- add sources.
[platform/framework/web/crosswalk.git] / src / tools / valgrind / drmemory / suppressions_full.txt
1 # This file contains suppressions for the Dr.Memory tool, see
2 # http://dev.chromium.org/developers/how-tos/using-drmemory
3 #
4 # This file should contain suppressions only for the reports happening
5 # in the 'full' mode (drmemory_full).
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
7 # please use suppressions.txt instead.
8
9 ###############################################################
10 # Known reports on the third party we have no control over.
11 UNINITIALIZED READ
12 name=deflate UNINIT
13 ...
14 *!deflate_*
15 *!MOZ_Z_deflate
16
17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
18 LEAK
19 name=http://code.google.com/p/drmemory/issues/detail?id=406
20 ADVAPI32.dll!WmiOpenBlock
21 ADVAPI32.dll!WmiOpenBlock
22
23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
24 LEAK
25 name=GoogleDesktop LEAK
26 ...
27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
28
29 # They deliberately use uninit local var in sqlite random generator
30 UNINITIALIZED READ
31 name=sqlite3_randomness UNINIT
32 *!randomByte
33 *!sqlite3_randomness
34
35 # Intentional leak in WebKit Template Framework for ThreadData.
36 LEAK
37 name=intentional WTF ThreadData leak
38 ...
39 *!WTF::wtfThreadData
40
41 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
42 LEAK
43 name=http://crbug.com/125558 a
44 KERNELBASE.dll!LocalAlloc
45 SECHOST.dll!...
46 SECHOST.dll!NotifyServiceStatusChange
47 WINHTTP.dll!...
48 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
49 *!net::ProxyResolverWinHttp::GetProxyForURL
50
51 # Tiny locale-related leaks in ntdll.  Probably system bug.
52 LEAK
53 name=http://crbug.com/125558 b
54 ntdll.dll!...
55 ntdll.dll!*
56 KERNELBASE.dll!...
57 KERNELBASE.dll!GetCPInfoExW
58 webio.dll!*
59 webio.dll!*
60 webio.dll!*
61 WINHTTP.dll!...
62 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
63 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig
64
65 UNINITIALIZED READ
66 name=http://crbug.com/30704 #f
67 libpng.dll!wk_png_write_find_filter
68 libpng.dll!wk_png_write_row
69
70 ###############################################################
71 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
72 # assumptions or unhandled syscalls
73
74 # Please note: the following suppressions were written in the abscense of
75 # private symbols so may need to be updated when we switch to auto-loading PDBs
76 UNINITIALIZED READ
77 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1)
78 ntdll.dll!Rtl*
79 ntdll.dll!Rtl*
80 ntdll.dll!RtlFindActivationContextSectionString
81
82 UNINITIALIZED READ
83 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2)
84 ...
85 SHELL32.dll!SHFileOperation*
86
87 UNINITIALIZED READ
88 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3)
89 ...
90 SHELL32.dll!SHGetFolderPath*
91
92 LEAK
93 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4)
94 ...
95 SHELL32.dll!SHGetFolderPath*
96
97 UNINITIALIZED READ
98 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5)
99 ...
100 SHELL32.dll!SHCreateDirectory*
101
102 UNINITIALIZED READ
103 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6)
104 ...
105 SHELL32.dll!ILLoadFromStream*
106
107 UNINITIALIZED READ
108 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7)
109 ...
110 SHELL32.dll!ILSaveToStream*
111
112 LEAK
113 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8)
114 ...
115 SHELL32.dll!SHFileOperation*
116
117 UNINITIALIZED READ
118 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9)
119 ...
120 SHELL32.dll!SHGetItemFromDataObject
121
122 LEAK
123 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10)
124 ...
125 SHELL32.dll!SHGetItemFromDataObject
126
127 LEAK
128 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11)
129 ...
130 ole32.dll!*
131 SHELL32.dll!SHChangeNotifySuspendResume
132
133 UNINITIALIZED READ
134 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1)
135 ...
136 *!CreateProcess*
137
138 LEAK
139 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2)
140 ...
141 *!CreateProcess*
142
143 UNINITIALIZED READ
144 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3)
145 ...
146 *!base::LaunchApp*
147
148 UNINITIALIZED READ
149 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1)
150 ...
151 *!CreateWindow*
152
153 POSSIBLE LEAK
154 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2)
155 GDI32.dll!*
156 GDI32.dll!CreateFontIndirectExW
157 GDI32.dll!CreateFontIndirectW
158
159 LEAK
160 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3)
161 KERNELBASE.dll!LocalAlloc
162 ...
163 USER32.dll!CreateWindow*
164
165 UNINITIALIZED READ
166 name=http://code.google.com/p/drmemory/issues/detail?id=18 a
167 ...
168 *!CoInitialize*
169
170 UNINITIALIZED READ
171 name=http://code.google.com/p/drmemory/issues/detail?id=18 b
172 ...
173 *!CoCreateInstance*
174
175 UNINITIALIZED READ
176 name=http://code.google.com/p/drmemory/issues/detail?id=18 c
177 ...
178 *!CoUninitialize*
179
180 UNINITIALIZED READ
181 name=http://code.google.com/p/drmemory/issues/detail?id=18 d
182 ...
183 UxTheme.dll!*
184
185 UNINITIALIZED READ
186 name=http://code.google.com/p/drmemory/issues/detail?id=40 a
187 ...
188 WINSPOOL.DRV!*
189
190 LEAK
191 name=http://code.google.com/p/drmemory/issues/detail?id=40 b
192 ...
193 WINSPOOL.DRV!*
194
195 UNINITIALIZED READ
196 name=http://code.google.com/p/drmemory/issues/detail?id=48 a
197 system call NtContinue
198 ...
199 *!*SetThreadName
200
201 UNINITIALIZED READ
202 name=http://code.google.com/p/drmemory/issues/detail?id=48 b
203 system call NtContinue
204 *!WTF::initializeCurrentThreadInternal
205
206 UNINITIALIZED READ
207 name=http://code.google.com/p/drmemory/issues/detail?id=52 a
208 ...
209 DBGHELP.dll!SymInitialize
210
211 UNINITIALIZED READ
212 name=http://code.google.com/p/drmemory/issues/detail?id=52 b
213 ...
214 DBGHELP.dll!SymEnumSourceFiles
215
216 UNINITIALIZED READ
217 name=http://code.google.com/p/drmemory/issues/detail?id=52 c
218 ...
219 msvcrt.dll!_RTDynamicCast
220
221 UNINITIALIZED READ
222 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp
223 instruction=test   0x*(%*) $0x??
224 DBGHELP.dll!SymUnloadModule64
225
226 UNINITIALIZED READ
227 name=http://code.google.com/p/drmemory/issues/detail?id=53
228 ADVAPI32.dll!WmiMofEnumerateResourcesA
229 ADVAPI32.dll!WmiMofEnumerateResourcesA
230 ADVAPI32.dll!Sta*TraceW
231
232 UNINITIALIZED READ
233 name=http://code.google.com/p/drmemory/issues/detail?id=58
234 ...
235 *!_cfltcvt_l
236
237 UNINITIALIZED READ
238 name=http://code.google.com/p/drmemory/issues/detail?id=60
239 USP10.dll!*
240 ...
241 USP10.dll!ScriptStringAnalyse
242
243 LEAK
244 IMM32.dll!ImmGetIMCCSize
245 IMM32.dll!ImmLockClientImc
246 IMM32.dll!ImmDisableIME
247 IMM32.dll!ImmSetActiveContext
248 USER32.dll!IMPSetIMEA
249
250 UNINITIALIZED READ
251 name=http://code.google.com/p/drmemory/issues/detail?id=65 a
252 ...
253 *!SystemFunction036
254
255 UNINITIALIZED READ
256 name=http://code.google.com/p/drmemory/issues/detail?id=65 b
257 ...
258 *!talk_base::CreateRandomString
259
260 UNINITIALIZED READ
261 name=http://code.google.com/p/drmemory/issues/detail?id=68 a
262 ...
263 WS2_32.dll!*
264
265 UNINITIALIZED READ
266 name=http://code.google.com/p/drmemory/issues/detail?id=68 b
267 ...
268 ADVAPI32.dll!SetSecurityDescriptorDacl
269
270 UNINITIALIZED READ
271 name=http://code.google.com/p/drmemory/issues/detail?id=68 c
272 ...
273 MSWSOCK.dll!WSPStartup
274
275 UNINITIALIZED READ
276 name=http://code.google.com/p/drmemory/issues/detail?id=68 d
277 ...
278 ntdll.dll!RtlValidateUnicodeString
279
280 LEAK
281 name=http://code.google.com/p/drmemory/issues/detail?id=256
282 *!_mtinit
283 *!__tmainCRTStartup
284 *!mainCRTStartup
285
286 POSSIBLE LEAK
287 name=http://code.google.com/p/drmemory/issues/detail?id=274 a
288 ...
289 GDI32.dll!CreateDCW
290
291 LEAK
292 name=http://code.google.com/p/drmemory/issues/detail?id=274 b
293 ...
294 GDI32.dll!CreateDCW
295
296 LEAK
297 name=http://code.google.com/p/drmemory/issues/detail?id=275
298 ...
299 *!_getptd*
300
301 UNINITIALIZED READ
302 name=http://code.google.com/p/drmemory/issues/detail?id=276
303 ...
304 ntdll.dll!RtlConvertUlongToLargeInteger
305 ntdll.dll!RtlConvertUlongToLargeInteger
306 ntdll.dll!KiUserExceptionDispatcher
307
308 LEAK
309 name=http://code.google.com/p/drmemory/issues/detail?id=305
310 *!free
311 *!free
312 *!operator new
313 ...
314 *!MiniDumpWriteDump
315
316 UNINITIALIZED READ
317 name=http://code.google.com/p/drmemory/issues/detail?id=346 a
318 ...
319 GDI32.dll!CloseEnhMetaFile
320
321 UNINITIALIZED READ
322 name=http://code.google.com/p/drmemory/issues/detail?id=346 b
323 GDI32.dll!SetPolyFillMode
324 GDI32.dll!CreateICW
325
326 UNINITIALIZED READ
327 name=http://code.google.com/p/drmemory/issues/detail?id=362
328 USER32.dll!UnregisterClass*
329
330 LEAK
331 name=http://code.google.com/p/drmemory/issues/detail?id=382
332 ...
333 ntdll.dll!CsrNewThread
334
335 UNINITIALIZED READ
336 name=http://code.google.com/p/drmemory/issues/detail?id=397
337 system call NtDeviceIoControlFile InputBuffer
338 ADVAPI32.dll!ImpersonateAnonymousToken
339
340 UNINITIALIZED READ
341 name=http://code.google.com/p/drmemory/issues/detail?id=407 a
342 system call NtRequestWaitReplyPort
343 RPCRT4.dll!I_RpcSendReceive
344 RPCRT4.dll!NdrSendReceive
345
346 UNINITIALIZED READ
347 name=http://code.google.com/p/drmemory/issues/detail?id=407 b
348 IMM32.dll!*
349 ntdll.dll!LdrInitializeThunk
350 ntdll.dll!LdrShutdownThread
351
352 UNINITIALIZED READ
353 name=http://code.google.com/p/drmemory/issues/detail?id=412 a
354 ADVAPI32.dll!RegDeleteValue*
355
356 UNINITIALIZED READ
357 name=http://code.google.com/p/drmemory/issues/detail?id=412 b
358 ...
359 ADVAPI32.dll!Crypt*
360
361 UNINITIALIZED READ
362 name=http://code.google.com/p/drmemory/issues/detail?id=412 c
363 ...
364 RPCRT4.dll!NdrClientCall2
365
366 LEAK
367 name=http://code.google.com/p/drmemory/issues/detail?id=412 d
368 RSAENH.dll!DllUnregisterServer
369 ...
370 ADVAPI32.dll!CryptAcquireContextA
371 CRYPT32.dll!CryptEnumOIDFunction
372 ...
373 CRYPT32.dll!CertFindCertificateInStore
374
375 UNINITIALIZED READ
376 name=http://code.google.com/p/drmemory/issues/detail?id=412 e
377 ...
378 RSAENH.dll!CPGenRandom
379
380 UNINITIALIZED READ
381 name=http://code.google.com/p/drmemory/issues/detail?id=412 f
382 ...
383 CRYPT??.dll!Crypt*
384
385 UNINITIALIZED READ
386 name=http://code.google.com/p/drmemory/issues/detail?id=412 g
387 *!replace_memcmp
388 ...
389 *!testing::internal::CmpHelperEQ*
390 ...
391 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
392
393 # We get these sometimes from AesEncrypt and AesExpandKey.  AesEncrypt doesn't
394 # have frame pointers, and we have trouble unwinding from it.  Therefore, we use
395 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
396 UNINITIALIZED READ
397 name=http://code.google.com/p/drmemory/issues/detail?id=412 h
398 RSAENH.dll!*
399
400 UNINITIALIZED READ
401 name=http://code.google.com/p/drmemory/issues/detail?id=425 a
402 CLBCatQ.DLL!DestroyStgDatabase
403 CLBCatQ.DLL!PostError
404 CLBCatQ.DLL!PostError
405
406 LEAK
407 name=http://code.google.com/p/drmemory/issues/detail?id=425 b
408 RPCRT4.dll!I_RpcBCacheFree
409 RPCRT4.dll!I_RpcBCacheFree
410 ...
411 RPCRT4.dll!NdrClientCall2
412
413 UNINITIALIZED READ
414 name=http://code.google.com/p/drmemory/issues/detail?id=425 c
415 msdmo.dll!*
416 msdmo.dll!*
417 DEVENUM.DLL!*
418
419 UNINITIALIZED READ
420 name=http://code.google.com/p/drmemory/issues/detail?id=435 a
421 ...
422 ntdll.dll!RtlSetSecurityObject
423 ntdll.dll!RtlNewSecurityObjectEx
424 ADVAPI32.dll!CreatePrivateObjectSecurityEx
425 NTMARTA.dll!AccRewriteSetNamedRights
426
427 POSSIBLE LEAK
428 name=http://code.google.com/p/drmemory/issues/detail?id=435 b
429 WLDAP32.dll!Ordinal325
430 ...
431 WLDAP32.dll!Ordinal325
432 ntdll.dll!LdrInitializeThunk
433 ntdll.dll!LdrFindResourceDirectory_U
434 ntdll.dll!RtlValidateUnicodeString
435 ntdll.dll!LdrLoadDll
436 KERNEL32.dll!LoadLibraryExW
437
438 # mod+offs suppression because the symbolic makes no sense and changes
439 # completely in the presence of WS2_32.dll symbols.
440 LEAK
441 name=http://code.google.com/p/drmemory/issues/detail?id=438
442 <WS2_32.dll+0x260c>
443 <WS2_32.dll+0x2b76>
444 <WS2_32.dll+0x2c61>
445
446 UNINITIALIZED READ
447 name=http://code.google.com/p/drmemory/issues/detail?id=454 a
448 ...
449 WINMM.dll!wave*GetNumDevs
450
451 LEAK
452 name=http://code.google.com/p/drmemory/issues/detail?id=454 b
453 ...
454 WINMM.dll!wave*GetNumDevs
455
456 LEAK
457 name=http://code.google.com/p/drmemory/issues/detail?id=466
458 ntdll.dll!RtlRunOnceBeginInitialize
459 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
460
461 UNINITIALIZED READ
462 name=http://code.google.com/p/drmemory/issues/detail?id=471 a
463 *!media::AudioRendererAlgorithmOLA::Crossfade<unsigned char>
464 *!media::AudioRendererAlgorithmOLA::FillBuffer
465 *!media::AudioRendererAlgorithmOLATest_FillBuffer_*
466
467 # Uninit reported in copy ctor.  Would be nice if we could specify which ctor
468 # overload to suppress.
469 UNINITIALIZED READ
470 name=http://code.google.com/p/drmemory/issues/detail?id=471 b
471 *!WebCore::FormDataElement::FormDataElement
472
473 # Another default copy ctor uninit.
474 UNINITIALIZED READ
475 name=http://code.google.com/p/drmemory/issues/detail?id=471 c
476 *!WebCore::CachedResourceLoader::InitiatorInfo::InitiatorInfo
477 ...
478 *!WTF::Hash*
479
480 UNINITIALIZED READ
481 name=http://code.google.com/p/drmemory/issues/detail?id=473 a
482 system call NtDeviceIoControlFile InputBuffer
483 ...
484 iphlpapi.dll!GetAdaptersAddresses
485
486 POSSIBLE LEAK
487 name=http://code.google.com/p/drmemory/issues/detail?id=473 b
488 ESENT.dll!*
489 ESENT.dll!*
490 ESENT.dll!*
491 ntdll.dll!Ldr*Init*
492 ntdll.dll!Ldr*
493 ntdll.dll!*
494 ntdll.dll!LdrLoadDll
495 ...
496 iphlpapi.dll!GetPerAdapterInfo
497 ...
498 iphlpapi.dll!GetAdaptersAddresses
499
500 POSSIBLE LEAK
501 name=http://code.google.com/p/drmemory/issues/detail?id=473 c
502 RPCRT4.dll!*
503 RPCRT4.dll!*
504 ...
505 IPHLPAPI.DLL!GetAdaptersAddresses
506
507 LEAK
508 name=http://code.google.com/p/drmemory/issues/detail?id=475
509 ...
510 ADVAPI32.dll!CryptAcquireContextA
511 ...
512 CRYPT32.dll!CryptMsgOpenToDecode
513 ...
514 CRYPT32.dll!CryptQueryObject
515
516 # Lots of leaks from our interactions with the system certificate store.  May be
517 # worth reviewing our use of their API.
518 LEAK
519 name=http://code.google.com/p/drmemory/issues/detail?id=476 a
520 KERNEL*.dll!LocalAlloc
521 ...
522 CRYPT32.dll!CertGetCRLContextProperty
523
524 LEAK
525 name=http://code.google.com/p/drmemory/issues/detail?id=476 b
526 KERNEL*.dll!LocalAlloc
527 ...
528 CRYPT32.dll!CertAddCRLContextToStore
529
530 LEAK
531 name=http://code.google.com/p/drmemory/issues/detail?id=476 c
532 KERNEL*.dll!LocalAlloc
533 ...
534 CRYPT32.dll!CertOpenStore
535
536 LEAK
537 name=http://code.google.com/p/drmemory/issues/detail?id=476 d
538 ...
539 CRYPT32.dll!CertOpenSystemStore?
540
541 LEAK
542 name=http://code.google.com/p/drmemory/issues/detail?id=476 e
543 ...
544 CRYPT32.dll!CertGetCertificateChain
545
546 LEAK
547 name=http://code.google.com/p/drmemory/issues/detail?id=476 f
548 ...
549 CRYPT32.dll!CertCompareIntegerBlob
550
551 LEAK
552 name=http://code.google.com/p/drmemory/issues/detail?id=476 g
553 ...
554 CRYPT32.dll!CryptUnprotectData
555
556 LEAK
557 name=http://code.google.com/p/drmemory/issues/detail?id=476 h
558 KERNEL*.dll!LocalAlloc
559 ...
560 CRYPT32.dll!CertEnumCertificatesInStore
561
562 LEAK
563 name=http://code.google.com/p/drmemory/issues/detail?id=476 i
564 ...
565 CRYPT32.dll!CryptProtectData
566
567 LEAK
568 name=http://code.google.com/p/drmemory/issues/detail?id=476 j
569 ...
570 CRYPT32.dll!CryptExportPublicKeyInfoEx
571
572 UNINITIALIZED READ
573 name=http://code.google.com/p/drmemory/issues/detail?id=502 a
574 system call NtSecureConnectPort parameter #3
575 GDI32.dll!*
576 GDI32.dll!*
577
578 UNINITIALIZED READ
579 name=http://code.google.com/p/drmemory/issues/detail?id=502 b
580 system call NtGdiEnumFonts parameter #6
581 GDI32.dll!*
582 GDI32.dll!*
583
584 UNINITIALIZED READ
585 name=http://code.google.com/p/drmemory/issues/detail?id=511 a
586 RPCRT4.dll!...
587 ole32.dll!*
588
589 UNINITIALIZED READ
590 name=http://code.google.com/p/drmemory/issues/detail?id=511 b
591 ole32.dll!*
592 ole32.dll!*
593 ole32.dll!StringFromGUID2
594
595 UNINITIALIZED READ
596 name=http://code.google.com/p/drmemory/issues/detail?id=512 a
597 ...
598 *!browser_sync::Cryptographer::PackBootstrapToken
599 *!browser_sync::Cryptographer::GetBootstrapToken
600
601 UNINITIALIZED READ
602 name=http://code.google.com/p/drmemory/issues/detail?id=512 b
603 ...
604 *!Encrypt*
605
606 UNINITIALIZED READ
607 name=http://code.google.com/p/drmemory/issues/detail?id=513 a
608 *!v8*
609
610 UNINITIALIZED READ
611 name=http://code.google.com/p/drmemory/issues/detail?id=513 b
612 *!*
613 *!v8*
614
615 UNINITIALIZED READ
616 name=http://code.google.com/p/drmemory/issues/detail?id=513 c
617 <not in a module>
618 ...
619 *!v8*
620
621 UNINITIALIZED READ
622 name=http://code.google.com/p/drmemory/issues/detail?id=546
623 ...
624 mscms.dll!*
625 ...
626 GDI32.dll!*
627 *!IconUtil::Create*HICON*
628
629 LEAK
630 name=http://crbug.com/92152
631 ...
632 USER32.dll!CreateWindowExW
633 *!views::TooltipManagerWin::Init
634 *!views::TooltipManagerWin::TooltipManagerWin
635
636 UNINITIALIZED READ
637 name=http://code.google.com/p/drmemory/issues/detail?id=567 a
638 dbghelp.dll!*
639 ...
640 dbghelp.dll!StackWalk64
641
642 LEAK
643 name=http://code.google.com/p/drmemory/issues/detail?id=567 b
644 *!*
645 dbghelp.dll!*
646 ...
647 dbghelp.dll!StackWalk64
648
649 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
650 # TppWorkerThread w/ syms.  We used to use mod+offs here, but that was too
651 # brittle, so we switched to RPCRT4.dll!*.
652 LEAK
653 name=http://code.google.com/p/drmemory/issues/detail?id=569
654 RPCRT4.dll!...
655 ntdll.dll!*
656 ntdll.dll!*
657 KERNEL*.dll!BaseThreadInitThunk
658
659 # TODO(timurrrr): investigate these
660 UNINITIALIZED READ
661 name=http://crbug.com/TODO a
662 ...
663 *!win_util::GetLogonSessionOnlyDACL
664
665 UNINITIALIZED READ
666 name=http://crbug.com/TODO b
667 ...
668 ntshrui.dll!IsPathSharedW
669
670 UNINITIALIZED READ
671 name=http://crbug.com/TODO c
672 ...
673 *!NetApiBufferFree
674
675 UNINITIALIZED READ
676 name=http://crbug.com/TODO d
677 ...
678 *!ShellExecute*
679
680 UNINITIALIZED READ
681 name=http://crbug.com/TODO e
682 ...
683 *!SHParseDisplayName
684
685 UNINITIALIZED READ
686 name=http://crbug.com/TODO f
687 ...
688 *!GetCanonicalPathInfo*
689
690 UNINITIALIZED READ
691 name=http://crbug.com/TODO g
692 ...
693 SHELL32.dll!Ordinal*
694
695 UNINITIALIZED READ
696 name=http://crbug.com/TODO h
697 ...
698 GDI32.dll!GetTextExtentPoint32*
699
700 UNINITIALIZED READ
701 name=http://crbug.com/TODO i
702 ...
703 *!SyncSocketClientListener::OnMsgClassResponse
704
705 UNINITIALIZED READ
706 name=http://crbug.com/TODO j
707 ...
708 *!*NSPRInitSingleton*
709
710 UNINITIALIZED READ
711 name=http://crbug.com/TODO k
712 *!NdrSimpleStructFree
713
714 UNINITIALIZED READ
715 name=http://crbug.com/TODO l
716 ntdll.dll!RtlpNtOpenKey
717 ntdll.dll!RtlMakeSelfRelativeSD
718 ntdll.dll!RtlAbsoluteToSelfRelativeSD
719 ADVAPI32.dll!MakeSelfRelativeSD
720
721 UNINITIALIZED READ
722 name=http://crbug.com/TODO m
723 ...
724 CRYPT32.dll!I_CertSyncStore
725
726 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
727 # a leak.  Must be some early thread initialization.  Doesn't look like
728 # bit-level though.
729 UNINITIALIZED READ
730 name=http://crbug.com/TODO n
731 RPCRT4.dll!*
732 RPCRT4.dll!*
733 RPCRT4.dll!*
734 ntdll.dll!*
735 ntdll.dll!*
736 KERNEL*.dll!BaseThreadInitThunk
737
738 # No idea where this is from, but Chrome isn't even on the stack.
739 POSSIBLE LEAK
740 name=http://crbug.com/TODO o
741 RPCRT4.dll!...
742 ole32.dll!OleInitialize
743 ole32.dll!...
744 KERNEL32.dll!BaseThreadInitThunk
745
746 # Matches lots of RPC related leaks.  So far RPC handles have been mostly owned
747 # by system libraries and are not something we can fix easily.
748 POSSIBLE LEAK
749 name=http://crbug.com/TODO p
750 RPCRT4.dll!*
751 RPCRT4.dll!*
752 RPCRT4.dll!NDRCContextBinding
753
754 # No idea, but all system code, not interesting.
755 POSSIBLE LEAK
756 name=http://crbug.com/TODO q
757 RPCRT4.dll!...
758 RPCRT4.dll!*
759 RPCRT4.dll!*
760 ole32.dll!...
761 ole32.dll!*
762 ole32.dll!*
763 ...
764 SHELL32.dll!*
765
766 LEAK
767 name=http://crbug.com/109278 video device COM leaks
768 ...
769 *!media::VideoCaptureDevice::*
770
771 LEAK
772 name=http://crbug.com/109278 audio device COM leaks
773 ...
774 *!media::GetInputDeviceNamesWin
775
776 # False pos uninit in shell32 when resolving links.
777 UNINITIALIZED READ
778 name=http://code.google.com/p/drmemory/issues/detail?id=745
779 SHELL*.dll!*
780 ...
781 SHELL*.dll!*
782 *!file_util::ResolveShortcut
783
784 # Probable false pos uninit in ffmpeg.  Probably due to running off the end of a
785 # buffer with SSE/MMX instructions whose results are then masked out later.
786 UNINITIALIZED READ
787 name=http://code.google.com/p/drmemory/issues/detail?id=747 a
788 *!ff_pred4x4_vertical_vp8_mmxext
789
790 UNINITIALIZED READ
791 name=http://code.google.com/p/drmemory/issues/detail?id=747 b
792 *!ff_pred4x4_down_left_mmxext
793
794 UNINITIALIZED READ
795 name=http://code.google.com/p/drmemory/issues/detail?id=747 c
796 *!ff_vorbis_floor1_render_list
797
798 UNINITIALIZED READ
799 name=http://code.google.com/p/drmemory/issues/detail?id=747 d
800 *!ff_put_vp8_epel8_h6_ssse3
801
802 UNINITIALIZED READ
803 name=http://code.google.com/p/drmemory/issues/detail?id=747 e
804 *!ff_put_vp8_epel8_h4_ssse3
805
806 UNINITIALIZED READ
807 name=http://code.google.com/p/drmemory/issues/detail?id=747 f
808 *!ff_fft_permute_sse
809
810 UNINITIALIZED READ
811 name=http://code.google.com/p/drmemory/issues/detail?id=747 g
812 *!ff_simple_idct_add_mmx
813
814 # ffmpeg seems to leak a pthread condition variable.
815 LEAK
816 name=http://crbug.com/110042
817 *!ptw32_new
818 *!pthread_self
819 *!sem_wait
820 *!pthread_cond_wait
821 *!ff_thread_decode_frame
822 *!avcodec_decode_video2
823
824 # Improperly handled ioctl in bcrypt.
825 UNINITIALIZED READ
826 name=http://code.google.com/p/drmemory/issues/detail?id=748
827 system call NtDeviceIoControlFile InputBuffer
828 bcrypt.dll!BCryptUnregisterConfigChangeNotify
829 bcrypt.dll!BCryptGetFipsAlgorithmMode
830 ntdll.dll!RtlQueryEnvironmentVariable
831
832 # Not sure what this is.
833 POSSIBLE LEAK
834 name=http://code.google.com/p/drmemory/issues/detail?id=749
835 ...
836 fwpuclnt.dll!*
837 ...
838 RPCRT4.dll!*
839 ...
840 fwpuclnt.dll!*
841 ...
842 WS2_32.dll!*
843 *!talk_base::SafeGetHostByName
844 *!talk_base::SocketAddress::GetLocalIPs
845 *!talk_base::SocketAddress::IsLocalIP
846 *!cricket::Transport::VerifyCandidate
847 *!cricket::Session::OnRemoteCandidates
848 *!cricket::Session::OnTransportInfoMessage
849 *!cricket::Session::OnIncomingMessage
850 *!cricket::SessionManager::OnIncomingMessage
851
852 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
853 UNINITIALIZED READ
854 name=http://code.google.com/p/drmemory/issues/detail?id=529
855 RPCRT4.dll!*
856 ...
857 *!base::LaunchProcess
858
859 # System leak from CreateEnvironmentBlock.
860 LEAK
861 name=http://code.google.com/p/drmemory/issues/detail?id=757
862 ...
863 USERENV.dll!CreateEnvironmentBlock
864
865 # Looks like another instance of 753
866 LEAK
867 name=http://code.google.com/p/drmemory/issues/detail?id=753
868 ...
869 ntdll.dll!RtlLoadString
870
871 # More bit manip fps
872 UNINITIALIZED READ
873 name=http://code.google.com/p/drmemory/issues/detail?id=493
874 USP10.dll!ScriptPositionSingleGlyph
875
876 # Various TLS leaks that we don't understand yet.  We should be finding a root
877 # for these.
878 LEAK
879 name=http://code.google.com/p/drmemory/issues/detail?id=778 a
880 KERNELBASE.dll!TlsSetValue
881
882 # Originally filed as: http://crbug.com/109281
883 LEAK
884 name=http://code.google.com/p/drmemory/issues/detail?id=778 b
885 *!operator new
886 *!operator new[]
887 *!*::ConstructTlsVector
888 *!base::ThreadLocalStorage::StaticSlot::Get
889
890 # This is an NSS PRThread object installed in TLS.  Why isn't this detected as a
891 # root?  See also http://crbug.com/32624
892 LEAK
893 name=http://code.google.com/p/drmemory/issues/detail?id=778 c
894 *!PR_Calloc
895 *!_PR_AttachThread
896 *!_PRI_AttachThread
897
898 # Bit-level fps in rich edit layer.
899 UNINITIALIZED READ
900 name=http://code.google.com/p/drmemory/issues/detail?id=791
901 RICHED20.dll!*
902 RICHED20.dll!*
903
904 # Already suppressed by drmemory default supp we don't have yet.
905 LEAK
906 name=i#757: RPC binding leaks in sspicli.dll
907 RPCRT4.dll!*
908 ...
909 SspiCli.dll!*
910 SspiCli.dll!Cre*
911
912 # Async NtReadFile false positives.  This was fixed in drmemory r772, remove
913 # this supp when we pull that rev.
914 UNADDRESSABLE ACCESS
915 name=http://code.google.com/p/drmemory/issues/detail?id=798
916 system call NtReadFile parameter #5
917 KERNEL32.dll!ReadFile
918
919 # Probable syscall false positive.
920 UNADDRESSABLE ACCESS
921 name=http://code.google.com/p/drmemory/issues/detail?id=809
922 system call NtGdiPolyPolyDraw parameter #1
923 *!gfx::Path::CreateNativeRegion
924
925 # Very wide suppression for all uninits in rpcrt4.dll.  We get bad stack traces
926 # coming out of this module (sometimes only one frame), which makes it hard to
927 # write precise suppressions.  Until we have bit-level tracking (DRMi#113) we
928 # should keep this.
929 UNINITIALIZED READ
930 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard
931 RPCRT4.dll!*
932
933 UNINITIALIZED READ
934 name=http://code.google.com/p/drmemory/issues/detail?id=841 a
935 ...
936 CRYPTNET.dll!I_CryptNetGetConnectivity
937
938 UNINITIALIZED READ
939 name=http://code.google.com/p/drmemory/issues/detail?id=841 b
940 ...
941 webio.dll!*
942
943 UNINITIALIZED READ
944 name=http://code.google.com/p/drmemory/issues/detail?id=841 c
945 ...
946 winhttp.dll!*
947
948 LEAK
949 name=http://code.google.com/p/drmemory/issues/detail?id=841 d
950 ...
951 CRYPTNET.dll!I_CryptNetGetConnectivity
952
953 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
954 UNINITIALIZED READ
955 name=http://code.google.com/p/drmemory/issues/detail?id=810
956 instruction=test   %edx %edx
957 USER32.dll!GetClassLongW
958 ...
959 *!ui::CenterAndSizeWindow
960
961 UNINITIALIZED READ
962 name=http://code.google.com/p/drmemory/issues/detail?id=815
963 KERNEL*.dll!...
964 dxgi.dll!*
965 USER32.dll!GetMonitorInfoA
966 ntdll.dll!KiUserCallbackDispatcher
967 dxgi.dll!*
968 WinSATAPI.DLL!*
969
970 # Suppress anything in cmd.exe.  It's safer to suppress these than disable
971 # following, since someone might launch a Chrome process via cmd.exe.
972 LEAK
973 name=cmd.exe
974 ...
975 cmd.exe!*
976
977 # Possible true system use after free.
978 UNADDRESSABLE ACCESS
979 name=http://code.google.com/p/drmemory/issues/detail?id=623
980 KERNELBASE.dll!TlsGetValue
981 OLEAUT32.dll!SysFreeString
982 OLEAUT32.dll!SysAllocStringByteLen
983 OLEACC.dll!*
984 OLEACC.dll!*
985 OLEACC.dll!*
986 OLEACC.dll!*
987
988 # basic_streambuf seems to leak something in creating a std::_Mutex
989 LEAK
990 name=http://code.google.com/p/drmemory/issues/detail?id=857
991 ntdll.dll!...
992 ntdll.dll!RtlInitializeCriticalSection
993 *!_Mtxinit
994 *!std::_Mutex::_Mutex
995 *!std::basic_streambuf<*>
996
997 # stdext::hash_map<> seems to swap uninitialized floats.
998 UNINITIALIZED READ
999 name=http://code.google.com/p/drmemory/issues/detail?id=931
1000 *!std::swap<float>
1001 *!std::_Hash<*
1002
1003 # syscall false positive on handling NtQuerySystemInformation, fix in soon.
1004 UNINITIALIZED READ
1005 name=http://code.google.com/p/drmemory/issues/detail?id=932
1006 KERNEL32.dll!K32GetPerformanceInfo
1007
1008 # Seems to create a DC, sometimes.  GetTextMetrics returns no pointers, though.
1009 LEAK
1010 name=GDI SetBrushOrgEx leak
1011 GDI32.dll!...
1012 GDI32.dll!GetTextMetricsW
1013 *!gfx::PlatformFontWin::CreateHFontRef
1014 *!gfx::PlatformFontWin::GetBaseFontRef
1015
1016 ###############################################################
1017 # Benign issues in Chromium
1018
1019 # This test intentionally leaks an object and checks that it's never deleted.
1020 LEAK
1021 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
1022 ...
1023 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
1024
1025 LEAK
1026 name=deliberate histogram leak
1027 ...
1028 *!replace_operator_new
1029 ...
1030 *!*::*Histogram::FactoryGet
1031
1032 LEAK
1033 name=deliberate leak for SampleMap
1034 ...
1035 *!base::SampleMap::Accumulate
1036 *!base::SparseHistogram::Add
1037
1038 LEAK
1039 name=deliberate LazyInstance leak
1040 ...
1041 *!*LeakyLazyInstance*
1042 ...
1043 *!base::LazyInstance*::Pointer
1044
1045 LEAK
1046 name=http://crbug.com/79933 (1)
1047 ...
1048 *!TestURLRequestContext::Init
1049
1050 LEAK
1051 name=http://crbug.com/79933 (2)
1052 ...
1053 *!TestURLRequestContext::TestURLRequestContext
1054 *!TestURLRequestContextGetter::GetURLRequestContext
1055 *!notifier::SingleLoginAttempt::SingleLoginAttempt
1056 *!notifier::Login::StartConnection
1057 *!syncer::InvalidationNotifier::UpdateCredentials
1058 *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials
1059
1060 LEAK
1061 name=http://crbug.com/79933 (3)
1062 ...
1063 *!TestURLRequestContext::TestURLRequestContext
1064 *!TestURLRequestContextGetter::GetURLRequestContext
1065 *!URLFetcher::Core::StartURLRequest
1066
1067 LEAK
1068 name=http://crbug.com/79933 (4)
1069 *!generic_cpp_alloc
1070 *!operator new
1071 *!std::_Allocate<net::SSLConfigService::Observer *>
1072 *!std::allocator<net::SSLConfigService::Observer *>::allocate
1073 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::_Insert_n
1074 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::insert
1075 *!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::push_back
1076 *!ObserverListBase<net::SSLConfigService::Observer>::AddObserver
1077 ...
1078 *!net::HttpNetworkSession::HttpNetworkSession
1079 *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
1080 *!notifier::XmppClientSocketFactory::CreateTransportClientSocket
1081 *!notifier::ChromeAsyncSocket::Connect
1082 *!buzz::XmppClient::ProcessStartXmppLogin
1083 *!buzz::XmppClient::Process
1084 *!talk_base::Task::Step
1085 *!talk_base::TaskRunner::InternalRunTasks
1086 *!talk_base::TaskRunner::RunTasks
1087 *!notifier::TaskPump::CheckAndRunTasks
1088 *!base::internal::RunnableAdapter<void (__thiscall notifier::TaskPump::*)(void)>::Run
1089
1090 # Test intentionally leaks an object.
1091 LEAK
1092 name=http://crbug.com/86301
1093 *!replace_operator_new
1094 ...
1095 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody
1096
1097 # Leak in a binary copy of Firefox 3's NSS dll.  Not much we can do about it.
1098 LEAK
1099 name=Firefox 3 NSS dll leak
1100 nspr4.dll!*
1101 ...
1102 *!NSSDecryptor::~NSSDecryptor
1103
1104 # We get uninit reports inside GMock when it prints the bytes of references to
1105 # partially initialized objects passed to unexpected method calls.
1106 UNINITIALIZED READ
1107 name=GMock printing uninit data
1108 ...
1109 *!testing::internal2::PrintBytesInObjectTo
1110
1111 ###############################################################
1112 # Real issues in Chromium
1113
1114 LEAK
1115 name=http://crbug.com/32085
1116 ...
1117 chrome.dll!NotificationRegistrar::Add
1118
1119 LEAK
1120 name=http://crbug.com/32623
1121 ...
1122 *!ssl3_HandleHandshakeMessage
1123 *!ssl3_HandleHandshake
1124 *!ssl3_HandleRecord
1125 *!ssl3_GatherCompleteHandshake
1126 ...
1127 *!SSL_ForceHandshake
1128 *!net::SSLServerSocketNSS::DoHandshake
1129 *!net::SSLServerSocketNSS::DoHandshakeLoop
1130
1131 UNINITIALIZED READ
1132 name=http://crbug.com/57266 (1)
1133 ...
1134 *!remoting::EncoderVp8::Encode
1135
1136 UNINITIALIZED READ
1137 name=http://crbug.com/57266 (2)
1138 ...
1139 *!vp8_*
1140
1141 LEAK
1142 name=http://crbug.com/70062
1143 *!PR_Calloc
1144 *!PR_NewLock
1145 ...
1146 *!InitSessionCacheLocks
1147 *!initSessionCacheLocksLazily
1148 *!PR_CallOnce
1149 *!ssl_InitSessionCacheLocks
1150 *!lock_cache
1151 *!ssl_LookupSID
1152 *!ssl2_BeginClientHandshake
1153 *!ssl_Do1stHandshake
1154 *!SSL_ForceHandshake
1155 *!net::SSL*SocketNSS::DoHandshake
1156 *!net::SSL*SocketNSS::DoHandshakeLoop
1157
1158 LEAK
1159 name=http://crbug.com/74417 a
1160 *!replace_operator_new
1161 *!disk_cache::BackendImpl::CreateEntryImpl
1162
1163 LEAK
1164 name=http://crbug.com/74417 b
1165 *!replace_operator_new
1166 *!disk_cache::BackendImpl::NewEntry
1167
1168 # One more disk_cache::BackendImpl leak.  See also http://crbug.com/87500.
1169 LEAK
1170 name=http://crbug.com/74417 c
1171 *!replace_operator_new
1172 ...
1173 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
1174
1175 LEAK
1176 name=http://crbug.com/75247
1177 ...
1178 *!replace_operator_new
1179 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
1180
1181 LEAK
1182 name=http://crbug.com/78784
1183 *!generic_cpp_alloc
1184 *!operator new
1185 *!TestingProfile::CreateRequestContext
1186 *!*ProfileSyncService*::SetUp
1187
1188 LEAK
1189 name=http://crbug.com/80550 (1)
1190 ...
1191 *!RenderWidgetHost::WasHidden
1192
1193 LEAK
1194 name=http://crbug.com/80550 (2)
1195 ...
1196 *!RenderWidgetHost::WasRestored
1197
1198 LEAK
1199 name=http://crbug.com/87612
1200 ...
1201 *!SSL_ConfigSecureServer
1202 *!net::SSLServerSocketNSS::InitializeSSLOptions
1203 *!net::SSLServerSocketNSS::Handshake
1204
1205 LEAK
1206 name=http://crbug.com/88640
1207 *!generic_cpp_alloc
1208 *!operator new
1209 *!ProfileImpl::InitRegisteredProtocolHandlers
1210 *!ProfileImpl::DoFinalInit
1211 *!ProfileImpl::OnPrefsLoaded
1212
1213 LEAK
1214 name=http://crbug.com/91465
1215 *!generic_cpp_alloc
1216 *!operator new
1217 *!browser_sync::internal::WeakHandleCore<browser_sync::JsBackend>::*
1218 *!browser_sync::WeakHandle<browser_sync::JsBackend>::*
1219 *!syncer::SyncManager::SyncInternal::Init
1220
1221 LEAK
1222 name=http://crbug.com/91491
1223 ...
1224 *!CrxUpdateService::ProcessPendingItems
1225
1226 UNINITIALIZED READ
1227 name=http://crbug.com/92026 (1)
1228 softokn3.dll!FC_GetFunctionList
1229 ...
1230 softokn3.dll!NSC_ModuleDBFunc
1231
1232 UNINITIALIZED READ
1233 name=http://crbug.com/92026 (2)
1234 freebl3.dll!FREEBL_GetVector
1235 ...
1236 softokn3.dll!NSC_ModuleDBFunc
1237
1238 LEAK
1239 name=http://crbug.com/92166
1240 ...
1241 *!replace_operator_new
1242 *!views::NativeWidgetWin::OnCreate
1243
1244 # Possible real Chromium issue in DoCrossfade.
1245 UNINITIALIZED READ
1246 name=http://crbug.com/110049
1247 *!media::DoCrossfade<*>
1248 *!media::Crossfade
1249 *!media::AudioRendererAlgorithmBase::FillBuffer
1250
1251 # Known sqlite3 leaks.
1252 LEAK
1253 name=http://crbug.com/113847 (1)
1254 ...
1255 *!sqlite3MemMalloc
1256 *!mallocWithAlarm
1257 *!sqlite3Malloc
1258 ...
1259 *!yy_reduce
1260
1261 LEAK
1262 name=http://crbug.com/113847 (2)
1263 ...
1264 *!openDatabase
1265 *!sqlite3_open
1266
1267 LEAK
1268 name=http://crbug.com/115328
1269 ...
1270 *!GenericInfoViewTest_GenericInfoView_Test::TestBody
1271
1272 UNINITIALIZED READ
1273 name=http://crbug.com/116277
1274 *!MOZ_Z_deflate
1275 *!zipCloseFileInZipRaw64
1276
1277 LEAK
1278 name=http://crbug.com/117427 a
1279 ...
1280 *!net::HostCache::Set
1281 *!net::HostResolverImpl::CacheResult
1282 *!net::HostResolverImpl::Job::CompleteRequests
1283 *!net::HostResolverImpl::Job::OnProcTaskComplete
1284 *!base::internal::RunnableAdapter<void (__thiscall net::HostResolverImpl::Job::*)(int,net::AddressList const &)>::Run
1285
1286 # Probably related to 117427.  Someone is not tearing down DNS resolution during
1287 # testing.
1288 LEAK
1289 name=http://crbug.com/117427 b
1290 *!generic_cpp_alloc
1291 *!operator new
1292 *!base::internal::WeakReferenceOwner::GetRef
1293 *!base::SupportsWeakPtr<net::HostResolverImpl>::AsWeakPtr
1294 *!net::HostResolverImpl::Job::Job
1295 *!net::HostResolverImpl::Resolve
1296 *!net::SingleRequestHostResolver::Resolve
1297 *!net::TransportConnectJob::DoResolveHost
1298 *!net::TransportConnectJob::DoLoop
1299 *!net::TransportConnectJob::ConnectInternal
1300 *!net::ConnectJob::Connect
1301 *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
1302 *!net::internal::ClientSocketPoolBaseHelper::RequestSocket
1303 *!net::ClientSocketPoolBase<net::TransportSocketParams>::RequestSocket
1304 *!net::TransportClientSocketPool::RequestSocket
1305 *!net::ClientSocketHandle::Init<net::TransportSocketParams,net::TransportClientSocketPool>
1306 *!net::`anonymous namespace'::InitSocketPoolHelper
1307 *!net::InitSocketHandleForRawConnect
1308 *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
1309 *!base::internal::RunnableAdapter<void (__thiscall notifier::ProxyResolvingClientSocket::*)(int)>::Run
1310
1311 # IE frame possible leak of COM object.
1312 LEAK
1313 name=http://crbug.com/122399
1314 ole32.dll!...
1315 ole32.dll!CoTaskMemAlloc
1316 urlmon.dll!...
1317 urlmon.dll!CreateUri
1318 IEFRAME.dll!*
1319
1320 # RenderWidgetHelper leak in DelayProfileDestruction test.
1321 LEAK
1322 name=http://crbug.com/125565
1323 *!generic_cpp_alloc
1324 *!operator new
1325 *!RenderProcessHostImpl::RenderProcessHostImpl
1326 *!SiteInstanceImpl::GetProcess
1327 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
1328
1329 LEAK
1330 name=http://crbug.com/125807
1331 *!generic_cpp_alloc
1332 *!operator new
1333 *!TransportSecurityPersister::TransportSecurityPersister
1334 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest