[MemSheriff] Broaden a DrMemory suppression and add a new one.
[chromium-blink-merge.git] / tools / valgrind / drmemory / suppressions_full.txt
blob2036d21e15477afb85d1d3e0a2de9ae8c35e2076
1 # This file contains suppressions for the Dr.Memory tool, see
2 # http://dev.chromium.org/developers/how-tos/using-drmemory
4 # This file should contain suppressions only for the reports happening
5 # in the 'full' mode (drmemory_full).
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
7 # please use suppressions.txt instead.
9 ###############################################################
10 # Known reports on the third party we have no control over.
12 UNINITIALIZED READ
13 name=http://crbug.com/116277
14 ...
15 *!MOZ_Z_deflate
17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
18 LEAK
19 name=https://github.com/DynamoRIO/drmemory/issues/406
20 ADVAPI32.dll!WmiOpenBlock
21 ADVAPI32.dll!WmiOpenBlock
23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
24 LEAK
25 name=GoogleDesktop LEAK
26 ...
27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
29 # They deliberately use uninit local var in sqlite random generator.
30 # Random bytes may mess up the call stack between randomByte and
31 # sqlite3_* frames (https://github.com/DynamoRIO/drmemory/issues/1514)
32 # so we just look for randomByte.
33 UNINITIALIZED READ
34 name=sqlite3_randomness UNINIT
35 *!randomByte
37 # Intentional leak in WebKit Template Framework for ThreadData.
38 LEAK
39 name=intentional WTF ThreadData leak
40 ...
41 *!WTF::wtfThreadData
43 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
44 LEAK
45 name=http://crbug.com/125558 a
46 KERNELBASE.dll!LocalAlloc
47 SECHOST.dll!...
48 SECHOST.dll!NotifyServiceStatusChange
49 WINHTTP.dll!...
50 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
51 *!net::ProxyResolverWinHttp::GetProxyForURL
53 # Tiny locale-related leaks in ntdll.  Probably system bug.
54 LEAK
55 name=http://crbug.com/125558 b
56 ntdll.dll!...
57 ntdll.dll!*
58 KERNELBASE.dll!...
59 KERNELBASE.dll!GetCPInfoExW
60 webio.dll!*
61 webio.dll!*
62 webio.dll!*
63 WINHTTP.dll!...
64 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
65 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig
67 UNINITIALIZED READ
68 name=http://crbug.com/30704 #f
69 libpng.dll!wk_png_write_find_filter
70 libpng.dll!wk_png_write_row
72 ###############################################################
73 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
74 # assumptions or unhandled syscalls
76 # Please note: the following suppressions were written in the abscense of
77 # private symbols so may need to be updated when we switch to auto-loading PDBs
78 UNINITIALIZED READ
79 name=https://github.com/DynamoRIO/drmemory/issues/12 (1)
80 ntdll.dll!Rtl*
81 ntdll.dll!Rtl*
82 ntdll.dll!RtlFindActivationContextSectionString
84 UNINITIALIZED READ
85 name=https://github.com/DynamoRIO/drmemory/issues/12 (2)
86 ...
87 SHELL32.dll!SHFileOperation*
89 UNINITIALIZED READ
90 name=https://github.com/DynamoRIO/drmemory/issues/12 (3)
91 ...
92 SHELL32.dll!SHGetFolderPath*
94 LEAK
95 name=https://github.com/DynamoRIO/drmemory/issues/12 (4)
96 ...
97 SHELL32.dll!SHGetFolderPath*
99 UNINITIALIZED READ
100 name=https://github.com/DynamoRIO/drmemory/issues/12 (5)
102 SHELL32.dll!SHCreateDirectory*
104 UNINITIALIZED READ
105 name=https://github.com/DynamoRIO/drmemory/issues/12 (6)
107 SHELL32.dll!ILLoadFromStream*
109 UNINITIALIZED READ
110 name=https://github.com/DynamoRIO/drmemory/issues/12 (7)
112 SHELL32.dll!ILSaveToStream*
114 LEAK
115 name=https://github.com/DynamoRIO/drmemory/issues/12 (8)
117 SHELL32.dll!SHFileOperation*
119 UNINITIALIZED READ
120 name=https://github.com/DynamoRIO/drmemory/issues/12 (9)
122 SHELL32.dll!SHGetItemFromDataObject
124 LEAK
125 name=https://github.com/DynamoRIO/drmemory/issues/12 (10)
127 SHELL32.dll!SHGetItemFromDataObject
129 LEAK
130 name=https://github.com/DynamoRIO/drmemory/issues/12 (11)
132 ole32.dll!*
133 SHELL32.dll!SHChangeNotifySuspendResume
135 UNINITIALIZED READ
136 name=https://github.com/DynamoRIO/drmemory/issues/14 (1)
138 *!CreateProcess*
140 LEAK
141 name=https://github.com/DynamoRIO/drmemory/issues/14 (2)
143 *!CreateProcess*
145 UNINITIALIZED READ
146 name=https://github.com/DynamoRIO/drmemory/issues/14 (3)
148 *!base::LaunchApp*
150 UNINITIALIZED READ
151 name=https://github.com/DynamoRIO/drmemory/issues/17 (1)
153 *!CreateWindow*
155 POSSIBLE LEAK
156 name=https://github.com/DynamoRIO/drmemory/issues/17 (2)
157 GDI32.dll!*
158 GDI32.dll!CreateFontIndirectExW
159 GDI32.dll!CreateFontIndirectW
161 LEAK
162 name=https://github.com/DynamoRIO/drmemory/issues/17 (3)
163 KERNELBASE.dll!LocalAlloc
165 USER32.dll!CreateWindow*
167 UNINITIALIZED READ
168 name=https://github.com/DynamoRIO/drmemory/issues/18 a
170 *!CoInitialize*
172 UNINITIALIZED READ
173 name=https://github.com/DynamoRIO/drmemory/issues/18 b
175 *!CoCreateInstance*
177 UNINITIALIZED READ
178 name=https://github.com/DynamoRIO/drmemory/issues/18 c
180 *!CoUninitialize*
182 UNINITIALIZED READ
183 name=https://github.com/DynamoRIO/drmemory/issues/18 d
185 UxTheme.dll!*
187 UNINITIALIZED READ
188 name=https://github.com/DynamoRIO/drmemory/issues/40 a
190 WINSPOOL.DRV!*
192 LEAK
193 name=https://github.com/DynamoRIO/drmemory/issues/40 b
195 WINSPOOL.DRV!*
197 UNINITIALIZED READ
198 name=https://github.com/DynamoRIO/drmemory/issues/48 a
199 system call NtContinue
201 *!*SetThreadName
203 UNINITIALIZED READ
204 name=https://github.com/DynamoRIO/drmemory/issues/48 b
205 system call NtContinue
206 *!WTF::initializeCurrentThreadInternal
208 UNINITIALIZED READ
209 name=https://github.com/DynamoRIO/drmemory/issues/52 a
211 DBGHELP.dll!SymInitialize
213 UNINITIALIZED READ
214 name=https://github.com/DynamoRIO/drmemory/issues/52 b
216 DBGHELP.dll!SymEnumSourceFiles
218 UNINITIALIZED READ
219 name=https://github.com/DynamoRIO/drmemory/issues/52 c
221 msvcrt.dll!_RTDynamicCast
223 UNINITIALIZED READ
224 name=https://github.com/DynamoRIO/drmemory/issues/52 bit-level fp in dbghelp
225 instruction=test   0x*(%*) $0x??
226 DBGHELP.dll!SymUnloadModule64
228 UNINITIALIZED READ
229 name=https://github.com/DynamoRIO/drmemory/issues/53
230 ADVAPI32.dll!WmiMofEnumerateResourcesA
231 ADVAPI32.dll!WmiMofEnumerateResourcesA
232 ADVAPI32.dll!Sta*TraceW
234 UNINITIALIZED READ
235 name=https://github.com/DynamoRIO/drmemory/issues/58
237 *!_cfltcvt_l
239 UNINITIALIZED READ
240 name=https://github.com/DynamoRIO/drmemory/issues/60
241 USP10.dll!*
243 USP10.dll!ScriptStringAnalyse
245 LEAK
246 IMM32.dll!ImmGetIMCCSize
247 IMM32.dll!ImmLockClientImc
248 IMM32.dll!ImmDisableIME
249 IMM32.dll!ImmSetActiveContext
250 USER32.dll!IMPSetIMEA
252 UNINITIALIZED READ
253 name=https://github.com/DynamoRIO/drmemory/issues/65 a
255 *!SystemFunction036
257 UNINITIALIZED READ
258 name=https://github.com/DynamoRIO/drmemory/issues/65 b
260 *!talk_base::CreateRandomString
262 UNINITIALIZED READ
263 name=https://github.com/DynamoRIO/drmemory/issues/68 a
265 WS2_32.dll!*
267 UNINITIALIZED READ
268 name=https://github.com/DynamoRIO/drmemory/issues/68 b
270 ADVAPI32.dll!SetSecurityDescriptorDacl
272 UNINITIALIZED READ
273 name=https://github.com/DynamoRIO/drmemory/issues/68 c
275 MSWSOCK.dll!WSPStartup
277 UNINITIALIZED READ
278 name=https://github.com/DynamoRIO/drmemory/issues/68 d
280 ntdll.dll!RtlValidateUnicodeString
282 LEAK
283 name=https://github.com/DynamoRIO/drmemory/issues/256
284 *!_mtinit
285 *!__tmainCRTStartup
286 *!mainCRTStartup
288 POSSIBLE LEAK
289 name=https://github.com/DynamoRIO/drmemory/issues/274 a
291 GDI32.dll!CreateDCW
293 LEAK
294 name=https://github.com/DynamoRIO/drmemory/issues/274 b
296 GDI32.dll!CreateDCW
298 LEAK
299 name=https://github.com/DynamoRIO/drmemory/issues/275
301 *!_getptd*
303 UNINITIALIZED READ
304 name=https://github.com/DynamoRIO/drmemory/issues/276
306 ntdll.dll!RtlConvertUlongToLargeInteger
307 ntdll.dll!RtlConvertUlongToLargeInteger
308 ntdll.dll!KiUserExceptionDispatcher
310 LEAK
311 name=https://github.com/DynamoRIO/drmemory/issues/305
312 *!free
313 *!free
314 *!operator new
316 *!MiniDumpWriteDump
318 UNINITIALIZED READ
319 name=https://github.com/DynamoRIO/drmemory/issues/346 a
321 GDI32.dll!CloseEnhMetaFile
323 UNINITIALIZED READ
324 name=https://github.com/DynamoRIO/drmemory/issues/346 b
325 GDI32.dll!SetPolyFillMode
326 GDI32.dll!CreateICW
328 UNINITIALIZED READ
329 name=https://github.com/DynamoRIO/drmemory/issues/362
330 USER32.dll!UnregisterClass*
332 LEAK
333 name=https://github.com/DynamoRIO/drmemory/issues/382
335 ntdll.dll!CsrNewThread
337 UNINITIALIZED READ
338 name=https://github.com/DynamoRIO/drmemory/issues/397
339 system call NtDeviceIoControlFile InputBuffer
340 ADVAPI32.dll!ImpersonateAnonymousToken
342 UNINITIALIZED READ
343 name=https://github.com/DynamoRIO/drmemory/issues/407 a
344 system call NtRequestWaitReplyPort
345 RPCRT4.dll!I_RpcSendReceive
346 RPCRT4.dll!NdrSendReceive
348 UNINITIALIZED READ
349 name=https://github.com/DynamoRIO/drmemory/issues/407 b
350 IMM32.dll!*
351 ntdll.dll!LdrInitializeThunk
352 ntdll.dll!LdrShutdownThread
354 UNINITIALIZED READ
355 name=https://github.com/DynamoRIO/drmemory/issues/412 a
356 ADVAPI32.dll!RegDeleteValue*
358 UNINITIALIZED READ
359 name=https://github.com/DynamoRIO/drmemory/issues/412 b
361 ADVAPI32.dll!Crypt*
363 UNINITIALIZED READ
364 name=https://github.com/DynamoRIO/drmemory/issues/412 c
366 RPCRT4.dll!NdrClientCall2
368 LEAK
369 name=https://github.com/DynamoRIO/drmemory/issues/412 d
370 RSAENH.dll!DllUnregisterServer
372 ADVAPI32.dll!CryptAcquireContextA
373 CRYPT32.dll!CryptEnumOIDFunction
375 CRYPT32.dll!CertFindCertificateInStore
377 UNINITIALIZED READ
378 name=https://github.com/DynamoRIO/drmemory/issues/412 e
380 RSAENH.dll!CPGenRandom
382 UNINITIALIZED READ
383 name=https://github.com/DynamoRIO/drmemory/issues/412 f
385 CRYPT??.dll!Crypt*
387 UNINITIALIZED READ
388 name=https://github.com/DynamoRIO/drmemory/issues/412 g
389 *!replace_memcmp
391 *!testing::internal::CmpHelperEQ*
393 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
395 # We get these sometimes from AesEncrypt and AesExpandKey.  AesEncrypt doesn't
396 # have frame pointers, and we have trouble unwinding from it.  Therefore, we use
397 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
398 UNINITIALIZED READ
399 name=https://github.com/DynamoRIO/drmemory/issues/412 h
400 RSAENH.dll!*
402 UNINITIALIZED READ
403 name=https://github.com/DynamoRIO/drmemory/issues/425 a
404 CLBCatQ.DLL!DestroyStgDatabase
405 CLBCatQ.DLL!PostError
406 CLBCatQ.DLL!PostError
408 LEAK
409 name=https://github.com/DynamoRIO/drmemory/issues/425 b
410 RPCRT4.dll!I_RpcBCacheFree
411 RPCRT4.dll!I_RpcBCacheFree
413 RPCRT4.dll!NdrClientCall2
415 UNINITIALIZED READ
416 name=https://github.com/DynamoRIO/drmemory/issues/425 c
417 msdmo.dll!*
418 msdmo.dll!*
419 DEVENUM.DLL!*
421 UNINITIALIZED READ
422 name=https://github.com/DynamoRIO/drmemory/issues/435 a
424 ntdll.dll!RtlSetSecurityObject
425 ntdll.dll!RtlNewSecurityObjectEx
426 ADVAPI32.dll!CreatePrivateObjectSecurityEx
427 NTMARTA.dll!AccRewriteSetNamedRights
429 POSSIBLE LEAK
430 name=https://github.com/DynamoRIO/drmemory/issues/435 b
431 WLDAP32.dll!Ordinal325
433 WLDAP32.dll!Ordinal325
434 ntdll.dll!LdrInitializeThunk
435 ntdll.dll!LdrFindResourceDirectory_U
436 ntdll.dll!RtlValidateUnicodeString
437 ntdll.dll!LdrLoadDll
438 KERNEL32.dll!LoadLibraryExW
440 # mod+offs suppression because the symbolic makes no sense and changes
441 # completely in the presence of WS2_32.dll symbols.
442 LEAK
443 name=https://github.com/DynamoRIO/drmemory/issues/438
444 <WS2_32.dll+0x260c>
445 <WS2_32.dll+0x2b76>
446 <WS2_32.dll+0x2c61>
448 UNINITIALIZED READ
449 name=https://github.com/DynamoRIO/drmemory/issues/454 a
451 WINMM.dll!wave*GetNumDevs
453 LEAK
454 name=https://github.com/DynamoRIO/drmemory/issues/454 b
456 WINMM.dll!wave*GetNumDevs
458 LEAK
459 name=https://github.com/DynamoRIO/drmemory/issues/466
460 ntdll.dll!RtlRunOnceBeginInitialize
461 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
463 UNINITIALIZED READ
464 name=https://github.com/DynamoRIO/drmemory/issues/473 a
465 system call NtDeviceIoControlFile InputBuffer
467 iphlpapi.dll!GetAdaptersAddresses
469 POSSIBLE LEAK
470 name=https://github.com/DynamoRIO/drmemory/issues/473 b
471 ESENT.dll!*
472 ESENT.dll!*
473 ESENT.dll!*
474 ntdll.dll!Ldr*Init*
475 ntdll.dll!Ldr*
476 ntdll.dll!*
477 ntdll.dll!LdrLoadDll
479 iphlpapi.dll!GetPerAdapterInfo
481 iphlpapi.dll!GetAdaptersAddresses
483 POSSIBLE LEAK
484 name=https://github.com/DynamoRIO/drmemory/issues/473 c
485 RPCRT4.dll!*
486 RPCRT4.dll!*
488 IPHLPAPI.DLL!GetAdaptersAddresses
490 LEAK
491 name=https://github.com/DynamoRIO/drmemory/issues/475
493 ADVAPI32.dll!CryptAcquireContextA
495 CRYPT32.dll!CryptMsgOpenToDecode
497 CRYPT32.dll!CryptQueryObject
499 # Lots of leaks from our interactions with the system certificate store.  May be
500 # worth reviewing our use of their API.
501 LEAK
502 name=https://github.com/DynamoRIO/drmemory/issues/476 a
503 KERNEL*.dll!LocalAlloc
505 CRYPT32.dll!CertGetCRLContextProperty
507 LEAK
508 name=https://github.com/DynamoRIO/drmemory/issues/476 b
509 KERNEL*.dll!LocalAlloc
511 CRYPT32.dll!CertAddCRLContextToStore
513 LEAK
514 name=https://github.com/DynamoRIO/drmemory/issues/476 c
515 KERNEL*.dll!LocalAlloc
517 CRYPT32.dll!CertOpenStore
519 LEAK
520 name=https://github.com/DynamoRIO/drmemory/issues/476 d
522 CRYPT32.dll!CertOpenSystemStore?
524 LEAK
525 name=https://github.com/DynamoRIO/drmemory/issues/476 e
527 CRYPT32.dll!CertGetCertificateChain
529 LEAK
530 name=https://github.com/DynamoRIO/drmemory/issues/476 f
532 CRYPT32.dll!CertCompareIntegerBlob
534 LEAK
535 name=https://github.com/DynamoRIO/drmemory/issues/476 g
537 CRYPT32.dll!CryptUnprotectData
539 LEAK
540 name=https://github.com/DynamoRIO/drmemory/issues/476 h
541 KERNEL*.dll!LocalAlloc
543 CRYPT32.dll!CertEnumCertificatesInStore
545 LEAK
546 name=https://github.com/DynamoRIO/drmemory/issues/476 i
548 CRYPT32.dll!CryptProtectData
550 LEAK
551 name=https://github.com/DynamoRIO/drmemory/issues/476 j
553 CRYPT32.dll!CryptExportPublicKeyInfoEx
555 UNINITIALIZED READ
556 name=https://github.com/DynamoRIO/drmemory/issues/502 a
557 system call NtSecureConnectPort parameter #3
558 GDI32.dll!*
559 GDI32.dll!*
561 UNINITIALIZED READ
562 name=https://github.com/DynamoRIO/drmemory/issues/502 b
563 system call NtGdiEnumFonts parameter #6
564 GDI32.dll!*
565 GDI32.dll!*
567 UNINITIALIZED READ
568 name=https://github.com/DynamoRIO/drmemory/issues/511 a
569 RPCRT4.dll!...
570 ole32.dll!*
572 UNINITIALIZED READ
573 name=https://github.com/DynamoRIO/drmemory/issues/511 b
574 ole32.dll!*
575 ole32.dll!*
576 ole32.dll!StringFromGUID2
578 UNINITIALIZED READ
579 name=https://github.com/DynamoRIO/drmemory/issues/512 a
581 *!browser_sync::Cryptographer::PackBootstrapToken
582 *!browser_sync::Cryptographer::GetBootstrapToken
584 UNINITIALIZED READ
585 name=https://github.com/DynamoRIO/drmemory/issues/512 b
587 *!Encrypt*
589 # TODO(bruening): remove these once we have v8 bitfields handled
590 UNINITIALIZED READ
591 name=https://github.com/DynamoRIO/drmemory/issues/513 a
592 *!v8*
594 UNINITIALIZED READ
595 name=https://github.com/DynamoRIO/drmemory/issues/513 b
597 *!v8*
599 UNINITIALIZED READ
600 name=https://github.com/DynamoRIO/drmemory/issues/513 c
601 <not in a module>
603 *!v8*
605 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll
606 # has no symbols.  These are all on the bots using component build, so we use
607 # v8.dll.  TODO(bruening): remove these once we've fixed the symbol issue.
608 UNINITIALIZED READ
609 name=https://github.com/DynamoRIO/drmemory/issues/513 d
610 v8.dll!*
612 UNINITIALIZED READ
613 name=https://github.com/DynamoRIO/drmemory/issues/513 e
614 <not in a module>
616 v8.dll!*
618 UNINITIALIZED READ
619 name=https://github.com/DynamoRIO/drmemory/issues/546
621 mscms.dll!*
623 GDI32.dll!*
624 *!IconUtil::Create*HICON*
626 LEAK
627 name=http://crbug.com/92152
629 USER32.dll!CreateWindowExW
630 *!views::TooltipManagerWin::Init
631 *!views::TooltipManagerWin::TooltipManagerWin
633 UNINITIALIZED READ
634 name=https://github.com/DynamoRIO/drmemory/issues/567 a
635 dbghelp.dll!*
637 dbghelp.dll!StackWalk64
639 LEAK
640 name=https://github.com/DynamoRIO/drmemory/issues/567 b
642 dbghelp.dll!*
644 dbghelp.dll!StackWalk64
646 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
647 # TppWorkerThread w/ syms.  We used to use mod+offs here, but that was too
648 # brittle, so we switched to RPCRT4.dll!*.
649 LEAK
650 name=https://github.com/DynamoRIO/drmemory/issues/569
651 RPCRT4.dll!...
652 ntdll.dll!*
653 ntdll.dll!*
654 KERNEL*.dll!BaseThreadInitThunk
656 # TODO(timurrrr): investigate these
657 UNINITIALIZED READ
658 name=http://crbug.com/TODO a
660 *!win_util::GetLogonSessionOnlyDACL
662 UNINITIALIZED READ
663 name=http://crbug.com/TODO b
665 ntshrui.dll!IsPathSharedW
667 UNINITIALIZED READ
668 name=http://crbug.com/TODO c
670 *!NetApiBufferFree
672 UNINITIALIZED READ
673 name=http://crbug.com/TODO d
675 *!ShellExecute*
677 UNINITIALIZED READ
678 name=http://crbug.com/TODO e
680 *!SHParseDisplayName
682 UNINITIALIZED READ
683 name=http://crbug.com/TODO f
685 *!GetCanonicalPathInfo*
687 UNINITIALIZED READ
688 name=http://crbug.com/TODO g
690 SHELL32.dll!Ordinal*
692 UNINITIALIZED READ
693 name=http://crbug.com/TODO h
695 GDI32.dll!GetTextExtentPoint32*
697 UNINITIALIZED READ
698 name=http://crbug.com/TODO i
700 *!SyncSocketClientListener::OnMsgClassResponse
702 UNINITIALIZED READ
703 name=http://crbug.com/TODO j
705 *!*NSPRInitSingleton*
707 UNINITIALIZED READ
708 name=http://crbug.com/TODO k
709 *!NdrSimpleStructFree
711 UNINITIALIZED READ
712 name=http://crbug.com/TODO l
713 ntdll.dll!RtlpNtOpenKey
714 ntdll.dll!RtlMakeSelfRelativeSD
715 ntdll.dll!RtlAbsoluteToSelfRelativeSD
716 ADVAPI32.dll!MakeSelfRelativeSD
718 UNINITIALIZED READ
719 name=http://crbug.com/TODO m
721 CRYPT32.dll!I_CertSyncStore
723 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
724 # a leak.  Must be some early thread initialization.  Doesn't look like
725 # bit-level though.
726 UNINITIALIZED READ
727 name=http://crbug.com/TODO n
728 RPCRT4.dll!*
729 RPCRT4.dll!*
730 RPCRT4.dll!*
731 ntdll.dll!*
732 ntdll.dll!*
733 KERNEL*.dll!BaseThreadInitThunk
735 # No idea where this is from, but Chrome isn't even on the stack.
736 POSSIBLE LEAK
737 name=http://crbug.com/TODO o
738 RPCRT4.dll!...
739 ole32.dll!OleInitialize
740 ole32.dll!...
741 KERNEL32.dll!BaseThreadInitThunk
743 # Matches lots of RPC related leaks.  So far RPC handles have been mostly owned
744 # by system libraries and are not something we can fix easily.
745 POSSIBLE LEAK
746 name=http://crbug.com/TODO p
747 RPCRT4.dll!*
748 RPCRT4.dll!*
749 RPCRT4.dll!NDRCContextBinding
751 # No idea, but all system code, not interesting.
752 POSSIBLE LEAK
753 name=http://crbug.com/TODO q
754 RPCRT4.dll!...
755 RPCRT4.dll!*
756 RPCRT4.dll!*
757 ole32.dll!...
758 ole32.dll!*
759 ole32.dll!*
761 SHELL32.dll!*
763 LEAK
764 name=http://crbug.com/109278 video device COM leaks
766 *!media::VideoCaptureDevice::*
768 LEAK
769 name=http://crbug.com/109278 audio device COM leaks
771 *!media::GetInputDeviceNamesWin
773 # False pos uninit in shell32 when resolving links.
774 UNINITIALIZED READ
775 name=https://github.com/DynamoRIO/drmemory/issues/745
776 SHELL*.dll!*
778 SHELL*.dll!*
779 *!file_util::ResolveShortcut
781 # Probable false pos uninit in ffmpeg.  Probably due to running off the end of a
782 # buffer with SSE/MMX instructions whose results are then masked out later.
783 UNINITIALIZED READ
784 name=https://github.com/DynamoRIO/drmemory/issues/747 a
785 *!ff_pred4x4_vertical_vp8_mmxext
787 UNINITIALIZED READ
788 name=https://github.com/DynamoRIO/drmemory/issues/747 b
789 *!ff_pred4x4_down_left_mmxext
791 UNINITIALIZED READ
792 name=https://github.com/DynamoRIO/drmemory/issues/747 c
793 *!ff_vorbis_floor1_render_list
795 UNINITIALIZED READ
796 name=https://github.com/DynamoRIO/drmemory/issues/747 d
797 *!ff_put_vp8_epel8_h6_ssse3
799 UNINITIALIZED READ
800 name=https://github.com/DynamoRIO/drmemory/issues/747 e
801 *!ff_put_vp8_epel8_h4_ssse3
803 UNINITIALIZED READ
804 name=https://github.com/DynamoRIO/drmemory/issues/747 f
805 *!ff_fft_permute_sse
807 UNINITIALIZED READ
808 name=https://github.com/DynamoRIO/drmemory/issues/747 g
809 *!ff_simple_idct_add_mmx
811 # ffmpeg seems to leak a pthread condition variable.
812 LEAK
813 name=http://crbug.com/110042
814 *!ptw32_new
815 *!pthread_self
816 *!sem_wait
817 *!pthread_cond_wait
818 *!ff_thread_decode_frame
819 *!avcodec_decode_video2
821 # Improperly handled ioctl in bcrypt.
822 UNINITIALIZED READ
823 name=https://github.com/DynamoRIO/drmemory/issues/748
824 system call NtDeviceIoControlFile InputBuffer
826 bcrypt.dll!BCryptUnregisterConfigChangeNotify
827 bcrypt.dll!BCryptGetFipsAlgorithmMode
828 ntdll.dll!RtlQueryEnvironmentVariable
830 # Not sure what this is.
831 POSSIBLE LEAK
832 name=https://github.com/DynamoRIO/drmemory/issues/749
834 fwpuclnt.dll!*
836 RPCRT4.dll!*
838 fwpuclnt.dll!*
840 WS2_32.dll!*
841 *!talk_base::SafeGetHostByName
842 *!talk_base::SocketAddress::GetLocalIPs
843 *!talk_base::SocketAddress::IsLocalIP
844 *!cricket::Transport::VerifyCandidate
845 *!cricket::Session::OnRemoteCandidates
846 *!cricket::Session::OnTransportInfoMessage
847 *!cricket::Session::OnIncomingMessage
848 *!cricket::SessionManager::OnIncomingMessage
850 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
851 UNINITIALIZED READ
852 name=https://github.com/DynamoRIO/drmemory/issues/529
853 RPCRT4.dll!*
855 *!base::LaunchProcess
857 # System leak from CreateEnvironmentBlock.
858 LEAK
859 name=https://github.com/DynamoRIO/drmemory/issues/757
861 USERENV.dll!CreateEnvironmentBlock
863 # Looks like another instance of 753
864 LEAK
865 name=https://github.com/DynamoRIO/drmemory/issues/753
867 ntdll.dll!RtlLoadString
869 # More bit manip fps
870 UNINITIALIZED READ
871 name=https://github.com/DynamoRIO/drmemory/issues/493
872 USP10.dll!ScriptPositionSingleGlyph
874 # Various TLS leaks that we don't understand yet.  We should be finding a root
875 # for these.
876 LEAK
877 name=https://github.com/DynamoRIO/drmemory/issues/778 a
878 KERNELBASE.dll!TlsSetValue
880 # Originally filed as: http://crbug.com/109281
881 LEAK
882 name=https://github.com/DynamoRIO/drmemory/issues/778 b
883 *!operator new
884 *!operator new[]
885 *!*::ConstructTlsVector
886 *!base::ThreadLocalStorage::StaticSlot::Get
888 # This is an NSS PRThread object installed in TLS.  Why isn't this detected as a
889 # root?  See also http://crbug.com/32624
890 LEAK
891 name=https://github.com/DynamoRIO/drmemory/issues/778 c
892 *!PR_Calloc
893 *!_PR_AttachThread
894 *!_PRI_AttachThread
896 # Bit-level fps in rich edit layer.
897 UNINITIALIZED READ
898 name=https://github.com/DynamoRIO/drmemory/issues/791
899 RICHED20.dll!*
900 RICHED20.dll!*
902 # Already suppressed by drmemory default supp we don't have yet.
903 LEAK
904 name=i#757: RPC binding leaks in sspicli.dll
905 RPCRT4.dll!*
907 SspiCli.dll!*
908 SspiCli.dll!Cre*
910 # Async NtReadFile false positives.  This was fixed in drmemory r772, remove
911 # this supp when we pull that rev.
912 UNADDRESSABLE ACCESS
913 name=https://github.com/DynamoRIO/drmemory/issues/798
914 system call NtReadFile parameter #5
915 KERNEL32.dll!ReadFile
917 # Probable syscall false positive.
918 UNADDRESSABLE ACCESS
919 name=https://github.com/DynamoRIO/drmemory/issues/809
920 system call NtGdiPolyPolyDraw parameter #1
921 *!gfx::Path::CreateNativeRegion
923 # Very wide suppression for all uninits in rpcrt4.dll.  We get bad stack traces
924 # coming out of this module (sometimes only one frame), which makes it hard to
925 # write precise suppressions.  Until we have bit-level tracking (DRMi#113) we
926 # should keep this.
927 UNINITIALIZED READ
928 name=https://github.com/DynamoRIO/drmemory/issues/113 rpcrt4.dll wildcard
929 RPCRT4.dll!*
931 UNINITIALIZED READ
932 name=https://github.com/DynamoRIO/drmemory/issues/841 a
934 CRYPTNET.dll!I_CryptNetGetConnectivity
936 UNINITIALIZED READ
937 name=https://github.com/DynamoRIO/drmemory/issues/841 b
939 webio.dll!*
941 UNINITIALIZED READ
942 name=https://github.com/DynamoRIO/drmemory/issues/841 c
944 winhttp.dll!*
946 LEAK
947 name=https://github.com/DynamoRIO/drmemory/issues/841 d
949 CRYPTNET.dll!I_CryptNetGetConnectivity
951 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
952 UNINITIALIZED READ
953 name=https://github.com/DynamoRIO/drmemory/issues/810
954 instruction=test   %edx %edx
955 USER32.dll!GetClassLongW
957 *!ui::CenterAndSizeWindow
959 UNINITIALIZED READ
960 name=https://github.com/DynamoRIO/drmemory/issues/815
961 KERNEL*.dll!...
962 dxgi.dll!*
963 USER32.dll!GetMonitorInfoA
964 ntdll.dll!KiUserCallbackDispatcher
965 dxgi.dll!*
966 WinSATAPI.DLL!*
968 # Suppress anything in cmd.exe.  It's safer to suppress these than disable
969 # following, since someone might launch a Chrome process via cmd.exe.
970 LEAK
971 name=cmd.exe
973 cmd.exe!*
975 # Possible true system use after free.
976 UNADDRESSABLE ACCESS
977 name=https://github.com/DynamoRIO/drmemory/issues/623
978 KERNELBASE.dll!TlsGetValue
979 OLEAUT32.dll!SysFreeString
980 OLEAUT32.dll!SysAllocStringByteLen
981 OLEACC.dll!*
982 OLEACC.dll!*
983 OLEACC.dll!*
984 OLEACC.dll!*
986 # basic_streambuf seems to leak something in creating a std::_Mutex
987 LEAK
988 name=https://github.com/DynamoRIO/drmemory/issues/857
989 ntdll.dll!...
990 ntdll.dll!RtlInitializeCriticalSection
991 *!_Mtxinit
992 *!std::_Mutex::_Mutex
993 *!std::basic_streambuf<>
995 # Seems to create a DC, sometimes.  GetTextMetrics returns no pointers, though.
996 LEAK
997 name=GDI SetBrushOrgEx leak
998 GDI32.dll!...
999 GDI32.dll!GetTextMetricsW
1000 *!gfx::PlatformFontWin::CreateHFontRef
1001 *!gfx::PlatformFontWin::GetBaseFontRef
1003 ###############################################################
1004 # Benign issues in Chromium
1006 # This test intentionally leaks an object and checks that it's never deleted.
1007 LEAK
1008 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
1010 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
1012 LEAK
1013 name=deliberate histogram leak
1015 *!replace_operator_new
1017 *!*::*Histogram::FactoryGet
1019 LEAK
1020 name=deliberate leak for SampleMap
1022 *!base::SampleMap::Accumulate
1023 *!base::SparseHistogram::Add
1025 LEAK
1026 name=deliberate LazyInstance leak
1028 *!*LeakyLazyInstance*
1030 *!base::LazyInstance*::Pointer
1032 LEAK
1033 name=http://crbug.com/79933 (2)
1035 *!TestURLRequestContext::TestURLRequestContext
1036 *!TestURLRequestContextGetter::GetURLRequestContext
1037 *!notifier::SingleLoginAttempt::SingleLoginAttempt
1038 *!notifier::Login::StartConnection
1039 *!syncer::InvalidationNotifier::UpdateCredentials
1040 *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials
1042 LEAK
1043 name=http://crbug.com/79933 (3)
1045 *!TestURLRequestContext::TestURLRequestContext
1046 *!TestURLRequestContextGetter::GetURLRequestContext
1047 *!URLFetcher::Core::StartURLRequest
1049 LEAK
1050 name=http://crbug.com/79933 (4)
1051 *!generic_cpp_alloc
1052 *!operator new
1053 *!std::_Allocate<>
1054 *!std::allocator<>::allocate
1055 *!std::vector<>::_Insert_n
1056 *!std::vector<>::insert
1057 *!std::vector<>::push_back
1058 *!ObserverListBase<>::AddObserver
1060 *!net::HttpNetworkSession::HttpNetworkSession
1061 *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
1062 *!notifier::XmppClientSocketFactory::CreateTransportClientSocket
1063 *!notifier::ChromeAsyncSocket::Connect
1064 *!buzz::XmppClient::ProcessStartXmppLogin
1065 *!buzz::XmppClient::Process
1066 *!talk_base::Task::Step
1067 *!talk_base::TaskRunner::InternalRunTasks
1068 *!talk_base::TaskRunner::RunTasks
1069 *!notifier::TaskPump::CheckAndRunTasks
1070 *!base::internal::RunnableAdapter<>::Run
1072 # Test intentionally leaks an object.
1073 LEAK
1074 name=http://crbug.com/86301
1075 *!replace_operator_new
1077 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody
1079 # Leak in a binary copy of Firefox 3's NSS dll.  Not much we can do about it.
1080 LEAK
1081 name=Firefox 3 NSS dll leak
1082 nspr4.dll!*
1084 *!NSSDecryptor::~NSSDecryptor
1086 # We get uninit reports inside GMock when it prints the bytes of references to
1087 # partially initialized objects passed to unexpected method calls.
1088 UNINITIALIZED READ
1089 name=http://crbug.com/64887 (GMock printing uninit data)
1091 *!testing::*::PrintBytesInObjectTo*
1093 ###############################################################
1094 # Proactively borrowed from memcheck/suppressions.txt.
1095 # We have not yet seen these, but we are expanding the sets of tests
1096 # we're running, and we've hit redness in the past that could have
1097 # been avoided by already having the Memcheck suppressions.
1098 # TODO(bruening): review the entire file (not just these) once we're
1099 # at the peak set of tests we plan to run and remove the unused ones.
1101 UNINITIALIZED READ
1102 name=bug_99307
1103 *!modp_b64_encode
1104 *!base::Base64Encode*
1105 *!web_ui_util::GetImageDataUrl
1106 *!::NetworkInfoDictionary::set_icon
1108 UNINITIALIZED READ
1109 name=bug_101781
1110 *!encode_one_block
1111 *!encode_mcu_huff
1112 *!compress_data
1113 *!process_data_simple_main
1114 *!chromium_jpeg_write_scanlines
1115 *!gfx::JPEGCodec::Encode
1116 *!gfx::JPEGEncodedDataFromImage
1117 *!history::TopSites::EncodeBitmap
1118 *!history::TopSites::SetPageThumbnail
1119 *!history::ExpireHistoryTest::AddExampleData
1120 *!history::ExpireHistoryTest::*
1122 UNINITIALIZED READ
1123 name=bug_101781_d
1124 *!testing::AssertionResult testing::internal::CmpHelperGE<>
1125 *!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody
1127 UNINITIALIZED READ
1128 name=bug_105907
1130 *!skia::BGRAConvolve2D
1131 *!skia::ImageOperations::ResizeBasic*
1132 *!skia::ImageOperations::Resize*
1134 UNINITIALIZED READ
1135 name=bug_112278
1136 *!fetch_texel_2d_f_rgba8888
1137 *!sample_2d_linear
1138 *!sample_linear_2d
1139 *!fetch_texel_lod
1140 *!fetch_texel
1141 *!_mesa_execute_program
1142 *!run_program
1143 *!_swrast_exec_fragment_program
1144 *!shade_texture_span
1145 *!_swrast_write_rgba_span
1146 *!general_triangle
1147 *!_swrast_validate_triangle
1148 *!_swrast_Triangle
1149 *!triangle_rgba
1150 *!_tnl_render_triangles_elts
1151 *!run_render
1152 *!_tnl_run_pipeline
1153 *!_tnl_draw_prims
1154 *!_tnl_vbo_draw_prims
1155 *!vbo_validated_drawrangeelements
1156 *!vbo_exec_DrawElements
1157 *!neutral_DrawElements
1159 UNINITIALIZED READ
1160 name=bug_112278b
1161 *!fetch_texel_2d_f_rgba8888
1162 *!sample_2d_nearest
1163 *!sample_nearest_2d
1164 *!fetch_texel_lod
1165 *!fetch_texel
1166 *!_mesa_execute_program
1167 *!run_program
1168 *!_swrast_exec_fragment_program
1169 *!shade_texture_span
1170 *!_swrast_write_rgba_span
1171 *!general_triangle
1173 *!_swrast_Triangle
1174 *!triangle_rgba
1176 *!run_render
1177 *!_tnl_run_pipeline
1178 *!_tnl_draw_prims
1179 *!_tnl_vbo_draw_prims
1181 UNINITIALIZED READ
1182 name=bug_115419_1
1183 *!fetch_texel_2d_f_rgba8888
1184 *!texture_get_row
1185 *!fast_read_rgba_pixels
1186 *!read_rgba_pixels
1187 *!_swrast_ReadPixels
1188 *!_mesa_ReadPixels
1189 *!glReadPixels
1190 *!gpu::gles2::GLES2DecoderImpl::HandleReadPixels
1191 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1192 *!gpu::CommandParser::ProcessCommand
1193 *!gpu::GpuScheduler::PutChanged
1194 *!webkit::gpu::GLInProcessContext::PumpCommands
1196 UNINITIALIZED READ
1197 name=bug_115419_2
1198 *!get_src_arg_mask
1199 *!_mesa_remove_extra_move_use
1200 *!_mesa_optimize_program
1201 *!get_mesa_program
1202 *!_mesa_ir_link_shader
1203 *!_mesa_glsl_link_shader
1204 *!link_program
1205 *!_mesa_LinkProgramARB
1206 *!glLinkProgram
1208 *!gpu::gles2::GLES2DecoderImpl::DoLinkProgram*
1209 *!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram*
1210 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1211 *!gpu::CommandParser::ProcessCommand
1212 *!gpu::GpuScheduler::PutChanged
1213 *!webkit::gpu::GLInProcessContext::PumpCommands
1215 UNINITIALIZED READ
1216 name=bug_138058
1218 *!blink::WebVTTParser::constructTreeFromToken
1219 *!blink::WebVTTParser::createDocumentFragmentFromCueText
1220 *!blink::TextTrackCue::getCueAsHTML
1221 *!blink::TextTrackCue::updateDisplayTree
1222 *!blink::HTMLMediaElement::updateActiveTextTrackCues
1224 UNINITIALIZED READ
1225 name=bug_138220_a
1226 *!blink::HTMLInputElement::dataList
1227 *!blink::HTMLInputElement::list
1228 *!blink::RenderSliderContainer::layout
1229 *!blink::RenderBlock::layoutBlockChild
1230 *!blink::RenderBlock::layoutBlockChildren
1231 *!blink::RenderBlock::layoutBlock
1232 *!blink::RenderBlock::layout
1233 *!blink::RenderSlider::layout
1235 UNINITIALIZED READ
1236 name=bug_138220_b
1237 *!blink::HTMLInputElement::dataList
1238 *!blink::HTMLInputElement::list
1239 *!blink::RenderTheme::paintSliderTicks
1240 *!blink::RenderThemeChromiumLinux::paintSliderTrack
1241 *!blink::RenderTheme::paint
1242 *!blink::RenderBox::paintBoxDecorations
1243 *!blink::RenderBlock::paintObject
1245 UNINITIALIZED READ
1246 name=bug_162825
1247 *!bcmp
1248 *!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator<
1249 *!std::less<>::operator
1251 *!std::map<>::find
1253 *!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
1255 UNINITIALIZED READ
1256 name=bug_176616_a
1257 *!WebTestRunner::WebTestProxyBase::didCreateDataSource
1258 *!WebTestRunner::WebTestProxy<>::didCreateDataSource
1259 *!blink::FrameLoaderClientImpl::createDocumentLoader
1260 *!blink::FrameLoader::init
1261 *!blink::Frame::init
1262 *!blink::WebFrameImpl::initializeAsMainFrame
1263 *!blink::WebViewImpl::initializeMainFrame
1264 *!TestShell::createNewWindow
1265 *!TestShell::createMainWindow
1266 *!TestShell::initialize
1268 UNINITIALIZED READ
1269 name=bug_176616_b
1270 *!WebTestRunner::TestRunner::reset
1271 *!WebTestRunner::TestInterfaces::resetAll
1272 *!WebTestRunner::WebTestInterfaces::resetAll
1273 *!TestShell::resetTestController
1274 *!runTest
1276 UNINITIALIZED READ
1277 name=bug_222883
1278 *!v8::internal::ScavengeVisitor::ScavengePointer
1279 *!v8::internal::ScavengeVisitor::VisitPointers
1280 *!v8::internal::StandardFrame::IterateExpressions
1282 *!v8::internal::Heap::Scavenge
1283 *!v8::internal::Heap::PerformGarbageCollection*
1285 UNINITIALIZED READ
1286 name=bug_238170a
1287 *!blink::ElementRuleCollector::collectMatchingRules
1288 *!blink::ElementRuleCollector::hasAnyMatchingRules
1290 UNINITIALIZED READ
1291 name=bug_238170b
1292 *!blink::ElementRuleCollector::collectMatchingRules
1293 *!blink::StyleResolver::matchAuthorRules
1295 UNINITIALIZED READ
1296 name=bug_238170c
1297 *!blink::ReplaceSelectionCommand::doApply
1298 *!blink::CompositeEditCommand::apply
1299 *!blink::applyCommand
1301 UNINITIALIZED READ
1302 name=bug_259789
1303 *!blink::::adjustAttributes
1304 *!blink::WebGLRenderingContext::maybeRestoreContext
1305 *!blink::Timer<>::fired
1306 *!blink::ThreadTimers::sharedTimerFiredInternal
1307 *!blink::ThreadTimers::sharedTimerFired
1308 *!content::BlinkPlatformImpl::DoTimeout
1310 UNINITIALIZED READ
1311 name=bug_290405
1312 *!GrGradientEffect::onIsEqual
1313 *!GrEffect::isEqual
1314 *!GrEffectStage::DeferredStage::isEqual
1315 *!GrDrawState::DeferredState::isEqual
1316 *!GrInOrderDrawBuffer::needsNewState
1317 *!GrInOrderDrawBuffer::onDraw
1318 *!GrDrawTarget::drawIndexedInstances
1319 *!GrTextContext::flushGlyphs
1321 UNINITIALIZED READ
1322 name=bug_290435
1323 *!blink::AudioContext::scheduleNodeDeletion
1324 *!blink::AudioContext::handlePostRenderTasks
1325 *!blink::AudioDestinationNode::render
1326 *!blink::OfflineAudioDestinationNode::offlineRender
1328 UNINITIALIZED READ
1329 name=bug_364724
1330 *!base::MD5DigestToBase16
1331 *!content::WebKitTestRunner::CaptureDumpPixels
1333 UNINITIALIZED READ
1334 name=bug_298143
1336 *!blink::TypeConversionsV8Internal*AttributeGetter*
1338 UNINITIALIZED READ
1339 name=bug_299804
1340 *!GrConfigConversionEffect::TestForPreservingPMConversions
1341 *!::test_pm_conversions
1342 *!GrContext::createPMToUPMEffect
1343 *!GrContext::readRenderTargetPixels
1344 *!SkGpuDevice::onReadPixels
1345 *!SkBaseDevice::readPixels
1346 *!SkCanvas::readPixels
1347 *!DeferredDevice::onReadPixels
1348 *!SkBaseDevice::readPixels
1349 *!SkCanvas::readPixels
1350 *!blink::GraphicsContext::readPixels
1351 *!WTF::PassRefPtr<>
1352 *!blink::ImageBuffer::getUnmultipliedImageData
1353 *!blink::CanvasRenderingContext2D::getImageData
1354 *!blink::CanvasRenderingContext2D::getImageData
1355 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethod
1356 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback
1357 *!v8::internal::FunctionCallbackArguments::Call
1358 *!v8::internal::HandleApiCallHelper<>
1360 UNINITIALIZED READ
1361 name=bug_309477
1362 *!WebTestRunner::EventSender::reset
1363 *!WebTestRunner::TestInterfaces::resetTestHelperControllers
1364 *!WebTestRunner::TestInterfaces::resetAll
1366 *!content::ShellRenderProcessObserver::WebKitInitialized
1367 *!content::RenderThreadImpl::EnsureWebKitInitialized
1368 *!content::RenderThreadImpl::OnCreateNewView
1370 ###############################################################
1371 # Real issues in Chromium
1373 LEAK
1374 name=http://crbug.com/32085
1376 chrome.dll!NotificationRegistrar::Add
1378 UNINITIALIZED READ
1379 name=http://crbug.com/57266 (1)
1381 *!remoting::EncoderVp8::Encode
1383 UNINITIALIZED READ
1384 name=http://crbug.com/57266 (2)
1386 *!vp8_*
1388 LEAK
1389 name=http://crbug.com/70062
1390 *!PR_Calloc
1391 *!PR_NewLock
1393 *!InitSessionCacheLocks
1394 *!initSessionCacheLocksLazily
1395 *!PR_CallOnce
1396 *!ssl_InitSessionCacheLocks
1397 *!lock_cache
1398 *!ssl_LookupSID
1399 *!ssl2_BeginClientHandshake
1400 *!ssl_Do1stHandshake
1401 *!SSL_ForceHandshake
1402 *!net::SSL*SocketNSS::DoHandshake
1403 *!net::SSL*SocketNSS::DoHandshakeLoop
1405 LEAK
1406 name=http://crbug.com/74417 a
1407 *!replace_operator_new
1408 *!disk_cache::BackendImpl::CreateEntryImpl
1410 LEAK
1411 name=http://crbug.com/74417 b
1412 *!replace_operator_new
1413 *!disk_cache::BackendImpl::NewEntry
1415 # One more disk_cache::BackendImpl leak.  See also http://crbug.com/87500.
1416 LEAK
1417 name=http://crbug.com/74417 c
1418 *!replace_operator_new
1420 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
1422 LEAK
1423 name=http://crbug.com/75247
1425 *!replace_operator_new
1426 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
1428 LEAK
1429 name=http://crbug.com/78784
1430 *!generic_cpp_alloc
1431 *!operator new
1432 *!TestingProfile::CreateRequestContext
1433 *!*ProfileSyncService*::SetUp
1435 LEAK
1436 name=http://crbug.com/80550 (1)
1438 *!RenderWidgetHost::WasHidden
1440 LEAK
1441 name=http://crbug.com/80550 (2)
1443 *!RenderWidgetHost::WasRestored
1445 LEAK
1446 name=http://crbug.com/87612
1448 *!SSL_ConfigSecureServer
1449 *!net::SSLServerSocketNSS::InitializeSSLOptions
1450 *!net::SSLServerSocketNSS::Handshake
1452 LEAK
1453 name=http://crbug.com/88640
1454 *!generic_cpp_alloc
1455 *!operator new
1456 *!ProfileImpl::InitRegisteredProtocolHandlers
1457 *!ProfileImpl::DoFinalInit
1458 *!ProfileImpl::OnPrefsLoaded
1460 LEAK
1461 name=http://crbug.com/91465
1462 *!generic_cpp_alloc
1463 *!operator new
1464 *!browser_sync::internal::WeakHandleCore<>::*
1465 *!browser_sync::WeakHandle<>::*
1466 *!syncer::SyncManager::SyncInternal::Init
1468 LEAK
1469 name=http://crbug.com/91491
1471 *!CrxUpdateService::ProcessPendingItems
1473 UNINITIALIZED READ
1474 name=http://crbug.com/92026 (1)
1475 softokn3.dll!FC_GetFunctionList
1477 softokn3.dll!NSC_ModuleDBFunc
1479 UNINITIALIZED READ
1480 name=http://crbug.com/92026 (2)
1481 freebl3.dll!FREEBL_GetVector
1483 softokn3.dll!NSC_ModuleDBFunc
1485 # Possible real Chromium issue in DoCrossfade.
1486 UNINITIALIZED READ
1487 name=http://crbug.com/110049
1488 *!media::DoCrossfade<>
1489 *!media::Crossfade
1490 *!media::AudioRendererAlgorithmBase::FillBuffer
1492 # Known sqlite3 leaks.
1493 LEAK
1494 name=http://crbug.com/113847 (1)
1496 *!sqlite3MemMalloc
1497 *!mallocWithAlarm
1498 *!sqlite3Malloc
1500 *!yy_reduce
1502 LEAK
1503 name=http://crbug.com/113847 (2)
1505 *!openDatabase
1506 *!sqlite3_open
1508 LEAK
1509 name=http://crbug.com/115328
1511 *!GenericInfoViewTest_GenericInfoView_Test::TestBody
1513 LEAK
1514 name=http://crbug.com/117427 a
1516 *!net::HostCache::Set
1517 *!net::HostResolverImpl::CacheResult
1518 *!net::HostResolverImpl::Job::CompleteRequests
1519 *!net::HostResolverImpl::Job::OnProcTaskComplete
1520 *!base::internal::RunnableAdapter<>::Run
1522 # Probably related to 117427.  Someone is not tearing down DNS resolution during
1523 # testing.
1524 LEAK
1525 name=http://crbug.com/117427 b
1526 *!generic_cpp_alloc
1527 *!operator new
1528 *!base::internal::WeakReferenceOwner::GetRef
1529 *!base::SupportsWeakPtr<>::AsWeakPtr
1530 *!net::HostResolverImpl::Job::Job
1531 *!net::HostResolverImpl::Resolve
1532 *!net::SingleRequestHostResolver::Resolve
1533 *!net::TransportConnectJob::DoResolveHost
1534 *!net::TransportConnectJob::DoLoop
1535 *!net::TransportConnectJob::ConnectInternal
1536 *!net::ConnectJob::Connect
1537 *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
1538 *!net::internal::ClientSocketPoolBaseHelper::RequestSocket
1539 *!net::ClientSocketPoolBase<>::RequestSocket
1540 *!net::TransportClientSocketPool::RequestSocket
1541 *!net::ClientSocketHandle::Init<>
1542 *!net::`anonymous namespace'::InitSocketPoolHelper
1543 *!net::InitSocketHandleForRawConnect
1544 *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
1545 *!base::internal::RunnableAdapter<>::Run
1547 # IE frame possible leak of COM object.
1548 LEAK
1549 name=http://crbug.com/122399
1550 ole32.dll!...
1551 ole32.dll!CoTaskMemAlloc
1552 urlmon.dll!...
1553 urlmon.dll!CreateUri
1554 IEFRAME.dll!*
1556 # RenderWidgetHelper leak in DelayProfileDestruction test.
1557 LEAK
1558 name=http://crbug.com/125565
1559 *!generic_cpp_alloc
1560 *!operator new
1561 *!RenderProcessHostImpl::RenderProcessHostImpl
1562 *!SiteInstanceImpl::GetProcess
1563 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
1565 LEAK
1566 name=http://crbug.com/125807
1567 *!generic_cpp_alloc
1568 *!operator new
1569 *!TransportSecurityPersister::TransportSecurityPersister
1570 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest
1572 UNINITIALIZED READ
1573 name=bug_113076
1574 *!media::ConvertYUVToRGB32_C
1575 *!media::LinearScaleYUVToRGB32RowWithRange_C
1576 *!media::ScaleYUVToRGB32WithRect
1578 UNINITIALIZED READ
1579 name=bug_343248
1580 osmesa.dll!LINTERP
1581 osmesa.dll!INTERP_4F
1582 osmesa.dll!_tnl_generic_interp
1584 UNINITIALIZED READ
1585 name=bug_340752
1587 *!*::ThreadState::visitStack
1589 UNINITIALIZED READ
1590 name=bug_343663
1591 blink_web.dll!blink::RenderBlock::computeInlinePreferredLogicalWidths
1593 UNINITIALIZED READ
1594 name=bug_343797
1596 blink_web.dll!blink::MediaQueryExp::create
1597 blink_web.dll!blink::BisonCSSParser::createFloatingMediaQueryExp
1598 blink_web.dll!cssyyparse
1600 UNINITIALIZED READ
1601 name=bug_343915
1602 blink_web.dll!blink::BisonCSSParser::parseFlex
1603 blink_web.dll!blink::BisonCSSParser::parseValue
1604 blink_web.dll!cssyyparse
1606 UNADDRESSABLE ACCESS
1607 name=BUG_343958
1608 blink_web.dll!blink::Node::getFlag
1609 blink_web.dll!blink::Node::inDocument
1610 blink_web.dll!blink::Node::isDescendantOf
1611 blink_web.dll!blink::CompositeEditCommand::cloneParagraphUnderNewElement
1612 blink_web.dll!blink::CompositeEditCommand::moveParagraphWithClones
1614 UNINITIALIZED READ
1615 name=BUG_344076
1616 blink_web.dll!blink::Editor::canSmartReplaceWithPasteboard
1617 blink_web.dll!blink::Editor::pasteAsPlainTextWithPasteboard
1618 blink_web.dll!blink::Editor::pasteAsPlainText
1619 blink_web.dll!blink::executePasteAndMatchStyle
1620 blink_web.dll!blink::Editor::Command::execute
1621 blink_web.dll!blink::Document::execCommand
1623 UNINITIALIZED READ
1624 name=BUG_349128
1625 content.dll!std::*
1627 content.dll!content::BrowserAccessibilityManagerWin::*
1629 *!*::UpdateNode
1631 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB*
1632 # variety) that it's a performance hit.  We avoid that by requesting
1633 # whole-module suppression
1634 # (see https://github.com/DynamoRIO/drmemory/issues/1529).
1635 UNINITIALIZED READ
1636 name=bug_347967_all_osmesa
1637 osmesa.dll!*
1639 UNINITIALIZED READ
1640 name=bug_347967
1641 osmesa.dll!unpack_RGB*888
1642 osmesa.dll!_mesa_unpack_rgba_row
1643 osmesa.dll!slow_read_rgba_pixels
1644 osmesa.dll!read_rgba_pixels
1645 osmesa.dll!_mesa_readpixels
1647 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
1648 gpu.dll!gpu::CommandParser::ProcessCommand
1649 gpu.dll!gpu::GpuScheduler::PutChanged
1651 UNINITIALIZED READ
1652 name=bug_347967,bug_348357
1653 osmesa.dll!clip_span
1654 osmesa.dll!_swrast_write_rgba_span
1655 osmesa.dll!general_triangle
1657 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements
1658 gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements
1659 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
1660 gpu.dll!gpu::CommandParser::ProcessCommand
1662 UNINITIALIZED READ
1663 name=bug_361594
1665 skia.dll!SkA8_Shader_Blitter::blitH
1666 skia.dll!SkBlitter::blitRect
1667 skia.dll!blitrect
1668 skia.dll!SkScan::FillIRect
1670 skia.dll!SkDraw::drawRect
1671 skia.dll!SkDraw::drawBitmap
1672 skia.dll!SkBitmapDevice::drawBitmap
1673 skia.dll!SkCanvas::internalDrawBitmap
1674 skia.dll!SkCanvas::drawBitmap
1675 content.dll!content::ScreenshotData::EncodeOnWorker
1677 UNINITIALIZED READ
1678 name=bug_363487
1679 blink_web.dll!blink::RenderLayerCompositor::updateIfNeeded
1680 blink_web.dll!blink::RenderLayerCompositor::updateIfNeededRecursive
1681 blink_web.dll!blink::FrameView::updateLayoutAndStyleForPainting
1682 blink_web.dll!blink::PageAnimator::updateLayoutAndStyleForPainting
1684 UNINITIALIZED READ
1685 name=bug_365101
1686 *!device::BluetoothAdapterWin::AdapterStateChanged
1688 UNINITIALIZED READ
1689 name=bug_364146
1691 v8.dll!*
1692 net_with_v8.dll!net::ProxyResolverV8::Context::*
1694 UNINITIALIZED READ
1695 name=bug_334448
1696 *!CLD2::UTF8GenericReplaceInternal
1697 *!CLD2::UTF8GenericReplace
1698 *!CLD2::ScriptScanner::LowerScriptSpan
1699 *!CLD2::ScriptScanner::GetOneScriptSpanLower
1700 *!CLD2::DetectLanguageSummaryV2
1701 *!CLD2::DetectLanguageSummary
1703 UNINITIALIZED READ
1704 name=bug_42043
1706 QuickTime.qts!*
1708 UNINITIALIZED READ
1709 name=bug_369141
1711 *!blink::RenderLayerClipper::updateClipRects
1712 *!blink::RenderLayerClipper::parentClipRects
1713 *!blink::RenderLayerClipper::backgroundClipRect
1715 HANDLE LEAK
1716 name=bug_370178
1717 system call NtCreateEvent
1718 KERNELBASE.dll!CreateEventExW
1719 KERNELBASE.dll!CreateEventW
1720 base.dll!base::WaitableEvent::WaitableEvent
1721 gpu.dll!gpu::InProcessCommandBuffer::Initialize
1722 gl_in_process_context.dll!gpu::`anonymous namespace'::GLInProcessContextImpl::Initialize
1723 gl_in_process_context.dll!gpu::GLInProcessContext::CreateContext
1725 UNINITIALIZED READ
1726 name=bug_371844
1727 *!content::GamepadProvider::PadState::Match
1728 *!content::GamepadProvider::DoPoll
1730 UNINITIALIZED READ
1731 name=bug_371950
1732 media.dll!ConvertYUVToRGB32Row_SSE
1733 media.dll!media::ConvertYUVToRGB32_SSE
1734 media.dll!media::ConvertVideoFrameToBitmap
1735 media.dll!media::SkCanvasVideoRenderer::Paint
1736 cc.dll!cc::VideoResourceUpdater::CreateForSoftwarePlanes
1737 cc.dll!cc::VideoResourceUpdater::CreateExternalResourcesFromVideoFrame
1738 cc.dll!cc::VideoLayerImpl::WillDraw
1740 UNINITIALIZED READ
1741 name=bug_371959
1742 content.dll!webrtc::PeerConnection::DoInitialize
1743 content.dll!webrtc::PeerConnection::Initialize
1744 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection_s
1745 content.dll!webrtc::PeerConnectionFactory::OnMessage
1746 content.dll!jingle_glue::JingleThreadWrapper::Send
1747 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection
1748 content.dll!webrtc::PeerConnectionFactoryInterface::CreatePeerConnection
1750 # This suppression is deliberately general, as bugs reported in
1751 # ProcessOutgoingMessages are difficult to track down until we
1752 # get our annotations in place.
1753 # TODO(bruening): add annotations once we have the infrastructure.
1754 UNINITIALIZED READ
1755 name=bug_371991
1756 system call NtWriteFile parameter #5
1757 KERNELBASE.dll!WriteFile
1758 KERNEL32.dll!WriteFile*
1759 *!IPC::Channel*::ProcessOutgoingMessages
1761 UNINITIALIZED READ
1762 name=bug_372254
1763 *!content::*::NotifyPluginProcessHostHelper
1765 UNINITIALIZED READ
1766 name=drm_i#1546
1767 *!testing::internal::CmpHelperEQ<>
1769 *!content::BrowserPluginTest_ResizeFlowControl_Test::TestBody
1771 UNINITIALIZED READ
1772 name=bug_374410
1773 *!ui::NativeThemeWin::PaintScrollbarTrack
1774 *!ui::NativeThemeWin::PaintDirect
1776 UNINITIALIZED READ
1777 name=bug_377728
1779 *!Hunspell::suggest
1780 *!HunspellEngine::FillSuggestionList
1781 *!SpellcheckLanguage::SpellCheckWord
1782 *!SpellCheck::SpellCheckWord
1784 UNINITIALIZED READ
1785 name=bug_387373
1786 *!blink::WebEmbeddedWorkerImpl::startWorkerContext
1787 *!content::EmbeddedWorkerDispatcher::OnStartWorker
1788 *!EmbeddedWorkerMsg_StartWorker::Dispatch<>
1790 UNADDRESSABLE ACCESS
1791 name=bug_389132
1792 content.dll!crypto_kernel_do_load_cipher_type
1793 content.dll!crypto_kernel_load_cipher_type
1794 content.dll!crypto_kernel_init
1795 content.dll!cricket::SrtpSession::SetKey
1796 content.dll!cricket::SrtpSession::SetSend
1797 content.dll!cricket::SrtpFilter::SetRtpParams
1798 content.dll!cricket::BaseChannel::SetupDtlsSrtp
1799 content.dll!cricket::BaseChannel::ChannelWritable_w
1800 content.dll!cricket::BaseChannel::OnWritableState
1802 UNINITIALIZED READ
1803 name=bug_392585
1804 system call NtCreateFile parameter #9
1805 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1807 UNADDRESSABLE ACCESS
1808 name=bug_398850
1810 wtf.dll!WTF::PlatformCondition::timedWait
1812 UNINITIALIZED READ
1813 name=bug_399293
1814 blink_web.dll!blink::InputMethodController::extendSelectionAndDelete
1815 blink_web.dll!blink::WebLocalFrameImpl::extendSelectionAndDelete
1816 content.dll!content::RenderFrameImpl::OnExtendSelectionAndDelete
1817 *!content::RenderViewImplTest_OnExtendSelectionAndDelete_Test::TestBody
1818 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1820 UNINITIALIZED READ
1821 name=bug_398547
1822 system call NtWriteFile parameter #5
1823 KERNELBASE.dll!WriteFile
1824 KERNEL32.dll!WriteFile
1825 mojo_system_impl.dll!mojo::system::`anonymous namespace'::RawChannelWin::WriteNoLock
1827 HANDLE LEAK
1828 name=bug_403544
1829 system call NtCreateSemaphore
1830 KERNELBASE.dll!CreateSemaphoreExW
1832 v8.dll!v8::internal::SweeperThread::SweeperThread
1834 blink_web.dll!blink::WorkerScriptController::WorkerScriptController
1835 blink_web.dll!blink::WorkerGlobalScope::WorkerGlobalScope
1836 blink_web.dll!blink::ServiceWorkerGlobalScope::ServiceWorkerGlobalScope
1839 HANDLE LEAK
1840 name=bug_403681
1841 system call NtCreateTimer
1842 KERNELBASE.dll!CreateWaitableTimerExW
1843 KERNEL32.dll!CreateWaitableTimerW
1844 content.dll!rtc::Timing::Timing
1845 content.dll!content::RenderProcessHostImpl::CreateMessageFilters
1847 content.dll!content::RenderViewHostImpl::CreateRenderView
1848 content.dll!content::WebContentsImpl::CreateRenderViewForRenderManager
1850 content.dll!content::NavigationControllerImpl::LoadEntry
1852 *!extensions::ExtensionHost::LoadInitialURL
1854 UNINITIALIZED READ
1855 name=bug_414268
1856 pdf.dll!chrome_pdf::PDFiumEngine::OnMouseMove
1857 pdf.dll!chrome_pdf::PDFiumEngine::HandleEvent
1858 pdf.dll!chrome_pdf::OutOfProcessInstance::HandleInputEvent
1859 pdf.dll!pp::InputEvent_HandleEvent
1860 ppapi_proxy.dll!ppapi::CallWhileUnlocked<>
1861 ppapi_proxy.dll!ppapi::proxy::PPP_InputEvent_Proxy::OnMsgHandleFilteredInputEvent
1863 UNADDRESSABLE ACCESS
1864 name=bug_425097
1866 *!ash::test::ShelfViewTest_CheckDragAndDropFromOverflowBubbleToShelf_Test::TestBody
1868 UNINITIALIZED READ
1869 name=bug_432067
1870 system call NtCreateFile parameter #9
1871 MSWSOCK.dll!*
1872 content.dll!content::AppCacheStorageImpl::DatabaseTask::CallRun
1874 UNADDRESSABLE ACCESS
1875 name=bug_436131
1876 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
1877 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
1878 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1880 UNADDRESSABLE ACCESS
1881 name=bug_436131_b
1882 views.dll!ObserverListBase<>::RemoveObserver
1883 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
1884 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1886 UNADDRESSABLE ACCESS
1887 name=bug_436131_c
1888 *!ash::test::ShelfViewTestAPI::GetPreferredSize
1889 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
1890 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1892 UNINITIALIZED READ
1893 name=bug_446256
1894 *!`anonymous namespace'::GraphicsContextTest_trackDisplayListRecording_Test::TestBody
1895 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1897 UNINITIALIZED READ
1898 name=bug_399842
1899 skia.dll!S32A_Opaque_BlitRow32_SSE4