# This file contains suppressions for the Dr.Memory tool, see # http://dev.chromium.org/developers/how-tos/using-drmemory # # This file should contain suppressions only for the reports happening # in the 'full' mode (drmemory_full). # For the reports that can happen in the light mode (a.k.a. drmemory_light), # please use suppressions.txt instead. ############################################################### # Known reports on the third party we have no control over. UNINITIALIZED READ name=http://crbug.com/116277 ... *!MOZ_Z_deflate # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=406 ADVAPI32.dll!WmiOpenBlock ADVAPI32.dll!WmiOpenBlock # Leaks inside GoogleDesktop - it injects into our processes for some reason LEAK name=GoogleDesktop LEAK ... GoogleDesktopNetwork3.DLL!DllUnregisterServer # They deliberately use uninit local var in sqlite random generator. # Random bytes may mess up the call stack between randomByte and # sqlite3_* frames (http://code.google.com/p/drmemory/issues/detail?id=1514) # so we just look for randomByte. UNINITIALIZED READ name=sqlite3_randomness UNINIT *!randomByte # Intentional leak in WebKit Template Framework for ThreadData. LEAK name=intentional WTF ThreadData leak ... *!WTF::wtfThreadData # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT. LEAK name=http://crbug.com/125558 a KERNELBASE.dll!LocalAlloc SECHOST.dll!... SECHOST.dll!NotifyServiceStatusChange WINHTTP.dll!... WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl *!net::ProxyResolverWinHttp::GetProxyForURL # Tiny locale-related leaks in ntdll. Probably system bug. LEAK name=http://crbug.com/125558 b ntdll.dll!... ntdll.dll!* KERNELBASE.dll!... KERNELBASE.dll!GetCPInfoExW webio.dll!* webio.dll!* webio.dll!* WINHTTP.dll!... WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser *!net::ProxyConfigServiceWin::GetCurrentProxyConfig UNINITIALIZED READ name=http://crbug.com/30704 #f libpng.dll!wk_png_write_find_filter libpng.dll!wk_png_write_row ############################################################### # Suppress some false reports due to bugs in Dr.Memory like wrong analysis # assumptions or unhandled syscalls # Please note: the following suppressions were written in the abscense of # private symbols so may need to be updated when we switch to auto-loading PDBs UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (1) ntdll.dll!Rtl* ntdll.dll!Rtl* ntdll.dll!RtlFindActivationContextSectionString UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (2) ... SHELL32.dll!SHFileOperation* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (3) ... SHELL32.dll!SHGetFolderPath* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=12 (4) ... SHELL32.dll!SHGetFolderPath* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (5) ... SHELL32.dll!SHCreateDirectory* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (6) ... SHELL32.dll!ILLoadFromStream* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (7) ... SHELL32.dll!ILSaveToStream* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=12 (8) ... SHELL32.dll!SHFileOperation* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (9) ... SHELL32.dll!SHGetItemFromDataObject LEAK name=http://code.google.com/p/drmemory/issues/detail?id=12 (10) ... SHELL32.dll!SHGetItemFromDataObject LEAK name=http://code.google.com/p/drmemory/issues/detail?id=12 (11) ... ole32.dll!* SHELL32.dll!SHChangeNotifySuspendResume UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=14 (1) ... *!CreateProcess* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=14 (2) ... *!CreateProcess* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=14 (3) ... *!base::LaunchApp* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=17 (1) ... *!CreateWindow* POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=17 (2) GDI32.dll!* GDI32.dll!CreateFontIndirectExW GDI32.dll!CreateFontIndirectW LEAK name=http://code.google.com/p/drmemory/issues/detail?id=17 (3) KERNELBASE.dll!LocalAlloc ... USER32.dll!CreateWindow* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=18 a ... *!CoInitialize* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=18 b ... *!CoCreateInstance* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=18 c ... *!CoUninitialize* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=18 d ... UxTheme.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=40 a ... WINSPOOL.DRV!* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=40 b ... WINSPOOL.DRV!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=48 a system call NtContinue ... *!*SetThreadName UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=48 b system call NtContinue *!WTF::initializeCurrentThreadInternal UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=52 a ... DBGHELP.dll!SymInitialize UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=52 b ... DBGHELP.dll!SymEnumSourceFiles UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=52 c ... msvcrt.dll!_RTDynamicCast UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp instruction=test 0x*(%*) $0x?? DBGHELP.dll!SymUnloadModule64 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=53 ADVAPI32.dll!WmiMofEnumerateResourcesA ADVAPI32.dll!WmiMofEnumerateResourcesA ADVAPI32.dll!Sta*TraceW UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=58 ... *!_cfltcvt_l UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=60 USP10.dll!* ... USP10.dll!ScriptStringAnalyse LEAK IMM32.dll!ImmGetIMCCSize IMM32.dll!ImmLockClientImc IMM32.dll!ImmDisableIME IMM32.dll!ImmSetActiveContext USER32.dll!IMPSetIMEA UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=65 a ... *!SystemFunction036 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=65 b ... *!talk_base::CreateRandomString UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=68 a ... WS2_32.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=68 b ... ADVAPI32.dll!SetSecurityDescriptorDacl UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=68 c ... MSWSOCK.dll!WSPStartup UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=68 d ... ntdll.dll!RtlValidateUnicodeString LEAK name=http://code.google.com/p/drmemory/issues/detail?id=256 *!_mtinit *!__tmainCRTStartup *!mainCRTStartup POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=274 a ... GDI32.dll!CreateDCW LEAK name=http://code.google.com/p/drmemory/issues/detail?id=274 b ... GDI32.dll!CreateDCW LEAK name=http://code.google.com/p/drmemory/issues/detail?id=275 ... *!_getptd* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=276 ... ntdll.dll!RtlConvertUlongToLargeInteger ntdll.dll!RtlConvertUlongToLargeInteger ntdll.dll!KiUserExceptionDispatcher LEAK name=http://code.google.com/p/drmemory/issues/detail?id=305 *!free *!free *!operator new ... *!MiniDumpWriteDump UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=346 a ... GDI32.dll!CloseEnhMetaFile UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=346 b GDI32.dll!SetPolyFillMode GDI32.dll!CreateICW UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=362 USER32.dll!UnregisterClass* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=382 ... ntdll.dll!CsrNewThread UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=397 system call NtDeviceIoControlFile InputBuffer ADVAPI32.dll!ImpersonateAnonymousToken UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=407 a system call NtRequestWaitReplyPort RPCRT4.dll!I_RpcSendReceive RPCRT4.dll!NdrSendReceive UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=407 b IMM32.dll!* ntdll.dll!LdrInitializeThunk ntdll.dll!LdrShutdownThread UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 a ADVAPI32.dll!RegDeleteValue* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 b ... ADVAPI32.dll!Crypt* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 c ... RPCRT4.dll!NdrClientCall2 LEAK name=http://code.google.com/p/drmemory/issues/detail?id=412 d RSAENH.dll!DllUnregisterServer ... ADVAPI32.dll!CryptAcquireContextA CRYPT32.dll!CryptEnumOIDFunction ... CRYPT32.dll!CertFindCertificateInStore UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 e ... RSAENH.dll!CPGenRandom UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 f ... CRYPT??.dll!Crypt* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 g *!replace_memcmp ... *!testing::internal::CmpHelperEQ* ... *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't # have frame pointers, and we have trouble unwinding from it. Therefore, we use # this broad suppression, effectively disabling uninit checks in rsaenh.dll. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 h RSAENH.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=425 a CLBCatQ.DLL!DestroyStgDatabase CLBCatQ.DLL!PostError CLBCatQ.DLL!PostError LEAK name=http://code.google.com/p/drmemory/issues/detail?id=425 b RPCRT4.dll!I_RpcBCacheFree RPCRT4.dll!I_RpcBCacheFree ... RPCRT4.dll!NdrClientCall2 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=425 c msdmo.dll!* msdmo.dll!* DEVENUM.DLL!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=435 a ... ntdll.dll!RtlSetSecurityObject ntdll.dll!RtlNewSecurityObjectEx ADVAPI32.dll!CreatePrivateObjectSecurityEx NTMARTA.dll!AccRewriteSetNamedRights POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=435 b WLDAP32.dll!Ordinal325 ... WLDAP32.dll!Ordinal325 ntdll.dll!LdrInitializeThunk ntdll.dll!LdrFindResourceDirectory_U ntdll.dll!RtlValidateUnicodeString ntdll.dll!LdrLoadDll KERNEL32.dll!LoadLibraryExW # mod+offs suppression because the symbolic makes no sense and changes # completely in the presence of WS2_32.dll symbols. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=438 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=454 a ... WINMM.dll!wave*GetNumDevs LEAK name=http://code.google.com/p/drmemory/issues/detail?id=454 b ... WINMM.dll!wave*GetNumDevs LEAK name=http://code.google.com/p/drmemory/issues/detail?id=466 ntdll.dll!RtlRunOnceBeginInitialize ntdll.dll!RtlInitializeCriticalSectionAndSpinCount UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=473 a system call NtDeviceIoControlFile InputBuffer ... iphlpapi.dll!GetAdaptersAddresses POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=473 b ESENT.dll!* ESENT.dll!* ESENT.dll!* ntdll.dll!Ldr*Init* ntdll.dll!Ldr* ntdll.dll!* ntdll.dll!LdrLoadDll ... iphlpapi.dll!GetPerAdapterInfo ... iphlpapi.dll!GetAdaptersAddresses POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=473 c RPCRT4.dll!* RPCRT4.dll!* ... IPHLPAPI.DLL!GetAdaptersAddresses LEAK name=http://code.google.com/p/drmemory/issues/detail?id=475 ... ADVAPI32.dll!CryptAcquireContextA ... CRYPT32.dll!CryptMsgOpenToDecode ... CRYPT32.dll!CryptQueryObject # Lots of leaks from our interactions with the system certificate store. May be # worth reviewing our use of their API. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 a KERNEL*.dll!LocalAlloc ... CRYPT32.dll!CertGetCRLContextProperty LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 b KERNEL*.dll!LocalAlloc ... CRYPT32.dll!CertAddCRLContextToStore LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 c KERNEL*.dll!LocalAlloc ... CRYPT32.dll!CertOpenStore LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 d ... CRYPT32.dll!CertOpenSystemStore? LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 e ... CRYPT32.dll!CertGetCertificateChain LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 f ... CRYPT32.dll!CertCompareIntegerBlob LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 g ... CRYPT32.dll!CryptUnprotectData LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 h KERNEL*.dll!LocalAlloc ... CRYPT32.dll!CertEnumCertificatesInStore LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 i ... CRYPT32.dll!CryptProtectData LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 j ... CRYPT32.dll!CryptExportPublicKeyInfoEx UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=502 a system call NtSecureConnectPort parameter #3 GDI32.dll!* GDI32.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=502 b system call NtGdiEnumFonts parameter #6 GDI32.dll!* GDI32.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=511 a RPCRT4.dll!... ole32.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=511 b ole32.dll!* ole32.dll!* ole32.dll!StringFromGUID2 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=512 a ... *!browser_sync::Cryptographer::PackBootstrapToken *!browser_sync::Cryptographer::GetBootstrapToken UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=512 b ... *!Encrypt* # TODO(bruening): remove these once we have v8 bitfields handled UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=513 a *!v8* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=513 b *!* *!v8* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=513 c ... *!v8* # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll # has no symbols. These are all on the bots using component build, so we use # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=513 d v8.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=513 e ... v8.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=546 ... mscms.dll!* ... GDI32.dll!* *!IconUtil::Create*HICON* LEAK name=http://crbug.com/92152 ... USER32.dll!CreateWindowExW *!views::TooltipManagerWin::Init *!views::TooltipManagerWin::TooltipManagerWin UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=567 a dbghelp.dll!* ... dbghelp.dll!StackWalk64 LEAK name=http://code.google.com/p/drmemory/issues/detail?id=567 b *!* dbghelp.dll!* ... dbghelp.dll!StackWalk64 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too # brittle, so we switched to RPCRT4.dll!*. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=569 RPCRT4.dll!... ntdll.dll!* ntdll.dll!* KERNEL*.dll!BaseThreadInitThunk # TODO(timurrrr): investigate these UNINITIALIZED READ name=http://crbug.com/TODO a ... *!win_util::GetLogonSessionOnlyDACL UNINITIALIZED READ name=http://crbug.com/TODO b ... ntshrui.dll!IsPathSharedW UNINITIALIZED READ name=http://crbug.com/TODO c ... *!NetApiBufferFree UNINITIALIZED READ name=http://crbug.com/TODO d ... *!ShellExecute* UNINITIALIZED READ name=http://crbug.com/TODO e ... *!SHParseDisplayName UNINITIALIZED READ name=http://crbug.com/TODO f ... *!GetCanonicalPathInfo* UNINITIALIZED READ name=http://crbug.com/TODO g ... SHELL32.dll!Ordinal* UNINITIALIZED READ name=http://crbug.com/TODO h ... GDI32.dll!GetTextExtentPoint32* UNINITIALIZED READ name=http://crbug.com/TODO i ... *!SyncSocketClientListener::OnMsgClassResponse UNINITIALIZED READ name=http://crbug.com/TODO j ... *!*NSPRInitSingleton* UNINITIALIZED READ name=http://crbug.com/TODO k *!NdrSimpleStructFree UNINITIALIZED READ name=http://crbug.com/TODO l ntdll.dll!RtlpNtOpenKey ntdll.dll!RtlMakeSelfRelativeSD ntdll.dll!RtlAbsoluteToSelfRelativeSD ADVAPI32.dll!MakeSelfRelativeSD UNINITIALIZED READ name=http://crbug.com/TODO m ... CRYPT32.dll!I_CertSyncStore # This matches the same stack as DrMem i#751, but it's an uninit read instead of # a leak. Must be some early thread initialization. Doesn't look like # bit-level though. UNINITIALIZED READ name=http://crbug.com/TODO n RPCRT4.dll!* RPCRT4.dll!* RPCRT4.dll!* ntdll.dll!* ntdll.dll!* KERNEL*.dll!BaseThreadInitThunk # No idea where this is from, but Chrome isn't even on the stack. POSSIBLE LEAK name=http://crbug.com/TODO o RPCRT4.dll!... ole32.dll!OleInitialize ole32.dll!... KERNEL32.dll!BaseThreadInitThunk # Matches lots of RPC related leaks. So far RPC handles have been mostly owned # by system libraries and are not something we can fix easily. POSSIBLE LEAK name=http://crbug.com/TODO p RPCRT4.dll!* RPCRT4.dll!* RPCRT4.dll!NDRCContextBinding # No idea, but all system code, not interesting. POSSIBLE LEAK name=http://crbug.com/TODO q RPCRT4.dll!... RPCRT4.dll!* RPCRT4.dll!* ole32.dll!... ole32.dll!* ole32.dll!* ... SHELL32.dll!* LEAK name=http://crbug.com/109278 video device COM leaks ... *!media::VideoCaptureDevice::* LEAK name=http://crbug.com/109278 audio device COM leaks ... *!media::GetInputDeviceNamesWin # False pos uninit in shell32 when resolving links. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=745 SHELL*.dll!* ... SHELL*.dll!* *!file_util::ResolveShortcut # Probable false pos uninit in ffmpeg. Probably due to running off the end of a # buffer with SSE/MMX instructions whose results are then masked out later. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 a *!ff_pred4x4_vertical_vp8_mmxext UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 b *!ff_pred4x4_down_left_mmxext UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 c *!ff_vorbis_floor1_render_list UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 d *!ff_put_vp8_epel8_h6_ssse3 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 e *!ff_put_vp8_epel8_h4_ssse3 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 f *!ff_fft_permute_sse UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 g *!ff_simple_idct_add_mmx # ffmpeg seems to leak a pthread condition variable. LEAK name=http://crbug.com/110042 *!ptw32_new *!pthread_self *!sem_wait *!pthread_cond_wait *!ff_thread_decode_frame *!avcodec_decode_video2 # Improperly handled ioctl in bcrypt. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=748 system call NtDeviceIoControlFile InputBuffer ... bcrypt.dll!BCryptUnregisterConfigChangeNotify bcrypt.dll!BCryptGetFipsAlgorithmMode ntdll.dll!RtlQueryEnvironmentVariable # Not sure what this is. POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=749 ... fwpuclnt.dll!* ... RPCRT4.dll!* ... fwpuclnt.dll!* ... WS2_32.dll!* *!talk_base::SafeGetHostByName *!talk_base::SocketAddress::GetLocalIPs *!talk_base::SocketAddress::IsLocalIP *!cricket::Transport::VerifyCandidate *!cricket::Session::OnRemoteCandidates *!cricket::Session::OnTransportInfoMessage *!cricket::Session::OnIncomingMessage *!cricket::SessionManager::OnIncomingMessage # More uninit false pos in rpcrt4.dll not caught by default suppressions. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=529 RPCRT4.dll!* ... *!base::LaunchProcess # System leak from CreateEnvironmentBlock. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=757 ... USERENV.dll!CreateEnvironmentBlock # Looks like another instance of 753 LEAK name=http://code.google.com/p/drmemory/issues/detail?id=753 ... ntdll.dll!RtlLoadString # More bit manip fps UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=493 USP10.dll!ScriptPositionSingleGlyph # Various TLS leaks that we don't understand yet. We should be finding a root # for these. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=778 a KERNELBASE.dll!TlsSetValue # Originally filed as: http://crbug.com/109281 LEAK name=http://code.google.com/p/drmemory/issues/detail?id=778 b *!operator new *!operator new[] *!*::ConstructTlsVector *!base::ThreadLocalStorage::StaticSlot::Get # This is an NSS PRThread object installed in TLS. Why isn't this detected as a # root? See also http://crbug.com/32624 LEAK name=http://code.google.com/p/drmemory/issues/detail?id=778 c *!PR_Calloc *!_PR_AttachThread *!_PRI_AttachThread # Bit-level fps in rich edit layer. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=791 RICHED20.dll!* RICHED20.dll!* # Already suppressed by drmemory default supp we don't have yet. LEAK name=i#757: RPC binding leaks in sspicli.dll RPCRT4.dll!* ... SspiCli.dll!* SspiCli.dll!Cre* # Async NtReadFile false positives. This was fixed in drmemory r772, remove # this supp when we pull that rev. UNADDRESSABLE ACCESS name=http://code.google.com/p/drmemory/issues/detail?id=798 system call NtReadFile parameter #5 KERNEL32.dll!ReadFile # Probable syscall false positive. UNADDRESSABLE ACCESS name=http://code.google.com/p/drmemory/issues/detail?id=809 system call NtGdiPolyPolyDraw parameter #1 *!gfx::Path::CreateNativeRegion # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces # coming out of this module (sometimes only one frame), which makes it hard to # write precise suppressions. Until we have bit-level tracking (DRMi#113) we # should keep this. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard RPCRT4.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=841 a ... CRYPTNET.dll!I_CryptNetGetConnectivity UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=841 b ... webio.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=841 c ... winhttp.dll!* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=841 d ... CRYPTNET.dll!I_CryptNetGetConnectivity # Often missing a ntdll.dll!KiUserCallbackDispatcher frame. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=810 instruction=test %edx %edx USER32.dll!GetClassLongW ... *!ui::CenterAndSizeWindow UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=815 KERNEL*.dll!... dxgi.dll!* USER32.dll!GetMonitorInfoA ntdll.dll!KiUserCallbackDispatcher dxgi.dll!* WinSATAPI.DLL!* # Suppress anything in cmd.exe. It's safer to suppress these than disable # following, since someone might launch a Chrome process via cmd.exe. LEAK name=cmd.exe ... cmd.exe!* # Possible true system use after free. UNADDRESSABLE ACCESS name=http://code.google.com/p/drmemory/issues/detail?id=623 KERNELBASE.dll!TlsGetValue OLEAUT32.dll!SysFreeString OLEAUT32.dll!SysAllocStringByteLen OLEACC.dll!* OLEACC.dll!* OLEACC.dll!* OLEACC.dll!* # basic_streambuf seems to leak something in creating a std::_Mutex LEAK name=http://code.google.com/p/drmemory/issues/detail?id=857 ntdll.dll!... ntdll.dll!RtlInitializeCriticalSection *!_Mtxinit *!std::_Mutex::_Mutex *!std::basic_streambuf<> # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. LEAK name=GDI SetBrushOrgEx leak GDI32.dll!... GDI32.dll!GetTextMetricsW *!gfx::PlatformFontWin::CreateHFontRef *!gfx::PlatformFontWin::GetBaseFontRef ############################################################### # Benign issues in Chromium # This test intentionally leaks an object and checks that it's never deleted. LEAK name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak ... *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody LEAK name=deliberate histogram leak ... *!replace_operator_new ... *!*::*Histogram::FactoryGet LEAK name=deliberate leak for SampleMap ... *!base::SampleMap::Accumulate *!base::SparseHistogram::Add LEAK name=deliberate LazyInstance leak ... *!*LeakyLazyInstance* ... *!base::LazyInstance*::Pointer LEAK name=http://crbug.com/79933 (1) ... *!TestURLRequestContext::Init LEAK name=http://crbug.com/79933 (2) ... *!TestURLRequestContext::TestURLRequestContext *!TestURLRequestContextGetter::GetURLRequestContext *!notifier::SingleLoginAttempt::SingleLoginAttempt *!notifier::Login::StartConnection *!syncer::InvalidationNotifier::UpdateCredentials *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials LEAK name=http://crbug.com/79933 (3) ... *!TestURLRequestContext::TestURLRequestContext *!TestURLRequestContextGetter::GetURLRequestContext *!URLFetcher::Core::StartURLRequest LEAK name=http://crbug.com/79933 (4) *!generic_cpp_alloc *!operator new *!std::_Allocate<> *!std::allocator<>::allocate *!std::vector<>::_Insert_n *!std::vector<>::insert *!std::vector<>::push_back *!ObserverListBase<>::AddObserver ... *!net::HttpNetworkSession::HttpNetworkSession *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket *!notifier::XmppClientSocketFactory::CreateTransportClientSocket *!notifier::ChromeAsyncSocket::Connect *!buzz::XmppClient::ProcessStartXmppLogin *!buzz::XmppClient::Process *!talk_base::Task::Step *!talk_base::TaskRunner::InternalRunTasks *!talk_base::TaskRunner::RunTasks *!notifier::TaskPump::CheckAndRunTasks *!base::internal::RunnableAdapter<>::Run # Test intentionally leaks an object. LEAK name=http://crbug.com/86301 *!replace_operator_new ... *!*_DeadReplyLoopDoesNotDelete_Test::TestBody # Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it. LEAK name=Firefox 3 NSS dll leak nspr4.dll!* ... *!NSSDecryptor::~NSSDecryptor # We get uninit reports inside GMock when it prints the bytes of references to # partially initialized objects passed to unexpected method calls. UNINITIALIZED READ name=http://crbug.com/64887 (GMock printing uninit data) ... *!testing::*::PrintBytesInObjectTo* ############################################################### # Proactively borrowed from memcheck/suppressions.txt. # We have not yet seen these, but we are expanding the sets of tests # we're running, and we've hit redness in the past that could have # been avoided by already having the Memcheck suppressions. # TODO(bruening): review the entire file (not just these) once we're # at the peak set of tests we plan to run and remove the unused ones. UNINITIALIZED READ name=bug_87232 *!blink::base64Encode *!blink::base64Encode *!blink::ImageToDataURL<> UNINITIALIZED READ name=bug_75127 ... *!png_process_data *!gfx::PNGCodec::Decode* UNINITIALIZED READ name=bug_99307 *!modp_b64_encode *!base::Base64Encode* *!web_ui_util::GetImageDataUrl *!::NetworkInfoDictionary::set_icon UNINITIALIZED READ name=bug_101125a ... *!SkScan::AntiFillPath *!SkScan::AntiFillPath *!SkDraw::drawPath *!SkDevice::drawPath *!SkDraw::drawTextOnPath *!SkDevice::drawTextOnPath *!SkCanvas::drawTextOnPath *!blink::Font::drawGlyphs *!blink::Font::drawGlyphBuffer UNINITIALIZED READ name=bug_101125b ... *!SkScan::AntiFillRect *!SkScan::AntiFillRect *!SkDraw::drawRect *!SkDevice::drawRect *!SkCanvas::drawRect *!blink::GraphicsContext::fillRect *!blink::GraphicsContext::drawHighlightForText UNINITIALIZED READ name=bug_101125c ... *!morphpoints *!morphpath *!SkDraw::drawTextOnPath *!SkDevice::drawTextOnPath *!SkCanvas::drawTextOnPath *!blink::Font::drawGlyphs *!blink::Font::drawGlyphBuffer *!blink::Font::drawSimpleText *!blink::Font::drawText *!blink::GraphicsContext::drawText UNINITIALIZED READ name=bug_101781 *!encode_one_block *!encode_mcu_huff *!compress_data *!process_data_simple_main *!chromium_jpeg_write_scanlines *!gfx::JPEGCodec::Encode *!gfx::JPEGEncodedDataFromImage *!history::TopSites::EncodeBitmap *!history::TopSites::SetPageThumbnail *!history::ExpireHistoryTest::AddExampleData *!history::ExpireHistoryTest::* UNINITIALIZED READ name=bug_101781_d *!testing::AssertionResult testing::internal::CmpHelperGE<> *!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody UNINITIALIZED READ name=bug_105907 ... *!skia::BGRAConvolve2D *!skia::ImageOperations::ResizeBasic* *!skia::ImageOperations::Resize* UNINITIALIZED READ name=bug_106183a *!blink::RenderMarquee::updateMarqueeStyle *!blink::RenderLayer::styleChanged *!blink::RenderBoxModelObject::styleDidChange *!blink::RenderBox::styleDidChange *!blink::RenderBlock::styleDidChange *!blink::RenderObject::setStyle UNINITIALIZED READ name=bug_106183b *!blink::ComplexTextController* ... *!blink::Font::selectionRectForComplexText *!blink::Font::selectionRectForText *!blink::InlineTextBox::positionForOffset *!blink::RenderText::localCaretRect *!blink::VisiblePosition::localCaretRect *!blink::CaretBase::updateCaretRect *!blink::FrameSelection::localCaretRect *!blink::FrameSelection::recomputeCaretRect *!blink::FrameSelection::updateAppearance UNINITIALIZED READ name=bug_106183c *!blink::ComplexTextController* ... *!blink::Font::drawComplexText *!blink::Font::drawText *!blink::GraphicsContext::drawText *!blink::paintTextWithShadows ... *!blink::RenderLineBoxList::paint *!blink::RenderBlock::paintContents *!blink::RenderBlock::paintObject *!blink::RenderBlock::paint UNINITIALIZED READ name=bug_106552 ... *!JSONStringValueSerializer::SerializeInternal *!JSONStringValueSerializer::Serialize *!JsonPrefStore::SerializeData *!ImportantFileWriter::DoScheduledWrite *!JsonPrefStore::CommitPendingWrite *!JsonPrefStore::~JsonPrefStore *!base::RefCounted<>::Release *!scoped_refptr<>::operator= *!PrefService::~PrefService *!scoped_ptr<>::~scoped_ptr *!TestingProfile::~TestingProfile *!ExtensionTestingProfile::~ExtensionTestingProfile UNINITIALIZED READ name=bug_108147 ... *!SkDraw::drawPosText *!SkDevice::drawPosText *!SkCanvas::drawPosText *!blink::Font::drawGlyphs *!blink::Font::drawGlyphBuffer *!blink::Font::drawSimpleText *!blink::Font::drawText UNINITIALIZED READ name=bug_108620 *!blink::PlatformEvent::PlatformEvent *!blink::PlatformMouseEvent::PlatformMouseEvent *!blink::EventHandler::fakeMouseMoveEventTimerFired *!blink::Timer<>::fired *!blink::ThreadTimers::sharedTimerFiredInternal *!blink::ThreadTimers::sharedTimerFired *!webkit_glue::WebKitPlatformSupportImpl::DoTimeout *!base::BaseTimer<>::TimerTask::Run UNINITIALIZED READ name=bug_109496 ... *!blink::ImageBuffer::platformTransformColorSpace *!blink::ImageBuffer::transformColorSpace *!blink::RenderSVGResourceFilter::postApplyResource ... *!blink::RenderSVGShape::paint* ... *!blink::RenderSVGRoot*_Zpaint*_ZL9PaintInfoERKNS_* UNINITIALIZED READ name=bug_112278 *!fetch_texel_2d_f_rgba8888 *!sample_2d_linear *!sample_linear_2d *!fetch_texel_lod *!fetch_texel *!_mesa_execute_program *!run_program *!_swrast_exec_fragment_program *!shade_texture_span *!_swrast_write_rgba_span *!general_triangle *!_swrast_validate_triangle *!_swrast_Triangle *!triangle_rgba *!_tnl_render_triangles_elts *!run_render *!_tnl_run_pipeline *!_tnl_draw_prims *!_tnl_vbo_draw_prims *!vbo_validated_drawrangeelements *!vbo_exec_DrawElements *!neutral_DrawElements UNINITIALIZED READ name=bug_112278b *!fetch_texel_2d_f_rgba8888 *!sample_2d_nearest *!sample_nearest_2d *!fetch_texel_lod *!fetch_texel *!_mesa_execute_program *!run_program *!_swrast_exec_fragment_program *!shade_texture_span *!_swrast_write_rgba_span *!general_triangle ... *!_swrast_Triangle *!triangle_rgba ... *!run_render *!_tnl_run_pipeline *!_tnl_draw_prims *!_tnl_vbo_draw_prims UNINITIALIZED READ name=bug_115419_1 *!fetch_texel_2d_f_rgba8888 *!texture_get_row *!fast_read_rgba_pixels *!read_rgba_pixels *!_swrast_ReadPixels *!_mesa_ReadPixels *!glReadPixels *!gpu::gles2::GLES2DecoderImpl::HandleReadPixels *!gpu::gles2::GLES2DecoderImpl::DoCommand *!gpu::CommandParser::ProcessCommand *!gpu::GpuScheduler::PutChanged *!webkit::gpu::GLInProcessContext::PumpCommands UNINITIALIZED READ name=bug_115419_2 *!get_src_arg_mask *!_mesa_remove_extra_move_use *!_mesa_optimize_program *!get_mesa_program *!_mesa_ir_link_shader *!_mesa_glsl_link_shader *!link_program *!_mesa_LinkProgramARB *!glLinkProgram ... *!gpu::gles2::GLES2DecoderImpl::DoLinkProgram* *!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram* *!gpu::gles2::GLES2DecoderImpl::DoCommand *!gpu::CommandParser::ProcessCommand *!gpu::GpuScheduler::PutChanged *!webkit::gpu::GLInProcessContext::PumpCommands UNINITIALIZED READ name=bug_116475 ... *!base::Histogram::BucketIndex *!base::Histogram::Add *!webkit_glue::WebKitPlatformSupportImpl::histogramCustomCounts *!blink::PlatformSupport::histogramCustomCounts *!blink::CCLayerTreeHostImpl::optimizeRenderPasses* *!blink::CCLayerTreeHostImpl::drawLayers *!blink::CCSingleThreadProxy::doComposite UNINITIALIZED READ name=bug_122245a ... *!SkScalerContext::internalGetPath *!SkScalerContext::getMetrics *!SkGlyphCache::lookupMetrics UNINITIALIZED READ name=bug_122245b ... *!SkRect::roundOut *!SkScalerContext::getMetrics *!SkGlyphCache::lookupMetrics *!SkGlyphCache::getGlyphIDMetrics *!sk_getMetrics_glyph_00 *!SkDraw::drawPosText *!SkDevice::drawPosText *!SkGpuDevice::drawPosText *!SkCanvas::drawPosText *!blink::Font::drawGlyphs *!blink::Font::drawGlyphBuffer *!blink::Font::drawSimpleText *!blink::Font::drawText *!blink::GraphicsContext::drawBidiText *!blink::CanvasRenderingContext2D::drawTextInternal *!blink::CanvasRenderingContext2D::strokeText *!blink::CanvasRenderingContext2DInternal::strokeTextCallback *!v8::internal::HandleApiCallHelper<> *!v8::internal::Builtin_HandleApiCall UNINITIALIZED READ name=bug_138058 ... *!blink::WebVTTParser::constructTreeFromToken *!blink::WebVTTParser::createDocumentFragmentFromCueText *!blink::TextTrackCue::getCueAsHTML *!blink::TextTrackCue::updateDisplayTree *!blink::HTMLMediaElement::updateActiveTextTrackCues UNINITIALIZED READ name=bug_138220_a *!blink::HTMLInputElement::dataList *!blink::HTMLInputElement::list *!blink::RenderSliderContainer::layout *!blink::RenderBlock::layoutBlockChild *!blink::RenderBlock::layoutBlockChildren *!blink::RenderBlock::layoutBlock *!blink::RenderBlock::layout *!blink::RenderSlider::layout UNINITIALIZED READ name=bug_138220_b *!blink::HTMLInputElement::dataList *!blink::HTMLInputElement::list *!blink::RenderTheme::paintSliderTicks *!blink::RenderThemeChromiumLinux::paintSliderTrack *!blink::RenderTheme::paint *!blink::RenderBox::paintBoxDecorations *!blink::RenderBlock::paintObject UNINITIALIZED READ name=bug_139467 *!blink::AccessibilityTable::roleValue *!blink::AccessibilityRenderObject::ariaLiveRegionStatus *!blink::AccessibilityObject::supportsARIALiveRegion *!blink::AccessibilityObject::supportsARIAAttributes *!blink::AccessibilityRenderObject::determineAccessibilityRole *!blink::AccessibilityNodeObject::init *!blink::AccessibilityRenderObject::init *!blink::AccessibilityTable::init UNINITIALIZED READ name=bug_140196 *!SkDescriptor::equals *!SkGlyphCache::VisitCache ... *!SkPaint::descriptorProc UNINITIALIZED READ name=bug_143545 *!aura::RootWindow::ShowCursor *!ash::Shell::ShowCursor *!ash::CursorManager::ShowCursor *!ash::test::AshTestBase::SetUp UNINITIALIZED READ name=bug_145244 *!blink::StyleRuleImport::requestStyleSheet *!blink::StyleSheetContents::requestImportedStyleSheets UNINITIALIZED READ name=bug_159005 *!blink::RenderMarquee::updateMarqueeStyle *!blink::RenderLayer::styleChanged *!blink::RenderLayerModelObject::styleDidChange *!blink::RenderBox::styleDidChange *!blink::RenderBlock::styleDidChange *!blink::RenderObject::setStyle UNINITIALIZED READ name=bug_162825 *!bcmp *!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator< *!std::less<>::operator ... *!std::map<>::find ... *!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator UNINITIALIZED READ name=bug_164198 *!blink::RenderBox::paintFillLayers ... *!blink::RenderBlock::paintObject *!blink::RenderBlock::paint *!blink::RenderLayer::paintLayerContents *!blink::RenderLayer::paintLayerContentsAndReflection *!blink::RenderLayer::paintLayer *!blink::RenderLayer::paintList *!blink::RenderLayer::paintLayerContents *!blink::RenderLayer::paintLayerContentsAndReflection *!blink::RenderLayer::paintLayer UNINITIALIZED READ name=bug_170340 *!WTF::AtomicString::add *!WTF::AtomicString::AtomicString *!blink::HTMLPreloadScanner::processToken *!blink::HTMLPreloadScanner::scan *!blink::HTMLDocumentParser::pumpTokenizer *!blink::HTMLDocumentParser::pumpTokenizerIfPossible *!blink::HTMLDocumentParser::append *!blink::DecodedDataDocumentParser::flush *!blink::DocumentWriter::end *!blink::DocumentLoader::finishedLoading UNINITIALIZED READ name=bug_172025 *!WebViewHost::didCreateDataSource *!blink::FrameLoaderClientImpl::createDocumentLoader *!blink::FrameLoader::init *!blink::Frame::init *!blink::WebFrameImpl::initializeAsMainFrame *!blink::WebViewImpl::initializeMainFrame *!TestShell::createNewWindow *!TestShell::createMainWindow *!TestShell::initialize UNINITIALIZED READ name=bug_173096 *!bcmp *!cc::LayerTreeDebugState::equal *!cc::LayerTreeHost::setDebugState *!blink::WebLayerTreeViewImpl*_Zset* *!blink::WebViewImpl::setIsAcceleratedCompositingActive *!blink::WebViewImpl::setRootGraphicsLayer *!blink::ChromeClientImpl::attachRootGraphicsLayer *!blink::RenderLayerCompositor::attachRootLayer *!blink::RenderLayerCompositor::ensureRootLayer *!blink::RenderLayerCompositor::enableCompositingMode *!blink::RenderLayerCompositor::updateBacking *!blink::RenderLayerCompositor::updateLayerCompositingState *!blink::RenderLayer::styleChanged *!blink::RenderLayerModelObject::styleDidChange *!blink::RenderBox::styleDidChange UNINITIALIZED READ name=bug_175985 *!cc::LayerTreeHost::setDebugState ... *!blink::WebLayerTreeViewImpl* UNINITIALIZED READ name=bug_176270 *!cc::LayerTreeDebugState::recordRenderingStats UNINITIALIZED READ name=bug_176616_a *!WebTestRunner::WebTestProxyBase::didCreateDataSource *!WebTestRunner::WebTestProxy<>::didCreateDataSource *!blink::FrameLoaderClientImpl::createDocumentLoader *!blink::FrameLoader::init *!blink::Frame::init *!blink::WebFrameImpl::initializeAsMainFrame *!blink::WebViewImpl::initializeMainFrame *!TestShell::createNewWindow *!TestShell::createMainWindow *!TestShell::initialize UNINITIALIZED READ name=bug_176616_b *!WebTestRunner::TestRunner::reset *!WebTestRunner::TestInterfaces::resetAll *!WebTestRunner::WebTestInterfaces::resetAll *!TestShell::resetTestController *!runTest UNINITIALIZED READ name=bug_222883 *!v8::internal::ScavengeVisitor::ScavengePointer *!v8::internal::ScavengeVisitor::VisitPointers *!v8::internal::StandardFrame::IterateExpressions ... *!v8::internal::Heap::Scavenge *!v8::internal::Heap::PerformGarbageCollection* UNINITIALIZED READ name=bug_227278a ... *!content::CompositingIOSurfaceTransformerTest::RunResizeTest *!content::CompositingIOSurfaceTransformerTest_ResizesTexturesCorrectly_Test::TestBody UNINITIALIZED READ name=bug_227278b ... *!content::CompositingIOSurfaceTransformerTest::RunTransformRGBToYV12Test *!content::CompositingIOSurfaceTransformerTest_TransformsRGBToYV12_Test::TestBody UNINITIALIZED READ name=bug_227278c *!BitSetNextSetBit *!RegistersReInterfere *!RegistersMerge *!glpPPShaderLinearizeStreamMgr *!glpPPShaderLinearize *!glePrepareShaderForEmulation *!gleSetVPTransformFuncAll *!gleVPRenderQuadsSmooth *!gleDrawArraysOrElements_ExecCore *!glDrawArrays_Exec *!glDrawArrays *!content::::DrawQuad *!content::CompositingIOSurfaceTransformer::ResizeBilinear *!content::CompositingIOSurfaceTransformerTest::RunResizeTest *!content::CompositingIOSurfaceTransformerTest_ResizesTexturesCorrectly_Test::TestBody UNINITIALIZED READ name=bug_227278d *!glViewport_Exec *!glViewport *!content::::SetTransformationsForOffScreenRendering *!content::CompositingIOSurfaceTransformer::TransformRGBToYV12 *!content::CompositingIOSurfaceTransformerTest::RunTransformRGBToYV12Test *!content::CompositingIOSurfaceTransformerTest_TransformsRGBToYV12_Test::TestBody UNINITIALIZED READ name=bug_238170a *!blink::ElementRuleCollector::collectMatchingRules *!blink::ElementRuleCollector::hasAnyMatchingRules UNINITIALIZED READ name=bug_238170b *!blink::ElementRuleCollector::collectMatchingRules *!blink::StyleResolver::matchAuthorRules UNINITIALIZED READ name=bug_238170c *!blink::ReplaceSelectionCommand::doApply *!blink::CompositeEditCommand::apply *!blink::applyCommand UNINITIALIZED READ name=bug_241044 *!blink::Settings::setOpenGLMultisamplingEnabled *!blink::WebSettingsImpl::setOpenGLMultisamplingEnabled *!content::ApplyWebPreferences *!content::RenderViewImpl::OnUpdateWebPreferences *!content::RenderViewImpl::SetWebkitPreferences UNINITIALIZED READ name=bug_246153 *!blink::Settings::setOpenGLMultisamplingEnabled *!blink::WebSettingsImpl::setOpenGLMultisamplingEnabled *!content::ApplyWebPreferences ... *!content::RenderViewImpl::Initialize *!content::RenderViewImpl::Create* *!content::RenderThreadImpl::OnCreateNewView UNINITIALIZED READ name=bug_259789 *!blink::::adjustAttributes *!blink::WebGLRenderingContext::maybeRestoreContext *!blink::Timer<>::fired *!blink::ThreadTimers::sharedTimerFiredInternal *!blink::ThreadTimers::sharedTimerFired *!webkit_glue::WebKitPlatformSupportImpl::DoTimeout UNINITIALIZED READ name=bug_290405 *!GrGradientEffect::onIsEqual *!GrEffect::isEqual *!GrEffectStage::DeferredStage::isEqual *!GrDrawState::DeferredState::isEqual *!GrInOrderDrawBuffer::needsNewState *!GrInOrderDrawBuffer::onDraw *!GrDrawTarget::drawIndexedInstances *!GrTextContext::flushGlyphs UNINITIALIZED READ name=bug_290435 *!blink::AudioContext::scheduleNodeDeletion *!blink::AudioContext::handlePostRenderTasks *!blink::AudioDestinationNode::render *!blink::OfflineAudioDestinationNode::offlineRender UNINITIALIZED READ name=bug_364724 *!base::MD5DigestToBase16 *!content::WebKitTestRunner::CaptureDumpPixels UNINITIALIZED READ name=bug_298143 ... *!blink::TypeConversionsV8Internal*AttributeGetter* UNINITIALIZED READ name=bug_299804 *!GrConfigConversionEffect::TestForPreservingPMConversions *!::test_pm_conversions *!GrContext::createPMToUPMEffect *!GrContext::readRenderTargetPixels *!SkGpuDevice::onReadPixels *!SkBaseDevice::readPixels *!SkCanvas::readPixels *!DeferredDevice::onReadPixels *!SkBaseDevice::readPixels *!SkCanvas::readPixels *!blink::GraphicsContext::readPixels *!WTF::PassRefPtr<> *!blink::ImageBuffer::getUnmultipliedImageData *!blink::CanvasRenderingContext2D::getImageData *!blink::CanvasRenderingContext2D::getImageData *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethod *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback *!v8::internal::FunctionCallbackArguments::Call *!v8::internal::HandleApiCallHelper<> UNINITIALIZED READ name=bug_309477 *!WebTestRunner::EventSender::reset *!WebTestRunner::TestInterfaces::resetTestHelperControllers *!WebTestRunner::TestInterfaces::resetAll ... *!content::ShellRenderProcessObserver::WebKitInitialized *!content::RenderThreadImpl::EnsureWebKitInitialized *!content::RenderThreadImpl::OnCreateNewView UNINITIALIZED READ name=bug_312332 ... *!blink::RenderTextControl::computeIntrinsicLogicalWidths *!blink::RenderTextControl::computePreferredLogicalWidths ... *!blink::RenderBlock::layout UNINITIALIZED READ name=bug_327672 *!blink::StyleSheetContents::isCacheable *!blink::LinkStyle::setCSSStyleSheet *!blink::CSSStyleSheetResource::checkNotify ... *!webkit_glue::WebURLLoaderImpl::Context::OnCompletedRequest ############################################################### # Real issues in Chromium LEAK name=http://crbug.com/32085 ... chrome.dll!NotificationRegistrar::Add LEAK name=http://crbug.com/32623 ... *!ssl3_HandleHandshakeMessage *!ssl3_HandleHandshake *!ssl3_HandleRecord *!ssl3_GatherCompleteHandshake ... *!SSL_ForceHandshake *!net::SSLServerSocketNSS::DoHandshake *!net::SSLServerSocketNSS::DoHandshakeLoop UNINITIALIZED READ name=http://crbug.com/57266 (1) ... *!remoting::EncoderVp8::Encode UNINITIALIZED READ name=http://crbug.com/57266 (2) ... *!vp8_* LEAK name=http://crbug.com/70062 *!PR_Calloc *!PR_NewLock ... *!InitSessionCacheLocks *!initSessionCacheLocksLazily *!PR_CallOnce *!ssl_InitSessionCacheLocks *!lock_cache *!ssl_LookupSID *!ssl2_BeginClientHandshake *!ssl_Do1stHandshake *!SSL_ForceHandshake *!net::SSL*SocketNSS::DoHandshake *!net::SSL*SocketNSS::DoHandshakeLoop LEAK name=http://crbug.com/74417 a *!replace_operator_new *!disk_cache::BackendImpl::CreateEntryImpl LEAK name=http://crbug.com/74417 b *!replace_operator_new *!disk_cache::BackendImpl::NewEntry # One more disk_cache::BackendImpl leak. See also http://crbug.com/87500. LEAK name=http://crbug.com/74417 c *!replace_operator_new ... *!disk_cache::EntryImpl::UserBuffer::UserBuffer LEAK name=http://crbug.com/75247 ... *!replace_operator_new *!AutofillDownloadTestHelper::AutofillDownloadTestHelper LEAK name=http://crbug.com/78784 *!generic_cpp_alloc *!operator new *!TestingProfile::CreateRequestContext *!*ProfileSyncService*::SetUp LEAK name=http://crbug.com/80550 (1) ... *!RenderWidgetHost::WasHidden LEAK name=http://crbug.com/80550 (2) ... *!RenderWidgetHost::WasRestored LEAK name=http://crbug.com/87612 ... *!SSL_ConfigSecureServer *!net::SSLServerSocketNSS::InitializeSSLOptions *!net::SSLServerSocketNSS::Handshake LEAK name=http://crbug.com/88640 *!generic_cpp_alloc *!operator new *!ProfileImpl::InitRegisteredProtocolHandlers *!ProfileImpl::DoFinalInit *!ProfileImpl::OnPrefsLoaded LEAK name=http://crbug.com/91465 *!generic_cpp_alloc *!operator new *!browser_sync::internal::WeakHandleCore<>::* *!browser_sync::WeakHandle<>::* *!syncer::SyncManager::SyncInternal::Init LEAK name=http://crbug.com/91491 ... *!CrxUpdateService::ProcessPendingItems UNINITIALIZED READ name=http://crbug.com/92026 (1) softokn3.dll!FC_GetFunctionList ... softokn3.dll!NSC_ModuleDBFunc UNINITIALIZED READ name=http://crbug.com/92026 (2) freebl3.dll!FREEBL_GetVector ... softokn3.dll!NSC_ModuleDBFunc # Possible real Chromium issue in DoCrossfade. UNINITIALIZED READ name=http://crbug.com/110049 *!media::DoCrossfade<> *!media::Crossfade *!media::AudioRendererAlgorithmBase::FillBuffer # Known sqlite3 leaks. LEAK name=http://crbug.com/113847 (1) ... *!sqlite3MemMalloc *!mallocWithAlarm *!sqlite3Malloc ... *!yy_reduce LEAK name=http://crbug.com/113847 (2) ... *!openDatabase *!sqlite3_open LEAK name=http://crbug.com/115328 ... *!GenericInfoViewTest_GenericInfoView_Test::TestBody LEAK name=http://crbug.com/117427 a ... *!net::HostCache::Set *!net::HostResolverImpl::CacheResult *!net::HostResolverImpl::Job::CompleteRequests *!net::HostResolverImpl::Job::OnProcTaskComplete *!base::internal::RunnableAdapter<>::Run # Probably related to 117427. Someone is not tearing down DNS resolution during # testing. LEAK name=http://crbug.com/117427 b *!generic_cpp_alloc *!operator new *!base::internal::WeakReferenceOwner::GetRef *!base::SupportsWeakPtr<>::AsWeakPtr *!net::HostResolverImpl::Job::Job *!net::HostResolverImpl::Resolve *!net::SingleRequestHostResolver::Resolve *!net::TransportConnectJob::DoResolveHost *!net::TransportConnectJob::DoLoop *!net::TransportConnectJob::ConnectInternal *!net::ConnectJob::Connect *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal *!net::internal::ClientSocketPoolBaseHelper::RequestSocket *!net::ClientSocketPoolBase<>::RequestSocket *!net::TransportClientSocketPool::RequestSocket *!net::ClientSocketHandle::Init<> *!net::`anonymous namespace'::InitSocketPoolHelper *!net::InitSocketHandleForRawConnect *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone *!base::internal::RunnableAdapter<>::Run # IE frame possible leak of COM object. LEAK name=http://crbug.com/122399 ole32.dll!... ole32.dll!CoTaskMemAlloc urlmon.dll!... urlmon.dll!CreateUri IEFRAME.dll!* # RenderWidgetHelper leak in DelayProfileDestruction test. LEAK name=http://crbug.com/125565 *!generic_cpp_alloc *!operator new *!RenderProcessHostImpl::RenderProcessHostImpl *!SiteInstanceImpl::GetProcess *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody LEAK name=http://crbug.com/125807 *!generic_cpp_alloc *!operator new *!TransportSecurityPersister::TransportSecurityPersister *!TransportSecurityPersisterTest::TransportSecurityPersisterTest UNINITIALIZED READ name=bug_113076 *!media::ConvertYUVToRGB32_C *!media::LinearScaleYUVToRGB32RowWithRange_C *!media::ScaleYUVToRGB32WithRect UNINITIALIZED READ name=bug_343248 osmesa.dll!LINTERP osmesa.dll!INTERP_4F osmesa.dll!_tnl_generic_interp UNINITIALIZED READ name=bug_340752 ... *!*::ThreadState::visitStack UNINITIALIZED READ name=bug_343663 blink_web.dll!blink::RenderBlock::computeInlinePreferredLogicalWidths UNINITIALIZED READ name=bug_343797 ... blink_web.dll!blink::MediaQueryExp::create blink_web.dll!blink::BisonCSSParser::createFloatingMediaQueryExp blink_web.dll!cssyyparse UNINITIALIZED READ name=bug_343915 blink_web.dll!blink::BisonCSSParser::parseFlex blink_web.dll!blink::BisonCSSParser::parseValue blink_web.dll!cssyyparse UNADDRESSABLE ACCESS name=BUG_343958 blink_web.dll!blink::Node::getFlag blink_web.dll!blink::Node::inDocument blink_web.dll!blink::Node::isDescendantOf blink_web.dll!blink::CompositeEditCommand::cloneParagraphUnderNewElement blink_web.dll!blink::CompositeEditCommand::moveParagraphWithClones UNINITIALIZED READ name=BUG_344076 blink_web.dll!blink::Editor::canSmartReplaceWithPasteboard blink_web.dll!blink::Editor::pasteAsPlainTextWithPasteboard blink_web.dll!blink::Editor::pasteAsPlainText blink_web.dll!blink::executePasteAndMatchStyle blink_web.dll!blink::Editor::Command::execute blink_web.dll!blink::Document::execCommand UNINITIALIZED READ name=BUG_349128 content.dll!std::* ... content.dll!content::BrowserAccessibilityManagerWin::* ... *!*::UpdateNode # There are so many osmesa errors we have to suppress (mostly the unpack_RGB* # variety) that it's a performance hit. We avoid that by requesting # whole-module suppression # (see https://code.google.com/p/drmemory/issues/detail?id=1529). UNINITIALIZED READ name=bug_347967_all_osmesa osmesa.dll!* UNINITIALIZED READ name=bug_347967 osmesa.dll!unpack_RGB*888 osmesa.dll!_mesa_unpack_rgba_row osmesa.dll!slow_read_rgba_pixels osmesa.dll!read_rgba_pixels osmesa.dll!_mesa_readpixels ... gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand gpu.dll!gpu::CommandParser::ProcessCommand gpu.dll!gpu::GpuScheduler::PutChanged UNINITIALIZED READ name=bug_347967,bug_348357 osmesa.dll!clip_span osmesa.dll!_swrast_write_rgba_span osmesa.dll!general_triangle ... gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand gpu.dll!gpu::CommandParser::ProcessCommand UNINITIALIZED READ name=bug_361594 ... skia.dll!SkA8_Shader_Blitter::blitH skia.dll!SkBlitter::blitRect skia.dll!blitrect skia.dll!SkScan::FillIRect ... skia.dll!SkDraw::drawRect skia.dll!SkDraw::drawBitmap skia.dll!SkBitmapDevice::drawBitmap skia.dll!SkCanvas::internalDrawBitmap skia.dll!SkCanvas::drawBitmap content.dll!content::ScreenshotData::EncodeOnWorker UNINITIALIZED READ name=bug_363487 blink_web.dll!blink::RenderLayerCompositor::updateIfNeeded blink_web.dll!blink::RenderLayerCompositor::updateIfNeededRecursive blink_web.dll!blink::FrameView::updateLayoutAndStyleForPainting blink_web.dll!blink::PageAnimator::updateLayoutAndStyleForPainting UNINITIALIZED READ name=bug_365101 *!device::BluetoothAdapterWin::AdapterStateChanged UNINITIALIZED READ name=bug_364146 ... v8.dll!* net_with_v8.dll!net::ProxyResolverV8::Context::* UNINITIALIZED READ name=bug_334448 *!CLD2::UTF8GenericReplaceInternal *!CLD2::UTF8GenericReplace *!CLD2::ScriptScanner::LowerScriptSpan *!CLD2::ScriptScanner::GetOneScriptSpanLower *!CLD2::DetectLanguageSummaryV2 *!CLD2::DetectLanguageSummary UNINITIALIZED READ name=bug_42043 ... QuickTime.qts!* UNINITIALIZED READ name=bug_369141 ... *!blink::RenderLayerClipper::updateClipRects *!blink::RenderLayerClipper::parentClipRects *!blink::RenderLayerClipper::backgroundClipRect HANDLE LEAK name=bug_370178 system call NtCreateEvent KERNELBASE.dll!CreateEventExW KERNELBASE.dll!CreateEventW base.dll!base::WaitableEvent::WaitableEvent gpu.dll!gpu::InProcessCommandBuffer::Initialize gl_in_process_context.dll!gpu::`anonymous namespace'::GLInProcessContextImpl::Initialize gl_in_process_context.dll!gpu::GLInProcessContext::CreateContext UNINITIALIZED READ name=bug_371844 *!content::GamepadProvider::PadState::Match *!content::GamepadProvider::DoPoll UNINITIALIZED READ name=bug_371950 media.dll!ConvertYUVToRGB32Row_SSE media.dll!media::ConvertYUVToRGB32_SSE media.dll!media::ConvertVideoFrameToBitmap media.dll!media::SkCanvasVideoRenderer::Paint cc.dll!cc::VideoResourceUpdater::CreateForSoftwarePlanes cc.dll!cc::VideoResourceUpdater::CreateExternalResourcesFromVideoFrame cc.dll!cc::VideoLayerImpl::WillDraw UNINITIALIZED READ name=bug_371959 content.dll!webrtc::PeerConnection::DoInitialize content.dll!webrtc::PeerConnection::Initialize content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection_s content.dll!webrtc::PeerConnectionFactory::OnMessage content.dll!jingle_glue::JingleThreadWrapper::Send content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection content.dll!webrtc::PeerConnectionFactoryInterface::CreatePeerConnection # This suppression is deliberately general, as bugs reported in # ProcessOutgoingMessages are difficult to track down until we # get our annotations in place. # TODO(bruening): add annotations once we have the infrastructure. UNINITIALIZED READ name=bug_371991 system call NtWriteFile parameter #5 KERNELBASE.dll!WriteFile KERNEL32.dll!WriteFile* *!IPC::Channel*::ProcessOutgoingMessages UNINITIALIZED READ name=bug_372254 *!content::*::NotifyPluginProcessHostHelper UNINITIALIZED READ name=drm_i#1546 *!testing::internal::CmpHelperEQ<> ... *!content::BrowserPluginTest_ResizeFlowControl_Test::TestBody UNINITIALIZED READ name=bug_374105a ... gpu.dll!gpu::gles2::ShaderTranslatorCache::GetTranslator gpu.dll!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator gpu.dll!gpu::gles2::GLES2DecoderImpl::Initialize UNINITIALIZED READ name=bug_374105b ... gpu.dll!gpu::gles2::ShaderTranslator::GetStringForOptionsThatWouldAffectCompilation *!gpu::gles2::ShaderTranslatorTest_OptionsString_Test::TestBody UNINITIALIZED READ name=bug_374410 *!ui::NativeThemeWin::PaintScrollbarTrack *!ui::NativeThemeWin::PaintDirect UNINITIALIZED READ name=bug_377728 ... *!Hunspell::suggest *!HunspellEngine::FillSuggestionList *!SpellcheckLanguage::SpellCheckWord *!SpellCheck::SpellCheckWord UNINITIALIZED READ name=bug_387373 *!blink::WebEmbeddedWorkerImpl::startWorkerContext *!content::EmbeddedWorkerDispatcher::OnStartWorker *!EmbeddedWorkerMsg_StartWorker::Dispatch<> UNADDRESSABLE ACCESS name=bug_389132 content.dll!crypto_kernel_do_load_cipher_type content.dll!crypto_kernel_load_cipher_type content.dll!crypto_kernel_init content.dll!cricket::SrtpSession::SetKey content.dll!cricket::SrtpSession::SetSend content.dll!cricket::SrtpFilter::SetRtpParams content.dll!cricket::BaseChannel::SetupDtlsSrtp content.dll!cricket::BaseChannel::ChannelWritable_w content.dll!cricket::BaseChannel::OnWritableState UNINITIALIZED READ name=bug_392585 system call NtCreateFile parameter #9 *!testing::internal::HandleExceptionsInMethodIfSupported<> UNADDRESSABLE ACCESS name=bug_398850 ... wtf.dll!WTF::PlatformCondition::timedWait UNINITIALIZED READ name=bug_399293 blink_web.dll!blink::InputMethodController::extendSelectionAndDelete blink_web.dll!blink::WebLocalFrameImpl::extendSelectionAndDelete content.dll!content::RenderFrameImpl::OnExtendSelectionAndDelete *!content::RenderViewImplTest_OnExtendSelectionAndDelete_Test::TestBody *!testing::internal::HandleExceptionsInMethodIfSupported<> UNINITIALIZED READ name=bug_398547 system call NtWriteFile parameter #5 KERNELBASE.dll!WriteFile KERNEL32.dll!WriteFile mojo_system_impl.dll!mojo::system::`anonymous namespace'::RawChannelWin::WriteNoLock HANDLE LEAK name=bug_403544 system call NtCreateSemaphore KERNELBASE.dll!CreateSemaphoreExW ... v8.dll!v8::internal::SweeperThread::SweeperThread ... blink_web.dll!blink::WorkerScriptController::WorkerScriptController blink_web.dll!blink::WorkerGlobalScope::WorkerGlobalScope blink_web.dll!blink::ServiceWorkerGlobalScope::ServiceWorkerGlobalScope HANDLE LEAK name=bug_403681 system call NtCreateTimer KERNELBASE.dll!CreateWaitableTimerExW KERNEL32.dll!CreateWaitableTimerW content.dll!rtc::Timing::Timing content.dll!content::RenderProcessHostImpl::CreateMessageFilters ... content.dll!content::RenderViewHostImpl::CreateRenderView content.dll!content::WebContentsImpl::CreateRenderViewForRenderManager ... content.dll!content::NavigationControllerImpl::LoadEntry ... *!extensions::ExtensionHost::LoadInitialURL