Unregister from GCM when the only GCM app is removed
[chromium-blink-merge.git] / tools / valgrind / drmemory / suppressions_full.txt
blobd2db1bfb742963a93b3037e12bd9e100232d42e4
1 # This file contains suppressions for the Dr.Memory tool, see
2 # http://dev.chromium.org/developers/how-tos/using-drmemory
4 # This file should contain suppressions only for the reports happening
5 # in the 'full' mode (drmemory_full).
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
7 # please use suppressions.txt instead.
9 ###############################################################
10 # Known reports on the third party we have no control over.
12 UNINITIALIZED READ
13 name=http://crbug.com/116277
14 ...
15 *!MOZ_Z_deflate
17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
18 LEAK
19 name=https://github.com/DynamoRIO/drmemory/issues/406
20 ADVAPI32.dll!WmiOpenBlock
21 ADVAPI32.dll!WmiOpenBlock
23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
24 LEAK
25 name=GoogleDesktop LEAK
26 ...
27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
29 # They deliberately use uninit local var in sqlite random generator.
30 # Random bytes may mess up the call stack between randomByte and
31 # sqlite3_* frames (https://github.com/DynamoRIO/drmemory/issues/1514)
32 # so we just look for randomByte.
33 UNINITIALIZED READ
34 name=sqlite3_randomness UNINIT
35 sql.dll!sqlite3_randomness
37 UNINITIALIZED READ
38 name=blink_web_dll_sqlite3_randomness UNINIT
39 blink_web.dll!sqlite3_randomness
41 # Intentional leak in WebKit Template Framework for ThreadData.
42 LEAK
43 name=intentional WTF ThreadData leak
44 ...
45 *!WTF::wtfThreadData
47 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
48 LEAK
49 name=http://crbug.com/125558 a
50 KERNELBASE.dll!LocalAlloc
51 SECHOST.dll!...
52 SECHOST.dll!NotifyServiceStatusChange
53 WINHTTP.dll!...
54 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
55 *!net::ProxyResolverWinHttp::GetProxyForURL
57 # Tiny locale-related leaks in ntdll.  Probably system bug.
58 LEAK
59 name=http://crbug.com/125558 b
60 ntdll.dll!...
61 ntdll.dll!*
62 KERNELBASE.dll!...
63 KERNELBASE.dll!GetCPInfoExW
64 webio.dll!*
65 webio.dll!*
66 webio.dll!*
67 WINHTTP.dll!...
68 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
69 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig
71 UNINITIALIZED READ
72 name=http://crbug.com/30704 #f
73 libpng.dll!wk_png_write_find_filter
74 libpng.dll!wk_png_write_row
76 ###############################################################
77 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
78 # assumptions or unhandled syscalls
80 # Please note: the following suppressions were written in the abscense of
81 # private symbols so may need to be updated when we switch to auto-loading PDBs
82 UNINITIALIZED READ
83 name=https://github.com/DynamoRIO/drmemory/issues/12 (1)
84 ntdll.dll!Rtl*
85 ntdll.dll!Rtl*
86 ntdll.dll!RtlFindActivationContextSectionString
88 UNINITIALIZED READ
89 name=https://github.com/DynamoRIO/drmemory/issues/12 (2)
90 ...
91 SHELL32.dll!SHFileOperation*
93 UNINITIALIZED READ
94 name=https://github.com/DynamoRIO/drmemory/issues/12 (3)
95 ...
96 SHELL32.dll!SHGetFolderPath*
98 LEAK
99 name=https://github.com/DynamoRIO/drmemory/issues/12 (4)
101 SHELL32.dll!SHGetFolderPath*
103 UNINITIALIZED READ
104 name=https://github.com/DynamoRIO/drmemory/issues/12 (5)
106 SHELL32.dll!SHCreateDirectory*
108 UNINITIALIZED READ
109 name=https://github.com/DynamoRIO/drmemory/issues/12 (6)
111 SHELL32.dll!ILLoadFromStream*
113 UNINITIALIZED READ
114 name=https://github.com/DynamoRIO/drmemory/issues/12 (7)
116 SHELL32.dll!ILSaveToStream*
118 LEAK
119 name=https://github.com/DynamoRIO/drmemory/issues/12 (8)
121 SHELL32.dll!SHFileOperation*
123 UNINITIALIZED READ
124 name=https://github.com/DynamoRIO/drmemory/issues/12 (9)
126 SHELL32.dll!SHGetItemFromDataObject
128 LEAK
129 name=https://github.com/DynamoRIO/drmemory/issues/12 (10)
131 SHELL32.dll!SHGetItemFromDataObject
133 LEAK
134 name=https://github.com/DynamoRIO/drmemory/issues/12 (11)
136 ole32.dll!*
137 SHELL32.dll!SHChangeNotifySuspendResume
139 UNINITIALIZED READ
140 name=https://github.com/DynamoRIO/drmemory/issues/14 (1)
142 *!CreateProcess*
144 LEAK
145 name=https://github.com/DynamoRIO/drmemory/issues/14 (2)
147 *!CreateProcess*
149 UNINITIALIZED READ
150 name=https://github.com/DynamoRIO/drmemory/issues/14 (3)
152 *!base::LaunchApp*
154 UNINITIALIZED READ
155 name=https://github.com/DynamoRIO/drmemory/issues/17 (1)
157 *!CreateWindow*
159 POSSIBLE LEAK
160 name=https://github.com/DynamoRIO/drmemory/issues/17 (2)
161 GDI32.dll!*
162 GDI32.dll!CreateFontIndirectExW
163 GDI32.dll!CreateFontIndirectW
165 LEAK
166 name=https://github.com/DynamoRIO/drmemory/issues/17 (3)
167 KERNELBASE.dll!LocalAlloc
169 USER32.dll!CreateWindow*
171 UNINITIALIZED READ
172 name=https://github.com/DynamoRIO/drmemory/issues/18 a
174 *!CoInitialize*
176 UNINITIALIZED READ
177 name=https://github.com/DynamoRIO/drmemory/issues/18 b
179 *!CoCreateInstance*
181 UNINITIALIZED READ
182 name=https://github.com/DynamoRIO/drmemory/issues/18 c
184 *!CoUninitialize*
186 UNINITIALIZED READ
187 name=https://github.com/DynamoRIO/drmemory/issues/18 d
189 UxTheme.dll!*
191 UNINITIALIZED READ
192 name=https://github.com/DynamoRIO/drmemory/issues/40 a
194 WINSPOOL.DRV!*
196 LEAK
197 name=https://github.com/DynamoRIO/drmemory/issues/40 b
199 WINSPOOL.DRV!*
201 UNINITIALIZED READ
202 name=https://github.com/DynamoRIO/drmemory/issues/48 a
203 system call NtContinue
205 *!*SetThreadName
207 UNINITIALIZED READ
208 name=https://github.com/DynamoRIO/drmemory/issues/48 b
209 system call NtContinue
210 *!WTF::initializeCurrentThreadInternal
212 UNINITIALIZED READ
213 name=https://github.com/DynamoRIO/drmemory/issues/52 a
215 DBGHELP.dll!SymInitialize
217 UNINITIALIZED READ
218 name=https://github.com/DynamoRIO/drmemory/issues/52 b
220 DBGHELP.dll!SymEnumSourceFiles
222 UNINITIALIZED READ
223 name=https://github.com/DynamoRIO/drmemory/issues/52 c
225 msvcrt.dll!_RTDynamicCast
227 UNINITIALIZED READ
228 name=https://github.com/DynamoRIO/drmemory/issues/52 bit-level fp in dbghelp
229 instruction=test   0x*(%*) $0x??
230 DBGHELP.dll!SymUnloadModule64
232 UNINITIALIZED READ
233 name=https://github.com/DynamoRIO/drmemory/issues/53
234 ADVAPI32.dll!WmiMofEnumerateResourcesA
235 ADVAPI32.dll!WmiMofEnumerateResourcesA
236 ADVAPI32.dll!Sta*TraceW
238 UNINITIALIZED READ
239 name=https://github.com/DynamoRIO/drmemory/issues/58
241 *!_cfltcvt_l
243 UNINITIALIZED READ
244 name=https://github.com/DynamoRIO/drmemory/issues/60
245 USP10.dll!*
247 USP10.dll!ScriptStringAnalyse
249 LEAK
250 IMM32.dll!ImmGetIMCCSize
251 IMM32.dll!ImmLockClientImc
252 IMM32.dll!ImmDisableIME
253 IMM32.dll!ImmSetActiveContext
254 USER32.dll!IMPSetIMEA
256 UNINITIALIZED READ
257 name=https://github.com/DynamoRIO/drmemory/issues/65 a
259 *!SystemFunction036
261 UNINITIALIZED READ
262 name=https://github.com/DynamoRIO/drmemory/issues/65 b
264 *!talk_base::CreateRandomString
266 UNINITIALIZED READ
267 name=https://github.com/DynamoRIO/drmemory/issues/68 a
269 WS2_32.dll!*
271 UNINITIALIZED READ
272 name=https://github.com/DynamoRIO/drmemory/issues/68 b
274 ADVAPI32.dll!SetSecurityDescriptorDacl
276 UNINITIALIZED READ
277 name=https://github.com/DynamoRIO/drmemory/issues/68 c
279 MSWSOCK.dll!WSPStartup
281 UNINITIALIZED READ
282 name=https://github.com/DynamoRIO/drmemory/issues/68 d
284 ntdll.dll!RtlValidateUnicodeString
286 LEAK
287 name=https://github.com/DynamoRIO/drmemory/issues/256
288 *!_mtinit
289 *!__tmainCRTStartup
290 *!mainCRTStartup
292 POSSIBLE LEAK
293 name=https://github.com/DynamoRIO/drmemory/issues/274 a
295 GDI32.dll!CreateDCW
297 LEAK
298 name=https://github.com/DynamoRIO/drmemory/issues/274 b
300 GDI32.dll!CreateDCW
302 LEAK
303 name=https://github.com/DynamoRIO/drmemory/issues/275
305 *!_getptd*
307 UNINITIALIZED READ
308 name=https://github.com/DynamoRIO/drmemory/issues/276
310 ntdll.dll!RtlConvertUlongToLargeInteger
311 ntdll.dll!RtlConvertUlongToLargeInteger
312 ntdll.dll!KiUserExceptionDispatcher
314 LEAK
315 name=https://github.com/DynamoRIO/drmemory/issues/305
316 *!free
317 *!free
318 *!operator new
320 *!MiniDumpWriteDump
322 UNINITIALIZED READ
323 name=https://github.com/DynamoRIO/drmemory/issues/346 a
325 GDI32.dll!CloseEnhMetaFile
327 UNINITIALIZED READ
328 name=https://github.com/DynamoRIO/drmemory/issues/346 b
329 GDI32.dll!SetPolyFillMode
330 GDI32.dll!CreateICW
332 UNINITIALIZED READ
333 name=https://github.com/DynamoRIO/drmemory/issues/362
334 USER32.dll!UnregisterClass*
336 LEAK
337 name=https://github.com/DynamoRIO/drmemory/issues/382
339 ntdll.dll!CsrNewThread
341 UNINITIALIZED READ
342 name=https://github.com/DynamoRIO/drmemory/issues/397
343 system call NtDeviceIoControlFile InputBuffer
344 ADVAPI32.dll!ImpersonateAnonymousToken
346 UNINITIALIZED READ
347 name=https://github.com/DynamoRIO/drmemory/issues/407 a
348 system call NtRequestWaitReplyPort
349 RPCRT4.dll!I_RpcSendReceive
350 RPCRT4.dll!NdrSendReceive
352 UNINITIALIZED READ
353 name=https://github.com/DynamoRIO/drmemory/issues/407 b
354 IMM32.dll!*
355 ntdll.dll!LdrInitializeThunk
356 ntdll.dll!LdrShutdownThread
358 UNINITIALIZED READ
359 name=https://github.com/DynamoRIO/drmemory/issues/412 a
360 ADVAPI32.dll!RegDeleteValue*
362 UNINITIALIZED READ
363 name=https://github.com/DynamoRIO/drmemory/issues/412 b
365 ADVAPI32.dll!Crypt*
367 UNINITIALIZED READ
368 name=https://github.com/DynamoRIO/drmemory/issues/412 c
370 RPCRT4.dll!NdrClientCall2
372 LEAK
373 name=https://github.com/DynamoRIO/drmemory/issues/412 d
374 RSAENH.dll!DllUnregisterServer
376 ADVAPI32.dll!CryptAcquireContextA
377 CRYPT32.dll!CryptEnumOIDFunction
379 CRYPT32.dll!CertFindCertificateInStore
381 UNINITIALIZED READ
382 name=https://github.com/DynamoRIO/drmemory/issues/412 e
384 RSAENH.dll!CPGenRandom
386 UNINITIALIZED READ
387 name=https://github.com/DynamoRIO/drmemory/issues/412 f
389 CRYPT??.dll!Crypt*
391 UNINITIALIZED READ
392 name=https://github.com/DynamoRIO/drmemory/issues/412 g
393 *!replace_memcmp
395 *!testing::internal::CmpHelperEQ*
397 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
399 # We get these sometimes from AesEncrypt and AesExpandKey.  AesEncrypt doesn't
400 # have frame pointers, and we have trouble unwinding from it.  Therefore, we use
401 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
402 UNINITIALIZED READ
403 name=https://github.com/DynamoRIO/drmemory/issues/412 h
404 RSAENH.dll!*
406 UNINITIALIZED READ
407 name=https://github.com/DynamoRIO/drmemory/issues/425 a
408 CLBCatQ.DLL!DestroyStgDatabase
409 CLBCatQ.DLL!PostError
410 CLBCatQ.DLL!PostError
412 LEAK
413 name=https://github.com/DynamoRIO/drmemory/issues/425 b
414 RPCRT4.dll!I_RpcBCacheFree
415 RPCRT4.dll!I_RpcBCacheFree
417 RPCRT4.dll!NdrClientCall2
419 UNINITIALIZED READ
420 name=https://github.com/DynamoRIO/drmemory/issues/425 c
421 msdmo.dll!*
422 msdmo.dll!*
423 DEVENUM.DLL!*
425 UNINITIALIZED READ
426 name=https://github.com/DynamoRIO/drmemory/issues/435 a
428 ntdll.dll!RtlSetSecurityObject
429 ntdll.dll!RtlNewSecurityObjectEx
430 ADVAPI32.dll!CreatePrivateObjectSecurityEx
431 NTMARTA.dll!AccRewriteSetNamedRights
433 POSSIBLE LEAK
434 name=https://github.com/DynamoRIO/drmemory/issues/435 b
435 WLDAP32.dll!Ordinal325
437 WLDAP32.dll!Ordinal325
438 ntdll.dll!LdrInitializeThunk
439 ntdll.dll!LdrFindResourceDirectory_U
440 ntdll.dll!RtlValidateUnicodeString
441 ntdll.dll!LdrLoadDll
442 KERNEL32.dll!LoadLibraryExW
444 # mod+offs suppression because the symbolic makes no sense and changes
445 # completely in the presence of WS2_32.dll symbols.
446 LEAK
447 name=https://github.com/DynamoRIO/drmemory/issues/438
448 <WS2_32.dll+0x260c>
449 <WS2_32.dll+0x2b76>
450 <WS2_32.dll+0x2c61>
452 UNINITIALIZED READ
453 name=https://github.com/DynamoRIO/drmemory/issues/454 a
455 WINMM.dll!wave*GetNumDevs
457 LEAK
458 name=https://github.com/DynamoRIO/drmemory/issues/454 b
460 WINMM.dll!wave*GetNumDevs
462 LEAK
463 name=https://github.com/DynamoRIO/drmemory/issues/466
464 ntdll.dll!RtlRunOnceBeginInitialize
465 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
467 UNINITIALIZED READ
468 name=https://github.com/DynamoRIO/drmemory/issues/473 a
469 system call NtDeviceIoControlFile InputBuffer
471 iphlpapi.dll!GetAdaptersAddresses
473 POSSIBLE LEAK
474 name=https://github.com/DynamoRIO/drmemory/issues/473 b
475 ESENT.dll!*
476 ESENT.dll!*
477 ESENT.dll!*
478 ntdll.dll!Ldr*Init*
479 ntdll.dll!Ldr*
480 ntdll.dll!*
481 ntdll.dll!LdrLoadDll
483 iphlpapi.dll!GetPerAdapterInfo
485 iphlpapi.dll!GetAdaptersAddresses
487 POSSIBLE LEAK
488 name=https://github.com/DynamoRIO/drmemory/issues/473 c
489 RPCRT4.dll!*
490 RPCRT4.dll!*
492 IPHLPAPI.DLL!GetAdaptersAddresses
494 LEAK
495 name=https://github.com/DynamoRIO/drmemory/issues/475
497 ADVAPI32.dll!CryptAcquireContextA
499 CRYPT32.dll!CryptMsgOpenToDecode
501 CRYPT32.dll!CryptQueryObject
503 # Lots of leaks from our interactions with the system certificate store.  May be
504 # worth reviewing our use of their API.
505 LEAK
506 name=https://github.com/DynamoRIO/drmemory/issues/476 a
507 KERNEL*.dll!LocalAlloc
509 CRYPT32.dll!CertGetCRLContextProperty
511 LEAK
512 name=https://github.com/DynamoRIO/drmemory/issues/476 b
513 KERNEL*.dll!LocalAlloc
515 CRYPT32.dll!CertAddCRLContextToStore
517 LEAK
518 name=https://github.com/DynamoRIO/drmemory/issues/476 c
519 KERNEL*.dll!LocalAlloc
521 CRYPT32.dll!CertOpenStore
523 LEAK
524 name=https://github.com/DynamoRIO/drmemory/issues/476 d
526 CRYPT32.dll!CertOpenSystemStore?
528 LEAK
529 name=https://github.com/DynamoRIO/drmemory/issues/476 e
531 CRYPT32.dll!CertGetCertificateChain
533 LEAK
534 name=https://github.com/DynamoRIO/drmemory/issues/476 f
536 CRYPT32.dll!CertCompareIntegerBlob
538 LEAK
539 name=https://github.com/DynamoRIO/drmemory/issues/476 g
541 CRYPT32.dll!CryptUnprotectData
543 LEAK
544 name=https://github.com/DynamoRIO/drmemory/issues/476 h
545 KERNEL*.dll!LocalAlloc
547 CRYPT32.dll!CertEnumCertificatesInStore
549 LEAK
550 name=https://github.com/DynamoRIO/drmemory/issues/476 i
552 CRYPT32.dll!CryptProtectData
554 LEAK
555 name=https://github.com/DynamoRIO/drmemory/issues/476 j
557 CRYPT32.dll!CryptExportPublicKeyInfoEx
559 UNINITIALIZED READ
560 name=https://github.com/DynamoRIO/drmemory/issues/502 a
561 system call NtSecureConnectPort parameter #3
562 GDI32.dll!*
563 GDI32.dll!*
565 UNINITIALIZED READ
566 name=https://github.com/DynamoRIO/drmemory/issues/502 b
567 system call NtGdiEnumFonts parameter #6
568 GDI32.dll!*
569 GDI32.dll!*
571 UNINITIALIZED READ
572 name=https://github.com/DynamoRIO/drmemory/issues/511 a
573 RPCRT4.dll!...
574 ole32.dll!*
576 UNINITIALIZED READ
577 name=https://github.com/DynamoRIO/drmemory/issues/511 b
578 ole32.dll!*
579 ole32.dll!*
580 ole32.dll!StringFromGUID2
582 UNINITIALIZED READ
583 name=https://github.com/DynamoRIO/drmemory/issues/512 a
585 *!browser_sync::Cryptographer::PackBootstrapToken
586 *!browser_sync::Cryptographer::GetBootstrapToken
588 UNINITIALIZED READ
589 name=https://github.com/DynamoRIO/drmemory/issues/512 b
591 *!Encrypt*
593 # TODO(bruening): remove these once we have v8 bitfields handled
594 UNINITIALIZED READ
595 name=https://github.com/DynamoRIO/drmemory/issues/513 a
596 *!v8*
598 UNINITIALIZED READ
599 name=https://github.com/DynamoRIO/drmemory/issues/513 b
601 *!v8*
603 UNINITIALIZED READ
604 name=https://github.com/DynamoRIO/drmemory/issues/513 c
605 <not in a module>
607 *!v8*
609 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll
610 # has no symbols.  These are all on the bots using component build, so we use
611 # v8.dll.  TODO(bruening): remove these once we've fixed the symbol issue.
612 UNINITIALIZED READ
613 name=https://github.com/DynamoRIO/drmemory/issues/513 d
614 v8.dll!*
616 UNINITIALIZED READ
617 name=https://github.com/DynamoRIO/drmemory/issues/513 e
618 <not in a module>
620 v8.dll!*
622 UNINITIALIZED READ
623 name=https://github.com/DynamoRIO/drmemory/issues/546
625 mscms.dll!*
627 GDI32.dll!*
628 *!IconUtil::Create*HICON*
630 LEAK
631 name=http://crbug.com/92152
633 USER32.dll!CreateWindowExW
634 *!views::TooltipManagerWin::Init
635 *!views::TooltipManagerWin::TooltipManagerWin
637 UNINITIALIZED READ
638 name=https://github.com/DynamoRIO/drmemory/issues/567 a
639 dbghelp.dll!*
641 dbghelp.dll!StackWalk64
643 LEAK
644 name=https://github.com/DynamoRIO/drmemory/issues/567 b
646 dbghelp.dll!*
648 dbghelp.dll!StackWalk64
650 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
651 # TppWorkerThread w/ syms.  We used to use mod+offs here, but that was too
652 # brittle, so we switched to RPCRT4.dll!*.
653 LEAK
654 name=https://github.com/DynamoRIO/drmemory/issues/569
655 RPCRT4.dll!...
656 ntdll.dll!*
657 ntdll.dll!*
658 KERNEL*.dll!BaseThreadInitThunk
660 # TODO(timurrrr): investigate these
661 UNINITIALIZED READ
662 name=http://crbug.com/TODO a
664 *!win_util::GetLogonSessionOnlyDACL
666 UNINITIALIZED READ
667 name=http://crbug.com/TODO b
669 ntshrui.dll!IsPathSharedW
671 UNINITIALIZED READ
672 name=http://crbug.com/TODO c
674 *!NetApiBufferFree
676 UNINITIALIZED READ
677 name=http://crbug.com/TODO d
679 *!ShellExecute*
681 UNINITIALIZED READ
682 name=http://crbug.com/TODO e
684 *!SHParseDisplayName
686 UNINITIALIZED READ
687 name=http://crbug.com/TODO f
689 *!GetCanonicalPathInfo*
691 UNINITIALIZED READ
692 name=http://crbug.com/TODO g
694 SHELL32.dll!Ordinal*
696 UNINITIALIZED READ
697 name=http://crbug.com/TODO h
699 GDI32.dll!GetTextExtentPoint32*
701 UNINITIALIZED READ
702 name=http://crbug.com/TODO i
704 *!SyncSocketClientListener::OnMsgClassResponse
706 UNINITIALIZED READ
707 name=http://crbug.com/TODO j
709 *!*NSPRInitSingleton*
711 UNINITIALIZED READ
712 name=http://crbug.com/TODO k
713 *!NdrSimpleStructFree
715 UNINITIALIZED READ
716 name=http://crbug.com/TODO l
717 ntdll.dll!RtlpNtOpenKey
718 ntdll.dll!RtlMakeSelfRelativeSD
719 ntdll.dll!RtlAbsoluteToSelfRelativeSD
720 ADVAPI32.dll!MakeSelfRelativeSD
722 UNINITIALIZED READ
723 name=http://crbug.com/TODO m
725 CRYPT32.dll!I_CertSyncStore
727 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
728 # a leak.  Must be some early thread initialization.  Doesn't look like
729 # bit-level though.
730 UNINITIALIZED READ
731 name=http://crbug.com/TODO n
732 RPCRT4.dll!*
733 RPCRT4.dll!*
734 RPCRT4.dll!*
735 ntdll.dll!*
736 ntdll.dll!*
737 KERNEL*.dll!BaseThreadInitThunk
739 # No idea where this is from, but Chrome isn't even on the stack.
740 POSSIBLE LEAK
741 name=http://crbug.com/TODO o
742 RPCRT4.dll!...
743 ole32.dll!OleInitialize
744 ole32.dll!...
745 KERNEL32.dll!BaseThreadInitThunk
747 # Matches lots of RPC related leaks.  So far RPC handles have been mostly owned
748 # by system libraries and are not something we can fix easily.
749 POSSIBLE LEAK
750 name=http://crbug.com/TODO p
751 RPCRT4.dll!*
752 RPCRT4.dll!*
753 RPCRT4.dll!NDRCContextBinding
755 # No idea, but all system code, not interesting.
756 POSSIBLE LEAK
757 name=http://crbug.com/TODO q
758 RPCRT4.dll!...
759 RPCRT4.dll!*
760 RPCRT4.dll!*
761 ole32.dll!...
762 ole32.dll!*
763 ole32.dll!*
765 SHELL32.dll!*
767 LEAK
768 name=http://crbug.com/109278 video device COM leaks
770 *!media::VideoCaptureDevice::*
772 LEAK
773 name=http://crbug.com/109278 audio device COM leaks
775 *!media::GetInputDeviceNamesWin
777 # False pos uninit in shell32 when resolving links.
778 UNINITIALIZED READ
779 name=https://github.com/DynamoRIO/drmemory/issues/745
780 SHELL*.dll!*
782 SHELL*.dll!*
783 *!file_util::ResolveShortcut
785 # Probable false pos uninit in ffmpeg.  Probably due to running off the end of a
786 # buffer with SSE/MMX instructions whose results are then masked out later.
787 UNINITIALIZED READ
788 name=https://github.com/DynamoRIO/drmemory/issues/747 a
789 *!ff_pred4x4_vertical_vp8_mmxext
791 UNINITIALIZED READ
792 name=https://github.com/DynamoRIO/drmemory/issues/747 b
793 *!ff_pred4x4_down_left_mmxext
795 UNINITIALIZED READ
796 name=https://github.com/DynamoRIO/drmemory/issues/747 c
797 *!ff_vorbis_floor1_render_list
799 UNINITIALIZED READ
800 name=https://github.com/DynamoRIO/drmemory/issues/747 d
801 *!ff_put_vp8_epel8_h6_ssse3
803 UNINITIALIZED READ
804 name=https://github.com/DynamoRIO/drmemory/issues/747 e
805 *!ff_put_vp8_epel8_h4_ssse3
807 UNINITIALIZED READ
808 name=https://github.com/DynamoRIO/drmemory/issues/747 f
809 *!ff_fft_permute_sse
811 UNINITIALIZED READ
812 name=https://github.com/DynamoRIO/drmemory/issues/747 g
813 *!ff_simple_idct_add_mmx
815 # ffmpeg seems to leak a pthread condition variable.
816 LEAK
817 name=http://crbug.com/110042
818 *!ptw32_new
819 *!pthread_self
820 *!sem_wait
821 *!pthread_cond_wait
822 *!ff_thread_decode_frame
823 *!avcodec_decode_video2
825 # Improperly handled ioctl in bcrypt.
826 UNINITIALIZED READ
827 name=https://github.com/DynamoRIO/drmemory/issues/748
828 system call NtDeviceIoControlFile InputBuffer
830 bcrypt.dll!BCryptUnregisterConfigChangeNotify
831 bcrypt.dll!BCryptGetFipsAlgorithmMode
832 ntdll.dll!RtlQueryEnvironmentVariable
834 # Not sure what this is.
835 POSSIBLE LEAK
836 name=https://github.com/DynamoRIO/drmemory/issues/749
838 fwpuclnt.dll!*
840 RPCRT4.dll!*
842 fwpuclnt.dll!*
844 WS2_32.dll!*
845 *!talk_base::SafeGetHostByName
846 *!talk_base::SocketAddress::GetLocalIPs
847 *!talk_base::SocketAddress::IsLocalIP
848 *!cricket::Transport::VerifyCandidate
849 *!cricket::Session::OnRemoteCandidates
850 *!cricket::Session::OnTransportInfoMessage
851 *!cricket::Session::OnIncomingMessage
852 *!cricket::SessionManager::OnIncomingMessage
854 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
855 UNINITIALIZED READ
856 name=https://github.com/DynamoRIO/drmemory/issues/529
857 RPCRT4.dll!*
859 *!base::LaunchProcess
861 # System leak from CreateEnvironmentBlock.
862 LEAK
863 name=https://github.com/DynamoRIO/drmemory/issues/757
865 USERENV.dll!CreateEnvironmentBlock
867 # Looks like another instance of 753
868 LEAK
869 name=https://github.com/DynamoRIO/drmemory/issues/753
871 ntdll.dll!RtlLoadString
873 # More bit manip fps
874 UNINITIALIZED READ
875 name=https://github.com/DynamoRIO/drmemory/issues/493
876 USP10.dll!ScriptPositionSingleGlyph
878 # Various TLS leaks that we don't understand yet.  We should be finding a root
879 # for these.
880 LEAK
881 name=https://github.com/DynamoRIO/drmemory/issues/778 a
882 KERNELBASE.dll!TlsSetValue
884 # Originally filed as: http://crbug.com/109281
885 LEAK
886 name=https://github.com/DynamoRIO/drmemory/issues/778 b
887 *!operator new
888 *!operator new[]
889 *!*::ConstructTlsVector
890 *!base::ThreadLocalStorage::StaticSlot::Get
892 # This is an NSS PRThread object installed in TLS.  Why isn't this detected as a
893 # root?  See also http://crbug.com/32624
894 LEAK
895 name=https://github.com/DynamoRIO/drmemory/issues/778 c
896 *!PR_Calloc
897 *!_PR_AttachThread
898 *!_PRI_AttachThread
900 # Bit-level fps in rich edit layer.
901 UNINITIALIZED READ
902 name=https://github.com/DynamoRIO/drmemory/issues/791
903 RICHED20.dll!*
904 RICHED20.dll!*
906 # Already suppressed by drmemory default supp we don't have yet.
907 LEAK
908 name=i#757: RPC binding leaks in sspicli.dll
909 RPCRT4.dll!*
911 SspiCli.dll!*
912 SspiCli.dll!Cre*
914 # Async NtReadFile false positives.  This was fixed in drmemory r772, remove
915 # this supp when we pull that rev.
916 UNADDRESSABLE ACCESS
917 name=https://github.com/DynamoRIO/drmemory/issues/798
918 system call NtReadFile parameter #5
919 KERNEL32.dll!ReadFile
921 # Probable syscall false positive.
922 UNADDRESSABLE ACCESS
923 name=https://github.com/DynamoRIO/drmemory/issues/809
924 system call NtGdiPolyPolyDraw parameter #1
925 *!gfx::Path::CreateNativeRegion
927 # Very wide suppression for all uninits in rpcrt4.dll.  We get bad stack traces
928 # coming out of this module (sometimes only one frame), which makes it hard to
929 # write precise suppressions.  Until we have bit-level tracking (DRMi#113) we
930 # should keep this.
931 UNINITIALIZED READ
932 name=https://github.com/DynamoRIO/drmemory/issues/113 rpcrt4.dll wildcard
933 RPCRT4.dll!*
935 UNINITIALIZED READ
936 name=https://github.com/DynamoRIO/drmemory/issues/841 a
938 CRYPTNET.dll!I_CryptNetGetConnectivity
940 UNINITIALIZED READ
941 name=https://github.com/DynamoRIO/drmemory/issues/841 b
943 webio.dll!*
945 UNINITIALIZED READ
946 name=https://github.com/DynamoRIO/drmemory/issues/841 c
948 winhttp.dll!*
950 LEAK
951 name=https://github.com/DynamoRIO/drmemory/issues/841 d
953 CRYPTNET.dll!I_CryptNetGetConnectivity
955 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
956 UNINITIALIZED READ
957 name=https://github.com/DynamoRIO/drmemory/issues/810
958 instruction=test   %edx %edx
959 USER32.dll!GetClassLongW
961 *!ui::CenterAndSizeWindow
963 UNINITIALIZED READ
964 name=https://github.com/DynamoRIO/drmemory/issues/815
965 KERNEL*.dll!...
966 dxgi.dll!*
967 USER32.dll!GetMonitorInfoA
968 ntdll.dll!KiUserCallbackDispatcher
969 dxgi.dll!*
970 WinSATAPI.DLL!*
972 # Suppress anything in cmd.exe.  It's safer to suppress these than disable
973 # following, since someone might launch a Chrome process via cmd.exe.
974 LEAK
975 name=cmd.exe
977 cmd.exe!*
979 # Possible true system use after free.
980 UNADDRESSABLE ACCESS
981 name=https://github.com/DynamoRIO/drmemory/issues/623
982 KERNELBASE.dll!TlsGetValue
983 OLEAUT32.dll!SysFreeString
984 OLEAUT32.dll!SysAllocStringByteLen
985 OLEACC.dll!*
986 OLEACC.dll!*
987 OLEACC.dll!*
988 OLEACC.dll!*
990 # basic_streambuf seems to leak something in creating a std::_Mutex
991 LEAK
992 name=https://github.com/DynamoRIO/drmemory/issues/857
993 ntdll.dll!...
994 ntdll.dll!RtlInitializeCriticalSection
995 *!_Mtxinit
996 *!std::_Mutex::_Mutex
997 *!std::basic_streambuf<>
999 # Seems to create a DC, sometimes.  GetTextMetrics returns no pointers, though.
1000 LEAK
1001 name=GDI SetBrushOrgEx leak
1002 GDI32.dll!...
1003 GDI32.dll!GetTextMetricsW
1004 *!gfx::PlatformFontWin::CreateHFontRef
1005 *!gfx::PlatformFontWin::GetBaseFontRef
1007 ###############################################################
1008 # Benign issues in Chromium
1010 # This test intentionally leaks an object and checks that it's never deleted.
1011 LEAK
1012 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
1014 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
1016 LEAK
1017 name=deliberate histogram leak
1019 *!replace_operator_new
1021 *!*::*Histogram::FactoryGet
1023 LEAK
1024 name=deliberate leak for SampleMap
1026 *!base::SampleMap::Accumulate
1027 *!base::SparseHistogram::Add
1029 LEAK
1030 name=deliberate LazyInstance leak
1032 *!*LeakyLazyInstance*
1034 *!base::LazyInstance*::Pointer
1036 LEAK
1037 name=http://crbug.com/79933 (2)
1039 *!TestURLRequestContext::TestURLRequestContext
1040 *!TestURLRequestContextGetter::GetURLRequestContext
1041 *!notifier::SingleLoginAttempt::SingleLoginAttempt
1042 *!notifier::Login::StartConnection
1043 *!syncer::InvalidationNotifier::UpdateCredentials
1044 *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials
1046 LEAK
1047 name=http://crbug.com/79933 (3)
1049 *!TestURLRequestContext::TestURLRequestContext
1050 *!TestURLRequestContextGetter::GetURLRequestContext
1051 *!URLFetcher::Core::StartURLRequest
1053 LEAK
1054 name=http://crbug.com/79933 (4)
1055 *!generic_cpp_alloc
1056 *!operator new
1057 *!std::_Allocate<>
1058 *!std::allocator<>::allocate
1059 *!std::vector<>::_Insert_n
1060 *!std::vector<>::insert
1061 *!std::vector<>::push_back
1062 *!ObserverListBase<>::AddObserver
1064 *!net::HttpNetworkSession::HttpNetworkSession
1065 *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
1066 *!notifier::XmppClientSocketFactory::CreateTransportClientSocket
1067 *!notifier::ChromeAsyncSocket::Connect
1068 *!buzz::XmppClient::ProcessStartXmppLogin
1069 *!buzz::XmppClient::Process
1070 *!talk_base::Task::Step
1071 *!talk_base::TaskRunner::InternalRunTasks
1072 *!talk_base::TaskRunner::RunTasks
1073 *!notifier::TaskPump::CheckAndRunTasks
1074 *!base::internal::RunnableAdapter<>::Run
1076 # Test intentionally leaks an object.
1077 LEAK
1078 name=http://crbug.com/86301
1079 *!replace_operator_new
1081 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody
1083 # Leak in a binary copy of Firefox 3's NSS dll.  Not much we can do about it.
1084 LEAK
1085 name=Firefox 3 NSS dll leak
1086 nspr4.dll!*
1088 *!NSSDecryptor::~NSSDecryptor
1090 # We get uninit reports inside GMock when it prints the bytes of references to
1091 # partially initialized objects passed to unexpected method calls.
1092 UNINITIALIZED READ
1093 name=http://crbug.com/64887 (GMock printing uninit data)
1095 *!testing::*::PrintBytesInObjectTo*
1097 ###############################################################
1098 # Proactively borrowed from memcheck/suppressions.txt.
1099 # We have not yet seen these, but we are expanding the sets of tests
1100 # we're running, and we've hit redness in the past that could have
1101 # been avoided by already having the Memcheck suppressions.
1102 # TODO(bruening): review the entire file (not just these) once we're
1103 # at the peak set of tests we plan to run and remove the unused ones.
1105 UNINITIALIZED READ
1106 name=bug_99307
1107 *!modp_b64_encode
1108 *!base::Base64Encode*
1109 *!web_ui_util::GetImageDataUrl
1110 *!::NetworkInfoDictionary::set_icon
1112 UNINITIALIZED READ
1113 name=bug_101781
1114 *!encode_one_block
1115 *!encode_mcu_huff
1116 *!compress_data
1117 *!process_data_simple_main
1118 *!chromium_jpeg_write_scanlines
1119 *!gfx::JPEGCodec::Encode
1120 *!gfx::JPEGEncodedDataFromImage
1121 *!history::TopSites::EncodeBitmap
1122 *!history::TopSites::SetPageThumbnail
1123 *!history::ExpireHistoryTest::AddExampleData
1124 *!history::ExpireHistoryTest::*
1126 UNINITIALIZED READ
1127 name=bug_101781_d
1128 *!testing::AssertionResult testing::internal::CmpHelperGE<>
1129 *!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody
1131 UNINITIALIZED READ
1132 name=bug_105907
1134 *!skia::BGRAConvolve2D
1135 *!skia::ImageOperations::ResizeBasic*
1136 *!skia::ImageOperations::Resize*
1138 UNINITIALIZED READ
1139 name=bug_112278
1140 *!fetch_texel_2d_f_rgba8888
1141 *!sample_2d_linear
1142 *!sample_linear_2d
1143 *!fetch_texel_lod
1144 *!fetch_texel
1145 *!_mesa_execute_program
1146 *!run_program
1147 *!_swrast_exec_fragment_program
1148 *!shade_texture_span
1149 *!_swrast_write_rgba_span
1150 *!general_triangle
1151 *!_swrast_validate_triangle
1152 *!_swrast_Triangle
1153 *!triangle_rgba
1154 *!_tnl_render_triangles_elts
1155 *!run_render
1156 *!_tnl_run_pipeline
1157 *!_tnl_draw_prims
1158 *!_tnl_vbo_draw_prims
1159 *!vbo_validated_drawrangeelements
1160 *!vbo_exec_DrawElements
1161 *!neutral_DrawElements
1163 UNINITIALIZED READ
1164 name=bug_112278b
1165 *!fetch_texel_2d_f_rgba8888
1166 *!sample_2d_nearest
1167 *!sample_nearest_2d
1168 *!fetch_texel_lod
1169 *!fetch_texel
1170 *!_mesa_execute_program
1171 *!run_program
1172 *!_swrast_exec_fragment_program
1173 *!shade_texture_span
1174 *!_swrast_write_rgba_span
1175 *!general_triangle
1177 *!_swrast_Triangle
1178 *!triangle_rgba
1180 *!run_render
1181 *!_tnl_run_pipeline
1182 *!_tnl_draw_prims
1183 *!_tnl_vbo_draw_prims
1185 UNINITIALIZED READ
1186 name=bug_115419_1
1187 *!fetch_texel_2d_f_rgba8888
1188 *!texture_get_row
1189 *!fast_read_rgba_pixels
1190 *!read_rgba_pixels
1191 *!_swrast_ReadPixels
1192 *!_mesa_ReadPixels
1193 *!glReadPixels
1194 *!gpu::gles2::GLES2DecoderImpl::HandleReadPixels
1195 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1196 *!gpu::CommandParser::ProcessCommand
1197 *!gpu::GpuScheduler::PutChanged
1198 *!webkit::gpu::GLInProcessContext::PumpCommands
1200 UNINITIALIZED READ
1201 name=bug_115419_2
1202 *!get_src_arg_mask
1203 *!_mesa_remove_extra_move_use
1204 *!_mesa_optimize_program
1205 *!get_mesa_program
1206 *!_mesa_ir_link_shader
1207 *!_mesa_glsl_link_shader
1208 *!link_program
1209 *!_mesa_LinkProgramARB
1210 *!glLinkProgram
1212 *!gpu::gles2::GLES2DecoderImpl::DoLinkProgram*
1213 *!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram*
1214 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1215 *!gpu::CommandParser::ProcessCommand
1216 *!gpu::GpuScheduler::PutChanged
1217 *!webkit::gpu::GLInProcessContext::PumpCommands
1219 UNINITIALIZED READ
1220 name=bug_138058
1222 *!blink::WebVTTParser::constructTreeFromToken
1223 *!blink::WebVTTParser::createDocumentFragmentFromCueText
1224 *!blink::TextTrackCue::getCueAsHTML
1225 *!blink::TextTrackCue::updateDisplayTree
1226 *!blink::HTMLMediaElement::updateActiveTextTrackCues
1228 UNINITIALIZED READ
1229 name=bug_138220_a
1230 *!blink::HTMLInputElement::dataList
1231 *!blink::HTMLInputElement::list
1232 *!blink::RenderSliderContainer::layout
1233 *!blink::RenderBlock::layoutBlockChild
1234 *!blink::RenderBlock::layoutBlockChildren
1235 *!blink::RenderBlock::layoutBlock
1236 *!blink::RenderBlock::layout
1237 *!blink::RenderSlider::layout
1239 UNINITIALIZED READ
1240 name=bug_138220_b
1241 *!blink::HTMLInputElement::dataList
1242 *!blink::HTMLInputElement::list
1243 *!blink::RenderTheme::paintSliderTicks
1244 *!blink::RenderThemeChromiumLinux::paintSliderTrack
1245 *!blink::RenderTheme::paint
1246 *!blink::RenderBox::paintBoxDecorations
1247 *!blink::RenderBlock::paintObject
1249 UNINITIALIZED READ
1250 name=bug_162825
1251 *!bcmp
1252 *!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator<
1253 *!std::less<>::operator
1255 *!std::map<>::find
1257 *!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
1259 UNINITIALIZED READ
1260 name=bug_176616_a
1261 *!WebTestRunner::WebTestProxyBase::didCreateDataSource
1262 *!WebTestRunner::WebTestProxy<>::didCreateDataSource
1263 *!blink::FrameLoaderClientImpl::createDocumentLoader
1264 *!blink::FrameLoader::init
1265 *!blink::Frame::init
1266 *!blink::WebFrameImpl::initializeAsMainFrame
1267 *!blink::WebViewImpl::initializeMainFrame
1268 *!TestShell::createNewWindow
1269 *!TestShell::createMainWindow
1270 *!TestShell::initialize
1272 UNINITIALIZED READ
1273 name=bug_176616_b
1274 *!WebTestRunner::TestRunner::reset
1275 *!WebTestRunner::TestInterfaces::resetAll
1276 *!WebTestRunner::WebTestInterfaces::resetAll
1277 *!TestShell::resetTestController
1278 *!runTest
1280 UNINITIALIZED READ
1281 name=bug_222883
1282 *!v8::internal::ScavengeVisitor::ScavengePointer
1283 *!v8::internal::ScavengeVisitor::VisitPointers
1284 *!v8::internal::StandardFrame::IterateExpressions
1286 *!v8::internal::Heap::Scavenge
1287 *!v8::internal::Heap::PerformGarbageCollection*
1289 UNINITIALIZED READ
1290 name=bug_238170a
1291 *!blink::ElementRuleCollector::collectMatchingRules
1292 *!blink::ElementRuleCollector::hasAnyMatchingRules
1294 UNINITIALIZED READ
1295 name=bug_238170b
1296 *!blink::ElementRuleCollector::collectMatchingRules
1297 *!blink::StyleResolver::matchAuthorRules
1299 UNINITIALIZED READ
1300 name=bug_238170c
1301 *!blink::ReplaceSelectionCommand::doApply
1302 *!blink::CompositeEditCommand::apply
1303 *!blink::applyCommand
1305 UNINITIALIZED READ
1306 name=bug_259789
1307 *!blink::::adjustAttributes
1308 *!blink::WebGLRenderingContext::maybeRestoreContext
1309 *!blink::Timer<>::fired
1310 *!blink::ThreadTimers::sharedTimerFiredInternal
1311 *!blink::ThreadTimers::sharedTimerFired
1312 *!content::BlinkPlatformImpl::DoTimeout
1314 UNINITIALIZED READ
1315 name=bug_290405
1316 *!GrGradientEffect::onIsEqual
1317 *!GrEffect::isEqual
1318 *!GrEffectStage::DeferredStage::isEqual
1319 *!GrDrawState::DeferredState::isEqual
1320 *!GrInOrderDrawBuffer::needsNewState
1321 *!GrInOrderDrawBuffer::onDraw
1322 *!GrDrawTarget::drawIndexedInstances
1323 *!GrTextContext::flushGlyphs
1325 UNINITIALIZED READ
1326 name=bug_290435
1327 *!blink::AudioContext::scheduleNodeDeletion
1328 *!blink::AudioContext::handlePostRenderTasks
1329 *!blink::AudioDestinationNode::render
1330 *!blink::OfflineAudioDestinationNode::offlineRender
1332 UNINITIALIZED READ
1333 name=bug_364724
1334 *!base::MD5DigestToBase16
1335 *!content::WebKitTestRunner::CaptureDumpPixels
1337 UNINITIALIZED READ
1338 name=bug_298143
1340 *!blink::TypeConversionsV8Internal*AttributeGetter*
1342 UNINITIALIZED READ
1343 name=bug_299804
1344 *!GrConfigConversionEffect::TestForPreservingPMConversions
1345 *!::test_pm_conversions
1346 *!GrContext::createPMToUPMEffect
1347 *!GrContext::readRenderTargetPixels
1348 *!SkGpuDevice::onReadPixels
1349 *!SkBaseDevice::readPixels
1350 *!SkCanvas::readPixels
1351 *!DeferredDevice::onReadPixels
1352 *!SkBaseDevice::readPixels
1353 *!SkCanvas::readPixels
1354 *!blink::GraphicsContext::readPixels
1355 *!WTF::PassRefPtr<>
1356 *!blink::ImageBuffer::getUnmultipliedImageData
1357 *!blink::CanvasRenderingContext2D::getImageData
1358 *!blink::CanvasRenderingContext2D::getImageData
1359 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethod
1360 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback
1361 *!v8::internal::FunctionCallbackArguments::Call
1362 *!v8::internal::HandleApiCallHelper<>
1364 UNINITIALIZED READ
1365 name=bug_309477
1366 *!WebTestRunner::EventSender::reset
1367 *!WebTestRunner::TestInterfaces::resetTestHelperControllers
1368 *!WebTestRunner::TestInterfaces::resetAll
1370 *!content::ShellRenderProcessObserver::WebKitInitialized
1371 *!content::RenderThreadImpl::EnsureWebKitInitialized
1372 *!content::RenderThreadImpl::OnCreateNewView
1374 ###############################################################
1375 # Real issues in Chromium
1377 LEAK
1378 name=http://crbug.com/32085
1380 chrome.dll!NotificationRegistrar::Add
1382 UNINITIALIZED READ
1383 name=http://crbug.com/57266 (1)
1385 *!remoting::EncoderVp8::Encode
1387 UNINITIALIZED READ
1388 name=http://crbug.com/57266 (2)
1390 *!vp8_*
1392 LEAK
1393 name=http://crbug.com/70062
1394 *!PR_Calloc
1395 *!PR_NewLock
1397 *!InitSessionCacheLocks
1398 *!initSessionCacheLocksLazily
1399 *!PR_CallOnce
1400 *!ssl_InitSessionCacheLocks
1401 *!lock_cache
1402 *!ssl_LookupSID
1403 *!ssl2_BeginClientHandshake
1404 *!ssl_Do1stHandshake
1405 *!SSL_ForceHandshake
1406 *!net::SSL*SocketNSS::DoHandshake
1407 *!net::SSL*SocketNSS::DoHandshakeLoop
1409 LEAK
1410 name=http://crbug.com/74417 a
1411 *!replace_operator_new
1412 *!disk_cache::BackendImpl::CreateEntryImpl
1414 LEAK
1415 name=http://crbug.com/74417 b
1416 *!replace_operator_new
1417 *!disk_cache::BackendImpl::NewEntry
1419 # One more disk_cache::BackendImpl leak.  See also http://crbug.com/87500.
1420 LEAK
1421 name=http://crbug.com/74417 c
1422 *!replace_operator_new
1424 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
1426 LEAK
1427 name=http://crbug.com/75247
1429 *!replace_operator_new
1430 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
1432 LEAK
1433 name=http://crbug.com/78784
1434 *!generic_cpp_alloc
1435 *!operator new
1436 *!TestingProfile::CreateRequestContext
1437 *!*ProfileSyncService*::SetUp
1439 LEAK
1440 name=http://crbug.com/80550 (1)
1442 *!RenderWidgetHost::WasHidden
1444 LEAK
1445 name=http://crbug.com/80550 (2)
1447 *!RenderWidgetHost::WasRestored
1449 LEAK
1450 name=http://crbug.com/87612
1452 *!SSL_ConfigSecureServer
1453 *!net::SSLServerSocketNSS::InitializeSSLOptions
1454 *!net::SSLServerSocketNSS::Handshake
1456 LEAK
1457 name=http://crbug.com/88640
1458 *!generic_cpp_alloc
1459 *!operator new
1460 *!ProfileImpl::InitRegisteredProtocolHandlers
1461 *!ProfileImpl::DoFinalInit
1462 *!ProfileImpl::OnPrefsLoaded
1464 LEAK
1465 name=http://crbug.com/91465
1466 *!generic_cpp_alloc
1467 *!operator new
1468 *!browser_sync::internal::WeakHandleCore<>::*
1469 *!browser_sync::WeakHandle<>::*
1470 *!syncer::SyncManager::SyncInternal::Init
1472 LEAK
1473 name=http://crbug.com/91491
1475 *!CrxUpdateService::ProcessPendingItems
1477 UNINITIALIZED READ
1478 name=http://crbug.com/92026 (1)
1479 softokn3.dll!FC_GetFunctionList
1481 softokn3.dll!NSC_ModuleDBFunc
1483 UNINITIALIZED READ
1484 name=http://crbug.com/92026 (2)
1485 freebl3.dll!FREEBL_GetVector
1487 softokn3.dll!NSC_ModuleDBFunc
1489 # Possible real Chromium issue in DoCrossfade.
1490 UNINITIALIZED READ
1491 name=http://crbug.com/110049
1492 *!media::DoCrossfade<>
1493 *!media::Crossfade
1494 *!media::AudioRendererAlgorithmBase::FillBuffer
1496 # Known sqlite3 leaks.
1497 LEAK
1498 name=http://crbug.com/113847 (1)
1500 *!sqlite3MemMalloc
1501 *!mallocWithAlarm
1502 *!sqlite3Malloc
1504 *!yy_reduce
1506 LEAK
1507 name=http://crbug.com/113847 (2)
1509 *!openDatabase
1510 *!sqlite3_open
1512 LEAK
1513 name=http://crbug.com/115328
1515 *!GenericInfoViewTest_GenericInfoView_Test::TestBody
1517 LEAK
1518 name=http://crbug.com/117427 a
1520 *!net::HostCache::Set
1521 *!net::HostResolverImpl::CacheResult
1522 *!net::HostResolverImpl::Job::CompleteRequests
1523 *!net::HostResolverImpl::Job::OnProcTaskComplete
1524 *!base::internal::RunnableAdapter<>::Run
1526 # Probably related to 117427.  Someone is not tearing down DNS resolution during
1527 # testing.
1528 LEAK
1529 name=http://crbug.com/117427 b
1530 *!generic_cpp_alloc
1531 *!operator new
1532 *!base::internal::WeakReferenceOwner::GetRef
1533 *!base::SupportsWeakPtr<>::AsWeakPtr
1534 *!net::HostResolverImpl::Job::Job
1535 *!net::HostResolverImpl::Resolve
1536 *!net::SingleRequestHostResolver::Resolve
1537 *!net::TransportConnectJob::DoResolveHost
1538 *!net::TransportConnectJob::DoLoop
1539 *!net::TransportConnectJob::ConnectInternal
1540 *!net::ConnectJob::Connect
1541 *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
1542 *!net::internal::ClientSocketPoolBaseHelper::RequestSocket
1543 *!net::ClientSocketPoolBase<>::RequestSocket
1544 *!net::TransportClientSocketPool::RequestSocket
1545 *!net::ClientSocketHandle::Init<>
1546 *!net::`anonymous namespace'::InitSocketPoolHelper
1547 *!net::InitSocketHandleForRawConnect
1548 *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
1549 *!base::internal::RunnableAdapter<>::Run
1551 # IE frame possible leak of COM object.
1552 LEAK
1553 name=http://crbug.com/122399
1554 ole32.dll!...
1555 ole32.dll!CoTaskMemAlloc
1556 urlmon.dll!...
1557 urlmon.dll!CreateUri
1558 IEFRAME.dll!*
1560 # RenderWidgetHelper leak in DelayProfileDestruction test.
1561 LEAK
1562 name=http://crbug.com/125565
1563 *!generic_cpp_alloc
1564 *!operator new
1565 *!RenderProcessHostImpl::RenderProcessHostImpl
1566 *!SiteInstanceImpl::GetProcess
1567 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
1569 LEAK
1570 name=http://crbug.com/125807
1571 *!generic_cpp_alloc
1572 *!operator new
1573 *!TransportSecurityPersister::TransportSecurityPersister
1574 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest
1576 UNINITIALIZED READ
1577 name=bug_113076
1578 *!media::ConvertYUVToRGB32_C
1579 *!media::LinearScaleYUVToRGB32RowWithRange_C
1580 *!media::ScaleYUVToRGB32WithRect
1582 UNINITIALIZED READ
1583 name=bug_343248
1584 osmesa.dll!LINTERP
1585 osmesa.dll!INTERP_4F
1586 osmesa.dll!_tnl_generic_interp
1588 UNINITIALIZED READ
1589 name=bug_340752
1591 *!*::ThreadState::visitStack
1593 UNINITIALIZED READ
1594 name=bug_343663
1595 blink_web.dll!blink::RenderBlock::computeInlinePreferredLogicalWidths
1597 UNINITIALIZED READ
1598 name=bug_343797
1600 blink_web.dll!blink::MediaQueryExp::create
1601 blink_web.dll!blink::BisonCSSParser::createFloatingMediaQueryExp
1602 blink_web.dll!cssyyparse
1604 UNINITIALIZED READ
1605 name=bug_343915
1606 blink_web.dll!blink::BisonCSSParser::parseFlex
1607 blink_web.dll!blink::BisonCSSParser::parseValue
1608 blink_web.dll!cssyyparse
1610 UNADDRESSABLE ACCESS
1611 name=BUG_343958
1612 blink_web.dll!blink::Node::getFlag
1613 blink_web.dll!blink::Node::inDocument
1614 blink_web.dll!blink::Node::isDescendantOf
1615 blink_web.dll!blink::CompositeEditCommand::cloneParagraphUnderNewElement
1616 blink_web.dll!blink::CompositeEditCommand::moveParagraphWithClones
1618 UNINITIALIZED READ
1619 name=BUG_344076
1620 blink_web.dll!blink::Editor::canSmartReplaceWithPasteboard
1621 blink_web.dll!blink::Editor::pasteAsPlainTextWithPasteboard
1622 blink_web.dll!blink::Editor::pasteAsPlainText
1623 blink_web.dll!blink::executePasteAndMatchStyle
1624 blink_web.dll!blink::Editor::Command::execute
1625 blink_web.dll!blink::Document::execCommand
1627 UNINITIALIZED READ
1628 name=BUG_349128
1629 content.dll!std::*
1631 content.dll!content::BrowserAccessibilityManagerWin::*
1633 *!*::UpdateNode
1635 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB*
1636 # variety) that it's a performance hit.  We avoid that by requesting
1637 # whole-module suppression
1638 # (see https://github.com/DynamoRIO/drmemory/issues/1529).
1639 UNINITIALIZED READ
1640 name=bug_347967_all_osmesa
1641 osmesa.dll!*
1643 UNINITIALIZED READ
1644 name=bug_347967
1645 osmesa.dll!unpack_RGB*888
1646 osmesa.dll!_mesa_unpack_rgba_row
1647 osmesa.dll!slow_read_rgba_pixels
1648 osmesa.dll!read_rgba_pixels
1649 osmesa.dll!_mesa_readpixels
1651 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
1652 gpu.dll!gpu::CommandParser::ProcessCommand
1653 gpu.dll!gpu::GpuScheduler::PutChanged
1655 UNINITIALIZED READ
1656 name=bug_347967,bug_348357
1657 osmesa.dll!clip_span
1658 osmesa.dll!_swrast_write_rgba_span
1659 osmesa.dll!general_triangle
1661 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements
1662 gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements
1663 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
1664 gpu.dll!gpu::CommandParser::ProcessCommand
1666 UNINITIALIZED READ
1667 name=bug_361594
1669 skia.dll!SkA8_Shader_Blitter::blitH
1670 skia.dll!SkBlitter::blitRect
1671 skia.dll!blitrect
1672 skia.dll!SkScan::FillIRect
1674 skia.dll!SkDraw::drawRect
1675 skia.dll!SkDraw::drawBitmap
1676 skia.dll!SkBitmapDevice::drawBitmap
1677 skia.dll!SkCanvas::internalDrawBitmap
1678 skia.dll!SkCanvas::drawBitmap
1679 content.dll!content::ScreenshotData::EncodeOnWorker
1681 UNINITIALIZED READ
1682 name=bug_363487
1683 blink_web.dll!blink::RenderLayerCompositor::updateIfNeeded
1684 blink_web.dll!blink::RenderLayerCompositor::updateIfNeededRecursive
1685 blink_web.dll!blink::FrameView::updateLayoutAndStyleForPainting
1686 blink_web.dll!blink::PageAnimator::updateLayoutAndStyleForPainting
1688 UNINITIALIZED READ
1689 name=bug_365101
1690 *!device::BluetoothAdapterWin::AdapterStateChanged
1692 UNINITIALIZED READ
1693 name=bug_364146
1695 v8.dll!*
1696 net_with_v8.dll!net::ProxyResolverV8::Context::*
1698 UNINITIALIZED READ
1699 name=bug_334448
1700 *!CLD2::UTF8GenericReplaceInternal
1701 *!CLD2::UTF8GenericReplace
1702 *!CLD2::ScriptScanner::LowerScriptSpan
1703 *!CLD2::ScriptScanner::GetOneScriptSpanLower
1704 *!CLD2::DetectLanguageSummaryV2
1705 *!CLD2::DetectLanguageSummary
1707 UNINITIALIZED READ
1708 name=bug_42043
1710 QuickTime.qts!*
1712 UNINITIALIZED READ
1713 name=bug_369141
1715 *!blink::RenderLayerClipper::updateClipRects
1716 *!blink::RenderLayerClipper::parentClipRects
1717 *!blink::RenderLayerClipper::backgroundClipRect
1719 HANDLE LEAK
1720 name=bug_370178
1721 system call NtCreateEvent
1722 KERNELBASE.dll!CreateEventExW
1723 KERNELBASE.dll!CreateEventW
1724 base.dll!base::WaitableEvent::WaitableEvent
1725 gpu.dll!gpu::InProcessCommandBuffer::Initialize
1726 gl_in_process_context.dll!gpu::`anonymous namespace'::GLInProcessContextImpl::Initialize
1727 gl_in_process_context.dll!gpu::GLInProcessContext::CreateContext
1729 UNINITIALIZED READ
1730 name=bug_371844
1731 *!content::GamepadProvider::PadState::Match
1732 *!content::GamepadProvider::DoPoll
1734 UNINITIALIZED READ
1735 name=bug_371950
1736 media.dll!ConvertYUVToRGB32Row_SSE
1737 media.dll!media::ConvertYUVToRGB32_SSE
1738 media.dll!media::ConvertVideoFrameToBitmap
1739 media.dll!media::SkCanvasVideoRenderer::Paint
1740 cc.dll!cc::VideoResourceUpdater::CreateForSoftwarePlanes
1741 cc.dll!cc::VideoResourceUpdater::CreateExternalResourcesFromVideoFrame
1742 cc.dll!cc::VideoLayerImpl::WillDraw
1744 UNINITIALIZED READ
1745 name=bug_371959
1746 content.dll!webrtc::PeerConnection::DoInitialize
1747 content.dll!webrtc::PeerConnection::Initialize
1748 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection_s
1749 content.dll!webrtc::PeerConnectionFactory::OnMessage
1750 content.dll!jingle_glue::JingleThreadWrapper::Send
1751 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection
1752 content.dll!webrtc::PeerConnectionFactoryInterface::CreatePeerConnection
1754 # This suppression is deliberately general, as bugs reported in
1755 # ProcessOutgoingMessages are difficult to track down until we
1756 # get our annotations in place.
1757 # TODO(bruening): add annotations once we have the infrastructure.
1758 UNINITIALIZED READ
1759 name=bug_371991
1760 system call NtWriteFile parameter #5
1761 KERNELBASE.dll!WriteFile
1762 KERNEL32.dll!WriteFile*
1763 *!IPC::Channel*::ProcessOutgoingMessages
1765 UNINITIALIZED READ
1766 name=bug_372254
1767 *!content::*::NotifyPluginProcessHostHelper
1769 UNINITIALIZED READ
1770 name=drm_i#1546
1771 *!testing::internal::CmpHelperEQ<>
1773 *!content::BrowserPluginTest_ResizeFlowControl_Test::TestBody
1775 UNINITIALIZED READ
1776 name=bug_374410
1777 *!ui::NativeThemeWin::PaintScrollbarTrack
1778 *!ui::NativeThemeWin::PaintDirect
1780 UNINITIALIZED READ
1781 name=bug_377728
1783 *!Hunspell::suggest
1784 *!HunspellEngine::FillSuggestionList
1785 *!SpellcheckLanguage::SpellCheckWord
1786 *!SpellCheck::SpellCheckWord
1788 UNINITIALIZED READ
1789 name=bug_387373
1790 *!blink::WebEmbeddedWorkerImpl::startWorkerContext
1791 *!content::EmbeddedWorkerDispatcher::OnStartWorker
1792 *!EmbeddedWorkerMsg_StartWorker::Dispatch<>
1794 UNADDRESSABLE ACCESS
1795 name=bug_389132
1796 content.dll!crypto_kernel_do_load_cipher_type
1797 content.dll!crypto_kernel_load_cipher_type
1798 content.dll!crypto_kernel_init
1799 content.dll!cricket::SrtpSession::SetKey
1800 content.dll!cricket::SrtpSession::SetSend
1801 content.dll!cricket::SrtpFilter::SetRtpParams
1802 content.dll!cricket::BaseChannel::SetupDtlsSrtp
1803 content.dll!cricket::BaseChannel::ChannelWritable_w
1804 content.dll!cricket::BaseChannel::OnWritableState
1806 UNINITIALIZED READ
1807 name=bug_392585
1808 system call NtCreateFile parameter #9
1809 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1811 UNADDRESSABLE ACCESS
1812 name=bug_398850
1814 wtf.dll!WTF::PlatformCondition::timedWait
1816 UNINITIALIZED READ
1817 name=bug_399293
1818 blink_web.dll!blink::InputMethodController::extendSelectionAndDelete
1819 blink_web.dll!blink::WebLocalFrameImpl::extendSelectionAndDelete
1820 content.dll!content::RenderFrameImpl::OnExtendSelectionAndDelete
1821 *!content::RenderViewImplTest_OnExtendSelectionAndDelete_Test::TestBody
1822 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1824 UNINITIALIZED READ
1825 name=bug_398547
1826 system call NtWriteFile parameter #5
1827 KERNELBASE.dll!WriteFile
1828 KERNEL32.dll!WriteFile
1829 mojo_system_impl.dll!mojo::system::`anonymous namespace'::RawChannelWin::WriteNoLock
1831 HANDLE LEAK
1832 name=bug_403544
1833 system call NtCreateSemaphore
1834 KERNELBASE.dll!CreateSemaphoreExW
1836 v8.dll!v8::internal::SweeperThread::SweeperThread
1838 blink_web.dll!blink::WorkerScriptController::WorkerScriptController
1839 blink_web.dll!blink::WorkerGlobalScope::WorkerGlobalScope
1840 blink_web.dll!blink::ServiceWorkerGlobalScope::ServiceWorkerGlobalScope
1843 HANDLE LEAK
1844 name=bug_403681
1845 system call NtCreateTimer
1846 KERNELBASE.dll!CreateWaitableTimerExW
1847 KERNEL32.dll!CreateWaitableTimerW
1848 content.dll!rtc::Timing::Timing
1849 content.dll!content::RenderProcessHostImpl::CreateMessageFilters
1851 content.dll!content::RenderViewHostImpl::CreateRenderView
1852 content.dll!content::WebContentsImpl::CreateRenderViewForRenderManager
1854 content.dll!content::NavigationControllerImpl::LoadEntry
1856 *!extensions::ExtensionHost::LoadInitialURL
1858 UNINITIALIZED READ
1859 name=bug_414268
1860 pdf.dll!chrome_pdf::PDFiumEngine::OnMouseMove
1861 pdf.dll!chrome_pdf::PDFiumEngine::HandleEvent
1862 pdf.dll!chrome_pdf::OutOfProcessInstance::HandleInputEvent
1863 pdf.dll!pp::InputEvent_HandleEvent
1864 ppapi_proxy.dll!ppapi::CallWhileUnlocked<>
1865 ppapi_proxy.dll!ppapi::proxy::PPP_InputEvent_Proxy::OnMsgHandleFilteredInputEvent
1867 UNADDRESSABLE ACCESS
1868 name=bug_425097
1870 *!ash::test::ShelfViewTest_CheckDragAndDropFromOverflowBubbleToShelf_Test::TestBody
1872 UNINITIALIZED READ
1873 name=bug_432067
1874 system call NtCreateFile parameter #9
1875 MSWSOCK.dll!*
1876 content.dll!content::AppCacheStorageImpl::DatabaseTask::CallRun
1878 UNADDRESSABLE ACCESS
1879 name=bug_436131
1880 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
1881 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
1882 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1884 UNADDRESSABLE ACCESS
1885 name=bug_436131_b
1886 views.dll!ObserverListBase<>::RemoveObserver
1887 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
1888 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1890 UNADDRESSABLE ACCESS
1891 name=bug_436131_c
1892 *!ash::test::ShelfViewTestAPI::GetPreferredSize
1893 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
1894 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1896 UNINITIALIZED READ
1897 name=bug_399842
1898 skia.dll!S32A_Opaque_BlitRow32_SSE4
1900 UNINITIALIZED READ
1901 name=bug_455417
1902 *!std::char_traits<>::compare
1904 *!*::*URLRequest*::TestBody