1 # This file contains suppressions for the Dr.Memory tool, see
2 # http://dev.chromium.org/developers/how-tos/using-drmemory
4 # This file should contain suppressions only for the reports happening
5 # in the 'full' mode (drmemory_full).
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
7 # please use suppressions.txt instead.
9 ###############################################################
10 # Known reports on the third party we have no control over.
13 name=http://crbug.com/116277
17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
19 name=https://github.com/DynamoRIO/drmemory/issues/406
20 ADVAPI32.dll!WmiOpenBlock
21 ADVAPI32.dll!WmiOpenBlock
23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
25 name=GoogleDesktop LEAK
27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
29 # They deliberately use uninit local var in sqlite random generator.
30 # Random bytes may mess up the call stack between randomByte and
31 # sqlite3_* frames (https://github.com/DynamoRIO/drmemory/issues/1514)
32 # so we also look for randomByte in form B.
34 name=sqlite3_randomness A
35 *.dll!sqlite3_randomness
38 name=sqlite3_randomness B
41 # Intentional leak in WebKit Template Framework for ThreadData.
43 name=intentional WTF ThreadData leak
47 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
49 name=http://crbug.com/125558 a
50 KERNELBASE.dll!LocalAlloc
52 SECHOST.dll!NotifyServiceStatusChange
54 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
55 *!net::ProxyResolverWinHttp::GetProxyForURL
57 # Tiny locale-related leaks in ntdll. Probably system bug.
59 name=http://crbug.com/125558 b
63 KERNELBASE.dll!GetCPInfoExW
68 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
69 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig
72 name=http://crbug.com/30704 #f
73 libpng.dll!wk_png_write_find_filter
74 libpng.dll!wk_png_write_row
76 ###############################################################
77 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
78 # assumptions or unhandled syscalls
80 # Please note: the following suppressions were written in the abscense of
81 # private symbols so may need to be updated when we switch to auto-loading PDBs
83 name=https://github.com/DynamoRIO/drmemory/issues/12 (1)
86 ntdll.dll!RtlFindActivationContextSectionString
89 name=https://github.com/DynamoRIO/drmemory/issues/12 (2)
91 SHELL32.dll!SHFileOperation*
94 name=https://github.com/DynamoRIO/drmemory/issues/12 (3)
96 SHELL32.dll!SHGetFolderPath*
99 name=https://github.com/DynamoRIO/drmemory/issues/12 (4)
101 SHELL32.dll!SHGetFolderPath*
104 name=https://github.com/DynamoRIO/drmemory/issues/12 (5)
106 SHELL32.dll!SHCreateDirectory*
109 name=https://github.com/DynamoRIO/drmemory/issues/12 (6)
111 SHELL32.dll!ILLoadFromStream*
114 name=https://github.com/DynamoRIO/drmemory/issues/12 (7)
116 SHELL32.dll!ILSaveToStream*
119 name=https://github.com/DynamoRIO/drmemory/issues/12 (8)
121 SHELL32.dll!SHFileOperation*
124 name=https://github.com/DynamoRIO/drmemory/issues/12 (9)
126 SHELL32.dll!SHGetItemFromDataObject
129 name=https://github.com/DynamoRIO/drmemory/issues/12 (10)
131 SHELL32.dll!SHGetItemFromDataObject
134 name=https://github.com/DynamoRIO/drmemory/issues/12 (11)
137 SHELL32.dll!SHChangeNotifySuspendResume
140 name=https://github.com/DynamoRIO/drmemory/issues/14 (1)
145 name=https://github.com/DynamoRIO/drmemory/issues/14 (2)
150 name=https://github.com/DynamoRIO/drmemory/issues/14 (3)
155 name=https://github.com/DynamoRIO/drmemory/issues/17 (1)
160 name=https://github.com/DynamoRIO/drmemory/issues/17 (2)
162 GDI32.dll!CreateFontIndirectExW
163 GDI32.dll!CreateFontIndirectW
166 name=https://github.com/DynamoRIO/drmemory/issues/17 (3)
167 KERNELBASE.dll!LocalAlloc
169 USER32.dll!CreateWindow*
172 name=https://github.com/DynamoRIO/drmemory/issues/18 a
177 name=https://github.com/DynamoRIO/drmemory/issues/18 b
182 name=https://github.com/DynamoRIO/drmemory/issues/18 c
187 name=https://github.com/DynamoRIO/drmemory/issues/18 d
192 name=https://github.com/DynamoRIO/drmemory/issues/40 a
197 name=https://github.com/DynamoRIO/drmemory/issues/40 b
202 name=https://github.com/DynamoRIO/drmemory/issues/48 a
203 system call NtContinue
208 name=https://github.com/DynamoRIO/drmemory/issues/48 b
209 system call NtContinue
210 *!WTF::initializeCurrentThreadInternal
213 name=https://github.com/DynamoRIO/drmemory/issues/52 a
215 DBGHELP.dll!SymInitialize
218 name=https://github.com/DynamoRIO/drmemory/issues/52 b
220 DBGHELP.dll!SymEnumSourceFiles
223 name=https://github.com/DynamoRIO/drmemory/issues/52 c
225 msvcrt.dll!_RTDynamicCast
228 name=https://github.com/DynamoRIO/drmemory/issues/52 bit-level fp in dbghelp
229 instruction=test 0x*(%*) $0x??
230 DBGHELP.dll!SymUnloadModule64
233 name=https://github.com/DynamoRIO/drmemory/issues/53
234 ADVAPI32.dll!WmiMofEnumerateResourcesA
235 ADVAPI32.dll!WmiMofEnumerateResourcesA
236 ADVAPI32.dll!Sta*TraceW
239 name=https://github.com/DynamoRIO/drmemory/issues/58
244 name=https://github.com/DynamoRIO/drmemory/issues/60
247 USP10.dll!ScriptStringAnalyse
250 IMM32.dll!ImmGetIMCCSize
251 IMM32.dll!ImmLockClientImc
252 IMM32.dll!ImmDisableIME
253 IMM32.dll!ImmSetActiveContext
254 USER32.dll!IMPSetIMEA
257 name=https://github.com/DynamoRIO/drmemory/issues/65 a
262 name=https://github.com/DynamoRIO/drmemory/issues/65 b
264 *!talk_base::CreateRandomString
267 name=https://github.com/DynamoRIO/drmemory/issues/68 a
272 name=https://github.com/DynamoRIO/drmemory/issues/68 b
274 ADVAPI32.dll!SetSecurityDescriptorDacl
277 name=https://github.com/DynamoRIO/drmemory/issues/68 c
279 MSWSOCK.dll!WSPStartup
282 name=https://github.com/DynamoRIO/drmemory/issues/68 d
284 ntdll.dll!RtlValidateUnicodeString
287 name=https://github.com/DynamoRIO/drmemory/issues/256
293 name=https://github.com/DynamoRIO/drmemory/issues/274 a
298 name=https://github.com/DynamoRIO/drmemory/issues/274 b
303 name=https://github.com/DynamoRIO/drmemory/issues/275
308 name=https://github.com/DynamoRIO/drmemory/issues/276
310 ntdll.dll!RtlConvertUlongToLargeInteger
311 ntdll.dll!RtlConvertUlongToLargeInteger
312 ntdll.dll!KiUserExceptionDispatcher
315 name=https://github.com/DynamoRIO/drmemory/issues/305
323 name=https://github.com/DynamoRIO/drmemory/issues/346 a
325 GDI32.dll!CloseEnhMetaFile
328 name=https://github.com/DynamoRIO/drmemory/issues/346 b
329 GDI32.dll!SetPolyFillMode
333 name=https://github.com/DynamoRIO/drmemory/issues/362
334 USER32.dll!UnregisterClass*
337 name=https://github.com/DynamoRIO/drmemory/issues/382
339 ntdll.dll!CsrNewThread
342 name=https://github.com/DynamoRIO/drmemory/issues/397
343 system call NtDeviceIoControlFile InputBuffer
344 ADVAPI32.dll!ImpersonateAnonymousToken
347 name=https://github.com/DynamoRIO/drmemory/issues/407 a
348 system call NtRequestWaitReplyPort
349 RPCRT4.dll!I_RpcSendReceive
350 RPCRT4.dll!NdrSendReceive
353 name=https://github.com/DynamoRIO/drmemory/issues/407 b
355 ntdll.dll!LdrInitializeThunk
356 ntdll.dll!LdrShutdownThread
359 name=https://github.com/DynamoRIO/drmemory/issues/412 a
360 ADVAPI32.dll!RegDeleteValue*
363 name=https://github.com/DynamoRIO/drmemory/issues/412 b
368 name=https://github.com/DynamoRIO/drmemory/issues/412 c
370 RPCRT4.dll!NdrClientCall2
373 name=https://github.com/DynamoRIO/drmemory/issues/412 d
374 RSAENH.dll!DllUnregisterServer
376 ADVAPI32.dll!CryptAcquireContextA
377 CRYPT32.dll!CryptEnumOIDFunction
379 CRYPT32.dll!CertFindCertificateInStore
382 name=https://github.com/DynamoRIO/drmemory/issues/412 e
384 RSAENH.dll!CPGenRandom
387 name=https://github.com/DynamoRIO/drmemory/issues/412 f
392 name=https://github.com/DynamoRIO/drmemory/issues/412 g
395 *!testing::internal::CmpHelperEQ*
397 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
399 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't
400 # have frame pointers, and we have trouble unwinding from it. Therefore, we use
401 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
403 name=https://github.com/DynamoRIO/drmemory/issues/412 h
407 name=https://github.com/DynamoRIO/drmemory/issues/425 a
408 CLBCatQ.DLL!DestroyStgDatabase
409 CLBCatQ.DLL!PostError
410 CLBCatQ.DLL!PostError
413 name=https://github.com/DynamoRIO/drmemory/issues/425 b
414 RPCRT4.dll!I_RpcBCacheFree
415 RPCRT4.dll!I_RpcBCacheFree
417 RPCRT4.dll!NdrClientCall2
420 name=https://github.com/DynamoRIO/drmemory/issues/425 c
426 name=https://github.com/DynamoRIO/drmemory/issues/435 a
428 ntdll.dll!RtlSetSecurityObject
429 ntdll.dll!RtlNewSecurityObjectEx
430 ADVAPI32.dll!CreatePrivateObjectSecurityEx
431 NTMARTA.dll!AccRewriteSetNamedRights
434 name=https://github.com/DynamoRIO/drmemory/issues/435 b
435 WLDAP32.dll!Ordinal325
437 WLDAP32.dll!Ordinal325
438 ntdll.dll!LdrInitializeThunk
439 ntdll.dll!LdrFindResourceDirectory_U
440 ntdll.dll!RtlValidateUnicodeString
442 KERNEL32.dll!LoadLibraryExW
444 # mod+offs suppression because the symbolic makes no sense and changes
445 # completely in the presence of WS2_32.dll symbols.
447 name=https://github.com/DynamoRIO/drmemory/issues/438
453 name=https://github.com/DynamoRIO/drmemory/issues/454 a
455 WINMM.dll!wave*GetNumDevs
458 name=https://github.com/DynamoRIO/drmemory/issues/454 b
460 WINMM.dll!wave*GetNumDevs
463 name=https://github.com/DynamoRIO/drmemory/issues/466
464 ntdll.dll!RtlRunOnceBeginInitialize
465 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
468 name=https://github.com/DynamoRIO/drmemory/issues/473 a
469 system call NtDeviceIoControlFile InputBuffer
471 iphlpapi.dll!GetAdaptersAddresses
474 name=https://github.com/DynamoRIO/drmemory/issues/473 b
483 iphlpapi.dll!GetPerAdapterInfo
485 iphlpapi.dll!GetAdaptersAddresses
488 name=https://github.com/DynamoRIO/drmemory/issues/473 c
492 IPHLPAPI.DLL!GetAdaptersAddresses
495 name=https://github.com/DynamoRIO/drmemory/issues/475
497 ADVAPI32.dll!CryptAcquireContextA
499 CRYPT32.dll!CryptMsgOpenToDecode
501 CRYPT32.dll!CryptQueryObject
503 # Lots of leaks from our interactions with the system certificate store. May be
504 # worth reviewing our use of their API.
506 name=https://github.com/DynamoRIO/drmemory/issues/476 a
507 KERNEL*.dll!LocalAlloc
509 CRYPT32.dll!CertGetCRLContextProperty
512 name=https://github.com/DynamoRIO/drmemory/issues/476 b
513 KERNEL*.dll!LocalAlloc
515 CRYPT32.dll!CertAddCRLContextToStore
518 name=https://github.com/DynamoRIO/drmemory/issues/476 c
519 KERNEL*.dll!LocalAlloc
521 CRYPT32.dll!CertOpenStore
524 name=https://github.com/DynamoRIO/drmemory/issues/476 d
526 CRYPT32.dll!CertOpenSystemStore?
529 name=https://github.com/DynamoRIO/drmemory/issues/476 e
531 CRYPT32.dll!CertGetCertificateChain
534 name=https://github.com/DynamoRIO/drmemory/issues/476 f
536 CRYPT32.dll!CertCompareIntegerBlob
539 name=https://github.com/DynamoRIO/drmemory/issues/476 g
541 CRYPT32.dll!CryptUnprotectData
544 name=https://github.com/DynamoRIO/drmemory/issues/476 h
545 KERNEL*.dll!LocalAlloc
547 CRYPT32.dll!CertEnumCertificatesInStore
550 name=https://github.com/DynamoRIO/drmemory/issues/476 i
552 CRYPT32.dll!CryptProtectData
555 name=https://github.com/DynamoRIO/drmemory/issues/476 j
557 CRYPT32.dll!CryptExportPublicKeyInfoEx
560 name=https://github.com/DynamoRIO/drmemory/issues/502 a
561 system call NtSecureConnectPort parameter #3
566 name=https://github.com/DynamoRIO/drmemory/issues/502 b
567 system call NtGdiEnumFonts parameter #6
572 name=https://github.com/DynamoRIO/drmemory/issues/511 a
577 name=https://github.com/DynamoRIO/drmemory/issues/511 b
580 ole32.dll!StringFromGUID2
583 name=https://github.com/DynamoRIO/drmemory/issues/512 a
585 *!browser_sync::Cryptographer::PackBootstrapToken
586 *!browser_sync::Cryptographer::GetBootstrapToken
589 name=https://github.com/DynamoRIO/drmemory/issues/512 b
593 # TODO(bruening): remove these once we have v8 bitfields handled
595 name=https://github.com/DynamoRIO/drmemory/issues/513 a
599 name=https://github.com/DynamoRIO/drmemory/issues/513 b
604 name=https://github.com/DynamoRIO/drmemory/issues/513 c
609 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll
610 # has no symbols. These are all on the bots using component build, so we use
611 # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue.
613 name=https://github.com/DynamoRIO/drmemory/issues/513 d
617 name=https://github.com/DynamoRIO/drmemory/issues/513 e
623 name=https://github.com/DynamoRIO/drmemory/issues/546
628 *!IconUtil::Create*HICON*
631 name=http://crbug.com/92152
633 USER32.dll!CreateWindowExW
634 *!views::TooltipManagerWin::Init
635 *!views::TooltipManagerWin::TooltipManagerWin
638 name=https://github.com/DynamoRIO/drmemory/issues/567 a
641 dbghelp.dll!StackWalk64
644 name=https://github.com/DynamoRIO/drmemory/issues/567 b
648 dbghelp.dll!StackWalk64
650 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
651 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too
652 # brittle, so we switched to RPCRT4.dll!*.
654 name=https://github.com/DynamoRIO/drmemory/issues/569
658 KERNEL*.dll!BaseThreadInitThunk
660 # TODO(timurrrr): investigate these
662 name=http://crbug.com/TODO a
664 *!win_util::GetLogonSessionOnlyDACL
667 name=http://crbug.com/TODO b
669 ntshrui.dll!IsPathSharedW
672 name=http://crbug.com/TODO c
677 name=http://crbug.com/TODO d
682 name=http://crbug.com/TODO e
687 name=http://crbug.com/TODO f
689 *!GetCanonicalPathInfo*
692 name=http://crbug.com/TODO g
697 name=http://crbug.com/TODO h
699 GDI32.dll!GetTextExtentPoint32*
702 name=http://crbug.com/TODO i
704 *!SyncSocketClientListener::OnMsgClassResponse
707 name=http://crbug.com/TODO j
709 *!*NSPRInitSingleton*
712 name=http://crbug.com/TODO k
713 *!NdrSimpleStructFree
716 name=http://crbug.com/TODO l
717 ntdll.dll!RtlpNtOpenKey
718 ntdll.dll!RtlMakeSelfRelativeSD
719 ntdll.dll!RtlAbsoluteToSelfRelativeSD
720 ADVAPI32.dll!MakeSelfRelativeSD
723 name=http://crbug.com/TODO m
725 CRYPT32.dll!I_CertSyncStore
727 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
728 # a leak. Must be some early thread initialization. Doesn't look like
731 name=http://crbug.com/TODO n
737 KERNEL*.dll!BaseThreadInitThunk
739 # No idea where this is from, but Chrome isn't even on the stack.
741 name=http://crbug.com/TODO o
743 ole32.dll!OleInitialize
745 KERNEL32.dll!BaseThreadInitThunk
747 # Matches lots of RPC related leaks. So far RPC handles have been mostly owned
748 # by system libraries and are not something we can fix easily.
750 name=http://crbug.com/TODO p
753 RPCRT4.dll!NDRCContextBinding
755 # No idea, but all system code, not interesting.
757 name=http://crbug.com/TODO q
768 name=http://crbug.com/109278 video device COM leaks
770 *!media::VideoCaptureDevice::*
773 name=http://crbug.com/109278 audio device COM leaks
775 *!media::GetInputDeviceNamesWin
777 # False pos uninit in shell32 when resolving links.
779 name=https://github.com/DynamoRIO/drmemory/issues/745
783 *!file_util::ResolveShortcut
785 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a
786 # buffer with SSE/MMX instructions whose results are then masked out later.
788 name=https://github.com/DynamoRIO/drmemory/issues/747 a
789 *!ff_pred4x4_vertical_vp8_mmxext
792 name=https://github.com/DynamoRIO/drmemory/issues/747 b
793 *!ff_pred4x4_down_left_mmxext
796 name=https://github.com/DynamoRIO/drmemory/issues/747 c
797 *!ff_vorbis_floor1_render_list
800 name=https://github.com/DynamoRIO/drmemory/issues/747 d
801 *!ff_put_vp8_epel8_h6_ssse3
804 name=https://github.com/DynamoRIO/drmemory/issues/747 e
805 *!ff_put_vp8_epel8_h4_ssse3
808 name=https://github.com/DynamoRIO/drmemory/issues/747 f
812 name=https://github.com/DynamoRIO/drmemory/issues/747 g
813 *!ff_simple_idct_add_mmx
815 # ffmpeg seems to leak a pthread condition variable.
817 name=http://crbug.com/110042
822 *!ff_thread_decode_frame
823 *!avcodec_decode_video2
825 # Improperly handled ioctl in bcrypt.
827 name=https://github.com/DynamoRIO/drmemory/issues/748
828 system call NtDeviceIoControlFile InputBuffer
830 bcrypt.dll!BCryptUnregisterConfigChangeNotify
831 bcrypt.dll!BCryptGetFipsAlgorithmMode
832 ntdll.dll!RtlQueryEnvironmentVariable
834 # Not sure what this is.
836 name=https://github.com/DynamoRIO/drmemory/issues/749
845 *!talk_base::SafeGetHostByName
846 *!talk_base::SocketAddress::GetLocalIPs
847 *!talk_base::SocketAddress::IsLocalIP
848 *!cricket::Transport::VerifyCandidate
849 *!cricket::Session::OnRemoteCandidates
850 *!cricket::Session::OnTransportInfoMessage
851 *!cricket::Session::OnIncomingMessage
852 *!cricket::SessionManager::OnIncomingMessage
854 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
856 name=https://github.com/DynamoRIO/drmemory/issues/529
859 *!base::LaunchProcess
861 # System leak from CreateEnvironmentBlock.
863 name=https://github.com/DynamoRIO/drmemory/issues/757
865 USERENV.dll!CreateEnvironmentBlock
867 # Looks like another instance of 753
869 name=https://github.com/DynamoRIO/drmemory/issues/753
871 ntdll.dll!RtlLoadString
875 name=https://github.com/DynamoRIO/drmemory/issues/493
876 USP10.dll!ScriptPositionSingleGlyph
878 # Various TLS leaks that we don't understand yet. We should be finding a root
881 name=https://github.com/DynamoRIO/drmemory/issues/778 a
882 KERNELBASE.dll!TlsSetValue
884 # Originally filed as: http://crbug.com/109281
886 name=https://github.com/DynamoRIO/drmemory/issues/778 b
889 *!*::ConstructTlsVector
890 *!base::ThreadLocalStorage::StaticSlot::Get
892 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a
893 # root? See also http://crbug.com/32624
895 name=https://github.com/DynamoRIO/drmemory/issues/778 c
900 # Bit-level fps in rich edit layer.
902 name=https://github.com/DynamoRIO/drmemory/issues/791
906 # Already suppressed by drmemory default supp we don't have yet.
908 name=i#757: RPC binding leaks in sspicli.dll
914 # Async NtReadFile false positives. This was fixed in drmemory r772, remove
915 # this supp when we pull that rev.
917 name=https://github.com/DynamoRIO/drmemory/issues/798
918 system call NtReadFile parameter #5
919 KERNEL32.dll!ReadFile
921 # Probable syscall false positive.
923 name=https://github.com/DynamoRIO/drmemory/issues/809
924 system call NtGdiPolyPolyDraw parameter #1
925 *!gfx::Path::CreateNativeRegion
927 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces
928 # coming out of this module (sometimes only one frame), which makes it hard to
929 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we
932 name=https://github.com/DynamoRIO/drmemory/issues/113 rpcrt4.dll wildcard
936 name=https://github.com/DynamoRIO/drmemory/issues/841 a
938 CRYPTNET.dll!I_CryptNetGetConnectivity
941 name=https://github.com/DynamoRIO/drmemory/issues/841 b
946 name=https://github.com/DynamoRIO/drmemory/issues/841 c
951 name=https://github.com/DynamoRIO/drmemory/issues/841 d
953 CRYPTNET.dll!I_CryptNetGetConnectivity
955 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
957 name=https://github.com/DynamoRIO/drmemory/issues/810
958 instruction=test %edx %edx
959 USER32.dll!GetClassLongW
961 *!ui::CenterAndSizeWindow
964 name=https://github.com/DynamoRIO/drmemory/issues/815
967 USER32.dll!GetMonitorInfoA
968 ntdll.dll!KiUserCallbackDispatcher
972 # Suppress anything in cmd.exe. It's safer to suppress these than disable
973 # following, since someone might launch a Chrome process via cmd.exe.
979 # Possible true system use after free.
981 name=https://github.com/DynamoRIO/drmemory/issues/623
982 KERNELBASE.dll!TlsGetValue
983 OLEAUT32.dll!SysFreeString
984 OLEAUT32.dll!SysAllocStringByteLen
990 # basic_streambuf seems to leak something in creating a std::_Mutex
992 name=https://github.com/DynamoRIO/drmemory/issues/857
994 ntdll.dll!RtlInitializeCriticalSection
996 *!std::_Mutex::_Mutex
997 *!std::basic_streambuf<>
999 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though.
1001 name=GDI SetBrushOrgEx leak
1003 GDI32.dll!GetTextMetricsW
1004 *!gfx::PlatformFontWin::CreateHFontRef
1005 *!gfx::PlatformFontWin::GetBaseFontRef
1007 ###############################################################
1008 # Benign issues in Chromium
1010 # This test intentionally leaks an object and checks that it's never deleted.
1012 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
1014 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
1017 name=deliberate histogram leak
1019 *!replace_operator_new
1021 *!*::*Histogram::FactoryGet
1024 name=deliberate leak for SampleMap
1026 *!base::SampleMap::Accumulate
1027 *!base::SparseHistogram::Add
1030 name=deliberate LazyInstance leak
1032 *!*LeakyLazyInstance*
1034 *!base::LazyInstance*::Pointer
1036 # Test intentionally leaks an object.
1038 name=http://crbug.com/86301
1039 *!replace_operator_new
1041 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody
1043 # Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it.
1045 name=Firefox 3 NSS dll leak
1048 *!NSSDecryptor::~NSSDecryptor
1050 # We get uninit reports inside GMock when it prints the bytes of references to
1051 # partially initialized objects passed to unexpected method calls.
1053 name=http://crbug.com/64887 (GMock printing uninit data)
1055 *!testing::*::PrintBytesInObjectTo*
1057 # This is an EXPECT_DEATH() that hits a RELEASE_ASSERT(),
1058 # which intentionally writes to NULL in order to crash.
1059 UNADDRESSABLE ACCESS
1060 name=https://crbug.com/497344
1061 blink_platform.dll!blink::SecurityOrigin::addSuborigin
1062 *!blink::SecurityOriginTest_Suborigins_Test::TestBody
1064 ###############################################################
1065 # Proactively borrowed from memcheck/suppressions.txt.
1066 # We have not yet seen these, but we are expanding the sets of tests
1067 # we're running, and we've hit redness in the past that could have
1068 # been avoided by already having the Memcheck suppressions.
1069 # TODO(bruening): review the entire file (not just these) once we're
1070 # at the peak set of tests we plan to run and remove the unused ones.
1077 *!process_data_simple_main
1078 *!chromium_jpeg_write_scanlines
1079 *!gfx::JPEGCodec::Encode
1080 *!gfx::JPEGEncodedDataFromImage
1081 *!history::TopSites::EncodeBitmap
1082 *!history::TopSites::SetPageThumbnail
1083 *!history::ExpireHistoryTest::AddExampleData
1084 *!history::ExpireHistoryTest::*
1088 *!testing::AssertionResult testing::internal::CmpHelperGE<>
1089 *!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody
1094 *!skia::BGRAConvolve2D
1095 *!skia::ImageOperations::ResizeBasic*
1096 *!skia::ImageOperations::Resize*
1100 *!fetch_texel_2d_f_rgba8888
1105 *!_mesa_execute_program
1107 *!_swrast_exec_fragment_program
1108 *!shade_texture_span
1109 *!_swrast_write_rgba_span
1111 *!_swrast_validate_triangle
1114 *!_tnl_render_triangles_elts
1118 *!_tnl_vbo_draw_prims
1119 *!vbo_validated_drawrangeelements
1120 *!vbo_exec_DrawElements
1121 *!neutral_DrawElements
1125 *!fetch_texel_2d_f_rgba8888
1130 *!_mesa_execute_program
1132 *!_swrast_exec_fragment_program
1133 *!shade_texture_span
1134 *!_swrast_write_rgba_span
1143 *!_tnl_vbo_draw_prims
1147 *!fetch_texel_2d_f_rgba8888
1149 *!fast_read_rgba_pixels
1151 *!_swrast_ReadPixels
1154 *!gpu::gles2::GLES2DecoderImpl::HandleReadPixels
1155 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1156 *!gpu::CommandParser::ProcessCommand
1157 *!gpu::GpuScheduler::PutChanged
1158 *!webkit::gpu::GLInProcessContext::PumpCommands
1163 *!_mesa_remove_extra_move_use
1164 *!_mesa_optimize_program
1166 *!_mesa_ir_link_shader
1167 *!_mesa_glsl_link_shader
1169 *!_mesa_LinkProgramARB
1172 *!gpu::gles2::GLES2DecoderImpl::DoLinkProgram*
1173 *!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram*
1174 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1175 *!gpu::CommandParser::ProcessCommand
1176 *!gpu::GpuScheduler::PutChanged
1177 *!webkit::gpu::GLInProcessContext::PumpCommands
1182 *!blink::WebVTTParser::constructTreeFromToken
1183 *!blink::WebVTTParser::createDocumentFragmentFromCueText
1184 *!blink::TextTrackCue::getCueAsHTML
1185 *!blink::TextTrackCue::updateDisplayTree
1186 *!blink::HTMLMediaElement::updateActiveTextTrackCues
1190 *!blink::HTMLInputElement::dataList
1191 *!blink::HTMLInputElement::list
1192 *!blink::RenderSliderContainer::layout
1193 *!blink::RenderBlock::layoutBlockChild
1194 *!blink::RenderBlock::layoutBlockChildren
1195 *!blink::RenderBlock::layoutBlock
1196 *!blink::RenderBlock::layout
1197 *!blink::RenderSlider::layout
1201 *!blink::HTMLInputElement::dataList
1202 *!blink::HTMLInputElement::list
1203 *!blink::RenderTheme::paintSliderTicks
1204 *!blink::RenderThemeChromiumLinux::paintSliderTrack
1205 *!blink::RenderTheme::paint
1206 *!blink::RenderBox::paintBoxDecorations
1207 *!blink::RenderBlock::paintObject
1212 *!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator<
1213 *!std::less<>::operator
1217 *!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
1221 *!WebTestRunner::WebTestProxyBase::didCreateDataSource
1222 *!WebTestRunner::WebTestProxy<>::didCreateDataSource
1223 *!blink::FrameLoaderClientImpl::createDocumentLoader
1224 *!blink::FrameLoader::init
1225 *!blink::Frame::init
1226 *!blink::WebFrameImpl::initializeAsMainFrame
1227 *!blink::WebViewImpl::initializeMainFrame
1228 *!TestShell::createNewWindow
1229 *!TestShell::createMainWindow
1230 *!TestShell::initialize
1234 *!WebTestRunner::TestRunner::reset
1235 *!WebTestRunner::TestInterfaces::resetAll
1236 *!WebTestRunner::WebTestInterfaces::resetAll
1237 *!TestShell::resetTestController
1242 *!v8::internal::ScavengeVisitor::ScavengePointer
1243 *!v8::internal::ScavengeVisitor::VisitPointers
1244 *!v8::internal::StandardFrame::IterateExpressions
1246 *!v8::internal::Heap::Scavenge
1247 *!v8::internal::Heap::PerformGarbageCollection*
1251 *!blink::ElementRuleCollector::collectMatchingRules
1252 *!blink::ElementRuleCollector::hasAnyMatchingRules
1256 *!blink::ElementRuleCollector::collectMatchingRules
1257 *!blink::StyleResolver::matchAuthorRules
1261 *!blink::ReplaceSelectionCommand::doApply
1262 *!blink::CompositeEditCommand::apply
1263 *!blink::applyCommand
1267 *!blink::::adjustAttributes
1268 *!blink::WebGLRenderingContext::maybeRestoreContext
1269 *!blink::Timer<>::fired
1270 *!blink::ThreadTimers::sharedTimerFiredInternal
1271 *!blink::ThreadTimers::sharedTimerFired
1272 *!content::BlinkPlatformImpl::DoTimeout
1276 *!GrGradientEffect::onIsEqual
1278 *!GrEffectStage::DeferredStage::isEqual
1279 *!GrDrawState::DeferredState::isEqual
1280 *!GrInOrderDrawBuffer::needsNewState
1281 *!GrInOrderDrawBuffer::onDraw
1282 *!GrDrawTarget::drawIndexedInstances
1283 *!GrTextContext::flushGlyphs
1287 *!blink::AudioContext::scheduleNodeDeletion
1288 *!blink::AudioContext::handlePostRenderTasks
1289 *!blink::AudioDestinationNode::render
1290 *!blink::OfflineAudioDestinationNode::offlineRender
1294 *!base::MD5DigestToBase16
1295 *!content::WebKitTestRunner::CaptureDumpPixels
1300 *!blink::TypeConversionsV8Internal*AttributeGetter*
1304 *!GrConfigConversionEffect::TestForPreservingPMConversions
1305 *!::test_pm_conversions
1306 *!GrContext::createPMToUPMEffect
1307 *!GrContext::readRenderTargetPixels
1308 *!SkGpuDevice::onReadPixels
1309 *!SkBaseDevice::readPixels
1310 *!SkCanvas::readPixels
1311 *!DeferredDevice::onReadPixels
1312 *!SkBaseDevice::readPixels
1313 *!SkCanvas::readPixels
1314 *!blink::GraphicsContext::readPixels
1316 *!blink::ImageBuffer::getUnmultipliedImageData
1317 *!blink::CanvasRenderingContext2D::getImageData
1318 *!blink::CanvasRenderingContext2D::getImageData
1319 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethod
1320 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback
1321 *!v8::internal::FunctionCallbackArguments::Call
1322 *!v8::internal::HandleApiCallHelper<>
1326 *!WebTestRunner::EventSender::reset
1327 *!WebTestRunner::TestInterfaces::resetTestHelperControllers
1328 *!WebTestRunner::TestInterfaces::resetAll
1330 *!content::ShellRenderProcessObserver::WebKitInitialized
1331 *!content::RenderThreadImpl::EnsureWebKitInitialized
1332 *!content::RenderThreadImpl::OnCreateNewView
1334 ###############################################################
1335 # Real issues in Chromium
1338 name=http://crbug.com/32085
1340 chrome.dll!NotificationRegistrar::Add
1343 name=http://crbug.com/57266 (1)
1345 *!remoting::EncoderVp8::Encode
1348 name=http://crbug.com/57266 (2)
1353 name=http://crbug.com/70062
1357 *!InitSessionCacheLocks
1358 *!initSessionCacheLocksLazily
1360 *!ssl_InitSessionCacheLocks
1363 *!ssl2_BeginClientHandshake
1364 *!ssl_Do1stHandshake
1365 *!SSL_ForceHandshake
1366 *!net::SSL*SocketNSS::DoHandshake
1367 *!net::SSL*SocketNSS::DoHandshakeLoop
1370 name=http://crbug.com/74417 a
1371 *!replace_operator_new
1372 *!disk_cache::BackendImpl::CreateEntryImpl
1375 name=http://crbug.com/74417 b
1376 *!replace_operator_new
1377 *!disk_cache::BackendImpl::NewEntry
1379 # One more disk_cache::BackendImpl leak. See also http://crbug.com/87500.
1381 name=http://crbug.com/74417 c
1382 *!replace_operator_new
1384 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
1387 name=http://crbug.com/75247
1389 *!replace_operator_new
1390 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
1393 name=http://crbug.com/78784
1396 *!TestingProfile::CreateRequestContext
1397 *!*ProfileSyncService*::SetUp
1400 name=http://crbug.com/80550 (1)
1402 *!RenderWidgetHost::WasHidden
1405 name=http://crbug.com/80550 (2)
1407 *!RenderWidgetHost::WasRestored
1410 name=http://crbug.com/87612
1412 *!SSL_ConfigSecureServer
1413 *!net::SSLServerSocketNSS::InitializeSSLOptions
1414 *!net::SSLServerSocketNSS::Handshake
1417 name=http://crbug.com/88640
1420 *!ProfileImpl::InitRegisteredProtocolHandlers
1421 *!ProfileImpl::DoFinalInit
1422 *!ProfileImpl::OnPrefsLoaded
1425 name=http://crbug.com/91465
1428 *!browser_sync::internal::WeakHandleCore<>::*
1429 *!browser_sync::WeakHandle<>::*
1430 *!syncer::SyncManager::SyncInternal::Init
1433 name=http://crbug.com/91491
1435 *!CrxUpdateService::ProcessPendingItems
1438 name=http://crbug.com/92026 (1)
1439 softokn3.dll!FC_GetFunctionList
1441 softokn3.dll!NSC_ModuleDBFunc
1444 name=http://crbug.com/92026 (2)
1445 freebl3.dll!FREEBL_GetVector
1447 softokn3.dll!NSC_ModuleDBFunc
1449 # Possible real Chromium issue in DoCrossfade.
1451 name=http://crbug.com/110049
1452 *!media::DoCrossfade<>
1454 *!media::AudioRendererAlgorithmBase::FillBuffer
1456 # Known sqlite3 leaks.
1458 name=http://crbug.com/113847 (1)
1467 name=http://crbug.com/113847 (2)
1473 name=http://crbug.com/115328
1475 *!GenericInfoViewTest_GenericInfoView_Test::TestBody
1477 # IE frame possible leak of COM object.
1479 name=http://crbug.com/122399
1481 ole32.dll!CoTaskMemAlloc
1483 urlmon.dll!CreateUri
1486 # RenderWidgetHelper leak in DelayProfileDestruction test.
1488 name=http://crbug.com/125565
1491 *!RenderProcessHostImpl::RenderProcessHostImpl
1492 *!SiteInstanceImpl::GetProcess
1493 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
1496 name=http://crbug.com/125807
1499 *!TransportSecurityPersister::TransportSecurityPersister
1500 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest
1504 *!media::ConvertYUVToRGB32_C
1505 *!media::LinearScaleYUVToRGB32RowWithRange_C
1506 *!media::ScaleYUVToRGB32WithRect
1511 osmesa.dll!INTERP_4F
1512 osmesa.dll!_tnl_generic_interp
1517 *!*::ThreadState::visitStack
1521 blink_web.dll!blink::RenderBlock::computeInlinePreferredLogicalWidths
1526 blink_web.dll!blink::MediaQueryExp::create
1527 blink_web.dll!blink::BisonCSSParser::createFloatingMediaQueryExp
1528 blink_web.dll!cssyyparse
1532 blink_web.dll!blink::BisonCSSParser::parseFlex
1533 blink_web.dll!blink::BisonCSSParser::parseValue
1534 blink_web.dll!cssyyparse
1536 UNADDRESSABLE ACCESS
1538 blink_web.dll!blink::Node::getFlag
1539 blink_web.dll!blink::Node::inDocument
1540 blink_web.dll!blink::Node::isDescendantOf
1541 blink_web.dll!blink::CompositeEditCommand::cloneParagraphUnderNewElement
1542 blink_web.dll!blink::CompositeEditCommand::moveParagraphWithClones
1546 blink_web.dll!blink::Editor::canSmartReplaceWithPasteboard
1547 blink_web.dll!blink::Editor::pasteAsPlainTextWithPasteboard
1548 blink_web.dll!blink::Editor::pasteAsPlainText
1549 blink_web.dll!blink::executePasteAndMatchStyle
1550 blink_web.dll!blink::Editor::Command::execute
1551 blink_web.dll!blink::Document::execCommand
1557 content.dll!content::BrowserAccessibilityManagerWin::*
1561 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB*
1562 # variety) that it's a performance hit. We avoid that by requesting
1563 # whole-module suppression
1564 # (see https://github.com/DynamoRIO/drmemory/issues/1529).
1566 name=bug_347967_all_osmesa
1571 osmesa.dll!unpack_RGB*888
1572 osmesa.dll!_mesa_unpack_rgba_row
1573 osmesa.dll!slow_read_rgba_pixels
1574 osmesa.dll!read_rgba_pixels
1575 osmesa.dll!_mesa_readpixels
1577 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
1578 gpu.dll!gpu::CommandParser::ProcessCommand
1579 gpu.dll!gpu::GpuScheduler::PutChanged
1582 name=bug_347967,bug_348357
1583 osmesa.dll!clip_span
1584 osmesa.dll!_swrast_write_rgba_span
1585 osmesa.dll!general_triangle
1587 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements
1588 gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements
1589 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
1590 gpu.dll!gpu::CommandParser::ProcessCommand
1595 skia.dll!SkA8_Shader_Blitter::blitH
1596 skia.dll!SkBlitter::blitRect
1598 skia.dll!SkScan::FillIRect
1600 skia.dll!SkDraw::drawRect
1601 skia.dll!SkDraw::drawBitmap
1602 skia.dll!SkBitmapDevice::drawBitmap
1603 skia.dll!SkCanvas::internalDrawBitmap
1604 skia.dll!SkCanvas::drawBitmap
1605 content.dll!content::ScreenshotData::EncodeOnWorker
1609 blink_web.dll!blink::RenderLayerCompositor::updateIfNeeded
1610 blink_web.dll!blink::RenderLayerCompositor::updateIfNeededRecursive
1611 blink_web.dll!blink::FrameView::updateLayoutAndStyleForPainting
1612 blink_web.dll!blink::PageAnimator::updateLayoutAndStyleForPainting
1616 *!device::BluetoothAdapterWin::AdapterStateChanged
1622 net_with_v8.dll!net::ProxyResolverV8::Context::*
1626 *!CLD2::UTF8GenericReplaceInternal
1627 *!CLD2::UTF8GenericReplace
1628 *!CLD2::ScriptScanner::LowerScriptSpan
1629 *!CLD2::ScriptScanner::GetOneScriptSpanLower
1630 *!CLD2::DetectLanguageSummaryV2
1631 *!CLD2::DetectLanguageSummary
1641 *!blink::RenderLayerClipper::updateClipRects
1642 *!blink::RenderLayerClipper::parentClipRects
1643 *!blink::RenderLayerClipper::backgroundClipRect
1647 system call NtCreateEvent
1648 KERNELBASE.dll!CreateEventExW
1649 KERNELBASE.dll!CreateEventW
1650 base.dll!base::WaitableEvent::WaitableEvent
1651 gpu.dll!gpu::InProcessCommandBuffer::Initialize
1652 gl_in_process_context.dll!gpu::`anonymous namespace'::GLInProcessContextImpl::Initialize
1653 gl_in_process_context.dll!gpu::GLInProcessContext::CreateContext
1657 *!content::GamepadProvider::PadState::Match
1658 *!content::GamepadProvider::DoPoll
1662 media.dll!ConvertYUVToRGB32Row_SSE
1663 media.dll!media::ConvertYUVToRGB32_SSE
1664 media.dll!media::ConvertVideoFrameToBitmap
1665 media.dll!media::SkCanvasVideoRenderer::Paint
1666 cc.dll!cc::VideoResourceUpdater::CreateForSoftwarePlanes
1667 cc.dll!cc::VideoResourceUpdater::CreateExternalResourcesFromVideoFrame
1668 cc.dll!cc::VideoLayerImpl::WillDraw
1672 content.dll!webrtc::PeerConnection::DoInitialize
1673 content.dll!webrtc::PeerConnection::Initialize
1674 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection_s
1675 content.dll!webrtc::PeerConnectionFactory::OnMessage
1676 content.dll!jingle_glue::JingleThreadWrapper::Send
1677 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection
1678 content.dll!webrtc::PeerConnectionFactoryInterface::CreatePeerConnection
1680 # This suppression is deliberately general, as bugs reported in
1681 # ProcessOutgoingMessages are difficult to track down until we
1682 # get our annotations in place.
1683 # TODO(bruening): add annotations once we have the infrastructure.
1686 system call NtWriteFile parameter #5
1687 KERNELBASE.dll!WriteFile
1688 KERNEL32.dll!WriteFile*
1689 *!IPC::Channel*::ProcessOutgoingMessages
1693 *!content::*::NotifyPluginProcessHostHelper
1697 *!testing::internal::CmpHelperEQ<>
1699 *!content::BrowserPluginTest_ResizeFlowControl_Test::TestBody
1703 *!ui::NativeThemeWin::PaintScrollbarTrack
1704 *!ui::NativeThemeWin::PaintDirect
1710 *!HunspellEngine::FillSuggestionList
1711 *!SpellcheckLanguage::SpellCheckWord
1712 *!SpellCheck::SpellCheckWord
1716 *!blink::WebEmbeddedWorkerImpl::startWorkerContext
1717 *!content::EmbeddedWorkerDispatcher::OnStartWorker
1718 *!EmbeddedWorkerMsg_StartWorker::Dispatch<>
1720 UNADDRESSABLE ACCESS
1722 content.dll!crypto_kernel_do_load_cipher_type
1723 content.dll!crypto_kernel_load_cipher_type
1724 content.dll!crypto_kernel_init
1725 content.dll!cricket::SrtpSession::SetKey
1726 content.dll!cricket::SrtpSession::SetSend
1727 content.dll!cricket::SrtpFilter::SetRtpParams
1728 content.dll!cricket::BaseChannel::SetupDtlsSrtp
1729 content.dll!cricket::BaseChannel::ChannelWritable_w
1730 content.dll!cricket::BaseChannel::OnWritableState
1734 system call NtCreateFile parameter #9
1735 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1737 UNADDRESSABLE ACCESS
1740 wtf.dll!WTF::PlatformCondition::timedWait
1744 blink_web.dll!blink::InputMethodController::extendSelectionAndDelete
1745 blink_web.dll!blink::WebLocalFrameImpl::extendSelectionAndDelete
1746 content.dll!content::RenderFrameImpl::OnExtendSelectionAndDelete
1747 *!content::RenderViewImplTest_OnExtendSelectionAndDelete_Test::TestBody
1748 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1752 system call NtWriteFile parameter #5
1753 KERNELBASE.dll!WriteFile
1754 KERNEL32.dll!WriteFile
1755 mojo_system_impl.dll!mojo::system::`anonymous namespace'::RawChannelWin::WriteNoLock
1759 skia.dll!S32A_Opaque_BlitRow32_SSE4
1763 system call NtCreateSemaphore
1764 KERNELBASE.dll!CreateSemaphoreExW
1766 v8.dll!v8::internal::SweeperThread::SweeperThread
1768 blink_web.dll!blink::WorkerScriptController::WorkerScriptController
1769 blink_web.dll!blink::WorkerGlobalScope::WorkerGlobalScope
1770 blink_web.dll!blink::ServiceWorkerGlobalScope::ServiceWorkerGlobalScope
1775 system call NtCreateTimer
1776 KERNELBASE.dll!CreateWaitableTimerExW
1777 KERNEL32.dll!CreateWaitableTimerW
1778 content.dll!rtc::Timing::Timing
1779 content.dll!content::RenderProcessHostImpl::CreateMessageFilters
1780 content.dll!content::RenderProcessHostImpl::Init
1782 content.dll!content::NavigationControllerImpl::LoadEntry
1786 pdf.dll!chrome_pdf::PDFiumEngine::OnMouseMove
1787 pdf.dll!chrome_pdf::PDFiumEngine::HandleEvent
1788 pdf.dll!chrome_pdf::OutOfProcessInstance::HandleInputEvent
1789 pdf.dll!pp::InputEvent_HandleEvent
1790 ppapi_proxy.dll!ppapi::CallWhileUnlocked<>
1791 ppapi_proxy.dll!ppapi::proxy::PPP_InputEvent_Proxy::OnMsgHandleFilteredInputEvent
1793 UNADDRESSABLE ACCESS
1796 *!ash::test::ShelfViewTest_CheckDragAndDropFromOverflowBubbleToShelf_Test::TestBody
1800 system call NtCreateFile parameter #9
1802 content.dll!content::AppCacheStorageImpl::DatabaseTask::CallRun
1804 UNADDRESSABLE ACCESS
1806 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
1807 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
1808 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1810 UNADDRESSABLE ACCESS
1812 views.dll!base::ObserverListBase<>::RemoveObserver
1813 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
1814 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1816 UNADDRESSABLE ACCESS
1818 *!ash::test::ShelfViewTestAPI::GetPreferredSize
1819 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
1820 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1822 UNADDRESSABLE ACCESS
1824 *!testing::internal::CmpHelperNE<>
1825 *!extensions::WebrtcAudioPrivateTest_GetAndSetWithMediaStream_Test::RunTestOnMainThread
1829 *!std::char_traits<>::compare
1831 *!*::*URLRequest*::TestBody
1836 *!encode_nonrd_sb_row
1841 blink_platform.dll!blink::Heap::RegionTree::lookup
1842 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1845 name=https://crbug.com/480741
1846 system call NtDuplicateObject
1847 KERNELBASE.dll!DuplicateHandle
1848 KERNEL32.dll!DuplicateHandle
1849 base.dll!base::SharedMemory::ShareToProcessCommon
1850 gl_wrapper.dll!gfx::GLImageSharedMemory::Initialize
1851 content.dll!content::GpuChannel::CreateImageForGpuMemoryBuffer
1852 content.dll!content::GpuCommandBufferStub::OnCreateImage
1855 name=https://crbug.com/481305
1856 system call NtCreateSection
1857 KERNELBASE.dll!CreateFileMappingW
1858 base.dll!base::SharedMemory::Create
1859 base.dll!base::SharedMemory::CreateAnonymous
1860 content.dll!content::ChildThreadImpl::AllocateSharedMemory
1861 content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
1862 content.dll!content::RenderThreadImpl::AllocateSharedMemory
1864 content.dll!content::WebGraphicsContext3DCommandBufferImpl::CreateContext
1867 name=https://crbug.com/489779
1868 system call NtUserCreateWindowEx
1869 USER32.dll!UnregisterClassW
1870 USER32.dll!UnregisterClassW
1871 USER32.dll!CreateWindowExW
1872 gfx.dll!gfx::WindowImpl::Init
1873 win_window.dll!ui::WinWindow::WinWindow
1874 aura.dll!aura::WindowTreeHostWin::WindowTreeHostWin
1875 aura.dll!aura::WindowTreeHost::Create
1879 *!blink::CSSPropertyParser::validUnit
1881 *!blink::CSSPropertyParser::parseValue
1882 *!blink::CSSPropertyParser::parseValue
1883 *!blink::CSSParserImpl::consumeDeclarationValue
1884 *!blink::CSSParserImpl::consumeDeclaration
1885 *!blink::CSSParserImpl::consumeDeclarationList
1886 *!blink::CSSParserImpl::consumeStyleRule
1887 *!blink::CSSParserImpl::consumeQualifiedRule
1888 *!blink::CSSParserImpl::consumeRuleList<>
1889 *!blink::CSSParserImpl::parseStyleSheet
1890 *!blink::CSSParser::parseSheet
1891 *!blink::StyleSheetContents::parseStringAtPosition
1892 *!blink::StyleEngine::parseSheet
1893 *!blink::StyleEngine::createSheet
1894 *!blink::StyleElement::createSheet
1895 *!blink::StyleElement::process
1899 system call NtWriteFile parameter #5
1900 KERNELBASE.dll!WriteFile
1901 KERNEL32.dll!WriteFile
1902 *!base::File::WriteAtCurrentPos
1903 *!sessions::SessionBackend::AppendCommandsToFile
1904 *!sessions::SessionBackend::AppendCommands
1905 *!base::internal::RunnableAdapter<>::Run
1907 UNADDRESSABLE ACCESS
1909 webcore_shared.dll!blink::FocusController::focusedOrMainFrame
1910 content.dll!content::RenderWidget::GetSelectionBounds
1911 content.dll!content::RenderWidget::UpdateSelectionBounds
1912 content.dll!content::RenderWidget::WillBeginCompositorFrame
1913 cc.dll!base::internal::InvokeHelper<>::MakeItSo
1914 cc.dll!base::internal::Invoker<>::Run
1916 UNADDRESSABLE ACCESS
1918 drmemorylib.dll!replace_memmove
1919 base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
1920 base.dll!base::trace_event::TraceEventSystemStatsMonitor::~TraceEventSystemStatsMonitor
1921 content.dll!content::BrowserMainLoop::ShutdownThreadsAndCleanUp
1922 content.dll!content::BrowserMainRunnerImpl::Shutdown
1923 content.dll!content::BrowserMain
1924 content.dll!content::RunNamedProcessTypeMain
1925 content.dll!content::ContentMainRunnerImpl::Run
1926 content.dll!content::ContentMain
1927 *!content::BrowserTestBase::SetUp
1928 *!InProcessBrowserTest::SetUp
1929 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1933 base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
1934 content.dll!content::V8SamplingProfiler::~V8SamplingProfiler
1935 content.dll!content::RenderThreadImpl::~RenderThreadImpl
1936 content.dll!content::RenderThreadImpl::`vector deleting destructor'
1937 content.dll!content::ChildProcess::~ChildProcess
1938 content.dll!content::RenderProcessImpl::`scalar deleting destructor'
1939 content.dll!content::InProcessRendererThread::CleanUp
1940 base.dll!base::`anonymous namespace'::ThreadFunc
1941 KERNEL32.dll!BaseThreadInitThunk
1943 UNADDRESSABLE ACCESS
1945 base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
1946 content.dll!content::V8SamplingProfiler::~V8SamplingProfiler
1947 content.dll!content::RenderThreadImpl::~RenderThreadImpl
1948 content.dll!content::RenderThreadImpl::`vector deleting destructor'
1949 content.dll!content::ChildProcess::~ChildProcess
1950 content.dll!content::RenderProcessImpl::`scalar deleting destructor'
1951 content.dll!content::InProcessRendererThread::CleanUp
1952 base.dll!base::`anonymous namespace'::ThreadFunc
1953 KERNEL32.dll!BaseThreadInitThunk
1955 UNADDRESSABLE ACCESS
1957 base.dll!std::vector<>::push_back
1958 base.dll!base::trace_event::TraceLog::AddEnabledStateObserver
1959 base.dll!base::trace_event::MemoryDumpManager::Initialize
1960 content.dll!content::ChildThreadImpl::Init
1961 content.dll!content::ChildThreadImpl::ChildThreadImpl
1962 content.dll!content::RenderThreadImpl::RenderThreadImpl
1963 content.dll!content::InProcessRendererThread::Init
1964 base.dll!base::`anonymous namespace'::ThreadFunc
1965 KERNEL32.dll!BaseThreadInitThunk
1967 UNADDRESSABLE ACCESS
1969 base.dll!std::vector<>::push_back
1970 base.dll!base::trace_event::TraceLog::AddEnabledStateObserver
1971 content.dll!content::V8SamplingProfiler::V8SamplingProfiler
1972 content.dll!content::RenderThreadImpl::EnsureWebKitInitialized
1973 content.dll!content::RenderThreadImpl::OnCreateNewView
1974 content.dll!ViewMsg_New::Dispatch<>
1975 content.dll!content::RenderThreadImpl::OnControlMessageReceived
1976 content.dll!content::ChildThreadImpl::OnMessageReceived
1977 ipc.dll!IPC::ChannelProxy::Context::OnDispatchMessage
1978 ipc.dll!base::internal::Invoker<>::Run
1979 base.dll!base::debug::TaskAnnotator::RunTask
1980 scheduler.dll!scheduler::TaskQueueManager::ProcessTaskFromWorkQueue
1981 scheduler.dll!scheduler::TaskQueueManager::DoWork
1982 scheduler.dll!base::internal::Invoker<>::Run
1983 base.dll!base::debug::TaskAnnotator::RunTask
1984 base.dll!base::MessageLoop::RunTask
1985 base.dll!base::MessageLoop::DeferOrRunPendingTask
1986 base.dll!base::MessageLoop::DoWork
1987 base.dll!base::MessagePumpForUI::DoRunLoop
1988 base.dll!base::MessagePumpWin::Run
1989 base.dll!base::MessageLoop::RunHandler
1990 base.dll!base::MessageLoop::Run
1991 base.dll!base::Thread::Run
1992 base.dll!base::Thread::ThreadMain
1993 base.dll!base::`anonymous namespace'::ThreadFunc
1994 KERNEL32.dll!BaseThreadInitThunk
1998 MSVCR120.dll!mbtowc_l
1999 MSVCR120.dll!fputwc_nolock
2000 MSVCR120.dll!vsnwprintf_s_l
2001 MSVCR120.dll!vsnwprintf_s
2002 *!base::`anonymous namespace'::StringAppendVT<>
2003 *!base::StringPrintf
2004 *!content::AccessibilityTreeFormatter::ToString
2005 *!content::AccessibilityTreeFormatter::RecursiveFormatAccessibilityTree