diff options
Diffstat (limited to 'chromium/tools/valgrind/drmemory/suppressions_full.txt')
-rw-r--r-- | chromium/tools/valgrind/drmemory/suppressions_full.txt | 1337 |
1 files changed, 0 insertions, 1337 deletions
diff --git a/chromium/tools/valgrind/drmemory/suppressions_full.txt b/chromium/tools/valgrind/drmemory/suppressions_full.txt deleted file mode 100644 index 76a1dfb4ce5..00000000000 --- a/chromium/tools/valgrind/drmemory/suppressions_full.txt +++ /dev/null @@ -1,1337 +0,0 @@ -# This file contains suppressions for the Dr.Memory tool, see -# http://dev.chromium.org/developers/how-tos/using-drmemory -# -# This file should contain suppressions only for the reports happening -# in the 'full' mode (drmemory_full). -# For the reports that can happen in the light mode (a.k.a. drmemory_light), -# please use suppressions.txt instead. - -############################################################### -# Known reports on the third party we have no control over. -UNINITIALIZED READ -name=deflate UNINIT -... -*!deflate_* -*!MOZ_Z_deflate - -# TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=406 -ADVAPI32.dll!WmiOpenBlock -ADVAPI32.dll!WmiOpenBlock - -# Leaks inside GoogleDesktop - it injects into our processes for some reason -LEAK -name=GoogleDesktop LEAK -... -GoogleDesktopNetwork3.DLL!DllUnregisterServer - -# They deliberately use uninit local var in sqlite random generator -# random byte may mess up the call stack between randomByte and -# sqlite3_randomness -UNINITIALIZED READ -name=sqlite3_randomness UNINIT -*!randomByte -... -*!sqlite3_randomness - -# Intentional leak in WebKit Template Framework for ThreadData. -LEAK -name=intentional WTF ThreadData leak -... -*!WTF::wtfThreadData - -# Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT. -LEAK -name=http://crbug.com/125558 a -KERNELBASE.dll!LocalAlloc -SECHOST.dll!... -SECHOST.dll!NotifyServiceStatusChange -WINHTTP.dll!... -WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl -*!net::ProxyResolverWinHttp::GetProxyForURL - -# Tiny locale-related leaks in ntdll. Probably system bug. -LEAK -name=http://crbug.com/125558 b -ntdll.dll!... -ntdll.dll!* -KERNELBASE.dll!... -KERNELBASE.dll!GetCPInfoExW -webio.dll!* -webio.dll!* -webio.dll!* -WINHTTP.dll!... -WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser -*!net::ProxyConfigServiceWin::GetCurrentProxyConfig - -UNINITIALIZED READ -name=http://crbug.com/30704 #f -libpng.dll!wk_png_write_find_filter -libpng.dll!wk_png_write_row - -############################################################### -# Suppress some false reports due to bugs in Dr.Memory like wrong analysis -# assumptions or unhandled syscalls - -# Please note: the following suppressions were written in the abscense of -# private symbols so may need to be updated when we switch to auto-loading PDBs -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (1) -ntdll.dll!Rtl* -ntdll.dll!Rtl* -ntdll.dll!RtlFindActivationContextSectionString - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (2) -... -SHELL32.dll!SHFileOperation* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (3) -... -SHELL32.dll!SHGetFolderPath* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=12 (4) -... -SHELL32.dll!SHGetFolderPath* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (5) -... -SHELL32.dll!SHCreateDirectory* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (6) -... -SHELL32.dll!ILLoadFromStream* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (7) -... -SHELL32.dll!ILSaveToStream* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=12 (8) -... -SHELL32.dll!SHFileOperation* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (9) -... -SHELL32.dll!SHGetItemFromDataObject - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=12 (10) -... -SHELL32.dll!SHGetItemFromDataObject - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=12 (11) -... -ole32.dll!* -SHELL32.dll!SHChangeNotifySuspendResume - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=14 (1) -... -*!CreateProcess* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=14 (2) -... -*!CreateProcess* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=14 (3) -... -*!base::LaunchApp* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=17 (1) -... -*!CreateWindow* - -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=17 (2) -GDI32.dll!* -GDI32.dll!CreateFontIndirectExW -GDI32.dll!CreateFontIndirectW - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=17 (3) -KERNELBASE.dll!LocalAlloc -... -USER32.dll!CreateWindow* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=18 a -... -*!CoInitialize* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=18 b -... -*!CoCreateInstance* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=18 c -... -*!CoUninitialize* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=18 d -... -UxTheme.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=40 a -... -WINSPOOL.DRV!* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=40 b -... -WINSPOOL.DRV!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=48 a -system call NtContinue -... -*!*SetThreadName - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=48 b -system call NtContinue -*!WTF::initializeCurrentThreadInternal - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=52 a -... -DBGHELP.dll!SymInitialize - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=52 b -... -DBGHELP.dll!SymEnumSourceFiles - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=52 c -... -msvcrt.dll!_RTDynamicCast - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp -instruction=test 0x*(%*) $0x?? -DBGHELP.dll!SymUnloadModule64 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=53 -ADVAPI32.dll!WmiMofEnumerateResourcesA -ADVAPI32.dll!WmiMofEnumerateResourcesA -ADVAPI32.dll!Sta*TraceW - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=58 -... -*!_cfltcvt_l - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=60 -USP10.dll!* -... -USP10.dll!ScriptStringAnalyse - -LEAK -IMM32.dll!ImmGetIMCCSize -IMM32.dll!ImmLockClientImc -IMM32.dll!ImmDisableIME -IMM32.dll!ImmSetActiveContext -USER32.dll!IMPSetIMEA - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=65 a -... -*!SystemFunction036 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=65 b -... -*!talk_base::CreateRandomString - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=68 a -... -WS2_32.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=68 b -... -ADVAPI32.dll!SetSecurityDescriptorDacl - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=68 c -... -MSWSOCK.dll!WSPStartup - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=68 d -... -ntdll.dll!RtlValidateUnicodeString - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=256 -*!_mtinit -*!__tmainCRTStartup -*!mainCRTStartup - -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=274 a -... -GDI32.dll!CreateDCW - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=274 b -... -GDI32.dll!CreateDCW - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=275 -... -*!_getptd* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=276 -... -ntdll.dll!RtlConvertUlongToLargeInteger -ntdll.dll!RtlConvertUlongToLargeInteger -ntdll.dll!KiUserExceptionDispatcher - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=305 -*!free -*!free -*!operator new -... -*!MiniDumpWriteDump - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=346 a -... -GDI32.dll!CloseEnhMetaFile - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=346 b -GDI32.dll!SetPolyFillMode -GDI32.dll!CreateICW - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=362 -USER32.dll!UnregisterClass* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=382 -... -ntdll.dll!CsrNewThread - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=397 -system call NtDeviceIoControlFile InputBuffer -ADVAPI32.dll!ImpersonateAnonymousToken - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=407 a -system call NtRequestWaitReplyPort -RPCRT4.dll!I_RpcSendReceive -RPCRT4.dll!NdrSendReceive - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=407 b -IMM32.dll!* -ntdll.dll!LdrInitializeThunk -ntdll.dll!LdrShutdownThread - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 a -ADVAPI32.dll!RegDeleteValue* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 b -... -ADVAPI32.dll!Crypt* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 c -... -RPCRT4.dll!NdrClientCall2 - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=412 d -RSAENH.dll!DllUnregisterServer -... -ADVAPI32.dll!CryptAcquireContextA -CRYPT32.dll!CryptEnumOIDFunction -... -CRYPT32.dll!CertFindCertificateInStore - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 e -... -RSAENH.dll!CPGenRandom - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 f -... -CRYPT??.dll!Crypt* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 g -*!replace_memcmp -... -*!testing::internal::CmpHelperEQ* -... -*!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody - -# We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't -# have frame pointers, and we have trouble unwinding from it. Therefore, we use -# this broad suppression, effectively disabling uninit checks in rsaenh.dll. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 h -RSAENH.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=425 a -CLBCatQ.DLL!DestroyStgDatabase -CLBCatQ.DLL!PostError -CLBCatQ.DLL!PostError - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=425 b -RPCRT4.dll!I_RpcBCacheFree -RPCRT4.dll!I_RpcBCacheFree -... -RPCRT4.dll!NdrClientCall2 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=425 c -msdmo.dll!* -msdmo.dll!* -DEVENUM.DLL!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=435 a -... -ntdll.dll!RtlSetSecurityObject -ntdll.dll!RtlNewSecurityObjectEx -ADVAPI32.dll!CreatePrivateObjectSecurityEx -NTMARTA.dll!AccRewriteSetNamedRights - -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=435 b -WLDAP32.dll!Ordinal325 -... -WLDAP32.dll!Ordinal325 -ntdll.dll!LdrInitializeThunk -ntdll.dll!LdrFindResourceDirectory_U -ntdll.dll!RtlValidateUnicodeString -ntdll.dll!LdrLoadDll -KERNEL32.dll!LoadLibraryExW - -# mod+offs suppression because the symbolic makes no sense and changes -# completely in the presence of WS2_32.dll symbols. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=438 -<WS2_32.dll+0x260c> -<WS2_32.dll+0x2b76> -<WS2_32.dll+0x2c61> - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=454 a -... -WINMM.dll!wave*GetNumDevs - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=454 b -... -WINMM.dll!wave*GetNumDevs - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=466 -ntdll.dll!RtlRunOnceBeginInitialize -ntdll.dll!RtlInitializeCriticalSectionAndSpinCount - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=471 a -*!media::AudioRendererAlgorithmOLA::Crossfade<unsigned char> -*!media::AudioRendererAlgorithmOLA::FillBuffer -*!media::AudioRendererAlgorithmOLATest_FillBuffer_* - -# Uninit reported in copy ctor. Would be nice if we could specify which ctor -# overload to suppress. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=471 b -*!WebCore::FormDataElement::FormDataElement - -# Another default copy ctor uninit. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=471 c -*!WebCore::CachedResourceLoader::InitiatorInfo::InitiatorInfo -... -*!WTF::Hash* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=473 a -system call NtDeviceIoControlFile InputBuffer -... -iphlpapi.dll!GetAdaptersAddresses - -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=473 b -ESENT.dll!* -ESENT.dll!* -ESENT.dll!* -ntdll.dll!Ldr*Init* -ntdll.dll!Ldr* -ntdll.dll!* -ntdll.dll!LdrLoadDll -... -iphlpapi.dll!GetPerAdapterInfo -... -iphlpapi.dll!GetAdaptersAddresses - -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=473 c -RPCRT4.dll!* -RPCRT4.dll!* -... -IPHLPAPI.DLL!GetAdaptersAddresses - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=475 -... -ADVAPI32.dll!CryptAcquireContextA -... -CRYPT32.dll!CryptMsgOpenToDecode -... -CRYPT32.dll!CryptQueryObject - -# Lots of leaks from our interactions with the system certificate store. May be -# worth reviewing our use of their API. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 a -KERNEL*.dll!LocalAlloc -... -CRYPT32.dll!CertGetCRLContextProperty - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 b -KERNEL*.dll!LocalAlloc -... -CRYPT32.dll!CertAddCRLContextToStore - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 c -KERNEL*.dll!LocalAlloc -... -CRYPT32.dll!CertOpenStore - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 d -... -CRYPT32.dll!CertOpenSystemStore? - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 e -... -CRYPT32.dll!CertGetCertificateChain - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 f -... -CRYPT32.dll!CertCompareIntegerBlob - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 g -... -CRYPT32.dll!CryptUnprotectData - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 h -KERNEL*.dll!LocalAlloc -... -CRYPT32.dll!CertEnumCertificatesInStore - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 i -... -CRYPT32.dll!CryptProtectData - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 j -... -CRYPT32.dll!CryptExportPublicKeyInfoEx - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=502 a -system call NtSecureConnectPort parameter #3 -GDI32.dll!* -GDI32.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=502 b -system call NtGdiEnumFonts parameter #6 -GDI32.dll!* -GDI32.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=511 a -RPCRT4.dll!... -ole32.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=511 b -ole32.dll!* -ole32.dll!* -ole32.dll!StringFromGUID2 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=512 a -... -*!browser_sync::Cryptographer::PackBootstrapToken -*!browser_sync::Cryptographer::GetBootstrapToken - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=512 b -... -*!Encrypt* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=513 a -*!v8* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=513 b -*!* -*!v8* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=513 c -<not in a module> -... -*!v8* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=546 -... -mscms.dll!* -... -GDI32.dll!* -*!IconUtil::Create*HICON* - -LEAK -name=http://crbug.com/92152 -... -USER32.dll!CreateWindowExW -*!views::TooltipManagerWin::Init -*!views::TooltipManagerWin::TooltipManagerWin - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=567 a -dbghelp.dll!* -... -dbghelp.dll!StackWalk64 - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=567 b -*!* -dbghelp.dll!* -... -dbghelp.dll!StackWalk64 - -# Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and -# TppWorkerThread w/ syms. We used to use mod+offs here, but that was too -# brittle, so we switched to RPCRT4.dll!*. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=569 -RPCRT4.dll!... -ntdll.dll!* -ntdll.dll!* -KERNEL*.dll!BaseThreadInitThunk - -# TODO(timurrrr): investigate these -UNINITIALIZED READ -name=http://crbug.com/TODO a -... -*!win_util::GetLogonSessionOnlyDACL - -UNINITIALIZED READ -name=http://crbug.com/TODO b -... -ntshrui.dll!IsPathSharedW - -UNINITIALIZED READ -name=http://crbug.com/TODO c -... -*!NetApiBufferFree - -UNINITIALIZED READ -name=http://crbug.com/TODO d -... -*!ShellExecute* - -UNINITIALIZED READ -name=http://crbug.com/TODO e -... -*!SHParseDisplayName - -UNINITIALIZED READ -name=http://crbug.com/TODO f -... -*!GetCanonicalPathInfo* - -UNINITIALIZED READ -name=http://crbug.com/TODO g -... -SHELL32.dll!Ordinal* - -UNINITIALIZED READ -name=http://crbug.com/TODO h -... -GDI32.dll!GetTextExtentPoint32* - -UNINITIALIZED READ -name=http://crbug.com/TODO i -... -*!SyncSocketClientListener::OnMsgClassResponse - -UNINITIALIZED READ -name=http://crbug.com/TODO j -... -*!*NSPRInitSingleton* - -UNINITIALIZED READ -name=http://crbug.com/TODO k -*!NdrSimpleStructFree - -UNINITIALIZED READ -name=http://crbug.com/TODO l -ntdll.dll!RtlpNtOpenKey -ntdll.dll!RtlMakeSelfRelativeSD -ntdll.dll!RtlAbsoluteToSelfRelativeSD -ADVAPI32.dll!MakeSelfRelativeSD - -UNINITIALIZED READ -name=http://crbug.com/TODO m -... -CRYPT32.dll!I_CertSyncStore - -# This matches the same stack as DrMem i#751, but it's an uninit read instead of -# a leak. Must be some early thread initialization. Doesn't look like -# bit-level though. -UNINITIALIZED READ -name=http://crbug.com/TODO n -RPCRT4.dll!* -RPCRT4.dll!* -RPCRT4.dll!* -ntdll.dll!* -ntdll.dll!* -KERNEL*.dll!BaseThreadInitThunk - -# No idea where this is from, but Chrome isn't even on the stack. -POSSIBLE LEAK -name=http://crbug.com/TODO o -RPCRT4.dll!... -ole32.dll!OleInitialize -ole32.dll!... -KERNEL32.dll!BaseThreadInitThunk - -# Matches lots of RPC related leaks. So far RPC handles have been mostly owned -# by system libraries and are not something we can fix easily. -POSSIBLE LEAK -name=http://crbug.com/TODO p -RPCRT4.dll!* -RPCRT4.dll!* -RPCRT4.dll!NDRCContextBinding - -# No idea, but all system code, not interesting. -POSSIBLE LEAK -name=http://crbug.com/TODO q -RPCRT4.dll!... -RPCRT4.dll!* -RPCRT4.dll!* -ole32.dll!... -ole32.dll!* -ole32.dll!* -... -SHELL32.dll!* - -LEAK -name=http://crbug.com/109278 video device COM leaks -... -*!media::VideoCaptureDevice::* - -LEAK -name=http://crbug.com/109278 audio device COM leaks -... -*!media::GetInputDeviceNamesWin - -# False pos uninit in shell32 when resolving links. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=745 -SHELL*.dll!* -... -SHELL*.dll!* -*!file_util::ResolveShortcut - -# Probable false pos uninit in ffmpeg. Probably due to running off the end of a -# buffer with SSE/MMX instructions whose results are then masked out later. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 a -*!ff_pred4x4_vertical_vp8_mmxext - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 b -*!ff_pred4x4_down_left_mmxext - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 c -*!ff_vorbis_floor1_render_list - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 d -*!ff_put_vp8_epel8_h6_ssse3 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 e -*!ff_put_vp8_epel8_h4_ssse3 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 f -*!ff_fft_permute_sse - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 g -*!ff_simple_idct_add_mmx - -# ffmpeg seems to leak a pthread condition variable. -LEAK -name=http://crbug.com/110042 -*!ptw32_new -*!pthread_self -*!sem_wait -*!pthread_cond_wait -*!ff_thread_decode_frame -*!avcodec_decode_video2 - -# Improperly handled ioctl in bcrypt. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=748 -system call NtDeviceIoControlFile InputBuffer -bcrypt.dll!BCryptUnregisterConfigChangeNotify -bcrypt.dll!BCryptGetFipsAlgorithmMode -ntdll.dll!RtlQueryEnvironmentVariable - -# Not sure what this is. -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=749 -... -fwpuclnt.dll!* -... -RPCRT4.dll!* -... -fwpuclnt.dll!* -... -WS2_32.dll!* -*!talk_base::SafeGetHostByName -*!talk_base::SocketAddress::GetLocalIPs -*!talk_base::SocketAddress::IsLocalIP -*!cricket::Transport::VerifyCandidate -*!cricket::Session::OnRemoteCandidates -*!cricket::Session::OnTransportInfoMessage -*!cricket::Session::OnIncomingMessage -*!cricket::SessionManager::OnIncomingMessage - -# More uninit false pos in rpcrt4.dll not caught by default suppressions. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=529 -RPCRT4.dll!* -... -*!base::LaunchProcess - -# System leak from CreateEnvironmentBlock. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=757 -... -USERENV.dll!CreateEnvironmentBlock - -# Looks like another instance of 753 -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=753 -... -ntdll.dll!RtlLoadString - -# More bit manip fps -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=493 -USP10.dll!ScriptPositionSingleGlyph - -# Various TLS leaks that we don't understand yet. We should be finding a root -# for these. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=778 a -KERNELBASE.dll!TlsSetValue - -# Originally filed as: http://crbug.com/109281 -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=778 b -*!operator new -*!operator new[] -*!*::ConstructTlsVector -*!base::ThreadLocalStorage::StaticSlot::Get - -# This is an NSS PRThread object installed in TLS. Why isn't this detected as a -# root? See also http://crbug.com/32624 -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=778 c -*!PR_Calloc -*!_PR_AttachThread -*!_PRI_AttachThread - -# Bit-level fps in rich edit layer. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=791 -RICHED20.dll!* -RICHED20.dll!* - -# Already suppressed by drmemory default supp we don't have yet. -LEAK -name=i#757: RPC binding leaks in sspicli.dll -RPCRT4.dll!* -... -SspiCli.dll!* -SspiCli.dll!Cre* - -# Async NtReadFile false positives. This was fixed in drmemory r772, remove -# this supp when we pull that rev. -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=798 -system call NtReadFile parameter #5 -KERNEL32.dll!ReadFile - -# Probable syscall false positive. -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=809 -system call NtGdiPolyPolyDraw parameter #1 -*!gfx::Path::CreateNativeRegion - -# Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces -# coming out of this module (sometimes only one frame), which makes it hard to -# write precise suppressions. Until we have bit-level tracking (DRMi#113) we -# should keep this. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard -RPCRT4.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=841 a -... -CRYPTNET.dll!I_CryptNetGetConnectivity - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=841 b -... -webio.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=841 c -... -winhttp.dll!* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=841 d -... -CRYPTNET.dll!I_CryptNetGetConnectivity - -# Often missing a ntdll.dll!KiUserCallbackDispatcher frame. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=810 -instruction=test %edx %edx -USER32.dll!GetClassLongW -... -*!ui::CenterAndSizeWindow - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=815 -KERNEL*.dll!... -dxgi.dll!* -USER32.dll!GetMonitorInfoA -ntdll.dll!KiUserCallbackDispatcher -dxgi.dll!* -WinSATAPI.DLL!* - -# Suppress anything in cmd.exe. It's safer to suppress these than disable -# following, since someone might launch a Chrome process via cmd.exe. -LEAK -name=cmd.exe -... -cmd.exe!* - -# Possible true system use after free. -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=623 -KERNELBASE.dll!TlsGetValue -OLEAUT32.dll!SysFreeString -OLEAUT32.dll!SysAllocStringByteLen -OLEACC.dll!* -OLEACC.dll!* -OLEACC.dll!* -OLEACC.dll!* - -# basic_streambuf seems to leak something in creating a std::_Mutex -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=857 -ntdll.dll!... -ntdll.dll!RtlInitializeCriticalSection -*!_Mtxinit -*!std::_Mutex::_Mutex -*!std::basic_streambuf<*> - -# stdext::hash_map<> seems to swap uninitialized floats. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=931 -*!std::swap<float> -*!std::_Hash<* - -# syscall false positive on handling NtQuerySystemInformation, fix in soon. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=932 -KERNEL32.dll!K32GetPerformanceInfo - -# Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. -LEAK -name=GDI SetBrushOrgEx leak -GDI32.dll!... -GDI32.dll!GetTextMetricsW -*!gfx::PlatformFontWin::CreateHFontRef -*!gfx::PlatformFontWin::GetBaseFontRef - -############################################################### -# Benign issues in Chromium - -# This test intentionally leaks an object and checks that it's never deleted. -LEAK -name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak -... -*!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody - -LEAK -name=deliberate histogram leak -... -*!replace_operator_new -... -*!*::*Histogram::FactoryGet - -LEAK -name=deliberate leak for SampleMap -... -*!base::SampleMap::Accumulate -*!base::SparseHistogram::Add - -LEAK -name=deliberate LazyInstance leak -... -*!*LeakyLazyInstance* -... -*!base::LazyInstance*::Pointer - -LEAK -name=http://crbug.com/79933 (1) -... -*!TestURLRequestContext::Init - -LEAK -name=http://crbug.com/79933 (2) -... -*!TestURLRequestContext::TestURLRequestContext -*!TestURLRequestContextGetter::GetURLRequestContext -*!notifier::SingleLoginAttempt::SingleLoginAttempt -*!notifier::Login::StartConnection -*!syncer::InvalidationNotifier::UpdateCredentials -*!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials - -LEAK -name=http://crbug.com/79933 (3) -... -*!TestURLRequestContext::TestURLRequestContext -*!TestURLRequestContextGetter::GetURLRequestContext -*!URLFetcher::Core::StartURLRequest - -LEAK -name=http://crbug.com/79933 (4) -*!generic_cpp_alloc -*!operator new -*!std::_Allocate<net::SSLConfigService::Observer *> -*!std::allocator<net::SSLConfigService::Observer *>::allocate -*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::_Insert_n -*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::insert -*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::push_back -*!ObserverListBase<net::SSLConfigService::Observer>::AddObserver -... -*!net::HttpNetworkSession::HttpNetworkSession -*!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket -*!notifier::XmppClientSocketFactory::CreateTransportClientSocket -*!notifier::ChromeAsyncSocket::Connect -*!buzz::XmppClient::ProcessStartXmppLogin -*!buzz::XmppClient::Process -*!talk_base::Task::Step -*!talk_base::TaskRunner::InternalRunTasks -*!talk_base::TaskRunner::RunTasks -*!notifier::TaskPump::CheckAndRunTasks -*!base::internal::RunnableAdapter<void (__thiscall notifier::TaskPump::*)(void)>::Run - -# Test intentionally leaks an object. -LEAK -name=http://crbug.com/86301 -*!replace_operator_new -... -*!*_DeadReplyLoopDoesNotDelete_Test::TestBody - -# Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it. -LEAK -name=Firefox 3 NSS dll leak -nspr4.dll!* -... -*!NSSDecryptor::~NSSDecryptor - -# We get uninit reports inside GMock when it prints the bytes of references to -# partially initialized objects passed to unexpected method calls. -UNINITIALIZED READ -name=GMock printing uninit data -... -*!testing::internal2::PrintBytesInObjectTo - -############################################################### -# Real issues in Chromium - -LEAK -name=http://crbug.com/32085 -... -chrome.dll!NotificationRegistrar::Add - -LEAK -name=http://crbug.com/32623 -... -*!ssl3_HandleHandshakeMessage -*!ssl3_HandleHandshake -*!ssl3_HandleRecord -*!ssl3_GatherCompleteHandshake -... -*!SSL_ForceHandshake -*!net::SSLServerSocketNSS::DoHandshake -*!net::SSLServerSocketNSS::DoHandshakeLoop - -UNINITIALIZED READ -name=http://crbug.com/57266 (1) -... -*!remoting::EncoderVp8::Encode - -UNINITIALIZED READ -name=http://crbug.com/57266 (2) -... -*!vp8_* - -LEAK -name=http://crbug.com/70062 -*!PR_Calloc -*!PR_NewLock -... -*!InitSessionCacheLocks -*!initSessionCacheLocksLazily -*!PR_CallOnce -*!ssl_InitSessionCacheLocks -*!lock_cache -*!ssl_LookupSID -*!ssl2_BeginClientHandshake -*!ssl_Do1stHandshake -*!SSL_ForceHandshake -*!net::SSL*SocketNSS::DoHandshake -*!net::SSL*SocketNSS::DoHandshakeLoop - -LEAK -name=http://crbug.com/74417 a -*!replace_operator_new -*!disk_cache::BackendImpl::CreateEntryImpl - -LEAK -name=http://crbug.com/74417 b -*!replace_operator_new -*!disk_cache::BackendImpl::NewEntry - -# One more disk_cache::BackendImpl leak. See also http://crbug.com/87500. -LEAK -name=http://crbug.com/74417 c -*!replace_operator_new -... -*!disk_cache::EntryImpl::UserBuffer::UserBuffer - -LEAK -name=http://crbug.com/75247 -... -*!replace_operator_new -*!AutofillDownloadTestHelper::AutofillDownloadTestHelper - -LEAK -name=http://crbug.com/78784 -*!generic_cpp_alloc -*!operator new -*!TestingProfile::CreateRequestContext -*!*ProfileSyncService*::SetUp - -LEAK -name=http://crbug.com/80550 (1) -... -*!RenderWidgetHost::WasHidden - -LEAK -name=http://crbug.com/80550 (2) -... -*!RenderWidgetHost::WasRestored - -LEAK -name=http://crbug.com/87612 -... -*!SSL_ConfigSecureServer -*!net::SSLServerSocketNSS::InitializeSSLOptions -*!net::SSLServerSocketNSS::Handshake - -LEAK -name=http://crbug.com/88640 -*!generic_cpp_alloc -*!operator new -*!ProfileImpl::InitRegisteredProtocolHandlers -*!ProfileImpl::DoFinalInit -*!ProfileImpl::OnPrefsLoaded - -LEAK -name=http://crbug.com/91465 -*!generic_cpp_alloc -*!operator new -*!browser_sync::internal::WeakHandleCore<browser_sync::JsBackend>::* -*!browser_sync::WeakHandle<browser_sync::JsBackend>::* -*!syncer::SyncManager::SyncInternal::Init - -LEAK -name=http://crbug.com/91491 -... -*!CrxUpdateService::ProcessPendingItems - -UNINITIALIZED READ -name=http://crbug.com/92026 (1) -softokn3.dll!FC_GetFunctionList -... -softokn3.dll!NSC_ModuleDBFunc - -UNINITIALIZED READ -name=http://crbug.com/92026 (2) -freebl3.dll!FREEBL_GetVector -... -softokn3.dll!NSC_ModuleDBFunc - -LEAK -name=http://crbug.com/92166 -... -*!replace_operator_new -*!views::NativeWidgetWin::OnCreate - -# Possible real Chromium issue in DoCrossfade. -UNINITIALIZED READ -name=http://crbug.com/110049 -*!media::DoCrossfade<*> -*!media::Crossfade -*!media::AudioRendererAlgorithmBase::FillBuffer - -# Known sqlite3 leaks. -LEAK -name=http://crbug.com/113847 (1) -... -*!sqlite3MemMalloc -*!mallocWithAlarm -*!sqlite3Malloc -... -*!yy_reduce - -LEAK -name=http://crbug.com/113847 (2) -... -*!openDatabase -*!sqlite3_open - -LEAK -name=http://crbug.com/115328 -... -*!GenericInfoViewTest_GenericInfoView_Test::TestBody - -UNINITIALIZED READ -name=http://crbug.com/116277 -*!MOZ_Z_deflate -*!zipCloseFileInZipRaw64 - -LEAK -name=http://crbug.com/117427 a -... -*!net::HostCache::Set -*!net::HostResolverImpl::CacheResult -*!net::HostResolverImpl::Job::CompleteRequests -*!net::HostResolverImpl::Job::OnProcTaskComplete -*!base::internal::RunnableAdapter<void (__thiscall net::HostResolverImpl::Job::*)(int,net::AddressList const &)>::Run - -# Probably related to 117427. Someone is not tearing down DNS resolution during -# testing. -LEAK -name=http://crbug.com/117427 b -*!generic_cpp_alloc -*!operator new -*!base::internal::WeakReferenceOwner::GetRef -*!base::SupportsWeakPtr<net::HostResolverImpl>::AsWeakPtr -*!net::HostResolverImpl::Job::Job -*!net::HostResolverImpl::Resolve -*!net::SingleRequestHostResolver::Resolve -*!net::TransportConnectJob::DoResolveHost -*!net::TransportConnectJob::DoLoop -*!net::TransportConnectJob::ConnectInternal -*!net::ConnectJob::Connect -*!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal -*!net::internal::ClientSocketPoolBaseHelper::RequestSocket -*!net::ClientSocketPoolBase<net::TransportSocketParams>::RequestSocket -*!net::TransportClientSocketPool::RequestSocket -*!net::ClientSocketHandle::Init<net::TransportSocketParams,net::TransportClientSocketPool> -*!net::`anonymous namespace'::InitSocketPoolHelper -*!net::InitSocketHandleForRawConnect -*!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone -*!base::internal::RunnableAdapter<void (__thiscall notifier::ProxyResolvingClientSocket::*)(int)>::Run - -# IE frame possible leak of COM object. -LEAK -name=http://crbug.com/122399 -ole32.dll!... -ole32.dll!CoTaskMemAlloc -urlmon.dll!... -urlmon.dll!CreateUri -IEFRAME.dll!* - -# RenderWidgetHelper leak in DelayProfileDestruction test. -LEAK -name=http://crbug.com/125565 -*!generic_cpp_alloc -*!operator new -*!RenderProcessHostImpl::RenderProcessHostImpl -*!SiteInstanceImpl::GetProcess -*!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody - -LEAK -name=http://crbug.com/125807 -*!generic_cpp_alloc -*!operator new -*!TransportSecurityPersister::TransportSecurityPersister -*!TransportSecurityPersisterTest::TransportSecurityPersisterTest |