summaryrefslogtreecommitdiffstats
path: root/chromium/tools/valgrind/drmemory/suppressions_full.txt
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/tools/valgrind/drmemory/suppressions_full.txt')
-rw-r--r--chromium/tools/valgrind/drmemory/suppressions_full.txt1337
1 files changed, 0 insertions, 1337 deletions
diff --git a/chromium/tools/valgrind/drmemory/suppressions_full.txt b/chromium/tools/valgrind/drmemory/suppressions_full.txt
deleted file mode 100644
index 76a1dfb4ce5..00000000000
--- a/chromium/tools/valgrind/drmemory/suppressions_full.txt
+++ /dev/null
@@ -1,1337 +0,0 @@
-# This file contains suppressions for the Dr.Memory tool, see
-# http://dev.chromium.org/developers/how-tos/using-drmemory
-#
-# This file should contain suppressions only for the reports happening
-# in the 'full' mode (drmemory_full).
-# For the reports that can happen in the light mode (a.k.a. drmemory_light),
-# please use suppressions.txt instead.
-
-###############################################################
-# Known reports on the third party we have no control over.
-UNINITIALIZED READ
-name=deflate UNINIT
-...
-*!deflate_*
-*!MOZ_Z_deflate
-
-# TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=406
-ADVAPI32.dll!WmiOpenBlock
-ADVAPI32.dll!WmiOpenBlock
-
-# Leaks inside GoogleDesktop - it injects into our processes for some reason
-LEAK
-name=GoogleDesktop LEAK
-...
-GoogleDesktopNetwork3.DLL!DllUnregisterServer
-
-# They deliberately use uninit local var in sqlite random generator
-# random byte may mess up the call stack between randomByte and
-# sqlite3_randomness
-UNINITIALIZED READ
-name=sqlite3_randomness UNINIT
-*!randomByte
-...
-*!sqlite3_randomness
-
-# Intentional leak in WebKit Template Framework for ThreadData.
-LEAK
-name=intentional WTF ThreadData leak
-...
-*!WTF::wtfThreadData
-
-# Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
-LEAK
-name=http://crbug.com/125558 a
-KERNELBASE.dll!LocalAlloc
-SECHOST.dll!...
-SECHOST.dll!NotifyServiceStatusChange
-WINHTTP.dll!...
-WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
-*!net::ProxyResolverWinHttp::GetProxyForURL
-
-# Tiny locale-related leaks in ntdll. Probably system bug.
-LEAK
-name=http://crbug.com/125558 b
-ntdll.dll!...
-ntdll.dll!*
-KERNELBASE.dll!...
-KERNELBASE.dll!GetCPInfoExW
-webio.dll!*
-webio.dll!*
-webio.dll!*
-WINHTTP.dll!...
-WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
-*!net::ProxyConfigServiceWin::GetCurrentProxyConfig
-
-UNINITIALIZED READ
-name=http://crbug.com/30704 #f
-libpng.dll!wk_png_write_find_filter
-libpng.dll!wk_png_write_row
-
-###############################################################
-# Suppress some false reports due to bugs in Dr.Memory like wrong analysis
-# assumptions or unhandled syscalls
-
-# Please note: the following suppressions were written in the abscense of
-# private symbols so may need to be updated when we switch to auto-loading PDBs
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=12 (1)
-ntdll.dll!Rtl*
-ntdll.dll!Rtl*
-ntdll.dll!RtlFindActivationContextSectionString
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=12 (2)
-...
-SHELL32.dll!SHFileOperation*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=12 (3)
-...
-SHELL32.dll!SHGetFolderPath*
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=12 (4)
-...
-SHELL32.dll!SHGetFolderPath*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=12 (5)
-...
-SHELL32.dll!SHCreateDirectory*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=12 (6)
-...
-SHELL32.dll!ILLoadFromStream*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=12 (7)
-...
-SHELL32.dll!ILSaveToStream*
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=12 (8)
-...
-SHELL32.dll!SHFileOperation*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=12 (9)
-...
-SHELL32.dll!SHGetItemFromDataObject
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=12 (10)
-...
-SHELL32.dll!SHGetItemFromDataObject
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=12 (11)
-...
-ole32.dll!*
-SHELL32.dll!SHChangeNotifySuspendResume
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=14 (1)
-...
-*!CreateProcess*
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=14 (2)
-...
-*!CreateProcess*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=14 (3)
-...
-*!base::LaunchApp*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=17 (1)
-...
-*!CreateWindow*
-
-POSSIBLE LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=17 (2)
-GDI32.dll!*
-GDI32.dll!CreateFontIndirectExW
-GDI32.dll!CreateFontIndirectW
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=17 (3)
-KERNELBASE.dll!LocalAlloc
-...
-USER32.dll!CreateWindow*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=18 a
-...
-*!CoInitialize*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=18 b
-...
-*!CoCreateInstance*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=18 c
-...
-*!CoUninitialize*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=18 d
-...
-UxTheme.dll!*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=40 a
-...
-WINSPOOL.DRV!*
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=40 b
-...
-WINSPOOL.DRV!*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=48 a
-system call NtContinue
-...
-*!*SetThreadName
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=48 b
-system call NtContinue
-*!WTF::initializeCurrentThreadInternal
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=52 a
-...
-DBGHELP.dll!SymInitialize
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=52 b
-...
-DBGHELP.dll!SymEnumSourceFiles
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=52 c
-...
-msvcrt.dll!_RTDynamicCast
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp
-instruction=test 0x*(%*) $0x??
-DBGHELP.dll!SymUnloadModule64
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=53
-ADVAPI32.dll!WmiMofEnumerateResourcesA
-ADVAPI32.dll!WmiMofEnumerateResourcesA
-ADVAPI32.dll!Sta*TraceW
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=58
-...
-*!_cfltcvt_l
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=60
-USP10.dll!*
-...
-USP10.dll!ScriptStringAnalyse
-
-LEAK
-IMM32.dll!ImmGetIMCCSize
-IMM32.dll!ImmLockClientImc
-IMM32.dll!ImmDisableIME
-IMM32.dll!ImmSetActiveContext
-USER32.dll!IMPSetIMEA
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=65 a
-...
-*!SystemFunction036
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=65 b
-...
-*!talk_base::CreateRandomString
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=68 a
-...
-WS2_32.dll!*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=68 b
-...
-ADVAPI32.dll!SetSecurityDescriptorDacl
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=68 c
-...
-MSWSOCK.dll!WSPStartup
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=68 d
-...
-ntdll.dll!RtlValidateUnicodeString
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=256
-*!_mtinit
-*!__tmainCRTStartup
-*!mainCRTStartup
-
-POSSIBLE LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=274 a
-...
-GDI32.dll!CreateDCW
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=274 b
-...
-GDI32.dll!CreateDCW
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=275
-...
-*!_getptd*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=276
-...
-ntdll.dll!RtlConvertUlongToLargeInteger
-ntdll.dll!RtlConvertUlongToLargeInteger
-ntdll.dll!KiUserExceptionDispatcher
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=305
-*!free
-*!free
-*!operator new
-...
-*!MiniDumpWriteDump
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=346 a
-...
-GDI32.dll!CloseEnhMetaFile
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=346 b
-GDI32.dll!SetPolyFillMode
-GDI32.dll!CreateICW
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=362
-USER32.dll!UnregisterClass*
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=382
-...
-ntdll.dll!CsrNewThread
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=397
-system call NtDeviceIoControlFile InputBuffer
-ADVAPI32.dll!ImpersonateAnonymousToken
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=407 a
-system call NtRequestWaitReplyPort
-RPCRT4.dll!I_RpcSendReceive
-RPCRT4.dll!NdrSendReceive
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=407 b
-IMM32.dll!*
-ntdll.dll!LdrInitializeThunk
-ntdll.dll!LdrShutdownThread
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=412 a
-ADVAPI32.dll!RegDeleteValue*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=412 b
-...
-ADVAPI32.dll!Crypt*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=412 c
-...
-RPCRT4.dll!NdrClientCall2
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=412 d
-RSAENH.dll!DllUnregisterServer
-...
-ADVAPI32.dll!CryptAcquireContextA
-CRYPT32.dll!CryptEnumOIDFunction
-...
-CRYPT32.dll!CertFindCertificateInStore
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=412 e
-...
-RSAENH.dll!CPGenRandom
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=412 f
-...
-CRYPT??.dll!Crypt*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=412 g
-*!replace_memcmp
-...
-*!testing::internal::CmpHelperEQ*
-...
-*!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
-
-# We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't
-# have frame pointers, and we have trouble unwinding from it. Therefore, we use
-# this broad suppression, effectively disabling uninit checks in rsaenh.dll.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=412 h
-RSAENH.dll!*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=425 a
-CLBCatQ.DLL!DestroyStgDatabase
-CLBCatQ.DLL!PostError
-CLBCatQ.DLL!PostError
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=425 b
-RPCRT4.dll!I_RpcBCacheFree
-RPCRT4.dll!I_RpcBCacheFree
-...
-RPCRT4.dll!NdrClientCall2
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=425 c
-msdmo.dll!*
-msdmo.dll!*
-DEVENUM.DLL!*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=435 a
-...
-ntdll.dll!RtlSetSecurityObject
-ntdll.dll!RtlNewSecurityObjectEx
-ADVAPI32.dll!CreatePrivateObjectSecurityEx
-NTMARTA.dll!AccRewriteSetNamedRights
-
-POSSIBLE LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=435 b
-WLDAP32.dll!Ordinal325
-...
-WLDAP32.dll!Ordinal325
-ntdll.dll!LdrInitializeThunk
-ntdll.dll!LdrFindResourceDirectory_U
-ntdll.dll!RtlValidateUnicodeString
-ntdll.dll!LdrLoadDll
-KERNEL32.dll!LoadLibraryExW
-
-# mod+offs suppression because the symbolic makes no sense and changes
-# completely in the presence of WS2_32.dll symbols.
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=438
-<WS2_32.dll+0x260c>
-<WS2_32.dll+0x2b76>
-<WS2_32.dll+0x2c61>
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=454 a
-...
-WINMM.dll!wave*GetNumDevs
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=454 b
-...
-WINMM.dll!wave*GetNumDevs
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=466
-ntdll.dll!RtlRunOnceBeginInitialize
-ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=471 a
-*!media::AudioRendererAlgorithmOLA::Crossfade<unsigned char>
-*!media::AudioRendererAlgorithmOLA::FillBuffer
-*!media::AudioRendererAlgorithmOLATest_FillBuffer_*
-
-# Uninit reported in copy ctor. Would be nice if we could specify which ctor
-# overload to suppress.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=471 b
-*!WebCore::FormDataElement::FormDataElement
-
-# Another default copy ctor uninit.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=471 c
-*!WebCore::CachedResourceLoader::InitiatorInfo::InitiatorInfo
-...
-*!WTF::Hash*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=473 a
-system call NtDeviceIoControlFile InputBuffer
-...
-iphlpapi.dll!GetAdaptersAddresses
-
-POSSIBLE LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=473 b
-ESENT.dll!*
-ESENT.dll!*
-ESENT.dll!*
-ntdll.dll!Ldr*Init*
-ntdll.dll!Ldr*
-ntdll.dll!*
-ntdll.dll!LdrLoadDll
-...
-iphlpapi.dll!GetPerAdapterInfo
-...
-iphlpapi.dll!GetAdaptersAddresses
-
-POSSIBLE LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=473 c
-RPCRT4.dll!*
-RPCRT4.dll!*
-...
-IPHLPAPI.DLL!GetAdaptersAddresses
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=475
-...
-ADVAPI32.dll!CryptAcquireContextA
-...
-CRYPT32.dll!CryptMsgOpenToDecode
-...
-CRYPT32.dll!CryptQueryObject
-
-# Lots of leaks from our interactions with the system certificate store. May be
-# worth reviewing our use of their API.
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=476 a
-KERNEL*.dll!LocalAlloc
-...
-CRYPT32.dll!CertGetCRLContextProperty
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=476 b
-KERNEL*.dll!LocalAlloc
-...
-CRYPT32.dll!CertAddCRLContextToStore
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=476 c
-KERNEL*.dll!LocalAlloc
-...
-CRYPT32.dll!CertOpenStore
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=476 d
-...
-CRYPT32.dll!CertOpenSystemStore?
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=476 e
-...
-CRYPT32.dll!CertGetCertificateChain
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=476 f
-...
-CRYPT32.dll!CertCompareIntegerBlob
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=476 g
-...
-CRYPT32.dll!CryptUnprotectData
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=476 h
-KERNEL*.dll!LocalAlloc
-...
-CRYPT32.dll!CertEnumCertificatesInStore
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=476 i
-...
-CRYPT32.dll!CryptProtectData
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=476 j
-...
-CRYPT32.dll!CryptExportPublicKeyInfoEx
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=502 a
-system call NtSecureConnectPort parameter #3
-GDI32.dll!*
-GDI32.dll!*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=502 b
-system call NtGdiEnumFonts parameter #6
-GDI32.dll!*
-GDI32.dll!*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=511 a
-RPCRT4.dll!...
-ole32.dll!*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=511 b
-ole32.dll!*
-ole32.dll!*
-ole32.dll!StringFromGUID2
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=512 a
-...
-*!browser_sync::Cryptographer::PackBootstrapToken
-*!browser_sync::Cryptographer::GetBootstrapToken
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=512 b
-...
-*!Encrypt*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=513 a
-*!v8*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=513 b
-*!*
-*!v8*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=513 c
-<not in a module>
-...
-*!v8*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=546
-...
-mscms.dll!*
-...
-GDI32.dll!*
-*!IconUtil::Create*HICON*
-
-LEAK
-name=http://crbug.com/92152
-...
-USER32.dll!CreateWindowExW
-*!views::TooltipManagerWin::Init
-*!views::TooltipManagerWin::TooltipManagerWin
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=567 a
-dbghelp.dll!*
-...
-dbghelp.dll!StackWalk64
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=567 b
-*!*
-dbghelp.dll!*
-...
-dbghelp.dll!StackWalk64
-
-# Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
-# TppWorkerThread w/ syms. We used to use mod+offs here, but that was too
-# brittle, so we switched to RPCRT4.dll!*.
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=569
-RPCRT4.dll!...
-ntdll.dll!*
-ntdll.dll!*
-KERNEL*.dll!BaseThreadInitThunk
-
-# TODO(timurrrr): investigate these
-UNINITIALIZED READ
-name=http://crbug.com/TODO a
-...
-*!win_util::GetLogonSessionOnlyDACL
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO b
-...
-ntshrui.dll!IsPathSharedW
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO c
-...
-*!NetApiBufferFree
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO d
-...
-*!ShellExecute*
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO e
-...
-*!SHParseDisplayName
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO f
-...
-*!GetCanonicalPathInfo*
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO g
-...
-SHELL32.dll!Ordinal*
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO h
-...
-GDI32.dll!GetTextExtentPoint32*
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO i
-...
-*!SyncSocketClientListener::OnMsgClassResponse
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO j
-...
-*!*NSPRInitSingleton*
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO k
-*!NdrSimpleStructFree
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO l
-ntdll.dll!RtlpNtOpenKey
-ntdll.dll!RtlMakeSelfRelativeSD
-ntdll.dll!RtlAbsoluteToSelfRelativeSD
-ADVAPI32.dll!MakeSelfRelativeSD
-
-UNINITIALIZED READ
-name=http://crbug.com/TODO m
-...
-CRYPT32.dll!I_CertSyncStore
-
-# This matches the same stack as DrMem i#751, but it's an uninit read instead of
-# a leak. Must be some early thread initialization. Doesn't look like
-# bit-level though.
-UNINITIALIZED READ
-name=http://crbug.com/TODO n
-RPCRT4.dll!*
-RPCRT4.dll!*
-RPCRT4.dll!*
-ntdll.dll!*
-ntdll.dll!*
-KERNEL*.dll!BaseThreadInitThunk
-
-# No idea where this is from, but Chrome isn't even on the stack.
-POSSIBLE LEAK
-name=http://crbug.com/TODO o
-RPCRT4.dll!...
-ole32.dll!OleInitialize
-ole32.dll!...
-KERNEL32.dll!BaseThreadInitThunk
-
-# Matches lots of RPC related leaks. So far RPC handles have been mostly owned
-# by system libraries and are not something we can fix easily.
-POSSIBLE LEAK
-name=http://crbug.com/TODO p
-RPCRT4.dll!*
-RPCRT4.dll!*
-RPCRT4.dll!NDRCContextBinding
-
-# No idea, but all system code, not interesting.
-POSSIBLE LEAK
-name=http://crbug.com/TODO q
-RPCRT4.dll!...
-RPCRT4.dll!*
-RPCRT4.dll!*
-ole32.dll!...
-ole32.dll!*
-ole32.dll!*
-...
-SHELL32.dll!*
-
-LEAK
-name=http://crbug.com/109278 video device COM leaks
-...
-*!media::VideoCaptureDevice::*
-
-LEAK
-name=http://crbug.com/109278 audio device COM leaks
-...
-*!media::GetInputDeviceNamesWin
-
-# False pos uninit in shell32 when resolving links.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=745
-SHELL*.dll!*
-...
-SHELL*.dll!*
-*!file_util::ResolveShortcut
-
-# Probable false pos uninit in ffmpeg. Probably due to running off the end of a
-# buffer with SSE/MMX instructions whose results are then masked out later.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=747 a
-*!ff_pred4x4_vertical_vp8_mmxext
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=747 b
-*!ff_pred4x4_down_left_mmxext
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=747 c
-*!ff_vorbis_floor1_render_list
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=747 d
-*!ff_put_vp8_epel8_h6_ssse3
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=747 e
-*!ff_put_vp8_epel8_h4_ssse3
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=747 f
-*!ff_fft_permute_sse
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=747 g
-*!ff_simple_idct_add_mmx
-
-# ffmpeg seems to leak a pthread condition variable.
-LEAK
-name=http://crbug.com/110042
-*!ptw32_new
-*!pthread_self
-*!sem_wait
-*!pthread_cond_wait
-*!ff_thread_decode_frame
-*!avcodec_decode_video2
-
-# Improperly handled ioctl in bcrypt.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=748
-system call NtDeviceIoControlFile InputBuffer
-bcrypt.dll!BCryptUnregisterConfigChangeNotify
-bcrypt.dll!BCryptGetFipsAlgorithmMode
-ntdll.dll!RtlQueryEnvironmentVariable
-
-# Not sure what this is.
-POSSIBLE LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=749
-...
-fwpuclnt.dll!*
-...
-RPCRT4.dll!*
-...
-fwpuclnt.dll!*
-...
-WS2_32.dll!*
-*!talk_base::SafeGetHostByName
-*!talk_base::SocketAddress::GetLocalIPs
-*!talk_base::SocketAddress::IsLocalIP
-*!cricket::Transport::VerifyCandidate
-*!cricket::Session::OnRemoteCandidates
-*!cricket::Session::OnTransportInfoMessage
-*!cricket::Session::OnIncomingMessage
-*!cricket::SessionManager::OnIncomingMessage
-
-# More uninit false pos in rpcrt4.dll not caught by default suppressions.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=529
-RPCRT4.dll!*
-...
-*!base::LaunchProcess
-
-# System leak from CreateEnvironmentBlock.
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=757
-...
-USERENV.dll!CreateEnvironmentBlock
-
-# Looks like another instance of 753
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=753
-...
-ntdll.dll!RtlLoadString
-
-# More bit manip fps
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=493
-USP10.dll!ScriptPositionSingleGlyph
-
-# Various TLS leaks that we don't understand yet. We should be finding a root
-# for these.
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=778 a
-KERNELBASE.dll!TlsSetValue
-
-# Originally filed as: http://crbug.com/109281
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=778 b
-*!operator new
-*!operator new[]
-*!*::ConstructTlsVector
-*!base::ThreadLocalStorage::StaticSlot::Get
-
-# This is an NSS PRThread object installed in TLS. Why isn't this detected as a
-# root? See also http://crbug.com/32624
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=778 c
-*!PR_Calloc
-*!_PR_AttachThread
-*!_PRI_AttachThread
-
-# Bit-level fps in rich edit layer.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=791
-RICHED20.dll!*
-RICHED20.dll!*
-
-# Already suppressed by drmemory default supp we don't have yet.
-LEAK
-name=i#757: RPC binding leaks in sspicli.dll
-RPCRT4.dll!*
-...
-SspiCli.dll!*
-SspiCli.dll!Cre*
-
-# Async NtReadFile false positives. This was fixed in drmemory r772, remove
-# this supp when we pull that rev.
-UNADDRESSABLE ACCESS
-name=http://code.google.com/p/drmemory/issues/detail?id=798
-system call NtReadFile parameter #5
-KERNEL32.dll!ReadFile
-
-# Probable syscall false positive.
-UNADDRESSABLE ACCESS
-name=http://code.google.com/p/drmemory/issues/detail?id=809
-system call NtGdiPolyPolyDraw parameter #1
-*!gfx::Path::CreateNativeRegion
-
-# Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces
-# coming out of this module (sometimes only one frame), which makes it hard to
-# write precise suppressions. Until we have bit-level tracking (DRMi#113) we
-# should keep this.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard
-RPCRT4.dll!*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=841 a
-...
-CRYPTNET.dll!I_CryptNetGetConnectivity
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=841 b
-...
-webio.dll!*
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=841 c
-...
-winhttp.dll!*
-
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=841 d
-...
-CRYPTNET.dll!I_CryptNetGetConnectivity
-
-# Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=810
-instruction=test %edx %edx
-USER32.dll!GetClassLongW
-...
-*!ui::CenterAndSizeWindow
-
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=815
-KERNEL*.dll!...
-dxgi.dll!*
-USER32.dll!GetMonitorInfoA
-ntdll.dll!KiUserCallbackDispatcher
-dxgi.dll!*
-WinSATAPI.DLL!*
-
-# Suppress anything in cmd.exe. It's safer to suppress these than disable
-# following, since someone might launch a Chrome process via cmd.exe.
-LEAK
-name=cmd.exe
-...
-cmd.exe!*
-
-# Possible true system use after free.
-UNADDRESSABLE ACCESS
-name=http://code.google.com/p/drmemory/issues/detail?id=623
-KERNELBASE.dll!TlsGetValue
-OLEAUT32.dll!SysFreeString
-OLEAUT32.dll!SysAllocStringByteLen
-OLEACC.dll!*
-OLEACC.dll!*
-OLEACC.dll!*
-OLEACC.dll!*
-
-# basic_streambuf seems to leak something in creating a std::_Mutex
-LEAK
-name=http://code.google.com/p/drmemory/issues/detail?id=857
-ntdll.dll!...
-ntdll.dll!RtlInitializeCriticalSection
-*!_Mtxinit
-*!std::_Mutex::_Mutex
-*!std::basic_streambuf<*>
-
-# stdext::hash_map<> seems to swap uninitialized floats.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=931
-*!std::swap<float>
-*!std::_Hash<*
-
-# syscall false positive on handling NtQuerySystemInformation, fix in soon.
-UNINITIALIZED READ
-name=http://code.google.com/p/drmemory/issues/detail?id=932
-KERNEL32.dll!K32GetPerformanceInfo
-
-# Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though.
-LEAK
-name=GDI SetBrushOrgEx leak
-GDI32.dll!...
-GDI32.dll!GetTextMetricsW
-*!gfx::PlatformFontWin::CreateHFontRef
-*!gfx::PlatformFontWin::GetBaseFontRef
-
-###############################################################
-# Benign issues in Chromium
-
-# This test intentionally leaks an object and checks that it's never deleted.
-LEAK
-name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
-...
-*!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
-
-LEAK
-name=deliberate histogram leak
-...
-*!replace_operator_new
-...
-*!*::*Histogram::FactoryGet
-
-LEAK
-name=deliberate leak for SampleMap
-...
-*!base::SampleMap::Accumulate
-*!base::SparseHistogram::Add
-
-LEAK
-name=deliberate LazyInstance leak
-...
-*!*LeakyLazyInstance*
-...
-*!base::LazyInstance*::Pointer
-
-LEAK
-name=http://crbug.com/79933 (1)
-...
-*!TestURLRequestContext::Init
-
-LEAK
-name=http://crbug.com/79933 (2)
-...
-*!TestURLRequestContext::TestURLRequestContext
-*!TestURLRequestContextGetter::GetURLRequestContext
-*!notifier::SingleLoginAttempt::SingleLoginAttempt
-*!notifier::Login::StartConnection
-*!syncer::InvalidationNotifier::UpdateCredentials
-*!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials
-
-LEAK
-name=http://crbug.com/79933 (3)
-...
-*!TestURLRequestContext::TestURLRequestContext
-*!TestURLRequestContextGetter::GetURLRequestContext
-*!URLFetcher::Core::StartURLRequest
-
-LEAK
-name=http://crbug.com/79933 (4)
-*!generic_cpp_alloc
-*!operator new
-*!std::_Allocate<net::SSLConfigService::Observer *>
-*!std::allocator<net::SSLConfigService::Observer *>::allocate
-*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::_Insert_n
-*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::insert
-*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::push_back
-*!ObserverListBase<net::SSLConfigService::Observer>::AddObserver
-...
-*!net::HttpNetworkSession::HttpNetworkSession
-*!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
-*!notifier::XmppClientSocketFactory::CreateTransportClientSocket
-*!notifier::ChromeAsyncSocket::Connect
-*!buzz::XmppClient::ProcessStartXmppLogin
-*!buzz::XmppClient::Process
-*!talk_base::Task::Step
-*!talk_base::TaskRunner::InternalRunTasks
-*!talk_base::TaskRunner::RunTasks
-*!notifier::TaskPump::CheckAndRunTasks
-*!base::internal::RunnableAdapter<void (__thiscall notifier::TaskPump::*)(void)>::Run
-
-# Test intentionally leaks an object.
-LEAK
-name=http://crbug.com/86301
-*!replace_operator_new
-...
-*!*_DeadReplyLoopDoesNotDelete_Test::TestBody
-
-# Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it.
-LEAK
-name=Firefox 3 NSS dll leak
-nspr4.dll!*
-...
-*!NSSDecryptor::~NSSDecryptor
-
-# We get uninit reports inside GMock when it prints the bytes of references to
-# partially initialized objects passed to unexpected method calls.
-UNINITIALIZED READ
-name=GMock printing uninit data
-...
-*!testing::internal2::PrintBytesInObjectTo
-
-###############################################################
-# Real issues in Chromium
-
-LEAK
-name=http://crbug.com/32085
-...
-chrome.dll!NotificationRegistrar::Add
-
-LEAK
-name=http://crbug.com/32623
-...
-*!ssl3_HandleHandshakeMessage
-*!ssl3_HandleHandshake
-*!ssl3_HandleRecord
-*!ssl3_GatherCompleteHandshake
-...
-*!SSL_ForceHandshake
-*!net::SSLServerSocketNSS::DoHandshake
-*!net::SSLServerSocketNSS::DoHandshakeLoop
-
-UNINITIALIZED READ
-name=http://crbug.com/57266 (1)
-...
-*!remoting::EncoderVp8::Encode
-
-UNINITIALIZED READ
-name=http://crbug.com/57266 (2)
-...
-*!vp8_*
-
-LEAK
-name=http://crbug.com/70062
-*!PR_Calloc
-*!PR_NewLock
-...
-*!InitSessionCacheLocks
-*!initSessionCacheLocksLazily
-*!PR_CallOnce
-*!ssl_InitSessionCacheLocks
-*!lock_cache
-*!ssl_LookupSID
-*!ssl2_BeginClientHandshake
-*!ssl_Do1stHandshake
-*!SSL_ForceHandshake
-*!net::SSL*SocketNSS::DoHandshake
-*!net::SSL*SocketNSS::DoHandshakeLoop
-
-LEAK
-name=http://crbug.com/74417 a
-*!replace_operator_new
-*!disk_cache::BackendImpl::CreateEntryImpl
-
-LEAK
-name=http://crbug.com/74417 b
-*!replace_operator_new
-*!disk_cache::BackendImpl::NewEntry
-
-# One more disk_cache::BackendImpl leak. See also http://crbug.com/87500.
-LEAK
-name=http://crbug.com/74417 c
-*!replace_operator_new
-...
-*!disk_cache::EntryImpl::UserBuffer::UserBuffer
-
-LEAK
-name=http://crbug.com/75247
-...
-*!replace_operator_new
-*!AutofillDownloadTestHelper::AutofillDownloadTestHelper
-
-LEAK
-name=http://crbug.com/78784
-*!generic_cpp_alloc
-*!operator new
-*!TestingProfile::CreateRequestContext
-*!*ProfileSyncService*::SetUp
-
-LEAK
-name=http://crbug.com/80550 (1)
-...
-*!RenderWidgetHost::WasHidden
-
-LEAK
-name=http://crbug.com/80550 (2)
-...
-*!RenderWidgetHost::WasRestored
-
-LEAK
-name=http://crbug.com/87612
-...
-*!SSL_ConfigSecureServer
-*!net::SSLServerSocketNSS::InitializeSSLOptions
-*!net::SSLServerSocketNSS::Handshake
-
-LEAK
-name=http://crbug.com/88640
-*!generic_cpp_alloc
-*!operator new
-*!ProfileImpl::InitRegisteredProtocolHandlers
-*!ProfileImpl::DoFinalInit
-*!ProfileImpl::OnPrefsLoaded
-
-LEAK
-name=http://crbug.com/91465
-*!generic_cpp_alloc
-*!operator new
-*!browser_sync::internal::WeakHandleCore<browser_sync::JsBackend>::*
-*!browser_sync::WeakHandle<browser_sync::JsBackend>::*
-*!syncer::SyncManager::SyncInternal::Init
-
-LEAK
-name=http://crbug.com/91491
-...
-*!CrxUpdateService::ProcessPendingItems
-
-UNINITIALIZED READ
-name=http://crbug.com/92026 (1)
-softokn3.dll!FC_GetFunctionList
-...
-softokn3.dll!NSC_ModuleDBFunc
-
-UNINITIALIZED READ
-name=http://crbug.com/92026 (2)
-freebl3.dll!FREEBL_GetVector
-...
-softokn3.dll!NSC_ModuleDBFunc
-
-LEAK
-name=http://crbug.com/92166
-...
-*!replace_operator_new
-*!views::NativeWidgetWin::OnCreate
-
-# Possible real Chromium issue in DoCrossfade.
-UNINITIALIZED READ
-name=http://crbug.com/110049
-*!media::DoCrossfade<*>
-*!media::Crossfade
-*!media::AudioRendererAlgorithmBase::FillBuffer
-
-# Known sqlite3 leaks.
-LEAK
-name=http://crbug.com/113847 (1)
-...
-*!sqlite3MemMalloc
-*!mallocWithAlarm
-*!sqlite3Malloc
-...
-*!yy_reduce
-
-LEAK
-name=http://crbug.com/113847 (2)
-...
-*!openDatabase
-*!sqlite3_open
-
-LEAK
-name=http://crbug.com/115328
-...
-*!GenericInfoViewTest_GenericInfoView_Test::TestBody
-
-UNINITIALIZED READ
-name=http://crbug.com/116277
-*!MOZ_Z_deflate
-*!zipCloseFileInZipRaw64
-
-LEAK
-name=http://crbug.com/117427 a
-...
-*!net::HostCache::Set
-*!net::HostResolverImpl::CacheResult
-*!net::HostResolverImpl::Job::CompleteRequests
-*!net::HostResolverImpl::Job::OnProcTaskComplete
-*!base::internal::RunnableAdapter<void (__thiscall net::HostResolverImpl::Job::*)(int,net::AddressList const &)>::Run
-
-# Probably related to 117427. Someone is not tearing down DNS resolution during
-# testing.
-LEAK
-name=http://crbug.com/117427 b
-*!generic_cpp_alloc
-*!operator new
-*!base::internal::WeakReferenceOwner::GetRef
-*!base::SupportsWeakPtr<net::HostResolverImpl>::AsWeakPtr
-*!net::HostResolverImpl::Job::Job
-*!net::HostResolverImpl::Resolve
-*!net::SingleRequestHostResolver::Resolve
-*!net::TransportConnectJob::DoResolveHost
-*!net::TransportConnectJob::DoLoop
-*!net::TransportConnectJob::ConnectInternal
-*!net::ConnectJob::Connect
-*!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
-*!net::internal::ClientSocketPoolBaseHelper::RequestSocket
-*!net::ClientSocketPoolBase<net::TransportSocketParams>::RequestSocket
-*!net::TransportClientSocketPool::RequestSocket
-*!net::ClientSocketHandle::Init<net::TransportSocketParams,net::TransportClientSocketPool>
-*!net::`anonymous namespace'::InitSocketPoolHelper
-*!net::InitSocketHandleForRawConnect
-*!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
-*!base::internal::RunnableAdapter<void (__thiscall notifier::ProxyResolvingClientSocket::*)(int)>::Run
-
-# IE frame possible leak of COM object.
-LEAK
-name=http://crbug.com/122399
-ole32.dll!...
-ole32.dll!CoTaskMemAlloc
-urlmon.dll!...
-urlmon.dll!CreateUri
-IEFRAME.dll!*
-
-# RenderWidgetHelper leak in DelayProfileDestruction test.
-LEAK
-name=http://crbug.com/125565
-*!generic_cpp_alloc
-*!operator new
-*!RenderProcessHostImpl::RenderProcessHostImpl
-*!SiteInstanceImpl::GetProcess
-*!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
-
-LEAK
-name=http://crbug.com/125807
-*!generic_cpp_alloc
-*!operator new
-*!TransportSecurityPersister::TransportSecurityPersister
-*!TransportSecurityPersisterTest::TransportSecurityPersisterTest