Upstream version 9.38.198.0
[platform/framework/web/crosswalk.git] / src / tools / valgrind / drmemory / suppressions_full.txt
1 # This file contains suppressions for the Dr.Memory tool, see
2 # http://dev.chromium.org/developers/how-tos/using-drmemory
3 #
4 # This file should contain suppressions only for the reports happening
5 # in the 'full' mode (drmemory_full).
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
7 # please use suppressions.txt instead.
8
9 ###############################################################
10 # Known reports on the third party we have no control over.
11
12 UNINITIALIZED READ
13 name=http://crbug.com/116277
14 ...
15 *!MOZ_Z_deflate
16
17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
18 LEAK
19 name=http://code.google.com/p/drmemory/issues/detail?id=406
20 ADVAPI32.dll!WmiOpenBlock
21 ADVAPI32.dll!WmiOpenBlock
22
23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
24 LEAK
25 name=GoogleDesktop LEAK
26 ...
27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
28
29 # They deliberately use uninit local var in sqlite random generator.
30 # Random bytes may mess up the call stack between randomByte and
31 # sqlite3_* frames (http://code.google.com/p/drmemory/issues/detail?id=1514)
32 # so we just look for randomByte.
33 UNINITIALIZED READ
34 name=sqlite3_randomness UNINIT
35 *!randomByte
36
37 # Intentional leak in WebKit Template Framework for ThreadData.
38 LEAK
39 name=intentional WTF ThreadData leak
40 ...
41 *!WTF::wtfThreadData
42
43 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
44 LEAK
45 name=http://crbug.com/125558 a
46 KERNELBASE.dll!LocalAlloc
47 SECHOST.dll!...
48 SECHOST.dll!NotifyServiceStatusChange
49 WINHTTP.dll!...
50 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
51 *!net::ProxyResolverWinHttp::GetProxyForURL
52
53 # Tiny locale-related leaks in ntdll.  Probably system bug.
54 LEAK
55 name=http://crbug.com/125558 b
56 ntdll.dll!...
57 ntdll.dll!*
58 KERNELBASE.dll!...
59 KERNELBASE.dll!GetCPInfoExW
60 webio.dll!*
61 webio.dll!*
62 webio.dll!*
63 WINHTTP.dll!...
64 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
65 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig
66
67 UNINITIALIZED READ
68 name=http://crbug.com/30704 #f
69 libpng.dll!wk_png_write_find_filter
70 libpng.dll!wk_png_write_row
71
72 ###############################################################
73 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
74 # assumptions or unhandled syscalls
75
76 # Please note: the following suppressions were written in the abscense of
77 # private symbols so may need to be updated when we switch to auto-loading PDBs
78 UNINITIALIZED READ
79 name=http://code.google.com/p/drmemory/issues/detail?id=12 (1)
80 ntdll.dll!Rtl*
81 ntdll.dll!Rtl*
82 ntdll.dll!RtlFindActivationContextSectionString
83
84 UNINITIALIZED READ
85 name=http://code.google.com/p/drmemory/issues/detail?id=12 (2)
86 ...
87 SHELL32.dll!SHFileOperation*
88
89 UNINITIALIZED READ
90 name=http://code.google.com/p/drmemory/issues/detail?id=12 (3)
91 ...
92 SHELL32.dll!SHGetFolderPath*
93
94 LEAK
95 name=http://code.google.com/p/drmemory/issues/detail?id=12 (4)
96 ...
97 SHELL32.dll!SHGetFolderPath*
98
99 UNINITIALIZED READ
100 name=http://code.google.com/p/drmemory/issues/detail?id=12 (5)
101 ...
102 SHELL32.dll!SHCreateDirectory*
103
104 UNINITIALIZED READ
105 name=http://code.google.com/p/drmemory/issues/detail?id=12 (6)
106 ...
107 SHELL32.dll!ILLoadFromStream*
108
109 UNINITIALIZED READ
110 name=http://code.google.com/p/drmemory/issues/detail?id=12 (7)
111 ...
112 SHELL32.dll!ILSaveToStream*
113
114 LEAK
115 name=http://code.google.com/p/drmemory/issues/detail?id=12 (8)
116 ...
117 SHELL32.dll!SHFileOperation*
118
119 UNINITIALIZED READ
120 name=http://code.google.com/p/drmemory/issues/detail?id=12 (9)
121 ...
122 SHELL32.dll!SHGetItemFromDataObject
123
124 LEAK
125 name=http://code.google.com/p/drmemory/issues/detail?id=12 (10)
126 ...
127 SHELL32.dll!SHGetItemFromDataObject
128
129 LEAK
130 name=http://code.google.com/p/drmemory/issues/detail?id=12 (11)
131 ...
132 ole32.dll!*
133 SHELL32.dll!SHChangeNotifySuspendResume
134
135 UNINITIALIZED READ
136 name=http://code.google.com/p/drmemory/issues/detail?id=14 (1)
137 ...
138 *!CreateProcess*
139
140 LEAK
141 name=http://code.google.com/p/drmemory/issues/detail?id=14 (2)
142 ...
143 *!CreateProcess*
144
145 UNINITIALIZED READ
146 name=http://code.google.com/p/drmemory/issues/detail?id=14 (3)
147 ...
148 *!base::LaunchApp*
149
150 UNINITIALIZED READ
151 name=http://code.google.com/p/drmemory/issues/detail?id=17 (1)
152 ...
153 *!CreateWindow*
154
155 POSSIBLE LEAK
156 name=http://code.google.com/p/drmemory/issues/detail?id=17 (2)
157 GDI32.dll!*
158 GDI32.dll!CreateFontIndirectExW
159 GDI32.dll!CreateFontIndirectW
160
161 LEAK
162 name=http://code.google.com/p/drmemory/issues/detail?id=17 (3)
163 KERNELBASE.dll!LocalAlloc
164 ...
165 USER32.dll!CreateWindow*
166
167 UNINITIALIZED READ
168 name=http://code.google.com/p/drmemory/issues/detail?id=18 a
169 ...
170 *!CoInitialize*
171
172 UNINITIALIZED READ
173 name=http://code.google.com/p/drmemory/issues/detail?id=18 b
174 ...
175 *!CoCreateInstance*
176
177 UNINITIALIZED READ
178 name=http://code.google.com/p/drmemory/issues/detail?id=18 c
179 ...
180 *!CoUninitialize*
181
182 UNINITIALIZED READ
183 name=http://code.google.com/p/drmemory/issues/detail?id=18 d
184 ...
185 UxTheme.dll!*
186
187 UNINITIALIZED READ
188 name=http://code.google.com/p/drmemory/issues/detail?id=40 a
189 ...
190 WINSPOOL.DRV!*
191
192 LEAK
193 name=http://code.google.com/p/drmemory/issues/detail?id=40 b
194 ...
195 WINSPOOL.DRV!*
196
197 UNINITIALIZED READ
198 name=http://code.google.com/p/drmemory/issues/detail?id=48 a
199 system call NtContinue
200 ...
201 *!*SetThreadName
202
203 UNINITIALIZED READ
204 name=http://code.google.com/p/drmemory/issues/detail?id=48 b
205 system call NtContinue
206 *!WTF::initializeCurrentThreadInternal
207
208 UNINITIALIZED READ
209 name=http://code.google.com/p/drmemory/issues/detail?id=52 a
210 ...
211 DBGHELP.dll!SymInitialize
212
213 UNINITIALIZED READ
214 name=http://code.google.com/p/drmemory/issues/detail?id=52 b
215 ...
216 DBGHELP.dll!SymEnumSourceFiles
217
218 UNINITIALIZED READ
219 name=http://code.google.com/p/drmemory/issues/detail?id=52 c
220 ...
221 msvcrt.dll!_RTDynamicCast
222
223 UNINITIALIZED READ
224 name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp
225 instruction=test   0x*(%*) $0x??
226 DBGHELP.dll!SymUnloadModule64
227
228 UNINITIALIZED READ
229 name=http://code.google.com/p/drmemory/issues/detail?id=53
230 ADVAPI32.dll!WmiMofEnumerateResourcesA
231 ADVAPI32.dll!WmiMofEnumerateResourcesA
232 ADVAPI32.dll!Sta*TraceW
233
234 UNINITIALIZED READ
235 name=http://code.google.com/p/drmemory/issues/detail?id=58
236 ...
237 *!_cfltcvt_l
238
239 UNINITIALIZED READ
240 name=http://code.google.com/p/drmemory/issues/detail?id=60
241 USP10.dll!*
242 ...
243 USP10.dll!ScriptStringAnalyse
244
245 LEAK
246 IMM32.dll!ImmGetIMCCSize
247 IMM32.dll!ImmLockClientImc
248 IMM32.dll!ImmDisableIME
249 IMM32.dll!ImmSetActiveContext
250 USER32.dll!IMPSetIMEA
251
252 UNINITIALIZED READ
253 name=http://code.google.com/p/drmemory/issues/detail?id=65 a
254 ...
255 *!SystemFunction036
256
257 UNINITIALIZED READ
258 name=http://code.google.com/p/drmemory/issues/detail?id=65 b
259 ...
260 *!talk_base::CreateRandomString
261
262 UNINITIALIZED READ
263 name=http://code.google.com/p/drmemory/issues/detail?id=68 a
264 ...
265 WS2_32.dll!*
266
267 UNINITIALIZED READ
268 name=http://code.google.com/p/drmemory/issues/detail?id=68 b
269 ...
270 ADVAPI32.dll!SetSecurityDescriptorDacl
271
272 UNINITIALIZED READ
273 name=http://code.google.com/p/drmemory/issues/detail?id=68 c
274 ...
275 MSWSOCK.dll!WSPStartup
276
277 UNINITIALIZED READ
278 name=http://code.google.com/p/drmemory/issues/detail?id=68 d
279 ...
280 ntdll.dll!RtlValidateUnicodeString
281
282 LEAK
283 name=http://code.google.com/p/drmemory/issues/detail?id=256
284 *!_mtinit
285 *!__tmainCRTStartup
286 *!mainCRTStartup
287
288 POSSIBLE LEAK
289 name=http://code.google.com/p/drmemory/issues/detail?id=274 a
290 ...
291 GDI32.dll!CreateDCW
292
293 LEAK
294 name=http://code.google.com/p/drmemory/issues/detail?id=274 b
295 ...
296 GDI32.dll!CreateDCW
297
298 LEAK
299 name=http://code.google.com/p/drmemory/issues/detail?id=275
300 ...
301 *!_getptd*
302
303 UNINITIALIZED READ
304 name=http://code.google.com/p/drmemory/issues/detail?id=276
305 ...
306 ntdll.dll!RtlConvertUlongToLargeInteger
307 ntdll.dll!RtlConvertUlongToLargeInteger
308 ntdll.dll!KiUserExceptionDispatcher
309
310 LEAK
311 name=http://code.google.com/p/drmemory/issues/detail?id=305
312 *!free
313 *!free
314 *!operator new
315 ...
316 *!MiniDumpWriteDump
317
318 UNINITIALIZED READ
319 name=http://code.google.com/p/drmemory/issues/detail?id=346 a
320 ...
321 GDI32.dll!CloseEnhMetaFile
322
323 UNINITIALIZED READ
324 name=http://code.google.com/p/drmemory/issues/detail?id=346 b
325 GDI32.dll!SetPolyFillMode
326 GDI32.dll!CreateICW
327
328 UNINITIALIZED READ
329 name=http://code.google.com/p/drmemory/issues/detail?id=362
330 USER32.dll!UnregisterClass*
331
332 LEAK
333 name=http://code.google.com/p/drmemory/issues/detail?id=382
334 ...
335 ntdll.dll!CsrNewThread
336
337 UNINITIALIZED READ
338 name=http://code.google.com/p/drmemory/issues/detail?id=397
339 system call NtDeviceIoControlFile InputBuffer
340 ADVAPI32.dll!ImpersonateAnonymousToken
341
342 UNINITIALIZED READ
343 name=http://code.google.com/p/drmemory/issues/detail?id=407 a
344 system call NtRequestWaitReplyPort
345 RPCRT4.dll!I_RpcSendReceive
346 RPCRT4.dll!NdrSendReceive
347
348 UNINITIALIZED READ
349 name=http://code.google.com/p/drmemory/issues/detail?id=407 b
350 IMM32.dll!*
351 ntdll.dll!LdrInitializeThunk
352 ntdll.dll!LdrShutdownThread
353
354 UNINITIALIZED READ
355 name=http://code.google.com/p/drmemory/issues/detail?id=412 a
356 ADVAPI32.dll!RegDeleteValue*
357
358 UNINITIALIZED READ
359 name=http://code.google.com/p/drmemory/issues/detail?id=412 b
360 ...
361 ADVAPI32.dll!Crypt*
362
363 UNINITIALIZED READ
364 name=http://code.google.com/p/drmemory/issues/detail?id=412 c
365 ...
366 RPCRT4.dll!NdrClientCall2
367
368 LEAK
369 name=http://code.google.com/p/drmemory/issues/detail?id=412 d
370 RSAENH.dll!DllUnregisterServer
371 ...
372 ADVAPI32.dll!CryptAcquireContextA
373 CRYPT32.dll!CryptEnumOIDFunction
374 ...
375 CRYPT32.dll!CertFindCertificateInStore
376
377 UNINITIALIZED READ
378 name=http://code.google.com/p/drmemory/issues/detail?id=412 e
379 ...
380 RSAENH.dll!CPGenRandom
381
382 UNINITIALIZED READ
383 name=http://code.google.com/p/drmemory/issues/detail?id=412 f
384 ...
385 CRYPT??.dll!Crypt*
386
387 UNINITIALIZED READ
388 name=http://code.google.com/p/drmemory/issues/detail?id=412 g
389 *!replace_memcmp
390 ...
391 *!testing::internal::CmpHelperEQ*
392 ...
393 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
394
395 # We get these sometimes from AesEncrypt and AesExpandKey.  AesEncrypt doesn't
396 # have frame pointers, and we have trouble unwinding from it.  Therefore, we use
397 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
398 UNINITIALIZED READ
399 name=http://code.google.com/p/drmemory/issues/detail?id=412 h
400 RSAENH.dll!*
401
402 UNINITIALIZED READ
403 name=http://code.google.com/p/drmemory/issues/detail?id=425 a
404 CLBCatQ.DLL!DestroyStgDatabase
405 CLBCatQ.DLL!PostError
406 CLBCatQ.DLL!PostError
407
408 LEAK
409 name=http://code.google.com/p/drmemory/issues/detail?id=425 b
410 RPCRT4.dll!I_RpcBCacheFree
411 RPCRT4.dll!I_RpcBCacheFree
412 ...
413 RPCRT4.dll!NdrClientCall2
414
415 UNINITIALIZED READ
416 name=http://code.google.com/p/drmemory/issues/detail?id=425 c
417 msdmo.dll!*
418 msdmo.dll!*
419 DEVENUM.DLL!*
420
421 UNINITIALIZED READ
422 name=http://code.google.com/p/drmemory/issues/detail?id=435 a
423 ...
424 ntdll.dll!RtlSetSecurityObject
425 ntdll.dll!RtlNewSecurityObjectEx
426 ADVAPI32.dll!CreatePrivateObjectSecurityEx
427 NTMARTA.dll!AccRewriteSetNamedRights
428
429 POSSIBLE LEAK
430 name=http://code.google.com/p/drmemory/issues/detail?id=435 b
431 WLDAP32.dll!Ordinal325
432 ...
433 WLDAP32.dll!Ordinal325
434 ntdll.dll!LdrInitializeThunk
435 ntdll.dll!LdrFindResourceDirectory_U
436 ntdll.dll!RtlValidateUnicodeString
437 ntdll.dll!LdrLoadDll
438 KERNEL32.dll!LoadLibraryExW
439
440 # mod+offs suppression because the symbolic makes no sense and changes
441 # completely in the presence of WS2_32.dll symbols.
442 LEAK
443 name=http://code.google.com/p/drmemory/issues/detail?id=438
444 <WS2_32.dll+0x260c>
445 <WS2_32.dll+0x2b76>
446 <WS2_32.dll+0x2c61>
447
448 UNINITIALIZED READ
449 name=http://code.google.com/p/drmemory/issues/detail?id=454 a
450 ...
451 WINMM.dll!wave*GetNumDevs
452
453 LEAK
454 name=http://code.google.com/p/drmemory/issues/detail?id=454 b
455 ...
456 WINMM.dll!wave*GetNumDevs
457
458 LEAK
459 name=http://code.google.com/p/drmemory/issues/detail?id=466
460 ntdll.dll!RtlRunOnceBeginInitialize
461 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
462
463 UNINITIALIZED READ
464 name=http://code.google.com/p/drmemory/issues/detail?id=473 a
465 system call NtDeviceIoControlFile InputBuffer
466 ...
467 iphlpapi.dll!GetAdaptersAddresses
468
469 POSSIBLE LEAK
470 name=http://code.google.com/p/drmemory/issues/detail?id=473 b
471 ESENT.dll!*
472 ESENT.dll!*
473 ESENT.dll!*
474 ntdll.dll!Ldr*Init*
475 ntdll.dll!Ldr*
476 ntdll.dll!*
477 ntdll.dll!LdrLoadDll
478 ...
479 iphlpapi.dll!GetPerAdapterInfo
480 ...
481 iphlpapi.dll!GetAdaptersAddresses
482
483 POSSIBLE LEAK
484 name=http://code.google.com/p/drmemory/issues/detail?id=473 c
485 RPCRT4.dll!*
486 RPCRT4.dll!*
487 ...
488 IPHLPAPI.DLL!GetAdaptersAddresses
489
490 LEAK
491 name=http://code.google.com/p/drmemory/issues/detail?id=475
492 ...
493 ADVAPI32.dll!CryptAcquireContextA
494 ...
495 CRYPT32.dll!CryptMsgOpenToDecode
496 ...
497 CRYPT32.dll!CryptQueryObject
498
499 # Lots of leaks from our interactions with the system certificate store.  May be
500 # worth reviewing our use of their API.
501 LEAK
502 name=http://code.google.com/p/drmemory/issues/detail?id=476 a
503 KERNEL*.dll!LocalAlloc
504 ...
505 CRYPT32.dll!CertGetCRLContextProperty
506
507 LEAK
508 name=http://code.google.com/p/drmemory/issues/detail?id=476 b
509 KERNEL*.dll!LocalAlloc
510 ...
511 CRYPT32.dll!CertAddCRLContextToStore
512
513 LEAK
514 name=http://code.google.com/p/drmemory/issues/detail?id=476 c
515 KERNEL*.dll!LocalAlloc
516 ...
517 CRYPT32.dll!CertOpenStore
518
519 LEAK
520 name=http://code.google.com/p/drmemory/issues/detail?id=476 d
521 ...
522 CRYPT32.dll!CertOpenSystemStore?
523
524 LEAK
525 name=http://code.google.com/p/drmemory/issues/detail?id=476 e
526 ...
527 CRYPT32.dll!CertGetCertificateChain
528
529 LEAK
530 name=http://code.google.com/p/drmemory/issues/detail?id=476 f
531 ...
532 CRYPT32.dll!CertCompareIntegerBlob
533
534 LEAK
535 name=http://code.google.com/p/drmemory/issues/detail?id=476 g
536 ...
537 CRYPT32.dll!CryptUnprotectData
538
539 LEAK
540 name=http://code.google.com/p/drmemory/issues/detail?id=476 h
541 KERNEL*.dll!LocalAlloc
542 ...
543 CRYPT32.dll!CertEnumCertificatesInStore
544
545 LEAK
546 name=http://code.google.com/p/drmemory/issues/detail?id=476 i
547 ...
548 CRYPT32.dll!CryptProtectData
549
550 LEAK
551 name=http://code.google.com/p/drmemory/issues/detail?id=476 j
552 ...
553 CRYPT32.dll!CryptExportPublicKeyInfoEx
554
555 UNINITIALIZED READ
556 name=http://code.google.com/p/drmemory/issues/detail?id=502 a
557 system call NtSecureConnectPort parameter #3
558 GDI32.dll!*
559 GDI32.dll!*
560
561 UNINITIALIZED READ
562 name=http://code.google.com/p/drmemory/issues/detail?id=502 b
563 system call NtGdiEnumFonts parameter #6
564 GDI32.dll!*
565 GDI32.dll!*
566
567 UNINITIALIZED READ
568 name=http://code.google.com/p/drmemory/issues/detail?id=511 a
569 RPCRT4.dll!...
570 ole32.dll!*
571
572 UNINITIALIZED READ
573 name=http://code.google.com/p/drmemory/issues/detail?id=511 b
574 ole32.dll!*
575 ole32.dll!*
576 ole32.dll!StringFromGUID2
577
578 UNINITIALIZED READ
579 name=http://code.google.com/p/drmemory/issues/detail?id=512 a
580 ...
581 *!browser_sync::Cryptographer::PackBootstrapToken
582 *!browser_sync::Cryptographer::GetBootstrapToken
583
584 UNINITIALIZED READ
585 name=http://code.google.com/p/drmemory/issues/detail?id=512 b
586 ...
587 *!Encrypt*
588
589 # TODO(bruening): remove these once we have v8 bitfields handled
590 UNINITIALIZED READ
591 name=http://code.google.com/p/drmemory/issues/detail?id=513 a
592 *!v8*
593
594 UNINITIALIZED READ
595 name=http://code.google.com/p/drmemory/issues/detail?id=513 b
596 *!*
597 *!v8*
598
599 UNINITIALIZED READ
600 name=http://code.google.com/p/drmemory/issues/detail?id=513 c
601 <not in a module>
602 ...
603 *!v8*
604
605 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll
606 # has no symbols.  These are all on the bots using component build, so we use
607 # v8.dll.  TODO(bruening): remove these once we've fixed the symbol issue.
608 UNINITIALIZED READ
609 name=http://code.google.com/p/drmemory/issues/detail?id=513 d
610 v8.dll!*
611
612 UNINITIALIZED READ
613 name=http://code.google.com/p/drmemory/issues/detail?id=513 e
614 <not in a module>
615 ...
616 v8.dll!*
617
618 UNINITIALIZED READ
619 name=http://code.google.com/p/drmemory/issues/detail?id=546
620 ...
621 mscms.dll!*
622 ...
623 GDI32.dll!*
624 *!IconUtil::Create*HICON*
625
626 LEAK
627 name=http://crbug.com/92152
628 ...
629 USER32.dll!CreateWindowExW
630 *!views::TooltipManagerWin::Init
631 *!views::TooltipManagerWin::TooltipManagerWin
632
633 UNINITIALIZED READ
634 name=http://code.google.com/p/drmemory/issues/detail?id=567 a
635 dbghelp.dll!*
636 ...
637 dbghelp.dll!StackWalk64
638
639 LEAK
640 name=http://code.google.com/p/drmemory/issues/detail?id=567 b
641 *!*
642 dbghelp.dll!*
643 ...
644 dbghelp.dll!StackWalk64
645
646 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
647 # TppWorkerThread w/ syms.  We used to use mod+offs here, but that was too
648 # brittle, so we switched to RPCRT4.dll!*.
649 LEAK
650 name=http://code.google.com/p/drmemory/issues/detail?id=569
651 RPCRT4.dll!...
652 ntdll.dll!*
653 ntdll.dll!*
654 KERNEL*.dll!BaseThreadInitThunk
655
656 # TODO(timurrrr): investigate these
657 UNINITIALIZED READ
658 name=http://crbug.com/TODO a
659 ...
660 *!win_util::GetLogonSessionOnlyDACL
661
662 UNINITIALIZED READ
663 name=http://crbug.com/TODO b
664 ...
665 ntshrui.dll!IsPathSharedW
666
667 UNINITIALIZED READ
668 name=http://crbug.com/TODO c
669 ...
670 *!NetApiBufferFree
671
672 UNINITIALIZED READ
673 name=http://crbug.com/TODO d
674 ...
675 *!ShellExecute*
676
677 UNINITIALIZED READ
678 name=http://crbug.com/TODO e
679 ...
680 *!SHParseDisplayName
681
682 UNINITIALIZED READ
683 name=http://crbug.com/TODO f
684 ...
685 *!GetCanonicalPathInfo*
686
687 UNINITIALIZED READ
688 name=http://crbug.com/TODO g
689 ...
690 SHELL32.dll!Ordinal*
691
692 UNINITIALIZED READ
693 name=http://crbug.com/TODO h
694 ...
695 GDI32.dll!GetTextExtentPoint32*
696
697 UNINITIALIZED READ
698 name=http://crbug.com/TODO i
699 ...
700 *!SyncSocketClientListener::OnMsgClassResponse
701
702 UNINITIALIZED READ
703 name=http://crbug.com/TODO j
704 ...
705 *!*NSPRInitSingleton*
706
707 UNINITIALIZED READ
708 name=http://crbug.com/TODO k
709 *!NdrSimpleStructFree
710
711 UNINITIALIZED READ
712 name=http://crbug.com/TODO l
713 ntdll.dll!RtlpNtOpenKey
714 ntdll.dll!RtlMakeSelfRelativeSD
715 ntdll.dll!RtlAbsoluteToSelfRelativeSD
716 ADVAPI32.dll!MakeSelfRelativeSD
717
718 UNINITIALIZED READ
719 name=http://crbug.com/TODO m
720 ...
721 CRYPT32.dll!I_CertSyncStore
722
723 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
724 # a leak.  Must be some early thread initialization.  Doesn't look like
725 # bit-level though.
726 UNINITIALIZED READ
727 name=http://crbug.com/TODO n
728 RPCRT4.dll!*
729 RPCRT4.dll!*
730 RPCRT4.dll!*
731 ntdll.dll!*
732 ntdll.dll!*
733 KERNEL*.dll!BaseThreadInitThunk
734
735 # No idea where this is from, but Chrome isn't even on the stack.
736 POSSIBLE LEAK
737 name=http://crbug.com/TODO o
738 RPCRT4.dll!...
739 ole32.dll!OleInitialize
740 ole32.dll!...
741 KERNEL32.dll!BaseThreadInitThunk
742
743 # Matches lots of RPC related leaks.  So far RPC handles have been mostly owned
744 # by system libraries and are not something we can fix easily.
745 POSSIBLE LEAK
746 name=http://crbug.com/TODO p
747 RPCRT4.dll!*
748 RPCRT4.dll!*
749 RPCRT4.dll!NDRCContextBinding
750
751 # No idea, but all system code, not interesting.
752 POSSIBLE LEAK
753 name=http://crbug.com/TODO q
754 RPCRT4.dll!...
755 RPCRT4.dll!*
756 RPCRT4.dll!*
757 ole32.dll!...
758 ole32.dll!*
759 ole32.dll!*
760 ...
761 SHELL32.dll!*
762
763 LEAK
764 name=http://crbug.com/109278 video device COM leaks
765 ...
766 *!media::VideoCaptureDevice::*
767
768 LEAK
769 name=http://crbug.com/109278 audio device COM leaks
770 ...
771 *!media::GetInputDeviceNamesWin
772
773 # False pos uninit in shell32 when resolving links.
774 UNINITIALIZED READ
775 name=http://code.google.com/p/drmemory/issues/detail?id=745
776 SHELL*.dll!*
777 ...
778 SHELL*.dll!*
779 *!file_util::ResolveShortcut
780
781 # Probable false pos uninit in ffmpeg.  Probably due to running off the end of a
782 # buffer with SSE/MMX instructions whose results are then masked out later.
783 UNINITIALIZED READ
784 name=http://code.google.com/p/drmemory/issues/detail?id=747 a
785 *!ff_pred4x4_vertical_vp8_mmxext
786
787 UNINITIALIZED READ
788 name=http://code.google.com/p/drmemory/issues/detail?id=747 b
789 *!ff_pred4x4_down_left_mmxext
790
791 UNINITIALIZED READ
792 name=http://code.google.com/p/drmemory/issues/detail?id=747 c
793 *!ff_vorbis_floor1_render_list
794
795 UNINITIALIZED READ
796 name=http://code.google.com/p/drmemory/issues/detail?id=747 d
797 *!ff_put_vp8_epel8_h6_ssse3
798
799 UNINITIALIZED READ
800 name=http://code.google.com/p/drmemory/issues/detail?id=747 e
801 *!ff_put_vp8_epel8_h4_ssse3
802
803 UNINITIALIZED READ
804 name=http://code.google.com/p/drmemory/issues/detail?id=747 f
805 *!ff_fft_permute_sse
806
807 UNINITIALIZED READ
808 name=http://code.google.com/p/drmemory/issues/detail?id=747 g
809 *!ff_simple_idct_add_mmx
810
811 # ffmpeg seems to leak a pthread condition variable.
812 LEAK
813 name=http://crbug.com/110042
814 *!ptw32_new
815 *!pthread_self
816 *!sem_wait
817 *!pthread_cond_wait
818 *!ff_thread_decode_frame
819 *!avcodec_decode_video2
820
821 # Improperly handled ioctl in bcrypt.
822 UNINITIALIZED READ
823 name=http://code.google.com/p/drmemory/issues/detail?id=748
824 system call NtDeviceIoControlFile InputBuffer
825 ...
826 bcrypt.dll!BCryptUnregisterConfigChangeNotify
827 bcrypt.dll!BCryptGetFipsAlgorithmMode
828 ntdll.dll!RtlQueryEnvironmentVariable
829
830 # Not sure what this is.
831 POSSIBLE LEAK
832 name=http://code.google.com/p/drmemory/issues/detail?id=749
833 ...
834 fwpuclnt.dll!*
835 ...
836 RPCRT4.dll!*
837 ...
838 fwpuclnt.dll!*
839 ...
840 WS2_32.dll!*
841 *!talk_base::SafeGetHostByName
842 *!talk_base::SocketAddress::GetLocalIPs
843 *!talk_base::SocketAddress::IsLocalIP
844 *!cricket::Transport::VerifyCandidate
845 *!cricket::Session::OnRemoteCandidates
846 *!cricket::Session::OnTransportInfoMessage
847 *!cricket::Session::OnIncomingMessage
848 *!cricket::SessionManager::OnIncomingMessage
849
850 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
851 UNINITIALIZED READ
852 name=http://code.google.com/p/drmemory/issues/detail?id=529
853 RPCRT4.dll!*
854 ...
855 *!base::LaunchProcess
856
857 # System leak from CreateEnvironmentBlock.
858 LEAK
859 name=http://code.google.com/p/drmemory/issues/detail?id=757
860 ...
861 USERENV.dll!CreateEnvironmentBlock
862
863 # Looks like another instance of 753
864 LEAK
865 name=http://code.google.com/p/drmemory/issues/detail?id=753
866 ...
867 ntdll.dll!RtlLoadString
868
869 # More bit manip fps
870 UNINITIALIZED READ
871 name=http://code.google.com/p/drmemory/issues/detail?id=493
872 USP10.dll!ScriptPositionSingleGlyph
873
874 # Various TLS leaks that we don't understand yet.  We should be finding a root
875 # for these.
876 LEAK
877 name=http://code.google.com/p/drmemory/issues/detail?id=778 a
878 KERNELBASE.dll!TlsSetValue
879
880 # Originally filed as: http://crbug.com/109281
881 LEAK
882 name=http://code.google.com/p/drmemory/issues/detail?id=778 b
883 *!operator new
884 *!operator new[]
885 *!*::ConstructTlsVector
886 *!base::ThreadLocalStorage::StaticSlot::Get
887
888 # This is an NSS PRThread object installed in TLS.  Why isn't this detected as a
889 # root?  See also http://crbug.com/32624
890 LEAK
891 name=http://code.google.com/p/drmemory/issues/detail?id=778 c
892 *!PR_Calloc
893 *!_PR_AttachThread
894 *!_PRI_AttachThread
895
896 # Bit-level fps in rich edit layer.
897 UNINITIALIZED READ
898 name=http://code.google.com/p/drmemory/issues/detail?id=791
899 RICHED20.dll!*
900 RICHED20.dll!*
901
902 # Already suppressed by drmemory default supp we don't have yet.
903 LEAK
904 name=i#757: RPC binding leaks in sspicli.dll
905 RPCRT4.dll!*
906 ...
907 SspiCli.dll!*
908 SspiCli.dll!Cre*
909
910 # Async NtReadFile false positives.  This was fixed in drmemory r772, remove
911 # this supp when we pull that rev.
912 UNADDRESSABLE ACCESS
913 name=http://code.google.com/p/drmemory/issues/detail?id=798
914 system call NtReadFile parameter #5
915 KERNEL32.dll!ReadFile
916
917 # Probable syscall false positive.
918 UNADDRESSABLE ACCESS
919 name=http://code.google.com/p/drmemory/issues/detail?id=809
920 system call NtGdiPolyPolyDraw parameter #1
921 *!gfx::Path::CreateNativeRegion
922
923 # Very wide suppression for all uninits in rpcrt4.dll.  We get bad stack traces
924 # coming out of this module (sometimes only one frame), which makes it hard to
925 # write precise suppressions.  Until we have bit-level tracking (DRMi#113) we
926 # should keep this.
927 UNINITIALIZED READ
928 name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard
929 RPCRT4.dll!*
930
931 UNINITIALIZED READ
932 name=http://code.google.com/p/drmemory/issues/detail?id=841 a
933 ...
934 CRYPTNET.dll!I_CryptNetGetConnectivity
935
936 UNINITIALIZED READ
937 name=http://code.google.com/p/drmemory/issues/detail?id=841 b
938 ...
939 webio.dll!*
940
941 UNINITIALIZED READ
942 name=http://code.google.com/p/drmemory/issues/detail?id=841 c
943 ...
944 winhttp.dll!*
945
946 LEAK
947 name=http://code.google.com/p/drmemory/issues/detail?id=841 d
948 ...
949 CRYPTNET.dll!I_CryptNetGetConnectivity
950
951 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
952 UNINITIALIZED READ
953 name=http://code.google.com/p/drmemory/issues/detail?id=810
954 instruction=test   %edx %edx
955 USER32.dll!GetClassLongW
956 ...
957 *!ui::CenterAndSizeWindow
958
959 UNINITIALIZED READ
960 name=http://code.google.com/p/drmemory/issues/detail?id=815
961 KERNEL*.dll!...
962 dxgi.dll!*
963 USER32.dll!GetMonitorInfoA
964 ntdll.dll!KiUserCallbackDispatcher
965 dxgi.dll!*
966 WinSATAPI.DLL!*
967
968 # Suppress anything in cmd.exe.  It's safer to suppress these than disable
969 # following, since someone might launch a Chrome process via cmd.exe.
970 LEAK
971 name=cmd.exe
972 ...
973 cmd.exe!*
974
975 # Possible true system use after free.
976 UNADDRESSABLE ACCESS
977 name=http://code.google.com/p/drmemory/issues/detail?id=623
978 KERNELBASE.dll!TlsGetValue
979 OLEAUT32.dll!SysFreeString
980 OLEAUT32.dll!SysAllocStringByteLen
981 OLEACC.dll!*
982 OLEACC.dll!*
983 OLEACC.dll!*
984 OLEACC.dll!*
985
986 # basic_streambuf seems to leak something in creating a std::_Mutex
987 LEAK
988 name=http://code.google.com/p/drmemory/issues/detail?id=857
989 ntdll.dll!...
990 ntdll.dll!RtlInitializeCriticalSection
991 *!_Mtxinit
992 *!std::_Mutex::_Mutex
993 *!std::basic_streambuf<>
994
995 # Seems to create a DC, sometimes.  GetTextMetrics returns no pointers, though.
996 LEAK
997 name=GDI SetBrushOrgEx leak
998 GDI32.dll!...
999 GDI32.dll!GetTextMetricsW
1000 *!gfx::PlatformFontWin::CreateHFontRef
1001 *!gfx::PlatformFontWin::GetBaseFontRef
1002
1003 ###############################################################
1004 # Benign issues in Chromium
1005
1006 # This test intentionally leaks an object and checks that it's never deleted.
1007 LEAK
1008 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
1009 ...
1010 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
1011
1012 LEAK
1013 name=deliberate histogram leak
1014 ...
1015 *!replace_operator_new
1016 ...
1017 *!*::*Histogram::FactoryGet
1018
1019 LEAK
1020 name=deliberate leak for SampleMap
1021 ...
1022 *!base::SampleMap::Accumulate
1023 *!base::SparseHistogram::Add
1024
1025 LEAK
1026 name=deliberate LazyInstance leak
1027 ...
1028 *!*LeakyLazyInstance*
1029 ...
1030 *!base::LazyInstance*::Pointer
1031
1032 LEAK
1033 name=http://crbug.com/79933 (1)
1034 ...
1035 *!TestURLRequestContext::Init
1036
1037 LEAK
1038 name=http://crbug.com/79933 (2)
1039 ...
1040 *!TestURLRequestContext::TestURLRequestContext
1041 *!TestURLRequestContextGetter::GetURLRequestContext
1042 *!notifier::SingleLoginAttempt::SingleLoginAttempt
1043 *!notifier::Login::StartConnection
1044 *!syncer::InvalidationNotifier::UpdateCredentials
1045 *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials
1046
1047 LEAK
1048 name=http://crbug.com/79933 (3)
1049 ...
1050 *!TestURLRequestContext::TestURLRequestContext
1051 *!TestURLRequestContextGetter::GetURLRequestContext
1052 *!URLFetcher::Core::StartURLRequest
1053
1054 LEAK
1055 name=http://crbug.com/79933 (4)
1056 *!generic_cpp_alloc
1057 *!operator new
1058 *!std::_Allocate<>
1059 *!std::allocator<>::allocate
1060 *!std::vector<>::_Insert_n
1061 *!std::vector<>::insert
1062 *!std::vector<>::push_back
1063 *!ObserverListBase<>::AddObserver
1064 ...
1065 *!net::HttpNetworkSession::HttpNetworkSession
1066 *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
1067 *!notifier::XmppClientSocketFactory::CreateTransportClientSocket
1068 *!notifier::ChromeAsyncSocket::Connect
1069 *!buzz::XmppClient::ProcessStartXmppLogin
1070 *!buzz::XmppClient::Process
1071 *!talk_base::Task::Step
1072 *!talk_base::TaskRunner::InternalRunTasks
1073 *!talk_base::TaskRunner::RunTasks
1074 *!notifier::TaskPump::CheckAndRunTasks
1075 *!base::internal::RunnableAdapter<>::Run
1076
1077 # Test intentionally leaks an object.
1078 LEAK
1079 name=http://crbug.com/86301
1080 *!replace_operator_new
1081 ...
1082 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody
1083
1084 # Leak in a binary copy of Firefox 3's NSS dll.  Not much we can do about it.
1085 LEAK
1086 name=Firefox 3 NSS dll leak
1087 nspr4.dll!*
1088 ...
1089 *!NSSDecryptor::~NSSDecryptor
1090
1091 # We get uninit reports inside GMock when it prints the bytes of references to
1092 # partially initialized objects passed to unexpected method calls.
1093 UNINITIALIZED READ
1094 name=http://crbug.com/64887 (GMock printing uninit data)
1095 ...
1096 *!testing::*::PrintBytesInObjectTo*
1097
1098 ###############################################################
1099 # Proactively borrowed from memcheck/suppressions.txt.
1100 # We have not yet seen these, but we are expanding the sets of tests
1101 # we're running, and we've hit redness in the past that could have
1102 # been avoided by already having the Memcheck suppressions.
1103 # TODO(bruening): review the entire file (not just these) once we're
1104 # at the peak set of tests we plan to run and remove the unused ones.
1105
1106 UNINITIALIZED READ
1107 name=bug_87232
1108 *!blink::base64Encode
1109 *!blink::base64Encode
1110 *!blink::ImageToDataURL<>
1111
1112 UNINITIALIZED READ
1113 name=bug_75127
1114 ...
1115 *!png_process_data
1116 *!gfx::PNGCodec::Decode*
1117
1118 UNINITIALIZED READ
1119 name=bug_99307
1120 *!modp_b64_encode
1121 *!base::Base64Encode*
1122 *!web_ui_util::GetImageDataUrl
1123 *!::NetworkInfoDictionary::set_icon
1124
1125 UNINITIALIZED READ
1126 name=bug_101125a
1127 ...
1128 *!SkScan::AntiFillPath
1129 *!SkScan::AntiFillPath
1130 *!SkDraw::drawPath
1131 *!SkDevice::drawPath
1132 *!SkDraw::drawTextOnPath
1133 *!SkDevice::drawTextOnPath
1134 *!SkCanvas::drawTextOnPath
1135 *!blink::Font::drawGlyphs
1136 *!blink::Font::drawGlyphBuffer
1137
1138 UNINITIALIZED READ
1139 name=bug_101125b
1140 ...
1141 *!SkScan::AntiFillRect
1142 *!SkScan::AntiFillRect
1143 *!SkDraw::drawRect
1144 *!SkDevice::drawRect
1145 *!SkCanvas::drawRect
1146 *!blink::GraphicsContext::fillRect
1147 *!blink::GraphicsContext::drawHighlightForText
1148
1149 UNINITIALIZED READ
1150 name=bug_101125c
1151 ...
1152 *!morphpoints
1153 *!morphpath
1154 *!SkDraw::drawTextOnPath
1155 *!SkDevice::drawTextOnPath
1156 *!SkCanvas::drawTextOnPath
1157 *!blink::Font::drawGlyphs
1158 *!blink::Font::drawGlyphBuffer
1159 *!blink::Font::drawSimpleText
1160 *!blink::Font::drawText
1161 *!blink::GraphicsContext::drawText
1162
1163 UNINITIALIZED READ
1164 name=bug_101781
1165 *!encode_one_block
1166 *!encode_mcu_huff
1167 *!compress_data
1168 *!process_data_simple_main
1169 *!chromium_jpeg_write_scanlines
1170 *!gfx::JPEGCodec::Encode
1171 *!gfx::JPEGEncodedDataFromImage
1172 *!history::TopSites::EncodeBitmap
1173 *!history::TopSites::SetPageThumbnail
1174 *!history::ExpireHistoryTest::AddExampleData
1175 *!history::ExpireHistoryTest::*
1176
1177 UNINITIALIZED READ
1178 name=bug_101781_d
1179 *!testing::AssertionResult testing::internal::CmpHelperGE<>
1180 *!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody
1181
1182 UNINITIALIZED READ
1183 name=bug_105907
1184 ...
1185 *!skia::BGRAConvolve2D
1186 *!skia::ImageOperations::ResizeBasic*
1187 *!skia::ImageOperations::Resize*
1188
1189 UNINITIALIZED READ
1190 name=bug_106183a
1191 *!blink::RenderMarquee::updateMarqueeStyle
1192 *!blink::RenderLayer::styleChanged
1193 *!blink::RenderBoxModelObject::styleDidChange
1194 *!blink::RenderBox::styleDidChange
1195 *!blink::RenderBlock::styleDidChange
1196 *!blink::RenderObject::setStyle
1197
1198 UNINITIALIZED READ
1199 name=bug_106183b
1200 *!blink::ComplexTextController*
1201 ...
1202 *!blink::Font::selectionRectForComplexText
1203 *!blink::Font::selectionRectForText
1204 *!blink::InlineTextBox::positionForOffset
1205 *!blink::RenderText::localCaretRect
1206 *!blink::VisiblePosition::localCaretRect
1207 *!blink::CaretBase::updateCaretRect
1208 *!blink::FrameSelection::localCaretRect
1209 *!blink::FrameSelection::recomputeCaretRect
1210 *!blink::FrameSelection::updateAppearance
1211
1212 UNINITIALIZED READ
1213 name=bug_106183c
1214 *!blink::ComplexTextController*
1215 ...
1216 *!blink::Font::drawComplexText
1217 *!blink::Font::drawText
1218 *!blink::GraphicsContext::drawText
1219 *!blink::paintTextWithShadows
1220 ...
1221 *!blink::RenderLineBoxList::paint
1222 *!blink::RenderBlock::paintContents
1223 *!blink::RenderBlock::paintObject
1224 *!blink::RenderBlock::paint
1225
1226 UNINITIALIZED READ
1227 name=bug_106552
1228 ...
1229 *!JSONStringValueSerializer::SerializeInternal
1230 *!JSONStringValueSerializer::Serialize
1231 *!JsonPrefStore::SerializeData
1232 *!ImportantFileWriter::DoScheduledWrite
1233 *!JsonPrefStore::CommitPendingWrite
1234 *!JsonPrefStore::~JsonPrefStore
1235 *!base::RefCounted<>::Release
1236 *!scoped_refptr<>::operator=
1237 *!PrefService::~PrefService
1238 *!scoped_ptr<>::~scoped_ptr
1239 *!TestingProfile::~TestingProfile
1240 *!ExtensionTestingProfile::~ExtensionTestingProfile
1241
1242 UNINITIALIZED READ
1243 name=bug_108147
1244 ...
1245 *!SkDraw::drawPosText
1246 *!SkDevice::drawPosText
1247 *!SkCanvas::drawPosText
1248 *!blink::Font::drawGlyphs
1249 *!blink::Font::drawGlyphBuffer
1250 *!blink::Font::drawSimpleText
1251 *!blink::Font::drawText
1252
1253 UNINITIALIZED READ
1254 name=bug_108620
1255 *!blink::PlatformEvent::PlatformEvent
1256 *!blink::PlatformMouseEvent::PlatformMouseEvent
1257 *!blink::EventHandler::fakeMouseMoveEventTimerFired
1258 *!blink::Timer<>::fired
1259 *!blink::ThreadTimers::sharedTimerFiredInternal
1260 *!blink::ThreadTimers::sharedTimerFired
1261 *!webkit_glue::WebKitPlatformSupportImpl::DoTimeout
1262 *!base::BaseTimer<>::TimerTask::Run
1263
1264 UNINITIALIZED READ
1265 name=bug_109496
1266 ...
1267 *!blink::ImageBuffer::platformTransformColorSpace
1268 *!blink::ImageBuffer::transformColorSpace
1269 *!blink::RenderSVGResourceFilter::postApplyResource
1270 ...
1271 *!blink::RenderSVGShape::paint*
1272 ...
1273 *!blink::RenderSVGRoot*_Zpaint*_ZL9PaintInfoERKNS_*
1274
1275 UNINITIALIZED READ
1276 name=bug_112278
1277 *!fetch_texel_2d_f_rgba8888
1278 *!sample_2d_linear
1279 *!sample_linear_2d
1280 *!fetch_texel_lod
1281 *!fetch_texel
1282 *!_mesa_execute_program
1283 *!run_program
1284 *!_swrast_exec_fragment_program
1285 *!shade_texture_span
1286 *!_swrast_write_rgba_span
1287 *!general_triangle
1288 *!_swrast_validate_triangle
1289 *!_swrast_Triangle
1290 *!triangle_rgba
1291 *!_tnl_render_triangles_elts
1292 *!run_render
1293 *!_tnl_run_pipeline
1294 *!_tnl_draw_prims
1295 *!_tnl_vbo_draw_prims
1296 *!vbo_validated_drawrangeelements
1297 *!vbo_exec_DrawElements
1298 *!neutral_DrawElements
1299
1300 UNINITIALIZED READ
1301 name=bug_112278b
1302 *!fetch_texel_2d_f_rgba8888
1303 *!sample_2d_nearest
1304 *!sample_nearest_2d
1305 *!fetch_texel_lod
1306 *!fetch_texel
1307 *!_mesa_execute_program
1308 *!run_program
1309 *!_swrast_exec_fragment_program
1310 *!shade_texture_span
1311 *!_swrast_write_rgba_span
1312 *!general_triangle
1313 ...
1314 *!_swrast_Triangle
1315 *!triangle_rgba
1316 ...
1317 *!run_render
1318 *!_tnl_run_pipeline
1319 *!_tnl_draw_prims
1320 *!_tnl_vbo_draw_prims
1321
1322 UNINITIALIZED READ
1323 name=bug_115419_1
1324 *!fetch_texel_2d_f_rgba8888
1325 *!texture_get_row
1326 *!fast_read_rgba_pixels
1327 *!read_rgba_pixels
1328 *!_swrast_ReadPixels
1329 *!_mesa_ReadPixels
1330 *!glReadPixels
1331 *!gpu::gles2::GLES2DecoderImpl::HandleReadPixels
1332 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1333 *!gpu::CommandParser::ProcessCommand
1334 *!gpu::GpuScheduler::PutChanged
1335 *!webkit::gpu::GLInProcessContext::PumpCommands
1336
1337 UNINITIALIZED READ
1338 name=bug_115419_2
1339 *!get_src_arg_mask
1340 *!_mesa_remove_extra_move_use
1341 *!_mesa_optimize_program
1342 *!get_mesa_program
1343 *!_mesa_ir_link_shader
1344 *!_mesa_glsl_link_shader
1345 *!link_program
1346 *!_mesa_LinkProgramARB
1347 *!glLinkProgram
1348 ...
1349 *!gpu::gles2::GLES2DecoderImpl::DoLinkProgram*
1350 *!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram*
1351 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1352 *!gpu::CommandParser::ProcessCommand
1353 *!gpu::GpuScheduler::PutChanged
1354 *!webkit::gpu::GLInProcessContext::PumpCommands
1355
1356 UNINITIALIZED READ
1357 name=bug_116475
1358 ...
1359 *!base::Histogram::BucketIndex
1360 *!base::Histogram::Add
1361 *!webkit_glue::WebKitPlatformSupportImpl::histogramCustomCounts
1362 *!blink::PlatformSupport::histogramCustomCounts
1363 *!blink::CCLayerTreeHostImpl::optimizeRenderPasses*
1364 *!blink::CCLayerTreeHostImpl::drawLayers
1365 *!blink::CCSingleThreadProxy::doComposite
1366
1367 UNINITIALIZED READ
1368 name=bug_122245a
1369 ...
1370 *!SkScalerContext::internalGetPath
1371 *!SkScalerContext::getMetrics
1372 *!SkGlyphCache::lookupMetrics
1373
1374 UNINITIALIZED READ
1375 name=bug_122245b
1376 ...
1377 *!SkRect::roundOut
1378 *!SkScalerContext::getMetrics
1379 *!SkGlyphCache::lookupMetrics
1380 *!SkGlyphCache::getGlyphIDMetrics
1381 *!sk_getMetrics_glyph_00
1382 *!SkDraw::drawPosText
1383 *!SkDevice::drawPosText
1384 *!SkGpuDevice::drawPosText
1385 *!SkCanvas::drawPosText
1386 *!blink::Font::drawGlyphs
1387 *!blink::Font::drawGlyphBuffer
1388 *!blink::Font::drawSimpleText
1389 *!blink::Font::drawText
1390 *!blink::GraphicsContext::drawBidiText
1391 *!blink::CanvasRenderingContext2D::drawTextInternal
1392 *!blink::CanvasRenderingContext2D::strokeText
1393 *!blink::CanvasRenderingContext2DInternal::strokeTextCallback
1394 *!v8::internal::HandleApiCallHelper<>
1395 *!v8::internal::Builtin_HandleApiCall
1396
1397 UNINITIALIZED READ
1398 name=bug_138058
1399 ...
1400 *!blink::WebVTTParser::constructTreeFromToken
1401 *!blink::WebVTTParser::createDocumentFragmentFromCueText
1402 *!blink::TextTrackCue::getCueAsHTML
1403 *!blink::TextTrackCue::updateDisplayTree
1404 *!blink::HTMLMediaElement::updateActiveTextTrackCues
1405
1406 UNINITIALIZED READ
1407 name=bug_138220_a
1408 *!blink::HTMLInputElement::dataList
1409 *!blink::HTMLInputElement::list
1410 *!blink::RenderSliderContainer::layout
1411 *!blink::RenderBlock::layoutBlockChild
1412 *!blink::RenderBlock::layoutBlockChildren
1413 *!blink::RenderBlock::layoutBlock
1414 *!blink::RenderBlock::layout
1415 *!blink::RenderSlider::layout
1416
1417 UNINITIALIZED READ
1418 name=bug_138220_b
1419 *!blink::HTMLInputElement::dataList
1420 *!blink::HTMLInputElement::list
1421 *!blink::RenderTheme::paintSliderTicks
1422 *!blink::RenderThemeChromiumLinux::paintSliderTrack
1423 *!blink::RenderTheme::paint
1424 *!blink::RenderBox::paintBoxDecorations
1425 *!blink::RenderBlock::paintObject
1426
1427 UNINITIALIZED READ
1428 name=bug_139467
1429 *!blink::AccessibilityTable::roleValue
1430 *!blink::AccessibilityRenderObject::ariaLiveRegionStatus
1431 *!blink::AccessibilityObject::supportsARIALiveRegion
1432 *!blink::AccessibilityObject::supportsARIAAttributes
1433 *!blink::AccessibilityRenderObject::determineAccessibilityRole
1434 *!blink::AccessibilityNodeObject::init
1435 *!blink::AccessibilityRenderObject::init
1436 *!blink::AccessibilityTable::init
1437
1438 UNINITIALIZED READ
1439 name=bug_140196
1440 *!SkDescriptor::equals
1441 *!SkGlyphCache::VisitCache
1442 ...
1443 *!SkPaint::descriptorProc
1444
1445 UNINITIALIZED READ
1446 name=bug_143545
1447 *!aura::RootWindow::ShowCursor
1448 *!ash::Shell::ShowCursor
1449 *!ash::CursorManager::ShowCursor
1450 *!ash::test::AshTestBase::SetUp
1451
1452 UNINITIALIZED READ
1453 name=bug_145244
1454 *!blink::StyleRuleImport::requestStyleSheet
1455 *!blink::StyleSheetContents::requestImportedStyleSheets
1456
1457 UNINITIALIZED READ
1458 name=bug_159005
1459 *!blink::RenderMarquee::updateMarqueeStyle
1460 *!blink::RenderLayer::styleChanged
1461 *!blink::RenderLayerModelObject::styleDidChange
1462 *!blink::RenderBox::styleDidChange
1463 *!blink::RenderBlock::styleDidChange
1464 *!blink::RenderObject::setStyle
1465
1466 UNINITIALIZED READ
1467 name=bug_162825
1468 *!bcmp
1469 *!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator<
1470 *!std::less<>::operator
1471 ...
1472 *!std::map<>::find
1473 ...
1474 *!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
1475
1476 UNINITIALIZED READ
1477 name=bug_164198
1478 *!blink::RenderBox::paintFillLayers
1479 ...
1480 *!blink::RenderBlock::paintObject
1481 *!blink::RenderBlock::paint
1482 *!blink::RenderLayer::paintLayerContents
1483 *!blink::RenderLayer::paintLayerContentsAndReflection
1484 *!blink::RenderLayer::paintLayer
1485 *!blink::RenderLayer::paintList
1486 *!blink::RenderLayer::paintLayerContents
1487 *!blink::RenderLayer::paintLayerContentsAndReflection
1488 *!blink::RenderLayer::paintLayer
1489
1490 UNINITIALIZED READ
1491 name=bug_170340
1492 *!WTF::AtomicString::add
1493 *!WTF::AtomicString::AtomicString
1494 *!blink::HTMLPreloadScanner::processToken
1495 *!blink::HTMLPreloadScanner::scan
1496 *!blink::HTMLDocumentParser::pumpTokenizer
1497 *!blink::HTMLDocumentParser::pumpTokenizerIfPossible
1498 *!blink::HTMLDocumentParser::append
1499 *!blink::DecodedDataDocumentParser::flush
1500 *!blink::DocumentWriter::end
1501 *!blink::DocumentLoader::finishedLoading
1502
1503 UNINITIALIZED READ
1504 name=bug_172025
1505 *!WebViewHost::didCreateDataSource
1506 *!blink::FrameLoaderClientImpl::createDocumentLoader
1507 *!blink::FrameLoader::init
1508 *!blink::Frame::init
1509 *!blink::WebFrameImpl::initializeAsMainFrame
1510 *!blink::WebViewImpl::initializeMainFrame
1511 *!TestShell::createNewWindow
1512 *!TestShell::createMainWindow
1513 *!TestShell::initialize
1514
1515 UNINITIALIZED READ
1516 name=bug_173096
1517 *!bcmp
1518 *!cc::LayerTreeDebugState::equal
1519 *!cc::LayerTreeHost::setDebugState
1520 *!blink::WebLayerTreeViewImpl*_Zset*
1521 *!blink::WebViewImpl::setIsAcceleratedCompositingActive
1522 *!blink::WebViewImpl::setRootGraphicsLayer
1523 *!blink::ChromeClientImpl::attachRootGraphicsLayer
1524 *!blink::RenderLayerCompositor::attachRootLayer
1525 *!blink::RenderLayerCompositor::ensureRootLayer
1526 *!blink::RenderLayerCompositor::enableCompositingMode
1527 *!blink::RenderLayerCompositor::updateBacking
1528 *!blink::RenderLayerCompositor::updateLayerCompositingState
1529 *!blink::RenderLayer::styleChanged
1530 *!blink::RenderLayerModelObject::styleDidChange
1531 *!blink::RenderBox::styleDidChange
1532
1533 UNINITIALIZED READ
1534 name=bug_175985
1535 *!cc::LayerTreeHost::setDebugState
1536 ...
1537 *!blink::WebLayerTreeViewImpl*
1538
1539 UNINITIALIZED READ
1540 name=bug_176270
1541 *!cc::LayerTreeDebugState::recordRenderingStats
1542
1543 UNINITIALIZED READ
1544 name=bug_176616_a
1545 *!WebTestRunner::WebTestProxyBase::didCreateDataSource
1546 *!WebTestRunner::WebTestProxy<>::didCreateDataSource
1547 *!blink::FrameLoaderClientImpl::createDocumentLoader
1548 *!blink::FrameLoader::init
1549 *!blink::Frame::init
1550 *!blink::WebFrameImpl::initializeAsMainFrame
1551 *!blink::WebViewImpl::initializeMainFrame
1552 *!TestShell::createNewWindow
1553 *!TestShell::createMainWindow
1554 *!TestShell::initialize
1555
1556 UNINITIALIZED READ
1557 name=bug_176616_b
1558 *!WebTestRunner::TestRunner::reset
1559 *!WebTestRunner::TestInterfaces::resetAll
1560 *!WebTestRunner::WebTestInterfaces::resetAll
1561 *!TestShell::resetTestController
1562 *!runTest
1563
1564 UNINITIALIZED READ
1565 name=bug_222883
1566 *!v8::internal::ScavengeVisitor::ScavengePointer
1567 *!v8::internal::ScavengeVisitor::VisitPointers
1568 *!v8::internal::StandardFrame::IterateExpressions
1569 ...
1570 *!v8::internal::Heap::Scavenge
1571 *!v8::internal::Heap::PerformGarbageCollection*
1572
1573 UNINITIALIZED READ
1574 name=bug_227278a
1575 ...
1576 *!content::CompositingIOSurfaceTransformerTest::RunResizeTest
1577 *!content::CompositingIOSurfaceTransformerTest_ResizesTexturesCorrectly_Test::TestBody
1578
1579 UNINITIALIZED READ
1580 name=bug_227278b
1581 ...
1582 *!content::CompositingIOSurfaceTransformerTest::RunTransformRGBToYV12Test
1583 *!content::CompositingIOSurfaceTransformerTest_TransformsRGBToYV12_Test::TestBody
1584
1585 UNINITIALIZED READ
1586 name=bug_227278c
1587 *!BitSetNextSetBit
1588 *!RegistersReInterfere
1589 *!RegistersMerge
1590 *!glpPPShaderLinearizeStreamMgr
1591 *!glpPPShaderLinearize
1592 *!glePrepareShaderForEmulation
1593 *!gleSetVPTransformFuncAll
1594 *!gleVPRenderQuadsSmooth
1595 *!gleDrawArraysOrElements_ExecCore
1596 *!glDrawArrays_Exec
1597 *!glDrawArrays
1598 *!content::::DrawQuad
1599 *!content::CompositingIOSurfaceTransformer::ResizeBilinear
1600 *!content::CompositingIOSurfaceTransformerTest::RunResizeTest
1601 *!content::CompositingIOSurfaceTransformerTest_ResizesTexturesCorrectly_Test::TestBody
1602
1603 UNINITIALIZED READ
1604 name=bug_227278d
1605 *!glViewport_Exec
1606 *!glViewport
1607 *!content::::SetTransformationsForOffScreenRendering
1608 *!content::CompositingIOSurfaceTransformer::TransformRGBToYV12
1609 *!content::CompositingIOSurfaceTransformerTest::RunTransformRGBToYV12Test
1610 *!content::CompositingIOSurfaceTransformerTest_TransformsRGBToYV12_Test::TestBody
1611
1612 UNINITIALIZED READ
1613 name=bug_238170a
1614 *!blink::ElementRuleCollector::collectMatchingRules
1615 *!blink::ElementRuleCollector::hasAnyMatchingRules
1616
1617 UNINITIALIZED READ
1618 name=bug_238170b
1619 *!blink::ElementRuleCollector::collectMatchingRules
1620 *!blink::StyleResolver::matchAuthorRules
1621
1622 UNINITIALIZED READ
1623 name=bug_238170c
1624 *!blink::ReplaceSelectionCommand::doApply
1625 *!blink::CompositeEditCommand::apply
1626 *!blink::applyCommand
1627
1628 UNINITIALIZED READ
1629 name=bug_241044
1630 *!blink::Settings::setOpenGLMultisamplingEnabled
1631 *!blink::WebSettingsImpl::setOpenGLMultisamplingEnabled
1632 *!content::ApplyWebPreferences
1633 *!content::RenderViewImpl::OnUpdateWebPreferences
1634 *!content::RenderViewImpl::SetWebkitPreferences
1635
1636 UNINITIALIZED READ
1637 name=bug_246153
1638 *!blink::Settings::setOpenGLMultisamplingEnabled
1639 *!blink::WebSettingsImpl::setOpenGLMultisamplingEnabled
1640 *!content::ApplyWebPreferences
1641 ...
1642 *!content::RenderViewImpl::Initialize
1643 *!content::RenderViewImpl::Create*
1644 *!content::RenderThreadImpl::OnCreateNewView
1645
1646 UNINITIALIZED READ
1647 name=bug_259789
1648 *!blink::::adjustAttributes
1649 *!blink::WebGLRenderingContext::maybeRestoreContext
1650 *!blink::Timer<>::fired
1651 *!blink::ThreadTimers::sharedTimerFiredInternal
1652 *!blink::ThreadTimers::sharedTimerFired
1653 *!webkit_glue::WebKitPlatformSupportImpl::DoTimeout
1654
1655 UNINITIALIZED READ
1656 name=bug_290405
1657 *!GrGradientEffect::onIsEqual
1658 *!GrEffect::isEqual
1659 *!GrEffectStage::DeferredStage::isEqual
1660 *!GrDrawState::DeferredState::isEqual
1661 *!GrInOrderDrawBuffer::needsNewState
1662 *!GrInOrderDrawBuffer::onDraw
1663 *!GrDrawTarget::drawIndexedInstances
1664 *!GrTextContext::flushGlyphs
1665
1666 UNINITIALIZED READ
1667 name=bug_290435
1668 *!blink::AudioContext::scheduleNodeDeletion
1669 *!blink::AudioContext::handlePostRenderTasks
1670 *!blink::AudioDestinationNode::render
1671 *!blink::OfflineAudioDestinationNode::offlineRender
1672
1673 UNINITIALIZED READ
1674 name=bug_364724
1675 *!base::MD5DigestToBase16
1676 *!content::WebKitTestRunner::CaptureDumpPixels
1677
1678 UNINITIALIZED READ
1679 name=bug_298143
1680 ...
1681 *!blink::TypeConversionsV8Internal*AttributeGetter*
1682
1683 UNINITIALIZED READ
1684 name=bug_299804
1685 *!GrConfigConversionEffect::TestForPreservingPMConversions
1686 *!::test_pm_conversions
1687 *!GrContext::createPMToUPMEffect
1688 *!GrContext::readRenderTargetPixels
1689 *!SkGpuDevice::onReadPixels
1690 *!SkBaseDevice::readPixels
1691 *!SkCanvas::readPixels
1692 *!DeferredDevice::onReadPixels
1693 *!SkBaseDevice::readPixels
1694 *!SkCanvas::readPixels
1695 *!blink::GraphicsContext::readPixels
1696 *!WTF::PassRefPtr<>
1697 *!blink::ImageBuffer::getUnmultipliedImageData
1698 *!blink::CanvasRenderingContext2D::getImageData
1699 *!blink::CanvasRenderingContext2D::getImageData
1700 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethod
1701 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback
1702 *!v8::internal::FunctionCallbackArguments::Call
1703 *!v8::internal::HandleApiCallHelper<>
1704
1705 UNINITIALIZED READ
1706 name=bug_309477
1707 *!WebTestRunner::EventSender::reset
1708 *!WebTestRunner::TestInterfaces::resetTestHelperControllers
1709 *!WebTestRunner::TestInterfaces::resetAll
1710 ...
1711 *!content::ShellRenderProcessObserver::WebKitInitialized
1712 *!content::RenderThreadImpl::EnsureWebKitInitialized
1713 *!content::RenderThreadImpl::OnCreateNewView
1714
1715 UNINITIALIZED READ
1716 name=bug_312332
1717 ...
1718 *!blink::RenderTextControl::computeIntrinsicLogicalWidths
1719 *!blink::RenderTextControl::computePreferredLogicalWidths
1720 ...
1721 *!blink::RenderBlock::layout
1722
1723 UNINITIALIZED READ
1724 name=bug_327672
1725 *!blink::StyleSheetContents::isCacheable
1726 *!blink::LinkStyle::setCSSStyleSheet
1727 *!blink::CSSStyleSheetResource::checkNotify
1728 ...
1729 *!webkit_glue::WebURLLoaderImpl::Context::OnCompletedRequest
1730
1731 ###############################################################
1732 # Real issues in Chromium
1733
1734 LEAK
1735 name=http://crbug.com/32085
1736 ...
1737 chrome.dll!NotificationRegistrar::Add
1738
1739 LEAK
1740 name=http://crbug.com/32623
1741 ...
1742 *!ssl3_HandleHandshakeMessage
1743 *!ssl3_HandleHandshake
1744 *!ssl3_HandleRecord
1745 *!ssl3_GatherCompleteHandshake
1746 ...
1747 *!SSL_ForceHandshake
1748 *!net::SSLServerSocketNSS::DoHandshake
1749 *!net::SSLServerSocketNSS::DoHandshakeLoop
1750
1751 UNINITIALIZED READ
1752 name=http://crbug.com/57266 (1)
1753 ...
1754 *!remoting::EncoderVp8::Encode
1755
1756 UNINITIALIZED READ
1757 name=http://crbug.com/57266 (2)
1758 ...
1759 *!vp8_*
1760
1761 LEAK
1762 name=http://crbug.com/70062
1763 *!PR_Calloc
1764 *!PR_NewLock
1765 ...
1766 *!InitSessionCacheLocks
1767 *!initSessionCacheLocksLazily
1768 *!PR_CallOnce
1769 *!ssl_InitSessionCacheLocks
1770 *!lock_cache
1771 *!ssl_LookupSID
1772 *!ssl2_BeginClientHandshake
1773 *!ssl_Do1stHandshake
1774 *!SSL_ForceHandshake
1775 *!net::SSL*SocketNSS::DoHandshake
1776 *!net::SSL*SocketNSS::DoHandshakeLoop
1777
1778 LEAK
1779 name=http://crbug.com/74417 a
1780 *!replace_operator_new
1781 *!disk_cache::BackendImpl::CreateEntryImpl
1782
1783 LEAK
1784 name=http://crbug.com/74417 b
1785 *!replace_operator_new
1786 *!disk_cache::BackendImpl::NewEntry
1787
1788 # One more disk_cache::BackendImpl leak.  See also http://crbug.com/87500.
1789 LEAK
1790 name=http://crbug.com/74417 c
1791 *!replace_operator_new
1792 ...
1793 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
1794
1795 LEAK
1796 name=http://crbug.com/75247
1797 ...
1798 *!replace_operator_new
1799 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
1800
1801 LEAK
1802 name=http://crbug.com/78784
1803 *!generic_cpp_alloc
1804 *!operator new
1805 *!TestingProfile::CreateRequestContext
1806 *!*ProfileSyncService*::SetUp
1807
1808 LEAK
1809 name=http://crbug.com/80550 (1)
1810 ...
1811 *!RenderWidgetHost::WasHidden
1812
1813 LEAK
1814 name=http://crbug.com/80550 (2)
1815 ...
1816 *!RenderWidgetHost::WasRestored
1817
1818 LEAK
1819 name=http://crbug.com/87612
1820 ...
1821 *!SSL_ConfigSecureServer
1822 *!net::SSLServerSocketNSS::InitializeSSLOptions
1823 *!net::SSLServerSocketNSS::Handshake
1824
1825 LEAK
1826 name=http://crbug.com/88640
1827 *!generic_cpp_alloc
1828 *!operator new
1829 *!ProfileImpl::InitRegisteredProtocolHandlers
1830 *!ProfileImpl::DoFinalInit
1831 *!ProfileImpl::OnPrefsLoaded
1832
1833 LEAK
1834 name=http://crbug.com/91465
1835 *!generic_cpp_alloc
1836 *!operator new
1837 *!browser_sync::internal::WeakHandleCore<>::*
1838 *!browser_sync::WeakHandle<>::*
1839 *!syncer::SyncManager::SyncInternal::Init
1840
1841 LEAK
1842 name=http://crbug.com/91491
1843 ...
1844 *!CrxUpdateService::ProcessPendingItems
1845
1846 UNINITIALIZED READ
1847 name=http://crbug.com/92026 (1)
1848 softokn3.dll!FC_GetFunctionList
1849 ...
1850 softokn3.dll!NSC_ModuleDBFunc
1851
1852 UNINITIALIZED READ
1853 name=http://crbug.com/92026 (2)
1854 freebl3.dll!FREEBL_GetVector
1855 ...
1856 softokn3.dll!NSC_ModuleDBFunc
1857
1858 # Possible real Chromium issue in DoCrossfade.
1859 UNINITIALIZED READ
1860 name=http://crbug.com/110049
1861 *!media::DoCrossfade<>
1862 *!media::Crossfade
1863 *!media::AudioRendererAlgorithmBase::FillBuffer
1864
1865 # Known sqlite3 leaks.
1866 LEAK
1867 name=http://crbug.com/113847 (1)
1868 ...
1869 *!sqlite3MemMalloc
1870 *!mallocWithAlarm
1871 *!sqlite3Malloc
1872 ...
1873 *!yy_reduce
1874
1875 LEAK
1876 name=http://crbug.com/113847 (2)
1877 ...
1878 *!openDatabase
1879 *!sqlite3_open
1880
1881 LEAK
1882 name=http://crbug.com/115328
1883 ...
1884 *!GenericInfoViewTest_GenericInfoView_Test::TestBody
1885
1886 LEAK
1887 name=http://crbug.com/117427 a
1888 ...
1889 *!net::HostCache::Set
1890 *!net::HostResolverImpl::CacheResult
1891 *!net::HostResolverImpl::Job::CompleteRequests
1892 *!net::HostResolverImpl::Job::OnProcTaskComplete
1893 *!base::internal::RunnableAdapter<>::Run
1894
1895 # Probably related to 117427.  Someone is not tearing down DNS resolution during
1896 # testing.
1897 LEAK
1898 name=http://crbug.com/117427 b
1899 *!generic_cpp_alloc
1900 *!operator new
1901 *!base::internal::WeakReferenceOwner::GetRef
1902 *!base::SupportsWeakPtr<>::AsWeakPtr
1903 *!net::HostResolverImpl::Job::Job
1904 *!net::HostResolverImpl::Resolve
1905 *!net::SingleRequestHostResolver::Resolve
1906 *!net::TransportConnectJob::DoResolveHost
1907 *!net::TransportConnectJob::DoLoop
1908 *!net::TransportConnectJob::ConnectInternal
1909 *!net::ConnectJob::Connect
1910 *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
1911 *!net::internal::ClientSocketPoolBaseHelper::RequestSocket
1912 *!net::ClientSocketPoolBase<>::RequestSocket
1913 *!net::TransportClientSocketPool::RequestSocket
1914 *!net::ClientSocketHandle::Init<>
1915 *!net::`anonymous namespace'::InitSocketPoolHelper
1916 *!net::InitSocketHandleForRawConnect
1917 *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
1918 *!base::internal::RunnableAdapter<>::Run
1919
1920 # IE frame possible leak of COM object.
1921 LEAK
1922 name=http://crbug.com/122399
1923 ole32.dll!...
1924 ole32.dll!CoTaskMemAlloc
1925 urlmon.dll!...
1926 urlmon.dll!CreateUri
1927 IEFRAME.dll!*
1928
1929 # RenderWidgetHelper leak in DelayProfileDestruction test.
1930 LEAK
1931 name=http://crbug.com/125565
1932 *!generic_cpp_alloc
1933 *!operator new
1934 *!RenderProcessHostImpl::RenderProcessHostImpl
1935 *!SiteInstanceImpl::GetProcess
1936 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
1937
1938 LEAK
1939 name=http://crbug.com/125807
1940 *!generic_cpp_alloc
1941 *!operator new
1942 *!TransportSecurityPersister::TransportSecurityPersister
1943 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest
1944
1945 UNINITIALIZED READ
1946 name=bug_113076
1947 *!media::ConvertYUVToRGB32_C
1948 *!media::LinearScaleYUVToRGB32RowWithRange_C
1949 *!media::ScaleYUVToRGB32WithRect
1950
1951 UNINITIALIZED READ
1952 name=bug_343248
1953 osmesa.dll!LINTERP
1954 osmesa.dll!INTERP_4F
1955 osmesa.dll!_tnl_generic_interp
1956
1957 UNINITIALIZED READ
1958 name=bug_340752
1959 ...
1960 *!*::ThreadState::visitStack
1961
1962 UNINITIALIZED READ
1963 name=bug_343663
1964 blink_web.dll!blink::RenderBlock::computeInlinePreferredLogicalWidths
1965
1966 UNINITIALIZED READ
1967 name=bug_343797
1968 ...
1969 blink_web.dll!blink::MediaQueryExp::create
1970 blink_web.dll!blink::BisonCSSParser::createFloatingMediaQueryExp
1971 blink_web.dll!cssyyparse
1972
1973 UNINITIALIZED READ
1974 name=bug_343915
1975 blink_web.dll!blink::BisonCSSParser::parseFlex
1976 blink_web.dll!blink::BisonCSSParser::parseValue
1977 blink_web.dll!cssyyparse
1978
1979 UNADDRESSABLE ACCESS
1980 name=BUG_343958
1981 blink_web.dll!blink::Node::getFlag
1982 blink_web.dll!blink::Node::inDocument
1983 blink_web.dll!blink::Node::isDescendantOf
1984 blink_web.dll!blink::CompositeEditCommand::cloneParagraphUnderNewElement
1985 blink_web.dll!blink::CompositeEditCommand::moveParagraphWithClones
1986
1987 UNINITIALIZED READ
1988 name=BUG_344076
1989 blink_web.dll!blink::Editor::canSmartReplaceWithPasteboard
1990 blink_web.dll!blink::Editor::pasteAsPlainTextWithPasteboard
1991 blink_web.dll!blink::Editor::pasteAsPlainText
1992 blink_web.dll!blink::executePasteAndMatchStyle
1993 blink_web.dll!blink::Editor::Command::execute
1994 blink_web.dll!blink::Document::execCommand
1995
1996 UNINITIALIZED READ
1997 name=BUG_349128
1998 content.dll!std::*
1999 ...
2000 content.dll!content::BrowserAccessibilityManagerWin::*
2001 ...
2002 *!*::UpdateNode
2003
2004 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB*
2005 # variety) that it's a performance hit.  We avoid that by requesting
2006 # whole-module suppression
2007 # (see https://code.google.com/p/drmemory/issues/detail?id=1529).
2008 UNINITIALIZED READ
2009 name=bug_347967_all_osmesa
2010 osmesa.dll!*
2011
2012 UNINITIALIZED READ
2013 name=bug_347967
2014 osmesa.dll!unpack_RGB*888
2015 osmesa.dll!_mesa_unpack_rgba_row
2016 osmesa.dll!slow_read_rgba_pixels
2017 osmesa.dll!read_rgba_pixels
2018 osmesa.dll!_mesa_readpixels
2019 ...
2020 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
2021 gpu.dll!gpu::CommandParser::ProcessCommand
2022 gpu.dll!gpu::GpuScheduler::PutChanged
2023
2024 UNINITIALIZED READ
2025 name=bug_347967,bug_348357
2026 osmesa.dll!clip_span
2027 osmesa.dll!_swrast_write_rgba_span
2028 osmesa.dll!general_triangle
2029 ...
2030 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements
2031 gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements
2032 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
2033 gpu.dll!gpu::CommandParser::ProcessCommand
2034
2035 UNINITIALIZED READ
2036 name=bug_361594
2037 ...
2038 skia.dll!SkA8_Shader_Blitter::blitH
2039 skia.dll!SkBlitter::blitRect
2040 skia.dll!blitrect
2041 skia.dll!SkScan::FillIRect
2042 ...
2043 skia.dll!SkDraw::drawRect
2044 skia.dll!SkDraw::drawBitmap
2045 skia.dll!SkBitmapDevice::drawBitmap
2046 skia.dll!SkCanvas::internalDrawBitmap
2047 skia.dll!SkCanvas::drawBitmap
2048 content.dll!content::ScreenshotData::EncodeOnWorker
2049
2050 UNINITIALIZED READ
2051 name=bug_363487
2052 blink_web.dll!blink::RenderLayerCompositor::updateIfNeeded
2053 blink_web.dll!blink::RenderLayerCompositor::updateIfNeededRecursive
2054 blink_web.dll!blink::FrameView::updateLayoutAndStyleForPainting
2055 blink_web.dll!blink::PageAnimator::updateLayoutAndStyleForPainting
2056
2057 UNINITIALIZED READ
2058 name=bug_365101
2059 *!device::BluetoothAdapterWin::AdapterStateChanged
2060
2061 UNINITIALIZED READ
2062 name=bug_364146
2063 ...
2064 v8.dll!*
2065 net_with_v8.dll!net::ProxyResolverV8::Context::*
2066
2067 UNINITIALIZED READ
2068 name=bug_334448
2069 *!CLD2::UTF8GenericReplaceInternal
2070 *!CLD2::UTF8GenericReplace
2071 *!CLD2::ScriptScanner::LowerScriptSpan
2072 *!CLD2::ScriptScanner::GetOneScriptSpanLower
2073 *!CLD2::DetectLanguageSummaryV2
2074 *!CLD2::DetectLanguageSummary
2075
2076 UNINITIALIZED READ
2077 name=bug_42043
2078 ...
2079 QuickTime.qts!*
2080
2081 UNINITIALIZED READ
2082 name=bug_369141
2083 ...
2084 *!blink::RenderLayerClipper::updateClipRects
2085 *!blink::RenderLayerClipper::parentClipRects
2086 *!blink::RenderLayerClipper::backgroundClipRect
2087
2088 HANDLE LEAK
2089 name=bug_370178
2090 system call NtCreateEvent
2091 KERNELBASE.dll!CreateEventExW
2092 KERNELBASE.dll!CreateEventW
2093 base.dll!base::WaitableEvent::WaitableEvent
2094 gpu.dll!gpu::InProcessCommandBuffer::Initialize
2095 gl_in_process_context.dll!gpu::`anonymous namespace'::GLInProcessContextImpl::Initialize
2096 gl_in_process_context.dll!gpu::GLInProcessContext::CreateContext
2097
2098 UNINITIALIZED READ
2099 name=bug_371844
2100 *!content::GamepadProvider::PadState::Match
2101 *!content::GamepadProvider::DoPoll
2102
2103 UNINITIALIZED READ
2104 name=bug_371950
2105 media.dll!ConvertYUVToRGB32Row_SSE
2106 media.dll!media::ConvertYUVToRGB32_SSE
2107 media.dll!media::ConvertVideoFrameToBitmap
2108 media.dll!media::SkCanvasVideoRenderer::Paint
2109 cc.dll!cc::VideoResourceUpdater::CreateForSoftwarePlanes
2110 cc.dll!cc::VideoResourceUpdater::CreateExternalResourcesFromVideoFrame
2111 cc.dll!cc::VideoLayerImpl::WillDraw
2112
2113 UNINITIALIZED READ
2114 name=bug_371959
2115 content.dll!webrtc::PeerConnection::DoInitialize
2116 content.dll!webrtc::PeerConnection::Initialize
2117 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection_s
2118 content.dll!webrtc::PeerConnectionFactory::OnMessage
2119 content.dll!jingle_glue::JingleThreadWrapper::Send
2120 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection
2121 content.dll!webrtc::PeerConnectionFactoryInterface::CreatePeerConnection
2122
2123 # This suppression is deliberately general, as bugs reported in
2124 # ProcessOutgoingMessages are difficult to track down until we
2125 # get our annotations in place.
2126 # TODO(bruening): add annotations once we have the infrastructure.
2127 UNINITIALIZED READ
2128 name=bug_371991
2129 system call NtWriteFile parameter #5
2130 KERNELBASE.dll!WriteFile
2131 KERNEL32.dll!WriteFile*
2132 *!IPC::Channel*::ProcessOutgoingMessages
2133
2134 UNINITIALIZED READ
2135 name=bug_372254
2136 *!content::*::NotifyPluginProcessHostHelper
2137
2138 UNINITIALIZED READ
2139 name=drm_i#1546
2140 *!testing::internal::CmpHelperEQ<>
2141 ...
2142 *!content::BrowserPluginTest_ResizeFlowControl_Test::TestBody
2143
2144 UNINITIALIZED READ
2145 name=bug_374105a
2146 ...
2147 gpu.dll!gpu::gles2::ShaderTranslatorCache::GetTranslator
2148 gpu.dll!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
2149 gpu.dll!gpu::gles2::GLES2DecoderImpl::Initialize
2150
2151 UNINITIALIZED READ
2152 name=bug_374105b
2153 ...
2154 gpu.dll!gpu::gles2::ShaderTranslator::GetStringForOptionsThatWouldAffectCompilation
2155 *!gpu::gles2::ShaderTranslatorTest_OptionsString_Test::TestBody
2156
2157 UNINITIALIZED READ
2158 name=bug_374410
2159 *!ui::NativeThemeWin::PaintScrollbarTrack
2160 *!ui::NativeThemeWin::PaintDirect
2161
2162 UNINITIALIZED READ
2163 name=bug_377728
2164 ...
2165 *!Hunspell::suggest
2166 *!HunspellEngine::FillSuggestionList
2167 *!SpellcheckLanguage::SpellCheckWord
2168 *!SpellCheck::SpellCheckWord
2169
2170 UNINITIALIZED READ
2171 name=bug_387373
2172 *!blink::WebEmbeddedWorkerImpl::startWorkerContext
2173 *!content::EmbeddedWorkerDispatcher::OnStartWorker
2174 *!EmbeddedWorkerMsg_StartWorker::Dispatch<>
2175
2176 UNADDRESSABLE ACCESS
2177 name=bug_389132
2178 content.dll!crypto_kernel_do_load_cipher_type
2179 content.dll!crypto_kernel_load_cipher_type
2180 content.dll!crypto_kernel_init
2181 content.dll!cricket::SrtpSession::SetKey
2182 content.dll!cricket::SrtpSession::SetSend
2183 content.dll!cricket::SrtpFilter::SetRtpParams
2184 content.dll!cricket::BaseChannel::SetupDtlsSrtp
2185 content.dll!cricket::BaseChannel::ChannelWritable_w
2186 content.dll!cricket::BaseChannel::OnWritableState
2187
2188 UNINITIALIZED READ
2189 name=bug_392585
2190 system call NtCreateFile parameter #9
2191 *!testing::internal::HandleExceptionsInMethodIfSupported<>
2192
2193 UNADDRESSABLE ACCESS
2194 name=bug_398850
2195 ...
2196 wtf.dll!WTF::PlatformCondition::timedWait
2197
2198 UNINITIALIZED READ
2199 name=bug_399293
2200 blink_web.dll!blink::InputMethodController::extendSelectionAndDelete
2201 blink_web.dll!blink::WebLocalFrameImpl::extendSelectionAndDelete
2202 content.dll!content::RenderFrameImpl::OnExtendSelectionAndDelete
2203 *!content::RenderViewImplTest_OnExtendSelectionAndDelete_Test::TestBody
2204 *!testing::internal::HandleExceptionsInMethodIfSupported<>
2205
2206 UNINITIALIZED READ
2207 name=bug_398547
2208 system call NtWriteFile parameter #5
2209 KERNELBASE.dll!WriteFile
2210 KERNEL32.dll!WriteFile
2211 mojo_system_impl.dll!mojo::system::`anonymous namespace'::RawChannelWin::WriteNoLock
2212
2213 HANDLE LEAK
2214 name=bug_403544
2215 system call NtCreateSemaphore
2216 KERNELBASE.dll!CreateSemaphoreExW
2217 ...
2218 v8.dll!v8::internal::SweeperThread::SweeperThread
2219 ...
2220 blink_web.dll!blink::WorkerScriptController::WorkerScriptController
2221 blink_web.dll!blink::WorkerGlobalScope::WorkerGlobalScope
2222 blink_web.dll!blink::ServiceWorkerGlobalScope::ServiceWorkerGlobalScope
2223
2224
2225 HANDLE LEAK
2226 name=bug_403681
2227 system call NtCreateTimer
2228 KERNELBASE.dll!CreateWaitableTimerExW
2229 KERNEL32.dll!CreateWaitableTimerW
2230 content.dll!rtc::Timing::Timing
2231 content.dll!content::RenderProcessHostImpl::CreateMessageFilters
2232 ...
2233 content.dll!content::RenderViewHostImpl::CreateRenderView
2234 content.dll!content::WebContentsImpl::CreateRenderViewForRenderManager
2235 ...
2236 content.dll!content::NavigationControllerImpl::LoadEntry
2237 ...
2238 *!extensions::ExtensionHost::LoadInitialURL