
1397 *!WebCore::RenderSliderContainer::layout
1398 *!WebCore::RenderBlock::layoutBlockChild
1399 *!WebCore::RenderBlock::layoutBlockChildren
1400 *!WebCore::RenderBlock::layoutBlock
1401 *!WebCore::RenderBlock::layout
1402 *!WebCore::RenderSlider::layout
1403
1404 UNINITIALIZED READ
1405 name=bug_138220_b
1406 *!WebCore::HTMLInputElement::dataList
1407 *!WebCore::HTMLInputElement::list
1408 *!WebCore::RenderTheme::paintSliderTicks
1409 *!WebCore::RenderThemeChromiumLinux::paintSliderTrack
1410 *!WebCore::RenderTheme::paint
1411 *!WebCore::RenderBox::paintBoxDecorations
1412 *!WebCore::RenderBlock::paintObject
1413
1414 UNINITIALIZED READ
1415 name=bug_139467
1416 *!WebCore::AccessibilityTable::roleValue
1417 *!WebCore::AccessibilityRenderObject::ariaLiveRegionStatus
1418 *!WebCore::AccessibilityObject::supportsARIALiveRegion
1419 *!WebCore::AccessibilityObject::supportsARIAAttributes
1420 *!WebCore::AccessibilityRenderObject::determineAccessibilityRole
1421 *!WebCore::AccessibilityNodeObject::init
1422 *!WebCore::AccessibilityRenderObject::init
1423 *!WebCore::AccessibilityTable::init
1424
1425 UNINITIALIZED READ
1426 name=bug_140196
1427 *!SkDescriptor::equals
1428 *!SkGlyphCache::VisitCache
1429 ...
1430 *!SkPaint::descriptorProc
1431
1432 UNINITIALIZED READ
1433 name=bug_143545
1434 *!aura::RootWindow::ShowCursor
1435 *!ash::Shell::ShowCursor
1436 *!ash::CursorManager::ShowCursor
1437 *!ash::test::AshTestBase::SetUp
1438
1439 UNINITIALIZED READ
1440 name=bug_145244
1441 *!WebCore::StyleRuleImport::requestStyleSheet
1442 *!WebCore::StyleSheetContents::requestImportedStyleSheets
1443
1444 UNINITIALIZED READ
1445 name=bug_158510
1446 *!WebCore::RenderTable::layout
1447 ...
1448 *!WebCore::RenderBlock::layout
1449
1450 UNINITIALIZED READ
1451 name=bug_159005
1452 *!WebCore::RenderMarquee::updateMarqueeStyle
1453 *!WebCore::RenderLayer::styleChanged
1454 *!WebCore::RenderLayerModelObject::styleDidChange
1455 *!WebCore::RenderBox::styleDidChange
1456 *!WebCore::RenderBlock::styleDidChange
1457 *!WebCore::RenderObject::setStyle
1458
1459 UNINITIALIZED READ
1460 name=bug_162825
1461 *!bcmp
1462 *!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator<
1463 *!std::less<>::operator
1464 ...
1465 *!std::map<>::find
1466 ...
1467 *!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
1468
1469 UNINITIALIZED READ
1470 name=bug_164198
1471 *!WebCore::RenderBox::paintFillLayers
1472 ...
1473 *!WebCore::RenderBlock::paintObject
1474 *!WebCore::RenderBlock::paint
1475 *!WebCore::RenderLayer::paintLayerContents
1476 *!WebCore::RenderLayer::paintLayerContentsAndReflection
1477 *!WebCore::RenderLayer::paintLayer
1478 *!WebCore::RenderLayer::paintList
1479 *!WebCore::RenderLayer::paintLayerContents
1480 *!WebCore::RenderLayer::paintLayerContentsAndReflection
1481 *!WebCore::RenderLayer::paintLayer
1482
1483 UNINITIALIZED READ
1484 name=bug_170340
1485 *!WTF::AtomicString::add
1486 *!WTF::AtomicString::AtomicString
1487 *!WebCore::HTMLPreloadScanner::processToken
1488 *!WebCore::HTMLPreloadScanner::scan
1489 *!WebCore::HTMLDocumentParser::pumpTokenizer
1490 *!WebCore::HTMLDocumentParser::pumpTokenizerIfPossible
1491 *!WebCore::HTMLDocumentParser::append
1492 *!WebCore::DecodedDataDocumentParser::flush
1493 *!WebCore::DocumentWriter::end
1494 *!WebCore::DocumentLoader::finishedLoading
1495
1496 UNINITIALIZED READ
1497 name=bug_172025
1498 *!WebViewHost::didCreateDataSource
1499 *!blink::FrameLoaderClientImpl::createDocumentLoader
1500 *!WebCore::FrameLoader::init
1501 *!WebCore::Frame::init
1502 *!blink::WebFrameImpl::initializeAsMainFrame
1503 *!blink::WebViewImpl::initializeMainFrame
1504 *!TestShell::createNewWindow
1505 *!TestShell::createMainWindow
1506 *!TestShell::initialize
1507
1508 UNINITIALIZED READ
1509 name=bug_173096
1510 *!bcmp
1511 *!cc::LayerTreeDebugState::equal
1512 *!cc::LayerTreeHost::setDebugState
1513 *!blink::WebLayerTreeViewImpl*_Zset*
1514 *!blink::WebViewImpl::setIsAcceleratedCompositingActive
1515 *!blink::WebViewImpl::setRootGraphicsLayer
1516 *!blink::ChromeClientImpl::attachRootGraphicsLayer
1517 *!WebCore::RenderLayerCompositor::attachRootLayer
1518 *!WebCore::RenderLayerCompositor::ensureRootLayer
1519 *!WebCore::RenderLayerCompositor::enableCompositingMode
1520 *!WebCore::RenderLayerCompositor::updateBacking
1521 *!WebCore::RenderLayerCompositor::updateLayerCompositingState
1522 *!WebCore::RenderLayer::styleChanged
1523 *!WebCore::RenderLayerModelObject::styleDidChange
1524 *!WebCore::RenderBox::styleDidChange
1525
1526 UNINITIALIZED READ
1527 name=bug_175985
1528 *!cc::LayerTreeHost::setDebugState
1529 ...
1530 *!blink::WebLayerTreeViewImpl*
1531
1532 UNINITIALIZED READ
1533 name=bug_176270
1534 *!cc::LayerTreeDebugState::recordRenderingStats
1535
1536 UNINITIALIZED READ
1537 name=bug_176616_a
1538 *!WebTestRunner::WebTestProxyBase::didCreateDataSource
1539 *!WebTestRunner::WebTestProxy<>::didCreateDataSource
1540 *!blink::FrameLoaderClientImpl::createDocumentLoader
1541 *!WebCore::FrameLoader::init
1542 *!WebCore::Frame::init
1543 *!blink::WebFrameImpl::initializeAsMainFrame
1544 *!blink::WebViewImpl::initializeMainFrame
1545 *!TestShell::createNewWindow
1546 *!TestShell::createMainWindow
1547 *!TestShell::initialize
1548
1549 UNINITIALIZED READ
1550 name=bug_176616_b
1551 *!WebTestRunner::TestRunner::reset
1552 *!WebTestRunner::TestInterfaces::resetAll
1553 *!WebTestRunner::WebTestInterfaces::resetAll
1554 *!TestShell::resetTestController
1555 *!runTest
1556
1557 UNINITIALIZED READ
1558 name=bug_222883
1559 *!v8::internal::ScavengeVisitor::ScavengePointer
1560 *!v8::internal::ScavengeVisitor::VisitPointers
1561 *!v8::internal::StandardFrame::IterateExpressions
1562 ...
1563 *!v8::internal::Heap::Scavenge
1564 *!v8::internal::Heap::PerformGarbageCollection*
1565
1566 UNINITIALIZED READ
1567 name=bug_227278a
1568 ...
1569 *!content::CompositingIOSurfaceTransformerTest::RunResizeTest
1570 *!content::CompositingIOSurfaceTransformerTest_ResizesTexturesCorrectly_Test::TestBody
1571
1572 UNINITIALIZED READ
1573 name=bug_227278b
1574 ...
1575 *!content::CompositingIOSurfaceTransformerTest::RunTransformRGBToYV12Test
1576 *!content::CompositingIOSurfaceTransformerTest_TransformsRGBToYV12_Test::TestBody
1577
1578 UNINITIALIZED READ
1579 name=bug_227278c
1580 *!BitSetNextSetBit
1581 *!RegistersReInterfere
1582 *!RegistersMerge
1583 *!glpPPShaderLinearizeStreamMgr
1584 *!glpPPShaderLinearize
1585 *!glePrepareShaderForEmulation
1586 *!gleSetVPTransformFuncAll
1587 *!gleVPRenderQuadsSmooth
1588 *!gleDrawArraysOrElements_ExecCore
1589 *!glDrawArrays_Exec
1590 *!glDrawArrays
1591 *!content::::DrawQuad
1592 *!content::CompositingIOSurfaceTransformer::ResizeBilinear
1593 *!content::CompositingIOSurfaceTransformerTest::RunResizeTest
1594 *!content::CompositingIOSurfaceTransformerTest_ResizesTexturesCorrectly_Test::TestBody
1595
1596 UNINITIALIZED READ
1597 name=bug_227278d
1598 *!glViewport_Exec
1599 *!glViewport
1600 *!content::::SetTransformationsForOffScreenRendering
1601 *!content::CompositingIOSurfaceTransformer::TransformRGBToYV12
1602 *!content::CompositingIOSurfaceTransformerTest::RunTransformRGBToYV12Test
1603 *!content::CompositingIOSurfaceTransformerTest_TransformsRGBToYV12_Test::TestBody
1604
1605 UNINITIALIZED READ
1606 name=bug_238170a
1607 *!WebCore::ElementRuleCollector::collectMatchingRules
1608 *!WebCore::ElementRuleCollector::hasAnyMatchingRules
1609
1610 UNINITIALIZED READ
1611 name=bug_238170b
1612 *!WebCore::ElementRuleCollector::collectMatchingRules
1613 *!WebCore::StyleResolver::matchAuthorRules
1614
1615 UNINITIALIZED READ
1616 name=bug_238170c
1617 *!WebCore::ReplaceSelectionCommand::doApply
1618 *!WebCore::CompositeEditCommand::apply
1619 *!WebCore::applyCommand
1620
1621 UNINITIALIZED READ
1622 name=bug_241044
1623 *!WebCore::Settings::setOpenGLMultisamplingEnabled
1624 *!blink::WebSettingsImpl::setOpenGLMultisamplingEnabled
1625 *!content::ApplyWebPreferences
1626 *!content::RenderViewImpl::OnUpdateWebPreferences
1627 *!content::RenderViewImpl::SetWebkitPreferences
1628
1629 UNINITIALIZED READ
1630 name=bug_246153
1631 *!WebCore::Settings::setOpenGLMultisamplingEnabled
1632 *!blink::WebSettingsImpl::setOpenGLMultisamplingEnabled
1633 *!content::ApplyWebPreferences
1634 ...
1635 *!content::RenderViewImpl::Initialize
1636 *!content::RenderViewImpl::Create*
1637 *!content::RenderThreadImpl::OnCreateNewView
1638
1639 UNINITIALIZED READ
1640 name=bug_259789
1641 *!WebCore::::adjustAttributes
1642 *!WebCore::WebGLRenderingContext::maybeRestoreContext
1643 *!WebCore::Timer<>::fired
1644 *!WebCore::ThreadTimers::sharedTimerFiredInternal
1645 *!WebCore::ThreadTimers::sharedTimerFired
1646 *!webkit_glue::WebKitPlatformSupportImpl::DoTimeout
1647
1648 UNINITIALIZED READ
1649 name=bug_290405
1650 *!GrGradientEffect::onIsEqual
1651 *!GrEffect::isEqual
1652 *!GrEffectStage::DeferredStage::isEqual
1653 *!GrDrawState::DeferredState::isEqual
1654 *!GrInOrderDrawBuffer::needsNewState
1655 *!GrInOrderDrawBuffer::onDraw
1656 *!GrDrawTarget::drawIndexedInstances
1657 *!GrTextContext::flushGlyphs
1658
1659 UNINITIALIZED READ
1660 name=bug_290435
1661 *!WebCore::AudioContext::scheduleNodeDeletion
1662 *!WebCore::AudioContext::handlePostRenderTasks
1663 *!WebCore::AudioDestinationNode::render
1664 *!WebCore::OfflineAudioDestinationNode::offlineRender
1665
1666 UNINITIALIZED READ
1667 name=bug_290451
1668 *!base::MD5DigestToBase16
1669 *!content::WebKitTestRunner::CaptureDump
1670 *!content::WebKitTestRunner::testFinished
1671 *!WebTestRunner::TestRunner::completeNotifyDone
1672 *!WebTestRunner::TestRunner::notifyDone
1673 *!WebTestRunner::CppBoundClass::MemberCallback<>::run
1674 *!WebTestRunner::CppBoundClass::invoke
1675 *!WebTestRunner::CppNPObject::invoke
1676
1677 UNINITIALIZED READ
1678 name=bug_298143
1679 ...
1680 *!WebCore::TypeConversionsV8Internal*AttributeGetter*
1681
1682 UNINITIALIZED READ
1683 name=bug_299804
1684 *!GrConfigConversionEffect::TestForPreservingPMConversions
1685 *!::test_pm_conversions
1686 *!GrContext::createPMToUPMEffect
1687 *!GrContext::readRenderTargetPixels
1688 *!SkGpuDevice::onReadPixels
1689 *!SkBaseDevice::readPixels
1690 *!SkCanvas::readPixels
1691 *!DeferredDevice::onReadPixels
1692 *!SkBaseDevice::readPixels
1693 *!SkCanvas::readPixels
1694 *!WebCore::GraphicsContext::readPixels
1695 *!WTF::PassRefPtr<>
1696 *!WebCore::ImageBuffer::getUnmultipliedImageData
1697 *!WebCore::CanvasRenderingContext2D::getImageData
1698 *!WebCore::CanvasRenderingContext2D::getImageData
1699 *!WebCore::CanvasRenderingContext2DV8Internal::getImageDataMethod
1700 *!WebCore::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback
1701 *!v8::internal::FunctionCallbackArguments::Call
1702 *!v8::internal::HandleApiCallHelper<>
1703
1704 UNINITIALIZED READ
1705 name=bug_309477
1706 *!WebTestRunner::EventSender::reset
1707 *!WebTestRunner::TestInterfaces::resetTestHelperControllers
1708 *!WebTestRunner::TestInterfaces::resetAll
1709 ...
1710 *!content::ShellRenderProcessObserver::WebKitInitialized
1711 *!content::RenderThreadImpl::EnsureWebKitInitialized
1712 *!content::RenderThreadImpl::OnCreateNewView
1713
1714 UNINITIALIZED READ
1715 name=bug_312332
1716 ...
1717 *!WebCore::RenderTextControl::computeIntrinsicLogicalWidths
1718 *!WebCore::RenderTextControl::computePreferredLogicalWidths
1719 ...
1720 *!WebCore::RenderBlock::layout
1721
1722 UNINITIALIZED READ
1723 name=bug_327672
1724 *!WebCore::StyleSheetContents::isCacheable
1725 *!WebCore::LinkStyle::setCSSStyleSheet
1726 *!WebCore::CSSStyleSheetResource::checkNotify
1727 ...
1728 *!webkit_glue::WebURLLoaderImpl::Context::OnCompletedRequest
1729
1730 ###############################################################
1731 # Real issues in Chromium
1732
1733 LEAK
1734 name=http://crbug.com/32085
1735 ...
1736 chrome.dll!NotificationRegistrar::Add
1737
1738 LEAK
1739 name=http://crbug.com/32623
1740 ...
1741 *!ssl3_HandleHandshakeMessage
1742 *!ssl3_HandleHandshake
1743 *!ssl3_HandleRecord
1744 *!ssl3_GatherCompleteHandshake
1745 ...
1746 *!SSL_ForceHandshake
1747 *!net::SSLServerSocketNSS::DoHandshake
1748 *!net::SSLServerSocketNSS::DoHandshakeLoop
1749
1750 UNINITIALIZED READ
1751 name=http://crbug.com/57266 (1)
1752 ...
1753 *!remoting::EncoderVp8::Encode
1754
1755 UNINITIALIZED READ
1756 name=http://crbug.com/57266 (2)
1757 ...
1758 *!vp8_*
1759
1760 LEAK
1761 name=http://crbug.com/70062
1762 *!PR_Calloc
1763 *!PR_NewLock
1764 ...
1765 *!InitSessionCacheLocks
1766 *!initSessionCacheLocksLazily
1767 *!PR_CallOnce
1768 *!ssl_InitSessionCacheLocks
1769 *!lock_cache
1770 *!ssl_LookupSID
1771 *!ssl2_BeginClientHandshake
1772 *!ssl_Do1stHandshake
1773 *!SSL_ForceHandshake
1774 *!net::SSL*SocketNSS::DoHandshake
1775 *!net::SSL*SocketNSS::DoHandshakeLoop
1776
1777 LEAK
1778 name=http://crbug.com/74417 a
1779 *!replace_operator_new
1780 *!disk_cache::BackendImpl::CreateEntryImpl
1781
1782 LEAK
1783 name=http://crbug.com/74417 b
1784 *!replace_operator_new
1785 *!disk_cache::BackendImpl::NewEntry
1786
1787 # One more disk_cache::BackendImpl leak.  See also http://crbug.com/87500.
1788 LEAK
1789 name=http://crbug.com/74417 c
1790 *!replace_operator_new
1791 ...
1792 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
1793
1794 LEAK
1795 name=http://crbug.com/75247
1796 ...
1797 *!replace_operator_new
1798 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
1799
1800 LEAK
1801 name=http://crbug.com/78784
1802 *!generic_cpp_alloc
1803 *!operator new
1804 *!TestingProfile::CreateRequestContext
1805 *!*ProfileSyncService*::SetUp
1806
1807 LEAK
1808 name=http://crbug.com/80550 (1)
1809 ...
1810 *!RenderWidgetHost::WasHidden
1811
1812 LEAK
1813 name=http://crbug.com/80550 (2)
1814 ...
1815 *!RenderWidgetHost::WasRestored
1816
1817 LEAK
1818 name=http://crbug.com/87612
1819 ...
1820 *!SSL_ConfigSecureServer
1821 *!net::SSLServerSocketNSS::InitializeSSLOptions
1822 *!net::SSLServerSocketNSS::Handshake
1823
1824 LEAK
1825 name=http://crbug.com/88640
1826 *!generic_cpp_alloc
1827 *!operator new
1828 *!ProfileImpl::InitRegisteredProtocolHandlers
1829 *!ProfileImpl::DoFinalInit
1830 *!ProfileImpl::OnPrefsLoaded
1831
1832 LEAK
1833 name=http://crbug.com/91465
1834 *!generic_cpp_alloc
1835 *!operator new
1836 *!browser_sync::internal::WeakHandleCore<>::*
1837 *!browser_sync::WeakHandle<>::*
1838 *!syncer::SyncManager::SyncInternal::Init
1839
1840 LEAK
1841 name=http://crbug.com/91491
1842 ...
1843 *!CrxUpdateService::ProcessPendingItems
1844
1845 UNINITIALIZED READ
1846 name=http://crbug.com/92026 (1)
1847 softokn3.dll!FC_GetFunctionList
1848 ...
1849 softokn3.dll!NSC_ModuleDBFunc
1850
1851 UNINITIALIZED READ
1852 name=http://crbug.com/92026 (2)
1853 freebl3.dll!FREEBL_GetVector
1854 ...
1855 softokn3.dll!NSC_ModuleDBFunc
1856
1857 # Possible real Chromium issue in DoCrossfade.
1858 UNINITIALIZED READ
1859 name=http://crbug.com/110049
1860 *!media::DoCrossfade<>
1861 *!media::Crossfade
1862 *!media::AudioRendererAlgorithmBase::FillBuffer
1863
1864 # Known sqlite3 leaks.
1865 LEAK
1866 name=http://crbug.com/113847 (1)
1867 ...
1868 *!sqlite3MemMalloc
1869 *!mallocWithAlarm
1870 *!sqlite3Malloc
1871 ...
1872 *!yy_reduce
1873
1874 LEAK
1875 name=http://crbug.com/113847 (2)
1876 ...
1877 *!openDatabase
1878 *!sqlite3_open
1879
1880 LEAK
1881 name=http://crbug.com/115328
1882 ...
1883 *!GenericInfoViewTest_GenericInfoView_Test::TestBody
1884
1885 LEAK
1886 name=http://crbug.com/117427 a
1887 ...
1888 *!net::HostCache::Set
1889 *!net::HostResolverImpl::CacheResult
1890 *!net::HostResolverImpl::Job::CompleteRequests
1891 *!net::HostResolverImpl::Job::OnProcTaskComplete
1892 *!base::internal::RunnableAdapter<>::Run
1893
1894 # Probably related to 117427.  Someone is not tearing down DNS resolution during
1895 # testing.
1896 LEAK
1897 name=http://crbug.com/117427 b
1898 *!generic_cpp_alloc
1899 *!operator new
1900 *!base::internal::WeakReferenceOwner::GetRef
1901 *!base::SupportsWeakPtr<>::AsWeakPtr
1902 *!net::HostResolverImpl::Job::Job
1903 *!net::HostResolverImpl::Resolve
1904 *!net::SingleRequestHostResolver::Resolve
1905 *!net::TransportConnectJob::DoResolveHost
1906 *!net::TransportConnectJob::DoLoop
1907 *!net::TransportConnectJob::ConnectInternal
1908 *!net::ConnectJob::Connect
1909 *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
1910 *!net::internal::ClientSocketPoolBaseHelper::RequestSocket
1911 *!net::ClientSocketPoolBase<>::RequestSocket
1912 *!net::TransportClientSocketPool::RequestSocket
1913 *!net::ClientSocketHandle::Init<>
1914 *!net::`anonymous namespace'::InitSocketPoolHelper
1915 *!net::InitSocketHandleForRawConnect
1916 *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
1917 *!base::internal::RunnableAdapter<>::Run
1918
1919 # IE frame possible leak of COM object.
1920 LEAK
1921 name=http://crbug.com/122399
1922 ole32.dll!...
1923 ole32.dll!CoTaskMemAlloc
1924 urlmon.dll!...
1925 urlmon.dll!CreateUri
1926 IEFRAME.dll!*
1927
1928 # RenderWidgetHelper leak in DelayProfileDestruction test.
1929 LEAK
1930 name=http://crbug.com/125565
1931 *!generic_cpp_alloc
1932 *!operator new
1933 *!RenderProcessHostImpl::RenderProcessHostImpl
1934 *!SiteInstanceImpl::GetProcess
1935 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
1936
1937 LEAK
1938 name=http://crbug.com/125807
1939 *!generic_cpp_alloc
1940 *!operator new
1941 *!TransportSecurityPersister::TransportSecurityPersister
1942 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest
1943
1944 UNINITIALIZED READ
1945 name=bug_113076
1946 *!media::ConvertYUVToRGB32_C
1947 *!media::LinearScaleYUVToRGB32RowWithRange_C
1948 *!media::ScaleYUVToRGB32WithRect
1949
1950 UNINITIALIZED READ
1951 name=bug_343248
1952 osmesa.dll!LINTERP
1953 osmesa.dll!INTERP_4F
1954 osmesa.dll!_tnl_generic_interp
1955
1956 UNADDRESSABLE ACCESS
1957 name=bug_340752
1958 blink_heap.dll!WebCore::ThreadState::visitStack
1959 blink_heap.dll!WebCore::ThreadState::trace
1960 blink_heap.dll!WebCore::ThreadState::visitRoots
1961
1962 UNINITIALIZED READ
1963 name=bug_343663
1964 blink_web.dll!WebCore::RenderBlock::computeInlinePreferredLogicalWidths
1965
1966 UNINITIALIZED READ
1967 name=bug_343797
1968 ...
1969 blink_web.dll!WebCore::MediaQueryExp::create
1970 blink_web.dll!WebCore::BisonCSSParser::createFloatingMediaQueryExp
1971 blink_web.dll!cssyyparse
1972
1973 UNINITIALIZED READ
1974 name=bug_343915
1975 blink_web.dll!WebCore::BisonCSSParser::parseFlex
1976 blink_web.dll!WebCore::BisonCSSParser::parseValue
1977 blink_web.dll!cssyyparse
1978
1979 UNADDRESSABLE ACCESS
1980 name=BUG_343958
1981 blink_web.dll!WebCore::Node::getFlag
1982 blink_web.dll!WebCore::Node::inDocument
1983 blink_web.dll!WebCore::Node::isDescendantOf
1984 blink_web.dll!WebCore::CompositeEditCommand::cloneParagraphUnderNewElement
1985 blink_web.dll!WebCore::CompositeEditCommand::moveParagraphWithClones
1986
1987 UNINITIALIZED READ
1988 name=BUG_344076
1989 blink_web.dll!WebCore::Editor::canSmartReplaceWithPasteboard
1990 blink_web.dll!WebCore::Editor::pasteAsPlainTextWithPasteboard
1991 blink_web.dll!WebCore::Editor::pasteAsPlainText
1992 blink_web.dll!WebCore::executePasteAndMatchStyle
1993 blink_web.dll!WebCore::Editor::Command::execute
1994 blink_web.dll!WebCore::Document::execCommand
1995
1996 UNINITIALIZED READ
1997 name=BUG_349128
1998 content.dll!std::*
1999 ...
2000 content.dll!content::BrowserAccessibilityManagerWin::*
2001 ...
2002 content.dll!content::BrowserAccessibilityManager::UpdateNode
2003 content.dll!content::BrowserAccessibilityManager::UpdateNodes
2004
2005 UNINITIALIZED READ
2006 name=bug_347976
2007 osmesa.dll!unpack_RGB*888
2008 osmesa.dll!_mesa_unpack_rgba_row
2009 osmesa.dll!slow_read_rgba_pixels
2010 osmesa.dll!read_rgba_pixels
2011 osmesa.dll!_mesa_readpixels
2012 ...
2013 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
2014 gpu.dll!gpu::CommandParser::ProcessCommand
2015 gpu.dll!gpu::GpuScheduler::PutChanged
2016
2017 UNINITIALIZED READ
2018 name=bug_347976,bug_348357
2019 osmesa.dll!clip_span
2020 osmesa.dll!_swrast_write_rgba_span
2021 osmesa.dll!general_triangle
2022 ...
2023 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements
2024 gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements
2025 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
2026 gpu.dll!gpu::CommandParser::ProcessCommand