# This file contains suppressions for the Dr.Memory tool, see # http://dev.chromium.org/developers/how-tos/using-drmemory # # This file should contain suppressions only for the reports happening # in the 'full' mode (drmemory_full). # For the reports that can happen in the light mode (a.k.a. drmemory_light), # please use suppressions.txt instead. ############################################################### # Known reports on the third party we have no control over. UNINITIALIZED READ name=deflate UNINIT ... *!deflate_* *!MOZ_Z_deflate # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=406 ADVAPI32.dll!WmiOpenBlock ADVAPI32.dll!WmiOpenBlock # Leaks inside GoogleDesktop - it injects into our processes for some reason LEAK name=GoogleDesktop LEAK ... GoogleDesktopNetwork3.DLL!DllUnregisterServer # They deliberately use uninit local var in sqlite random generator UNINITIALIZED READ name=sqlite3_randomness UNINIT *!randomByte *!sqlite3_randomness # Intentional leak in WebKit Template Framework for ThreadData. LEAK name=intentional WTF ThreadData leak ... *!WTF::wtfThreadData # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT. LEAK name=http://crbug.com/125558 a KERNELBASE.dll!LocalAlloc SECHOST.dll!... SECHOST.dll!NotifyServiceStatusChange WINHTTP.dll!... WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl *!net::ProxyResolverWinHttp::GetProxyForURL # Tiny locale-related leaks in ntdll. Probably system bug. LEAK name=http://crbug.com/125558 b ntdll.dll!... ntdll.dll!* KERNELBASE.dll!... KERNELBASE.dll!GetCPInfoExW webio.dll!* webio.dll!* webio.dll!* WINHTTP.dll!... WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser *!net::ProxyConfigServiceWin::GetCurrentProxyConfig ############################################################### # Suppress some false reports due to bugs in Dr.Memory like wrong analysis # assumptions or unhandled syscalls # Please note: the following suppressions were written in the abscense of # private symbols so may need to be updated when we switch to auto-loading PDBs UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (1) ntdll.dll!Rtl* ntdll.dll!Rtl* ntdll.dll!RtlFindActivationContextSectionString UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (2) ... SHELL32.dll!SHFileOperation* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (3) ... SHELL32.dll!SHGetFolderPath* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=12 (4) ... SHELL32.dll!SHGetFolderPath* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (5) ... SHELL32.dll!SHCreateDirectory* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (6) ... SHELL32.dll!ILLoadFromStream* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (7) ... SHELL32.dll!ILSaveToStream* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=12 (8) ... SHELL32.dll!SHFileOperation* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=12 (9) ... SHELL32.dll!SHGetItemFromDataObject LEAK name=http://code.google.com/p/drmemory/issues/detail?id=12 (10) ... SHELL32.dll!SHGetItemFromDataObject LEAK name=http://code.google.com/p/drmemory/issues/detail?id=12 (11) ... ole32.dll!* SHELL32.dll!SHChangeNotifySuspendResume UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=14 (1) ... *!CreateProcess* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=14 (2) ... *!CreateProcess* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=14 (3) ... *!base::LaunchApp* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=17 (1) ... *!CreateWindow* POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=17 (2) GDI32.dll!* GDI32.dll!CreateFontIndirectExW GDI32.dll!CreateFontIndirectW LEAK name=http://code.google.com/p/drmemory/issues/detail?id=17 (3) KERNELBASE.dll!LocalAlloc ... USER32.dll!CreateWindow* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=18 a ... *!CoInitialize* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=18 b ... *!CoCreateInstance* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=18 c ... *!CoUninitialize* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=18 d ... UxTheme.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=40 a ... WINSPOOL.DRV!* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=40 b ... WINSPOOL.DRV!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=48 a system call NtContinue ... *!*SetThreadName UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=48 b system call NtContinue *!WTF::initializeCurrentThreadInternal UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=52 a ... DBGHELP.dll!SymInitialize UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=52 b ... DBGHELP.dll!SymEnumSourceFiles UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=52 c ... msvcrt.dll!_RTDynamicCast UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp instruction=test 0x*(%*) $0x?? DBGHELP.dll!SymUnloadModule64 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=53 ADVAPI32.dll!WmiMofEnumerateResourcesA ADVAPI32.dll!WmiMofEnumerateResourcesA ADVAPI32.dll!Sta*TraceW UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=58 ... *!_cfltcvt_l UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=60 USP10.dll!* ... USP10.dll!ScriptStringAnalyse LEAK IMM32.dll!ImmGetIMCCSize IMM32.dll!ImmLockClientImc IMM32.dll!ImmDisableIME IMM32.dll!ImmSetActiveContext USER32.dll!IMPSetIMEA UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=65 a ... *!SystemFunction036 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=65 b ... *!talk_base::CreateRandomString UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=68 a ... WS2_32.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=68 b ... ADVAPI32.dll!SetSecurityDescriptorDacl UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=68 c ... MSWSOCK.dll!WSPStartup UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=68 d ... ntdll.dll!RtlValidateUnicodeString LEAK name=http://code.google.com/p/drmemory/issues/detail?id=256 *!_mtinit *!__tmainCRTStartup *!mainCRTStartup POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=274 a ... GDI32.dll!CreateDCW LEAK name=http://code.google.com/p/drmemory/issues/detail?id=274 b ... GDI32.dll!CreateDCW LEAK name=http://code.google.com/p/drmemory/issues/detail?id=275 ... *!_getptd* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=276 ... ntdll.dll!RtlConvertUlongToLargeInteger ntdll.dll!RtlConvertUlongToLargeInteger ntdll.dll!KiUserExceptionDispatcher LEAK name=http://code.google.com/p/drmemory/issues/detail?id=305 *!free *!free *!operator new ... *!MiniDumpWriteDump UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=346 a ... GDI32.dll!CloseEnhMetaFile UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=346 b GDI32.dll!SetPolyFillMode GDI32.dll!CreateICW UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=362 USER32.dll!UnregisterClass* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=382 ... ntdll.dll!CsrNewThread UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=397 system call NtDeviceIoControlFile InputBuffer ADVAPI32.dll!ImpersonateAnonymousToken UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=407 a system call NtRequestWaitReplyPort RPCRT4.dll!I_RpcSendReceive RPCRT4.dll!NdrSendReceive UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=407 b IMM32.dll!* ntdll.dll!LdrInitializeThunk ntdll.dll!LdrShutdownThread UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 a ADVAPI32.dll!RegDeleteValue* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 b ... ADVAPI32.dll!Crypt* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 c ... RPCRT4.dll!NdrClientCall2 LEAK name=http://code.google.com/p/drmemory/issues/detail?id=412 d RSAENH.dll!DllUnregisterServer ... ADVAPI32.dll!CryptAcquireContextA CRYPT32.dll!CryptEnumOIDFunction ... CRYPT32.dll!CertFindCertificateInStore UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 e ... RSAENH.dll!CPGenRandom UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 f ... CRYPT??.dll!Crypt* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 g *!replace_memcmp ... *!testing::internal::CmpHelperEQ* ... *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't # have frame pointers, and we have trouble unwinding from it. Therefore, we use # this broad suppression, effectively disabling uninit checks in rsaenh.dll. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=412 h RSAENH.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=425 a CLBCatQ.DLL!DestroyStgDatabase CLBCatQ.DLL!PostError CLBCatQ.DLL!PostError LEAK name=http://code.google.com/p/drmemory/issues/detail?id=425 b RPCRT4.dll!I_RpcBCacheFree RPCRT4.dll!I_RpcBCacheFree ... RPCRT4.dll!NdrClientCall2 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=425 c msdmo.dll!* msdmo.dll!* DEVENUM.DLL!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=435 a ... ntdll.dll!RtlSetSecurityObject ntdll.dll!RtlNewSecurityObjectEx ADVAPI32.dll!CreatePrivateObjectSecurityEx NTMARTA.dll!AccRewriteSetNamedRights POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=435 b WLDAP32.dll!Ordinal325 ... WLDAP32.dll!Ordinal325 ntdll.dll!LdrInitializeThunk ntdll.dll!LdrFindResourceDirectory_U ntdll.dll!RtlValidateUnicodeString ntdll.dll!LdrLoadDll KERNEL32.dll!LoadLibraryExW # mod+offs suppression because the symbolic makes no sense and changes # completely in the presence of WS2_32.dll symbols. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=438 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=454 a ... WINMM.dll!wave*GetNumDevs LEAK name=http://code.google.com/p/drmemory/issues/detail?id=454 b ... WINMM.dll!wave*GetNumDevs LEAK name=http://code.google.com/p/drmemory/issues/detail?id=466 ntdll.dll!RtlRunOnceBeginInitialize ntdll.dll!RtlInitializeCriticalSectionAndSpinCount UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=471 a *!media::AudioRendererAlgorithmOLA::Crossfade *!media::AudioRendererAlgorithmOLA::FillBuffer *!media::AudioRendererAlgorithmOLATest_FillBuffer_* # Uninit reported in copy ctor. Would be nice if we could specify which ctor # overload to suppress. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=471 b *!WebCore::FormDataElement::FormDataElement # Another default copy ctor uninit. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=471 c *!WebCore::CachedResourceLoader::InitiatorInfo::InitiatorInfo ... *!WTF::Hash* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=473 a system call NtDeviceIoControlFile InputBuffer ... iphlpapi.dll!GetAdaptersAddresses POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=473 b ESENT.dll!* ESENT.dll!* ESENT.dll!* ntdll.dll!Ldr*Init* ntdll.dll!Ldr* ntdll.dll!* ntdll.dll!LdrLoadDll ... iphlpapi.dll!GetPerAdapterInfo ... iphlpapi.dll!GetAdaptersAddresses POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=473 c RPCRT4.dll!* RPCRT4.dll!* ... IPHLPAPI.DLL!GetAdaptersAddresses LEAK name=http://code.google.com/p/drmemory/issues/detail?id=475 ... ADVAPI32.dll!CryptAcquireContextA ... CRYPT32.dll!CryptMsgOpenToDecode ... CRYPT32.dll!CryptQueryObject # Lots of leaks from our interactions with the system certificate store. May be # worth reviewing our use of their API. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 a KERNEL*.dll!LocalAlloc ... CRYPT32.dll!CertGetCRLContextProperty LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 b KERNEL*.dll!LocalAlloc ... CRYPT32.dll!CertAddCRLContextToStore LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 c KERNEL*.dll!LocalAlloc ... CRYPT32.dll!CertOpenStore LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 d ... CRYPT32.dll!CertOpenSystemStore? LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 e ... CRYPT32.dll!CertGetCertificateChain LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 f ... CRYPT32.dll!CertCompareIntegerBlob LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 g ... CRYPT32.dll!CryptUnprotectData LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 h KERNEL*.dll!LocalAlloc ... CRYPT32.dll!CertEnumCertificatesInStore LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 i ... CRYPT32.dll!CryptProtectData LEAK name=http://code.google.com/p/drmemory/issues/detail?id=476 j ... CRYPT32.dll!CryptExportPublicKeyInfoEx UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=502 a system call NtSecureConnectPort parameter #3 GDI32.dll!* GDI32.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=502 b system call NtGdiEnumFonts parameter #6 GDI32.dll!* GDI32.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=511 a RPCRT4.dll!... ole32.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=511 b ole32.dll!* ole32.dll!* ole32.dll!StringFromGUID2 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=512 a ... *!browser_sync::Cryptographer::PackBootstrapToken *!browser_sync::Cryptographer::GetBootstrapToken UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=512 b ... *!Encrypt* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=513 a *!v8* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=513 b *!* *!v8* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=513 c ... *!v8* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=546 ... mscms.dll!* ... GDI32.dll!* *!IconUtil::Create*HICON* LEAK name=http://crbug.com/92152 ... USER32.dll!CreateWindowExW *!views::TooltipManagerWin::Init *!views::TooltipManagerWin::TooltipManagerWin UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=567 a dbghelp.dll!* ... dbghelp.dll!StackWalk64 LEAK name=http://code.google.com/p/drmemory/issues/detail?id=567 b *!* dbghelp.dll!* ... dbghelp.dll!StackWalk64 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too # brittle, so we switched to RPCRT4.dll!*. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=569 RPCRT4.dll!... ntdll.dll!* ntdll.dll!* KERNEL*.dll!BaseThreadInitThunk # TODO(timurrrr): investigate these UNINITIALIZED READ name=http://crbug.com/TODO a ... *!win_util::GetLogonSessionOnlyDACL UNINITIALIZED READ name=http://crbug.com/TODO b ... ntshrui.dll!IsPathSharedW UNINITIALIZED READ name=http://crbug.com/TODO c ... *!NetApiBufferFree UNINITIALIZED READ name=http://crbug.com/TODO d ... *!ShellExecute* UNINITIALIZED READ name=http://crbug.com/TODO e ... *!SHParseDisplayName UNINITIALIZED READ name=http://crbug.com/TODO f ... *!GetCanonicalPathInfo* UNINITIALIZED READ name=http://crbug.com/TODO g ... SHELL32.dll!Ordinal* UNINITIALIZED READ name=http://crbug.com/TODO h ... GDI32.dll!GetTextExtentPoint32* UNINITIALIZED READ name=http://crbug.com/TODO i ... *!SyncSocketClientListener::OnMsgClassResponse UNINITIALIZED READ name=http://crbug.com/TODO j ... *!*NSPRInitSingleton* UNINITIALIZED READ name=http://crbug.com/TODO k *!NdrSimpleStructFree UNINITIALIZED READ name=http://crbug.com/TODO l ntdll.dll!RtlpNtOpenKey ntdll.dll!RtlMakeSelfRelativeSD ntdll.dll!RtlAbsoluteToSelfRelativeSD ADVAPI32.dll!MakeSelfRelativeSD UNINITIALIZED READ name=http://crbug.com/TODO m ... CRYPT32.dll!I_CertSyncStore # This matches the same stack as DrMem i#751, but it's an uninit read instead of # a leak. Must be some early thread initialization. Doesn't look like # bit-level though. UNINITIALIZED READ name=http://crbug.com/TODO n RPCRT4.dll!* RPCRT4.dll!* RPCRT4.dll!* ntdll.dll!* ntdll.dll!* KERNEL*.dll!BaseThreadInitThunk # No idea where this is from, but Chrome isn't even on the stack. POSSIBLE LEAK name=http://crbug.com/TODO o RPCRT4.dll!... ole32.dll!OleInitialize ole32.dll!... KERNEL32.dll!BaseThreadInitThunk # Matches lots of RPC related leaks. So far RPC handles have been mostly owned # by system libraries and are not something we can fix easily. POSSIBLE LEAK name=http://crbug.com/TODO p RPCRT4.dll!* RPCRT4.dll!* RPCRT4.dll!NDRCContextBinding # No idea, but all system code, not interesting. POSSIBLE LEAK name=http://crbug.com/TODO q RPCRT4.dll!... RPCRT4.dll!* RPCRT4.dll!* ole32.dll!... ole32.dll!* ole32.dll!* ... SHELL32.dll!* LEAK name=http://crbug.com/109278 video device COM leaks ... *!media::VideoCaptureDevice::* LEAK name=http://crbug.com/109278 audio device COM leaks ... *!media::GetInputDeviceNamesWin # False pos uninit in shell32 when resolving links. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=745 SHELL*.dll!* ... SHELL*.dll!* *!file_util::ResolveShortcut # Probable false pos uninit in ffmpeg. Probably due to running off the end of a # buffer with SSE/MMX instructions whose results are then masked out later. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 a *!ff_pred4x4_vertical_vp8_mmxext UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 b *!ff_pred4x4_down_left_mmxext UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 c *!ff_vorbis_floor1_render_list UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 d *!ff_put_vp8_epel8_h6_ssse3 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 e *!ff_put_vp8_epel8_h4_ssse3 UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 f *!ff_fft_permute_sse UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=747 g *!ff_simple_idct_add_mmx # ffmpeg seems to leak a pthread condition variable. LEAK name=http://crbug.com/110042 *!ptw32_new *!pthread_self *!sem_wait *!pthread_cond_wait *!ff_thread_decode_frame *!avcodec_decode_video2 # Improperly handled ioctl in bcrypt. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=748 system call NtDeviceIoControlFile InputBuffer bcrypt.dll!BCryptUnregisterConfigChangeNotify bcrypt.dll!BCryptGetFipsAlgorithmMode ntdll.dll!RtlQueryEnvironmentVariable # Not sure what this is. POSSIBLE LEAK name=http://code.google.com/p/drmemory/issues/detail?id=749 ... fwpuclnt.dll!* ... RPCRT4.dll!* ... fwpuclnt.dll!* ... WS2_32.dll!* *!talk_base::SafeGetHostByName *!talk_base::SocketAddress::GetLocalIPs *!talk_base::SocketAddress::IsLocalIP *!cricket::Transport::VerifyCandidate *!cricket::Session::OnRemoteCandidates *!cricket::Session::OnTransportInfoMessage *!cricket::Session::OnIncomingMessage *!cricket::SessionManager::OnIncomingMessage # More uninit false pos in rpcrt4.dll not caught by default suppressions. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=529 RPCRT4.dll!* ... *!base::LaunchProcess # System leak from CreateEnvironmentBlock. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=757 ... USERENV.dll!CreateEnvironmentBlock # Looks like another instance of 753 LEAK name=http://code.google.com/p/drmemory/issues/detail?id=753 ... ntdll.dll!RtlLoadString # More bit manip fps UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=493 USP10.dll!ScriptPositionSingleGlyph # Various TLS leaks that we don't understand yet. We should be finding a root # for these. LEAK name=http://code.google.com/p/drmemory/issues/detail?id=778 a KERNELBASE.dll!TlsSetValue # Originally filed as: http://crbug.com/109281 LEAK name=http://code.google.com/p/drmemory/issues/detail?id=778 b *!operator new *!operator new[] *!*::ConstructTlsVector *!base::ThreadLocalStorage::StaticSlot::Get # This is an NSS PRThread object installed in TLS. Why isn't this detected as a # root? See also http://crbug.com/32624 LEAK name=http://code.google.com/p/drmemory/issues/detail?id=778 c *!PR_Calloc *!_PR_AttachThread *!_PRI_AttachThread # Bit-level fps in rich edit layer. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=791 RICHED20.dll!* RICHED20.dll!* # Already suppressed by drmemory default supp we don't have yet. LEAK name=i#757: RPC binding leaks in sspicli.dll RPCRT4.dll!* ... SspiCli.dll!* SspiCli.dll!Cre* # Async NtReadFile false positives. This was fixed in drmemory r772, remove # this supp when we pull that rev. UNADDRESSABLE ACCESS name=http://code.google.com/p/drmemory/issues/detail?id=798 system call NtReadFile parameter #5 KERNEL32.dll!ReadFile # Probable syscall false positive. UNADDRESSABLE ACCESS name=http://code.google.com/p/drmemory/issues/detail?id=809 system call NtGdiPolyPolyDraw parameter #1 *!gfx::Path::CreateNativeRegion # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces # coming out of this module (sometimes only one frame), which makes it hard to # write precise suppressions. Until we have bit-level tracking (DRMi#113) we # should keep this. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard RPCRT4.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=841 a ... CRYPTNET.dll!I_CryptNetGetConnectivity UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=841 b ... webio.dll!* UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=841 c ... winhttp.dll!* LEAK name=http://code.google.com/p/drmemory/issues/detail?id=841 d ... CRYPTNET.dll!I_CryptNetGetConnectivity # Often missing a ntdll.dll!KiUserCallbackDispatcher frame. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=810 instruction=test %edx %edx USER32.dll!GetClassLongW ... *!ui::CenterAndSizeWindow UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=815 KERNEL*.dll!... dxgi.dll!* USER32.dll!GetMonitorInfoA ntdll.dll!KiUserCallbackDispatcher dxgi.dll!* WinSATAPI.DLL!* # Suppress anything in cmd.exe. It's safer to suppress these than disable # following, since someone might launch a Chrome process via cmd.exe. LEAK name=cmd.exe ... cmd.exe!* # Possible true system use after free. UNADDRESSABLE ACCESS name=http://code.google.com/p/drmemory/issues/detail?id=623 KERNELBASE.dll!TlsGetValue OLEAUT32.dll!SysFreeString OLEAUT32.dll!SysAllocStringByteLen OLEACC.dll!* OLEACC.dll!* OLEACC.dll!* OLEACC.dll!* # basic_streambuf seems to leak something in creating a std::_Mutex LEAK name=http://code.google.com/p/drmemory/issues/detail?id=857 ntdll.dll!... ntdll.dll!RtlInitializeCriticalSection *!_Mtxinit *!std::_Mutex::_Mutex *!std::basic_streambuf<*> # stdext::hash_map<> seems to swap uninitialized floats. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=931 *!std::swap *!std::_Hash<* # syscall false positive on handling NtQuerySystemInformation, fix in soon. UNINITIALIZED READ name=http://code.google.com/p/drmemory/issues/detail?id=932 KERNEL32.dll!K32GetPerformanceInfo # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. LEAK name=GDI SetBrushOrgEx leak GDI32.dll!... GDI32.dll!GetTextMetricsW *!gfx::PlatformFontWin::CreateHFontRef *!gfx::PlatformFontWin::GetBaseFontRef ############################################################### # Benign issues in Chromium # This test intentionally leaks an object and checks that it's never deleted. LEAK name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak ... *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody LEAK name=deliberate histogram leak ... *!replace_operator_new ... *!*::*Histogram::FactoryGet LEAK name=deliberate LazyInstance leak ... *!*LeakyLazyInstance* ... *!base::LazyInstance*::Pointer LEAK name=http://crbug.com/79933 (1) ... *!TestURLRequestContext::Init LEAK name=http://crbug.com/79933 (2) ... *!TestURLRequestContext::TestURLRequestContext *!TestURLRequestContextGetter::GetURLRequestContext *!notifier::SingleLoginAttempt::SingleLoginAttempt *!notifier::Login::StartConnection *!syncer::InvalidationNotifier::UpdateCredentials *!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials LEAK name=http://crbug.com/79933 (3) ... *!TestURLRequestContext::TestURLRequestContext *!TestURLRequestContextGetter::GetURLRequestContext *!URLFetcher::Core::StartURLRequest LEAK name=http://crbug.com/79933 (4) *!generic_cpp_alloc *!operator new *!std::_Allocate *!std::allocator::allocate *!std::vector >::_Insert_n *!std::vector >::insert *!std::vector >::push_back *!ObserverListBase::AddObserver ... *!net::HttpNetworkSession::HttpNetworkSession *!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket *!notifier::XmppClientSocketFactory::CreateTransportClientSocket *!notifier::ChromeAsyncSocket::Connect *!buzz::XmppClient::ProcessStartXmppLogin *!buzz::XmppClient::Process *!talk_base::Task::Step *!talk_base::TaskRunner::InternalRunTasks *!talk_base::TaskRunner::RunTasks *!notifier::TaskPump::CheckAndRunTasks *!base::internal::RunnableAdapter::Run # Test intentionally leaks an object. LEAK name=http://crbug.com/86301 *!replace_operator_new ... *!*_DeadReplyLoopDoesNotDelete_Test::TestBody # Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it. LEAK name=Firefox 3 NSS dll leak nspr4.dll!* ... *!NSSDecryptor::~NSSDecryptor # We get uninit reports inside GMock when it prints the bytes of references to # partially initialized objects passed to unexpected method calls. UNINITIALIZED READ name=GMock printing uninit data ... *!testing::internal2::PrintBytesInObjectTo ############################################################### # Real issues in Chromium LEAK name=http://crbug.com/32085 ... chrome.dll!NotificationRegistrar::Add LEAK name=http://crbug.com/32623 ... *!ssl3_HandleHandshakeMessage *!ssl3_HandleHandshake *!ssl3_HandleRecord *!ssl3_GatherCompleteHandshake ... *!SSL_ForceHandshake *!net::SSLServerSocketNSS::DoHandshake *!net::SSLServerSocketNSS::DoHandshakeLoop UNINITIALIZED READ name=http://crbug.com/57266 (1) ... *!remoting::EncoderVp8::Encode UNINITIALIZED READ name=http://crbug.com/57266 (2) ... *!vp8_* LEAK name=http://crbug.com/70062 *!PR_Calloc *!PR_NewLock ... *!InitSessionCacheLocks *!initSessionCacheLocksLazily *!PR_CallOnce *!ssl_InitSessionCacheLocks *!lock_cache *!ssl_LookupSID *!ssl2_BeginClientHandshake *!ssl_Do1stHandshake *!SSL_ForceHandshake *!net::SSL*SocketNSS::DoHandshake *!net::SSL*SocketNSS::DoHandshakeLoop LEAK name=http://crbug.com/74417 a *!replace_operator_new *!disk_cache::BackendImpl::CreateEntryImpl LEAK name=http://crbug.com/74417 b *!replace_operator_new *!disk_cache::BackendImpl::NewEntry # One more disk_cache::BackendImpl leak. See also http://crbug.com/87500. LEAK name=http://crbug.com/74417 c *!replace_operator_new ... *!disk_cache::EntryImpl::UserBuffer::UserBuffer LEAK name=http://crbug.com/75247 ... *!replace_operator_new *!AutofillDownloadTestHelper::AutofillDownloadTestHelper LEAK name=http://crbug.com/78784 *!generic_cpp_alloc *!operator new *!TestingProfile::CreateRequestContext *!*ProfileSyncService*::SetUp LEAK name=http://crbug.com/80550 (1) ... *!RenderWidgetHost::WasHidden LEAK name=http://crbug.com/80550 (2) ... *!RenderWidgetHost::WasRestored LEAK name=http://crbug.com/87612 ... *!SSL_ConfigSecureServer *!net::SSLServerSocketNSS::InitializeSSLOptions *!net::SSLServerSocketNSS::Handshake LEAK name=http://crbug.com/88640 *!generic_cpp_alloc *!operator new *!ProfileImpl::InitRegisteredProtocolHandlers *!ProfileImpl::DoFinalInit *!ProfileImpl::OnPrefsLoaded LEAK name=http://crbug.com/91465 *!generic_cpp_alloc *!operator new *!browser_sync::internal::WeakHandleCore::* *!browser_sync::WeakHandle::* *!syncer::SyncManager::SyncInternal::Init LEAK name=http://crbug.com/91491 ... *!CrxUpdateService::ProcessPendingItems UNINITIALIZED READ name=http://crbug.com/92026 (1) softokn3.dll!FC_GetFunctionList ... softokn3.dll!NSC_ModuleDBFunc UNINITIALIZED READ name=http://crbug.com/92026 (2) freebl3.dll!FREEBL_GetVector ... softokn3.dll!NSC_ModuleDBFunc LEAK name=http://crbug.com/92166 ... *!replace_operator_new *!views::NativeWidgetWin::OnCreate # Possible real Chromium issue in DoCrossfade. UNINITIALIZED READ name=http://crbug.com/110049 *!media::DoCrossfade<*> *!media::Crossfade *!media::AudioRendererAlgorithmBase::FillBuffer # Known sqlite3 leaks. LEAK name=http://crbug.com/113847 (1) ... *!sqlite3MemMalloc *!mallocWithAlarm *!sqlite3Malloc ... *!yy_reduce LEAK name=http://crbug.com/113847 (2) ... *!openDatabase *!sqlite3_open LEAK name=http://crbug.com/115328 ... *!GenericInfoViewTest_GenericInfoView_Test::TestBody UNINITIALIZED READ name=http://crbug.com/116277 *!MOZ_Z_deflate *!zipCloseFileInZipRaw64 LEAK name=http://crbug.com/117427 a ... *!net::HostCache::Set *!net::HostResolverImpl::CacheResult *!net::HostResolverImpl::Job::CompleteRequests *!net::HostResolverImpl::Job::OnProcTaskComplete *!base::internal::RunnableAdapter::Run # Probably related to 117427. Someone is not tearing down DNS resolution during # testing. LEAK name=http://crbug.com/117427 b *!generic_cpp_alloc *!operator new *!base::internal::WeakReferenceOwner::GetRef *!base::SupportsWeakPtr::AsWeakPtr *!net::HostResolverImpl::Job::Job *!net::HostResolverImpl::Resolve *!net::SingleRequestHostResolver::Resolve *!net::TransportConnectJob::DoResolveHost *!net::TransportConnectJob::DoLoop *!net::TransportConnectJob::ConnectInternal *!net::ConnectJob::Connect *!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal *!net::internal::ClientSocketPoolBaseHelper::RequestSocket *!net::ClientSocketPoolBase::RequestSocket *!net::TransportClientSocketPool::RequestSocket *!net::ClientSocketHandle::Init *!net::`anonymous namespace'::InitSocketPoolHelper *!net::InitSocketHandleForRawConnect *!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone *!base::internal::RunnableAdapter::Run # IE frame possible leak of COM object. LEAK name=http://crbug.com/122399 ole32.dll!... ole32.dll!CoTaskMemAlloc urlmon.dll!... urlmon.dll!CreateUri IEFRAME.dll!* # RenderWidgetHelper leak in DelayProfileDestruction test. LEAK name=http://crbug.com/125565 *!generic_cpp_alloc *!operator new *!RenderProcessHostImpl::RenderProcessHostImpl *!SiteInstanceImpl::GetProcess *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody LEAK name=http://crbug.com/125807 *!generic_cpp_alloc *!operator new *!TransportSecurityPersister::TransportSecurityPersister *!TransportSecurityPersisterTest::TransportSecurityPersisterTest