1 # This file contains suppressions for the Dr.Memory tool, see
2 # http://dev.chromium.org/developers/how-tos/using-drmemory
4 # This file should contain suppressions only for the reports happening
5 # in the 'full' mode (drmemory_full).
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
7 # please use suppressions.txt instead.
9 ###############################################################
10 # Known reports on the third party we have no control over.
17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
19 name=http://code.google.com/p/drmemory/issues/detail?id=406
20 ADVAPI32.dll!WmiOpenBlock
21 ADVAPI32.dll!WmiOpenBlock
23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
25 name=GoogleDesktop LEAK
27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
29 # They deliberately use uninit local var in sqlite random generator
31 name=sqlite3_randomness UNINIT
35 # Intentional leak in WebKit Template Framework for ThreadData.
37 name=intentional WTF ThreadData leak
41 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
43 name=http://crbug.com/125558 a
44 KERNELBASE.dll!LocalAlloc
46 SECHOST.dll!NotifyServiceStatusChange
48 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
49 *!net::ProxyResolverWinHttp::GetProxyForURL
51 # Tiny locale-related leaks in ntdll. Probably system bug.
53 name=http://crbug.com/125558 b
57 KERNELBASE.dll!GetCPInfoExW
62 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
63 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig
66 name=http://crbug.com/30704 #f
67 libpng.dll!wk_png_write_find_filter
68 libpng.dll!wk_png_write_row
70 ###############################################################
71 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
72 # assumptions or unhandled syscalls
74 # Please note: the following suppressions were written in the abscense of
75 # private symbols so may need to be updated when we switch to auto-loading PDBs
77 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1)
80 ntdll.dll!RtlFindActivationContextSectionString
83 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2)
85 SHELL32.dll!SHFileOperation*
88 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3)
90 SHELL32.dll!SHGetFolderPath*
93 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4)
95 SHELL32.dll!SHGetFolderPath*
98 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5)
100 SHELL32.dll!SHCreateDirectory*
103 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6)
105 SHELL32.dll!ILLoadFromStream*
108 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7)
110 SHELL32.dll!ILSaveToStream*
113 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8)
115 SHELL32.dll!SHFileOperation*
118 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9)
120 SHELL32.dll!SHGetItemFromDataObject
123 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10)
125 SHELL32.dll!SHGetItemFromDataObject
128 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11)
131 SHELL32.dll!SHChangeNotifySuspendResume
134 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1)
139 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2)
144 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3)
149 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1)
154 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2)
156 GDI32.dll!CreateFontIndirectExW
157 GDI32.dll!CreateFontIndirectW
160 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3)
161 KERNELBASE.dll!LocalAlloc
163 USER32.dll!CreateWindow*
166 name=http://code.google.com/p/drmemory/issues/detail?id=18 a
171 name=http://code.google.com/p/drmemory/issues/detail?id=18 b
176 name=http://code.google.com/p/drmemory/issues/detail?id=18 c
181 name=http://code.google.com/p/drmemory/issues/detail?id=18 d
186 name=http://code.google.com/p/drmemory/issues/detail?id=40 a
191 name=http://code.google.com/p/drmemory/issues/detail?id=40 b
196 name=http://code.google.com/p/drmemory/issues/detail?id=48 a
197 system call NtContinue
202 name=http://code.google.com/p/drmemory/issues/detail?id=48 b
203 system call NtContinue
204 *!WTF::initializeCurrentThreadInternal
207 name=http://code.google.com/p/drmemory/issues/detail?id=52 a
209 DBGHELP.dll!SymInitialize
212 name=http://code.google.com/p/drmemory/issues/detail?id=52 b
214 DBGHELP.dll!SymEnumSourceFiles
217 name=http://code.google.com/p/drmemory/issues/detail?id=52 c
219 msvcrt.dll!_RTDynamicCast
222 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp
223 instruction=test 0x*(%*) $0x??
224 DBGHELP.dll!SymUnloadModule64
227 name=http://code.google.com/p/drmemory/issues/detail?id=53
228 ADVAPI32.dll!WmiMofEnumerateResourcesA
229 ADVAPI32.dll!WmiMofEnumerateResourcesA
230 ADVAPI32.dll!Sta*TraceW
233 name=http://code.google.com/p/drmemory/issues/detail?id=58
238 name=http://code.google.com/p/drmemory/issues/detail?id=60
241 USP10.dll!ScriptStringAnalyse
244 IMM32.dll!ImmGetIMCCSize
245 IMM32.dll!ImmLockClientImc
246 IMM32.dll!ImmDisableIME
247 IMM32.dll!ImmSetActiveContext
248 USER32.dll!IMPSetIMEA
251 name=http://code.google.com/p/drmemory/issues/detail?id=65 a
256 name=http://code.google.com/p/drmemory/issues/detail?id=65 b
258 *!talk_base::CreateRandomString
261 name=http://code.google.com/p/drmemory/issues/detail?id=68 a
266 name=http://code.google.com/p/drmemory/issues/detail?id=68 b
268 ADVAPI32.dll!SetSecurityDescriptorDacl
271 name=http://code.google.com/p/drmemory/issues/detail?id=68 c
273 MSWSOCK.dll!WSPStartup
276 name=http://code.google.com/p/drmemory/issues/detail?id=68 d
278 ntdll.dll!RtlValidateUnicodeString
281 name=http://code.google.com/p/drmemory/issues/detail?id=256
287 name=http://code.google.com/p/drmemory/issues/detail?id=274 a
292 name=http://code.google.com/p/drmemory/issues/detail?id=274 b
297 name=http://code.google.com/p/drmemory/issues/detail?id=275
302 name=http://code.google.com/p/drmemory/issues/detail?id=276
304 ntdll.dll!RtlConvertUlongToLargeInteger
305 ntdll.dll!RtlConvertUlongToLargeInteger
306 ntdll.dll!KiUserExceptionDispatcher
309 name=http://code.google.com/p/drmemory/issues/detail?id=305
317 name=http://code.google.com/p/drmemory/issues/detail?id=346 a
319 GDI32.dll!CloseEnhMetaFile
322 name=http://code.google.com/p/drmemory/issues/detail?id=346 b
323 GDI32.dll!SetPolyFillMode
327 name=http://code.google.com/p/drmemory/issues/detail?id=362
328 USER32.dll!UnregisterClass*
331 name=http://code.google.com/p/drmemory/issues/detail?id=382
333 ntdll.dll!CsrNewThread
336 name=http://code.google.com/p/drmemory/issues/detail?id=397
337 system call NtDeviceIoControlFile InputBuffer
338 ADVAPI32.dll!ImpersonateAnonymousToken
341 name=http://code.google.com/p/drmemory/issues/detail?id=407 a
342 system call NtRequestWaitReplyPort
343 RPCRT4.dll!I_RpcSendReceive
344 RPCRT4.dll!NdrSendReceive
347 name=http://code.google.com/p/drmemory/issues/detail?id=407 b
349 ntdll.dll!LdrInitializeThunk
350 ntdll.dll!LdrShutdownThread
353 name=http://code.google.com/p/drmemory/issues/detail?id=412 a
354 ADVAPI32.dll!RegDeleteValue*
357 name=http://code.google.com/p/drmemory/issues/detail?id=412 b
362 name=http://code.google.com/p/drmemory/issues/detail?id=412 c
364 RPCRT4.dll!NdrClientCall2
367 name=http://code.google.com/p/drmemory/issues/detail?id=412 d
368 RSAENH.dll!DllUnregisterServer
370 ADVAPI32.dll!CryptAcquireContextA
371 CRYPT32.dll!CryptEnumOIDFunction
373 CRYPT32.dll!CertFindCertificateInStore
376 name=http://code.google.com/p/drmemory/issues/detail?id=412 e
378 RSAENH.dll!CPGenRandom
381 name=http://code.google.com/p/drmemory/issues/detail?id=412 f
386 name=http://code.google.com/p/drmemory/issues/detail?id=412 g
389 *!testing::internal::CmpHelperEQ*
391 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
393 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't
394 # have frame pointers, and we have trouble unwinding from it. Therefore, we use
395 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
397 name=http://code.google.com/p/drmemory/issues/detail?id=412 h
401 name=http://code.google.com/p/drmemory/issues/detail?id=425 a
402 CLBCatQ.DLL!DestroyStgDatabase
403 CLBCatQ.DLL!PostError
404 CLBCatQ.DLL!PostError
407 name=http://code.google.com/p/drmemory/issues/detail?id=425 b
408 RPCRT4.dll!I_RpcBCacheFree
409 RPCRT4.dll!I_RpcBCacheFree
411 RPCRT4.dll!NdrClientCall2
414 name=http://code.google.com/p/drmemory/issues/detail?id=425 c
420 name=http://code.google.com/p/drmemory/issues/detail?id=435 a
422 ntdll.dll!RtlSetSecurityObject
423 ntdll.dll!RtlNewSecurityObjectEx
424 ADVAPI32.dll!CreatePrivateObjectSecurityEx
425 NTMARTA.dll!AccRewriteSetNamedRights
428 name=http://code.google.com/p/drmemory/issues/detail?id=435 b
429 WLDAP32.dll!Ordinal325
431 WLDAP32.dll!Ordinal325
432 ntdll.dll!LdrInitializeThunk
433 ntdll.dll!LdrFindResourceDirectory_U
434 ntdll.dll!RtlValidateUnicodeString
436 KERNEL32.dll!LoadLibraryExW
438 # mod+offs suppression because the symbolic makes no sense and changes
439 # completely in the presence of WS2_32.dll symbols.
441 name=http://code.google.com/p/drmemory/issues/detail?id=438
447 name=http://code.google.com/p/drmemory/issues/detail?id=454 a
449 WINMM.dll!wave*GetNumDevs
452 name=http://code.google.com/p/drmemory/issues/detail?id=454 b
454 WINMM.dll!wave*GetNumDevs
457 name=http://code.google.com/p/drmemory/issues/detail?id=466
458 ntdll.dll!RtlRunOnceBeginInitialize
459 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
462 name=http://code.google.com/p/drmemory/issues/detail?id=471 a
463 *!media::AudioRendererAlgorithmOLA::Crossfade<unsigned char>
464 *!media::AudioRendererAlgorithmOLA::FillBuffer
465 *!media::AudioRendererAlgorithmOLATest_FillBuffer_*
467 # Uninit reported in copy ctor. Would be nice if we could specify which ctor
468 # overload to suppress.
470 name=http://code.google.com/p/drmemory/issues/detail?id=471 b
471 *!WebCore::FormDataElement::FormDataElement
473 # Another default copy ctor uninit.
475 name=http://code.google.com/p/drmemory/issues/detail?id=471 c
476 *!WebCore::CachedResourceLoader::InitiatorInfo::InitiatorInfo
481 name=http://code.google.com/p/drmemory/issues/detail?id=473 a
482 system call NtDeviceIoControlFile InputBuffer
484 iphlpapi.dll!GetAdaptersAddresses
487 name=http://code.google.com/p/drmemory/issues/detail?id=473 b
496 iphlpapi.dll!GetPerAdapterInfo
498 iphlpapi.dll!GetAdaptersAddresses
501 name=http://code.google.com/p/drmemory/issues/detail?id=473 c
505 IPHLPAPI.DLL!GetAdaptersAddresses
508 name=http://code.google.com/p/drmemory/issues/detail?id=475
510 ADVAPI32.dll!CryptAcquireContextA
512 CRYPT32.dll!CryptMsgOpenToDecode
514 CRYPT32.dll!CryptQueryObject
516 # Lots of leaks from our interactions with the system certificate store. May be
517 # worth reviewing our use of their API.
519 name=http://code.google.com/p/drmemory/issues/detail?id=476 a
520 KERNEL*.dll!LocalAlloc
522 CRYPT32.dll!CertGetCRLContextProperty
525 name=http://code.google.com/p/drmemory/issues/detail?id=476 b
526 KERNEL*.dll!LocalAlloc
528 CRYPT32.dll!CertAddCRLContextToStore
531 name=http://code.google.com/p/drmemory/issues/detail?id=476 c
532 KERNEL*.dll!LocalAlloc
534 CRYPT32.dll!CertOpenStore
537 name=http://code.google.com/p/drmemory/issues/detail?id=476 d
539 CRYPT32.dll!CertOpenSystemStore?
542 name=http://code.google.com/p/drmemory/issues/detail?id=476 e
544 CRYPT32.dll!CertGetCertificateChain
547 name=http://code.google.com/p/drmemory/issues/detail?id=476 f
549 CRYPT32.dll!CertCompareIntegerBlob
552 name=http://code.google.com/p/drmemory/issues/detail?id=476 g
554 CRYPT32.dll!CryptUnprotectData
557 name=http://code.google.com/p/drmemory/issues/detail?id=476 h
558 KERNEL*.dll!LocalAlloc
560 CRYPT32.dll!CertEnumCertificatesInStore
563 name=http://code.google.com/p/drmemory/issues/detail?id=476 i
565 CRYPT32.dll!CryptProtectData
568 name=http://code.google.com/p/drmemory/issues/detail?id=476 j
570 CRYPT32.dll!CryptExportPublicKeyInfoEx
573 name=http://code.google.com/p/drmemory/issues/detail?id=502 a
574 system call NtSecureConnectPort parameter #3
579 name=http://code.google.com/p/drmemory/issues/detail?id=502 b
580 system call NtGdiEnumFonts parameter #6
585 name=http://code.google.com/p/drmemory/issues/detail?id=511 a
590 name=http://code.google.com/p/drmemory/issues/detail?id=511 b
593 ole32.dll!StringFromGUID2
596 name=http://code.google.com/p/drmemory/issues/detail?id=512 a
598 *!browser_sync::Cryptographer::PackBootstrapToken
599 *!browser_sync::Cryptographer::GetBootstrapToken
602 name=http://code.google.com/p/drmemory/issues/detail?id=512 b
607 name=http://code.google.com/p/drmemory/issues/detail?id=513 a
611 name=http://code.google.com/p/drmemory/issues/detail?id=513 b
616 name=http://code.google.com/p/drmemory/issues/detail?id=513 c
622 name=http://code.google.com/p/drmemory/issues/detail?id=546
627 *!IconUtil::Create*HICON*
630 name=http://crbug.com/92152
632 USER32.dll!CreateWindowExW
633 *!views::TooltipManagerWin::Init
634 *!views::TooltipManagerWin::TooltipManagerWin
637 name=http://code.google.com/p/drmemory/issues/detail?id=567 a
640 dbghelp.dll!StackWalk64
643 name=http://code.google.com/p/drmemory/issues/detail?id=567 b
647 dbghelp.dll!StackWalk64
649 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
650 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too
651 # brittle, so we switched to RPCRT4.dll!*.
653 name=http://code.google.com/p/drmemory/issues/detail?id=569
657 KERNEL*.dll!BaseThreadInitThunk
659 # TODO(timurrrr): investigate these
661 name=http://crbug.com/TODO a
663 *!win_util::GetLogonSessionOnlyDACL
666 name=http://crbug.com/TODO b
668 ntshrui.dll!IsPathSharedW
671 name=http://crbug.com/TODO c
676 name=http://crbug.com/TODO d
681 name=http://crbug.com/TODO e
686 name=http://crbug.com/TODO f
688 *!GetCanonicalPathInfo*
691 name=http://crbug.com/TODO g
696 name=http://crbug.com/TODO h
698 GDI32.dll!GetTextExtentPoint32*
701 name=http://crbug.com/TODO i
703 *!SyncSocketClientListener::OnMsgClassResponse
706 name=http://crbug.com/TODO j
708 *!*NSPRInitSingleton*
711 name=http://crbug.com/TODO k
712 *!NdrSimpleStructFree
715 name=http://crbug.com/TODO l
716 ntdll.dll!RtlpNtOpenKey
717 ntdll.dll!RtlMakeSelfRelativeSD
718 ntdll.dll!RtlAbsoluteToSelfRelativeSD
719 ADVAPI32.dll!MakeSelfRelativeSD
722 name=http://crbug.com/TODO m
724 CRYPT32.dll!I_CertSyncStore
726 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
727 # a leak. Must be some early thread initialization. Doesn't look like
730 name=http://crbug.com/TODO n
736 KERNEL*.dll!BaseThreadInitThunk
738 # No idea where this is from, but Chrome isn't even on the stack.
740 name=http://crbug.com/TODO o
742 ole32.dll!OleInitialize
744 KERNEL32.dll!BaseThreadInitThunk
746 # Matches lots of RPC related leaks. So far RPC handles have been mostly owned
747 # by system libraries and are not something we can fix easily.
749 name=http://crbug.com/TODO p
752 RPCRT4.dll!NDRCContextBinding
754 # No idea, but all system code, not interesting.
756 name=http://crbug.com/TODO q
767 name=http://crbug.com/109278 video device COM leaks
769 *!media::VideoCaptureDevice::*
772 name=http://crbug.com/109278 audio device COM leaks
774 *!media::GetInputDeviceNamesWin
776 # False pos uninit in shell32 when resolving links.
778 name=http://code.google.com/p/drmemory/issues/detail?id=745
782 *!file_util::ResolveShortcut
784 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a
785 # buffer with SSE/MMX instructions whose results are then masked out later.
787 name=http://code.google.com/p/drmemory/issues/detail?id=747 a
788 *!ff_pred4x4_vertical_vp8_mmxext
791 name=http://code.google.com/p/drmemory/issues/detail?id=747 b
792 *!ff_pred4x4_down_left_mmxext
795 name=http://code.google.com/p/drmemory/issues/detail?id=747 c
796 *!ff_vorbis_floor1_render_list
799 name=http://code.google.com/p/drmemory/issues/detail?id=747 d
800 *!ff_put_vp8_epel8_h6_ssse3
803 name=http://code.google.com/p/drmemory/issues/detail?id=747 e
804 *!ff_put_vp8_epel8_h4_ssse3
807 name=http://code.google.com/p/drmemory/issues/detail?id=747 f
811 name=http://code.google.com/p/drmemory/issues/detail?id=747 g
812 *!ff_simple_idct_add_mmx
814 # ffmpeg seems to leak a pthread condition variable.
816 name=http://crbug.com/110042
821 *!ff_thread_decode_frame
822 *!avcodec_decode_video2
824 # Improperly handled ioctl in bcrypt.
826 name=http://code.google.com/p/drmemory/issues/detail?id=748
827 system call NtDeviceIoControlFile InputBuffer
828 bcrypt.dll!BCryptUnregisterConfigChangeNotify
829 bcrypt.dll!BCryptGetFipsAlgorithmMode
830 ntdll.dll!RtlQueryEnvironmentVariable
832 # Not sure what this is.
834 name=http://code.google.com/p/drmemory/issues/detail?id=749
843 *!talk_base::SafeGetHostByName
844 *!talk_base::SocketAddress::GetLocalIPs
845 *!talk_base::SocketAddress::IsLocalIP
846 *!cricket::Transport::VerifyCandidate
847 *!cricket::Session::OnRemoteCandidates
848 *!cricket::Session::OnTransportInfoMessage
849 *!cricket::Session::OnIncomingMessage
850 *!cricket::SessionManager::OnIncomingMessage
852 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
854 name=http://code.google.com/p/drmemory/issues/detail?id=529
857 *!base::LaunchProcess
859 # System leak from CreateEnvironmentBlock.
861 name=http://code.google.com/p/drmemory/issues/detail?id=757
863 USERENV.dll!CreateEnvironmentBlock
865 # Looks like another instance of 753
867 name=http://code.google.com/p/drmemory/issues/detail?id=753
869 ntdll.dll!RtlLoadString
873 name=http://code.google.com/p/drmemory/issues/detail?id=493
874 USP10.dll!ScriptPositionSingleGlyph
876 # Various TLS leaks that we don't understand yet. We should be finding a root
879 name=http://code.google.com/p/drmemory/issues/detail?id=778 a
880 KERNELBASE.dll!TlsSetValue
882 # Originally filed as: http://crbug.com/109281
884 name=http://code.google.com/p/drmemory/issues/detail?id=778 b
887 *!*::ConstructTlsVector
888 *!base::ThreadLocalStorage::StaticSlot::Get
890 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a
891 # root? See also http://crbug.com/32624
893 name=http://code.google.com/p/drmemory/issues/detail?id=778 c
898 # Bit-level fps in rich edit layer.
900 name=http://code.google.com/p/drmemory/issues/detail?id=791
904 # Already suppressed by drmemory default supp we don't have yet.
906 name=i#757: RPC binding leaks in sspicli.dll
912 # Async NtReadFile false positives. This was fixed in drmemory r772, remove
913 # this supp when we pull that rev.
915 name=http://code.google.com/p/drmemory/issues/detail?id=798
916 system call NtReadFile parameter #5
917 KERNEL32.dll!ReadFile
919 # Probable syscall false positive.
921 name=http://code.google.com/p/drmemory/issues/detail?id=809
922 system call NtGdiPolyPolyDraw parameter #1
923 *!gfx::Path::CreateNativeRegion
925 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces
926 # coming out of this module (sometimes only one frame), which makes it hard to
927 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we
930 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard
934 name=http://code.google.com/p/drmemory/issues/detail?id=841 a
936 CRYPTNET.dll!I_CryptNetGetConnectivity
939 name=http://code.google.com/p/drmemory/issues/detail?id=841 b
944 name=http://code.google.com/p/drmemory/issues/detail?id=841 c
949 name=http://code.google.com/p/drmemory/issues/detail?id=841 d
951 CRYPTNET.dll!I_CryptNetGetConnectivity
953 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
955 name=http://code.google.com/p/drmemory/issues/detail?id=810
956 instruction=test %edx %edx
957 USER32.dll!GetClassLongW
959 *!ui::CenterAndSizeWindow
962 name=http://code.google.com/p/drmemory/issues/detail?id=815
965 USER32.dll!GetMonitorInfoA
966 ntdll.dll!KiUserCallbackDispatcher
970 # Suppress anything in cmd.exe. It's safer to suppress these than disable
971 # following, since someone might launch a Chrome process via cmd.exe.
977 # Possible true system use after free.
979 name=http://code.google.com/p/drmemory/issues/detail?id=623
980 KERNELBASE.dll!TlsGetValue
981 OLEAUT32.dll!SysFreeString
982 OLEAUT32.dll!SysAllocStringByteLen
988 # basic_streambuf seems to leak something in creating a std::_Mutex
990 name=http://code.google.com/p/drmemory/issues/detail?id=857
992 ntdll.dll!RtlInitializeCriticalSection
994 *!std::_Mutex::_Mutex
995 *!std::basic_streambuf<*>
997 # stdext::hash_map<> seems to swap uninitialized floats.
999 name=http://code.google.com/p/drmemory/issues/detail?id=931
1003 # syscall false positive on handling NtQuerySystemInformation, fix in soon.
1005 name=http://code.google.com/p/drmemory/issues/detail?id=932
1006 KERNEL32.dll!K32GetPerformanceInfo
1008 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though.
1010 name=GDI SetBrushOrgEx leak
1012 GDI32.dll!GetTextMetricsW
1013 *!gfx::PlatformFontWin::CreateHFontRef
1014 *!gfx::PlatformFontWin::GetBaseFontRef
1016 ###############################################################
1017 # Benign issues in Chromium
1019 # This test intentionally leaks an object and checks that it's never deleted.
1021 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
1023 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
1026 name=deliberate histogram leak
1028 *!replace_operator_new
1030 *!*::*Histogram::FactoryGet
1033 name=deliberate leak for SampleMap
1035 *!base::SampleMap::Accumulate
1036 *!base::SparseHistogram::Add
1039 name=deliberate LazyInstance leak
1041 *!*LeakyLazyInstance*
1043 *!base::LazyInstance*::Pointer
1046 name=http://crbug.com/79933 (1)
1048 *!TestURLRequestContext::Init
1051 name=http://crbug.com/79933 (2)
1053 *!TestURLRequestContext::TestURLRequestContext
1054 *!TestURLRequestContextGetter::GetURLRequestContext
1055 *!notifier::SingleLoginAttempt::SingleLoginAttempt
1056 *!notifier::Login::StartConnection
1057 *!syncer::InvalidationNotifier::UpdateCredentials
1058 *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials
1061 name=http://crbug.com/79933 (3)
1063 *!TestURLRequestContext::TestURLRequestContext
1064 *!TestURLRequestContextGetter::GetURLRequestContext
1065 *!URLFetcher::Core::StartURLRequest
1068 name=http://crbug.com/79933 (4)
1071 *!std::_Allocate<net::SSLConfigService::Observer *>
1072 *!std::allocator<net::SSLConfigService::Observer *>::allocate
1073 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::_Insert_n
1074 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::insert
1075 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::push_back
1076 *!ObserverListBase<net::SSLConfigService::Observer>::AddObserver
1078 *!net::HttpNetworkSession::HttpNetworkSession
1079 *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
1080 *!notifier::XmppClientSocketFactory::CreateTransportClientSocket
1081 *!notifier::ChromeAsyncSocket::Connect
1082 *!buzz::XmppClient::ProcessStartXmppLogin
1083 *!buzz::XmppClient::Process
1084 *!talk_base::Task::Step
1085 *!talk_base::TaskRunner::InternalRunTasks
1086 *!talk_base::TaskRunner::RunTasks
1087 *!notifier::TaskPump::CheckAndRunTasks
1088 *!base::internal::RunnableAdapter<void (__thiscall notifier::TaskPump::*)(void)>::Run
1090 # Test intentionally leaks an object.
1092 name=http://crbug.com/86301
1093 *!replace_operator_new
1095 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody
1097 # Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it.
1099 name=Firefox 3 NSS dll leak
1102 *!NSSDecryptor::~NSSDecryptor
1104 # We get uninit reports inside GMock when it prints the bytes of references to
1105 # partially initialized objects passed to unexpected method calls.
1107 name=GMock printing uninit data
1109 *!testing::internal2::PrintBytesInObjectTo
1111 ###############################################################
1112 # Real issues in Chromium
1115 name=http://crbug.com/32085
1117 chrome.dll!NotificationRegistrar::Add
1120 name=http://crbug.com/32623
1122 *!ssl3_HandleHandshakeMessage
1123 *!ssl3_HandleHandshake
1125 *!ssl3_GatherCompleteHandshake
1127 *!SSL_ForceHandshake
1128 *!net::SSLServerSocketNSS::DoHandshake
1129 *!net::SSLServerSocketNSS::DoHandshakeLoop
1132 name=http://crbug.com/57266 (1)
1134 *!remoting::EncoderVp8::Encode
1137 name=http://crbug.com/57266 (2)
1142 name=http://crbug.com/70062
1146 *!InitSessionCacheLocks
1147 *!initSessionCacheLocksLazily
1149 *!ssl_InitSessionCacheLocks
1152 *!ssl2_BeginClientHandshake
1153 *!ssl_Do1stHandshake
1154 *!SSL_ForceHandshake
1155 *!net::SSL*SocketNSS::DoHandshake
1156 *!net::SSL*SocketNSS::DoHandshakeLoop
1159 name=http://crbug.com/74417 a
1160 *!replace_operator_new
1161 *!disk_cache::BackendImpl::CreateEntryImpl
1164 name=http://crbug.com/74417 b
1165 *!replace_operator_new
1166 *!disk_cache::BackendImpl::NewEntry
1168 # One more disk_cache::BackendImpl leak. See also http://crbug.com/87500.
1170 name=http://crbug.com/74417 c
1171 *!replace_operator_new
1173 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
1176 name=http://crbug.com/75247
1178 *!replace_operator_new
1179 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
1182 name=http://crbug.com/78784
1185 *!TestingProfile::CreateRequestContext
1186 *!*ProfileSyncService*::SetUp
1189 name=http://crbug.com/80550 (1)
1191 *!RenderWidgetHost::WasHidden
1194 name=http://crbug.com/80550 (2)
1196 *!RenderWidgetHost::WasRestored
1199 name=http://crbug.com/87612
1201 *!SSL_ConfigSecureServer
1202 *!net::SSLServerSocketNSS::InitializeSSLOptions
1203 *!net::SSLServerSocketNSS::Handshake
1206 name=http://crbug.com/88640
1209 *!ProfileImpl::InitRegisteredProtocolHandlers
1210 *!ProfileImpl::DoFinalInit
1211 *!ProfileImpl::OnPrefsLoaded
1214 name=http://crbug.com/91465
1217 *!browser_sync::internal::WeakHandleCore<browser_sync::JsBackend>::*
1218 *!browser_sync::WeakHandle<browser_sync::JsBackend>::*
1219 *!syncer::SyncManager::SyncInternal::Init
1222 name=http://crbug.com/91491
1224 *!CrxUpdateService::ProcessPendingItems
1227 name=http://crbug.com/92026 (1)
1228 softokn3.dll!FC_GetFunctionList
1230 softokn3.dll!NSC_ModuleDBFunc
1233 name=http://crbug.com/92026 (2)
1234 freebl3.dll!FREEBL_GetVector
1236 softokn3.dll!NSC_ModuleDBFunc
1239 name=http://crbug.com/92166
1241 *!replace_operator_new
1242 *!views::NativeWidgetWin::OnCreate
1244 # Possible real Chromium issue in DoCrossfade.
1246 name=http://crbug.com/110049
1247 *!media::DoCrossfade<*>
1249 *!media::AudioRendererAlgorithmBase::FillBuffer
1251 # Known sqlite3 leaks.
1253 name=http://crbug.com/113847 (1)
1262 name=http://crbug.com/113847 (2)
1268 name=http://crbug.com/115328
1270 *!GenericInfoViewTest_GenericInfoView_Test::TestBody
1273 name=http://crbug.com/116277
1275 *!zipCloseFileInZipRaw64
1278 name=http://crbug.com/117427 a
1280 *!net::HostCache::Set
1281 *!net::HostResolverImpl::CacheResult
1282 *!net::HostResolverImpl::Job::CompleteRequests
1283 *!net::HostResolverImpl::Job::OnProcTaskComplete
1284 *!base::internal::RunnableAdapter<void (__thiscall net::HostResolverImpl::Job::*)(int,net::AddressList const &)>::Run
1286 # Probably related to 117427. Someone is not tearing down DNS resolution during
1289 name=http://crbug.com/117427 b
1292 *!base::internal::WeakReferenceOwner::GetRef
1293 *!base::SupportsWeakPtr<net::HostResolverImpl>::AsWeakPtr
1294 *!net::HostResolverImpl::Job::Job
1295 *!net::HostResolverImpl::Resolve
1296 *!net::SingleRequestHostResolver::Resolve
1297 *!net::TransportConnectJob::DoResolveHost
1298 *!net::TransportConnectJob::DoLoop
1299 *!net::TransportConnectJob::ConnectInternal
1300 *!net::ConnectJob::Connect
1301 *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
1302 *!net::internal::ClientSocketPoolBaseHelper::RequestSocket
1303 *!net::ClientSocketPoolBase<net::TransportSocketParams>::RequestSocket
1304 *!net::TransportClientSocketPool::RequestSocket
1305 *!net::ClientSocketHandle::Init<net::TransportSocketParams,net::TransportClientSocketPool>
1306 *!net::`anonymous namespace'::InitSocketPoolHelper
1307 *!net::InitSocketHandleForRawConnect
1308 *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
1309 *!base::internal::RunnableAdapter<void (__thiscall notifier::ProxyResolvingClientSocket::*)(int)>::Run
1311 # IE frame possible leak of COM object.
1313 name=http://crbug.com/122399
1315 ole32.dll!CoTaskMemAlloc
1317 urlmon.dll!CreateUri
1320 # RenderWidgetHelper leak in DelayProfileDestruction test.
1322 name=http://crbug.com/125565
1325 *!RenderProcessHostImpl::RenderProcessHostImpl
1326 *!SiteInstanceImpl::GetProcess
1327 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
1330 name=http://crbug.com/125807
1333 *!TransportSecurityPersister::TransportSecurityPersister
1334 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest