diff options
Diffstat (limited to 'chromium/tools/valgrind/drmemory')
-rw-r--r-- | chromium/tools/valgrind/drmemory/OWNERS | 1 | ||||
-rw-r--r-- | chromium/tools/valgrind/drmemory/PRESUBMIT.py | 35 | ||||
-rw-r--r-- | chromium/tools/valgrind/drmemory/suppressions.txt | 430 | ||||
-rw-r--r-- | chromium/tools/valgrind/drmemory/suppressions_full.txt | 1337 |
4 files changed, 0 insertions, 1803 deletions
diff --git a/chromium/tools/valgrind/drmemory/OWNERS b/chromium/tools/valgrind/drmemory/OWNERS deleted file mode 100644 index 72e8ffc0db8..00000000000 --- a/chromium/tools/valgrind/drmemory/OWNERS +++ /dev/null @@ -1 +0,0 @@ -* diff --git a/chromium/tools/valgrind/drmemory/PRESUBMIT.py b/chromium/tools/valgrind/drmemory/PRESUBMIT.py deleted file mode 100644 index 11c71478b78..00000000000 --- a/chromium/tools/valgrind/drmemory/PRESUBMIT.py +++ /dev/null @@ -1,35 +0,0 @@ -# Copyright (c) 2012 The Chromium Authors. All rights reserved. -# Use of this source code is governed by a BSD-style license that can be -# found in the LICENSE file. -""" -See http://dev.chromium.org/developers/how-tos/depottools/presubmit-scripts -for more details on the presubmit API built into gcl. -""" - - -def CheckChange(input_api, output_api): - """Checks the DrMemory suppression files for bad suppressions.""" - - # TODO(timurrrr): find out how to do relative imports - # and remove this ugly hack. Also, the CheckChange function won't be needed. - tools_vg_path = input_api.os_path.join(input_api.PresubmitLocalPath(), '..') - import sys - old_path = sys.path - try: - sys.path = sys.path + [tools_vg_path] - import suppressions - return suppressions.PresubmitCheck(input_api, output_api) - finally: - sys.path = old_path - - -def CheckChangeOnUpload(input_api, output_api): - return CheckChange(input_api, output_api) - - -def CheckChangeOnCommit(input_api, output_api): - return CheckChange(input_api, output_api) - - -def GetPreferredTrySlaves(): - return ['win_drmemory'] diff --git a/chromium/tools/valgrind/drmemory/suppressions.txt b/chromium/tools/valgrind/drmemory/suppressions.txt deleted file mode 100644 index 7678adb3b2b..00000000000 --- a/chromium/tools/valgrind/drmemory/suppressions.txt +++ /dev/null @@ -1,430 +0,0 @@ -# This file contains suppressions for the Dr.Memory tool, see -# http://dev.chromium.org/developers/how-tos/using-drmemory -# -# This file contains suppressions for the DrMemory reports happening -# in the 'light' mode (a.k.a. drmemory_light) as well as in the 'full' mode. -# Please use suppressions_full.txt for all the reports that can happen only -# in the full mode (drmemory_full), - -############################ -# Known reports on the third party we have no control over. - -# Reports from Sophos antivirus -UNADDRESSABLE ACCESS -name=Sophos UNADDR -... -sophos*.dll!* - -UNINITIALIZED READ -name=Sophos UNINIT -... -sophos*.dll!* - -LEAK -name=Sophos LEAK -... -sophos*.dll!* - -# Reports from Micorosft RDP ActiveX control (mstscax.dll) - -GDI USAGE ERROR -name=crbug.com/177832: mstscax.dll causes "GDI USAGE ERROR" errors. -... -mstscax.dll!* - -UNADDRESSABLE ACCESS -name=crbug.com/177832: mstscax.dll causes "UNADDRESSABLE ACCESS" errors. -... -mstscax.dll!* - -############################ -# Suppress some false reports due to bugs in Dr.Memory like wrong analysis -# assumptions or unhandled syscalls - -# Please note: the following suppressions were written in the abscense of -# private symbols so may need to be updated when we switch to auto-loading PDBs - -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=12 UNADDR -... -SHELL32.dll!SHFileOperation* - -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=40 UNADDR -... -WINSPOOL.DRV!* - -INVALID HEAP ARGUMENT -name=http://code.google.com/p/drmemory/issues/detail?id=40 INVALID HEAP -... -WINSPOOL.DRV!* - -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=59 -... -*!SetEnvironmentVariable* - -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=68 (UNADDR 1) -... -MSWSOCK.dll!WSPStartup - -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=68 (UNADDR 2) -... -ntdll.dll!RtlValidateUnicodeString - -############################ -# TODO(timurrrr): investigate these -UNADDRESSABLE ACCESS -name=TODO SHParseDisplayName -... -*!SHParseDisplayName - -UNADDRESSABLE ACCESS -name=TODO GetCanonicalPathInfo -... -*!GetCanonicalPathInfo* - -UNADDRESSABLE ACCESS -name=TODO CreateDC -... -GDI32.dll!CreateDC* - -# This one looks interesting -INVALID HEAP ARGUMENT -name=TODO ExitProcess -... -KERNEL32.dll!ExitProcess - -INVALID HEAP ARGUMENT -name=http://crbug.com/103365 (a) -ppapi_tests.dll!* -... -ppapi_tests.dll!* -*!base::internal::RunnableAdapter<*>::Run - -INVALID HEAP ARGUMENT -name=http://crbug.com/103365 (b) -ppapi_tests.dll!* -... -ppapi_tests.dll!* -*!PP_RunCompletionCallback -... -*!base::internal::RunnableAdapter<*>::Run - -INVALID HEAP ARGUMENT -name=http://crbug.com/107567 intentional mismatch in _DebugHeapDelete, no frame -*!std::numpunct<*>::_Tidy -*!std::numpunct<*>::~numpunct<*> - -# TODO(rbultje): Investigate if code fix is required instead. -WARNING -name=http://crbug.com/223255 - prefetches in vp8 -instruction=prefetch* -ffmpegsumo.dll!ff_prefetch_mmxext -ffmpegsumo.dll!vp8_decode_mb_row_no_filter - -############################ -# Intentional errors in Chromium tests (ToolsSanityTests) -LEAK -name=sanity test 01 (memory leak) -base_unittests.exe!operator new -base_unittests.exe!operator new[] -base_unittests.exe!base::ToolsSanityTest_MemoryLeak_Test::TestBody - -# "..." is needed due to http://code.google.com/p/drmemory/issues/detail?id=666 -UNADDRESSABLE ACCESS -name=sanity test 02 (malloc/read left) -base_unittests.exe!*ReadValueOutOfArrayBoundsLeft -... -base_unittests.exe!base::ToolsSanityTest_AccessesToMallocMemory_Test::TestBody - -UNADDRESSABLE ACCESS -name=sanity test 03 (malloc/read right) -base_unittests.exe!*ReadValueOutOfArrayBoundsRight -base_unittests.exe!*MakeSomeErrors -base_unittests.exe!base::ToolsSanityTest_AccessesToMallocMemory_Test::TestBody - -UNADDRESSABLE ACCESS -name=sanity test 04 (malloc/write left) -base_unittests.exe!*WriteValueOutOfArrayBoundsLeft -base_unittests.exe!*MakeSomeErrors -base_unittests.exe!base::ToolsSanityTest_AccessesToMallocMemory_Test::TestBody - -UNADDRESSABLE ACCESS -name=sanity test 05 (malloc/write right) -base_unittests.exe!*WriteValueOutOfArrayBoundsRight -base_unittests.exe!*MakeSomeErrors -base_unittests.exe!base::ToolsSanityTest_AccessesToMallocMemory_Test::TestBody - -# "..." is needed due to http://code.google.com/p/drmemory/issues/detail?id=666 -UNADDRESSABLE ACCESS -name=sanity test 06 (new/read left) -base_unittests.exe!*ReadValueOutOfArrayBoundsLeft -... -base_unittests.exe!base::ToolsSanityTest_AccessesToNewMemory_Test::TestBody - -UNADDRESSABLE ACCESS -name=sanity test 07 (new/read right) -base_unittests.exe!*ReadValueOutOfArrayBoundsRight -base_unittests.exe!*MakeSomeErrors -base_unittests.exe!base::ToolsSanityTest_AccessesToNewMemory_Test::TestBody - -UNADDRESSABLE ACCESS -name=sanity test 08 (new/write left) -base_unittests.exe!*WriteValueOutOfArrayBoundsLeft -base_unittests.exe!*MakeSomeErrors -base_unittests.exe!base::ToolsSanityTest_AccessesToNewMemory_Test::TestBody - -UNADDRESSABLE ACCESS -name=sanity test 09 (new/write right) -base_unittests.exe!*WriteValueOutOfArrayBoundsRight -base_unittests.exe!*MakeSomeErrors -base_unittests.exe!base::ToolsSanityTest_AccessesToNewMemory_Test::TestBody - -UNADDRESSABLE ACCESS -name=sanity test 10 (write after free) -base_unittests.exe!base::ToolsSanityTest_AccessesToMallocMemory_Test::TestBody - -UNADDRESSABLE ACCESS -name=sanity test 11 (write after delete) -base_unittests.exe!base::ToolsSanityTest_AccessesToNewMemory_Test::TestBody - -INVALID HEAP ARGUMENT -name=sanity test 12 (array deleted without []) -base_unittests.exe!base::ToolsSanityTest_ArrayDeletedWithoutBraces_Test::TestBody - -INVALID HEAP ARGUMENT -name=sanity test 13 (single element deleted with []) -base_unittests.exe!base::ToolsSanityTest_SingleElementDeletedWithBraces_Test::TestBody - -UNINITIALIZED READ -name=sanity test 14 (malloc/read uninit) -base_unittests.exe!*ReadUninitializedValue -base_unittests.exe!*MakeSomeErrors -base_unittests.exe!base::ToolsSanityTest_AccessesToMallocMemory_Test::TestBody - -UNINITIALIZED READ -name=sanity test 15 (new/read uninit) -base_unittests.exe!*ReadUninitializedValue -base_unittests.exe!*MakeSomeErrors -base_unittests.exe!base::ToolsSanityTest_AccessesToNewMemory_Test::TestBody - -UNADDRESSABLE ACCESS -name=AboutHandler::AboutCrash deliberate crash -# TODO(bruening): switch to annotation once have support for that -chrome.dll!AboutHandler::AboutCrash - -UNADDRESSABLE ACCESS -name=NPAPITesterBase.NoHangIfInitCrashes deliberate crash -# function is small, little risk for false negative in rest of it -# TODO(bruening): switch to annotation once have support for that -npapi_test_plugin.dll!NPAPIClient::PluginClient::Initialize - -# Deliberate NULL deref to crash the child process -UNADDRESSABLE ACCESS -name=CrashingChildProcess deliberate crash -*!CrashingChildProcess - -UNADDRESSABLE ACCESS -name=::Crasher::Run deliberate crash -*!base::`anonymous namespace'::Crasher::Run - -############################ -# Benign issues in Chromium - -WARNING -name=http://crbug.com/72463 - prefetches in generated MemCopy -instruction=prefetch* -<not in a module> -chrome.dll!v8::internal::CopyChars* - -WARNING -name=prefetches in NVD3DUM.dll -instruction=prefetch* -NVD3DUM.dll!* - -WARNING -name=prefetches in igdumd32.dll -instruction=prefetch* -igdumd32.dll!* - -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=582 bizarre cl-generated read-beyond-TOS -instruction=mov 0xfffffffc(%esp) -> %eax -chrome.dll!WebCore::RenderStyle::resetBorder* - -INVALID HEAP ARGUMENT -name=http://crbug.com/101537 -*!scoped_ptr<_TOKEN_USER>* - -INVALID HEAP ARGUMENT -name=http://crbug.com/101717 (1) -*!scoped_ptr<_TOKEN_DEFAULT_DACL>* - -INVALID HEAP ARGUMENT -name=http://crbug.com/101717 (2) -*!sandbox::PolicyBase::~PolicyBase - -INVALID HEAP ARGUMENT -name=http://crbug.com/101717 (3) -*!scoped_ptr<_UNICODE_STRING>::~scoped_ptr<_UNICODE_STRING> -*!sandbox::GetHandleName - -INVALID HEAP ARGUMENT -name=http://crbug.com/101717 (4) -*!scoped_ptr<_OBJECT_NAME_INFORMATION>::~scoped_ptr<_OBJECT_NAME_INFORMATION> -*!sandbox::GetPathFromHandle - -GDI USAGE ERROR -name=http://code.google.com/p/drmemory/issues/detail?id=899 deleting bitmap which is probably safe -system call NtGdiDeleteObjectApp -*!skia::`anonymous namespace'::Bitmap::~Bitmap -*!skia::`anonymous namespace'::Bitmap::`scalar deleting destructor' - -############################ -# Real issues in Chromium - -UNADDRESSABLE ACCESS -name=http://crbug.com/88213 -*!base::win::ObjectWatcher::StopWatching -*!base::win::ObjectWatcher::WillDestroyCurrentMessageLoop -*!MessageLoop::~MessageLoop - -UNADDRESSABLE ACCESS -name=http://crbug.com/96010 -*!TestingProfile::FinishInit -*!TestingProfile::TestingProfile -*!BrowserAboutHandlerTest_WillHandleBrowserAboutURL_Test::TestBody - -UNADDRESSABLE ACCESS -name=http://crbug.com/106522 -npapi_test_plugin.dll!NPAPIClient::PluginTest::id -npapi_test_plugin.dll!NPAPIClient::ExecuteGetJavascriptUrlTest::TimerProc - -GDI USAGE ERROR -name=http://crbug.com/109963 c -system call NtGdiDeleteObjectApp -GDI32.dll!DeleteDC -content.dll!* - -GDI USAGE ERROR -name=http://crbug.com/109963 d -system call NtGdiDeleteObjectApp -GDI32.dll!DeleteDC -*!base::internal::RunnableAdapter* - -# GDI usage errors in 3rd-party components -GDI USAGE ERROR -name=http://crbug.com/119552 a -system call NtGdiDeleteObjectApp -... -*!OmniboxViewWin::* - -GDI USAGE ERROR -name=http://crbug.com/119552 b -system call Nt* -... -*!ATL::* - -GDI USAGE ERROR -name=http://crbug.com/119552 c -# optional gdi32.dll frame followed by user32.dll -# TODO(bruening): once have -# http://code.google.com/p/drmemory/issues/detail?id=846 -# I would do "gdi32.dll!...\nuser32.dll!*" -*32.dll!* -... -shell32.dll!SHGetFileInfoW -*!IconLoader::ReadIcon - -GDI USAGE ERROR -name=http://crbug.com/119552 d -system call NtGdiDeleteObjectApp -gdi32.dll!DeleteObject -riched20.dll!* -riched20.dll!* -riched20.dll!* - -GDI USAGE ERROR -name=http://crbug.com/120157 -# "ReleaseDC called from different thread than GetDC" -system call NtUserCallOneParam.RELEASEDC -*!*FontCache::CacheElement::~CacheElement - -GDI USAGE ERROR -name=http://crbug.com/158090 -# "DC created by one thread and used by another" -... -content.dll!content::*::FontCache::PreCacheFont -content.dll!content::FontCacheDispatcher::OnPreCacheFont -content.dll!DispatchToMethod<content::FontCacheDispatcher* - -GDI USAGE ERROR -name=http://crbug.com/158090 c#4 -# ReleaseDC for DC called from different thread than the thread that called GetDC -system call NtUserCallOneParam.RELEASEDC -ui.dll!gfx::ReadColorProfile -ui.dll!gfx::GetColorProfile -content.dll!content::RenderMessageFilter::OnGetMonitorColorProfile -content.dll!DispatchToMethod* - -INVALID HEAP ARGUMENT -name=http://crbug.com/158350 -# allocated with operator new[], freed with operator delete -*!* -*!* -*!* -*!* -*!* -content.dll!* -content.dll!* -content.dll!* -content.dll!* -content.dll!* -*!* -*!* -*!* -*!* -*!* -KERNEL32.dll!* -ntdll.dll!* -ntdll.dll!* - -WARNING -name=Security test (new oveflow) -MSVCR100D.dll!operator new -*!operator new -*!operator new[] -*!`anonymous namespace'::SecurityTest_NewOverflow_Test::TestBody -*!testing::internal::HandleExceptionsInMethodIfSupported<testing::Test,void> - -WARNING -name=Security test (calloc overflow) -*!`anonymous namespace'::CallocReturnsNull -*!`anonymous namespace'::SecurityTest_CallocOverflow_Test::TestBody -*!testing::internal::HandleExceptionsInMethodIfSupported<testing::Test,void> - -GDI USAGE ERROR -name=http://crbug.com/234484 -# "DC created by one thread and used by another" -... -*!chrome::`anonymous namespace'::SetOverlayIcon - -INVALID HEAP ARGUMENT -name=http://crbug.com/262088 -drmemorylib.dll!av_dup_packet -msvcrt.dll!wcsrchr -ntdll.dll!RtlIsCurrentThreadAttachExempt -ntdll.dll!LdrShutdownThread -ntdll.dll!RtlExitUserThread - -GDI USAGE ERROR -name=http://crbug.com/266484 -skia.dll!HDCOffscreen::draw -skia.dll!SkScalerContext_GDI::generateImage -skia.dll!SkScalerContext::getImage -skia.dll!SkGlyphCache::findImage -skia.dll!D1G_NoBounder_RectClip -skia.dll!SkDraw::drawText diff --git a/chromium/tools/valgrind/drmemory/suppressions_full.txt b/chromium/tools/valgrind/drmemory/suppressions_full.txt deleted file mode 100644 index 76a1dfb4ce5..00000000000 --- a/chromium/tools/valgrind/drmemory/suppressions_full.txt +++ /dev/null @@ -1,1337 +0,0 @@ -# This file contains suppressions for the Dr.Memory tool, see -# http://dev.chromium.org/developers/how-tos/using-drmemory -# -# This file should contain suppressions only for the reports happening -# in the 'full' mode (drmemory_full). -# For the reports that can happen in the light mode (a.k.a. drmemory_light), -# please use suppressions.txt instead. - -############################################################### -# Known reports on the third party we have no control over. -UNINITIALIZED READ -name=deflate UNINIT -... -*!deflate_* -*!MOZ_Z_deflate - -# TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=406 -ADVAPI32.dll!WmiOpenBlock -ADVAPI32.dll!WmiOpenBlock - -# Leaks inside GoogleDesktop - it injects into our processes for some reason -LEAK -name=GoogleDesktop LEAK -... -GoogleDesktopNetwork3.DLL!DllUnregisterServer - -# They deliberately use uninit local var in sqlite random generator -# random byte may mess up the call stack between randomByte and -# sqlite3_randomness -UNINITIALIZED READ -name=sqlite3_randomness UNINIT -*!randomByte -... -*!sqlite3_randomness - -# Intentional leak in WebKit Template Framework for ThreadData. -LEAK -name=intentional WTF ThreadData leak -... -*!WTF::wtfThreadData - -# Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT. -LEAK -name=http://crbug.com/125558 a -KERNELBASE.dll!LocalAlloc -SECHOST.dll!... -SECHOST.dll!NotifyServiceStatusChange -WINHTTP.dll!... -WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl -*!net::ProxyResolverWinHttp::GetProxyForURL - -# Tiny locale-related leaks in ntdll. Probably system bug. -LEAK -name=http://crbug.com/125558 b -ntdll.dll!... -ntdll.dll!* -KERNELBASE.dll!... -KERNELBASE.dll!GetCPInfoExW -webio.dll!* -webio.dll!* -webio.dll!* -WINHTTP.dll!... -WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser -*!net::ProxyConfigServiceWin::GetCurrentProxyConfig - -UNINITIALIZED READ -name=http://crbug.com/30704 #f -libpng.dll!wk_png_write_find_filter -libpng.dll!wk_png_write_row - -############################################################### -# Suppress some false reports due to bugs in Dr.Memory like wrong analysis -# assumptions or unhandled syscalls - -# Please note: the following suppressions were written in the abscense of -# private symbols so may need to be updated when we switch to auto-loading PDBs -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (1) -ntdll.dll!Rtl* -ntdll.dll!Rtl* -ntdll.dll!RtlFindActivationContextSectionString - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (2) -... -SHELL32.dll!SHFileOperation* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (3) -... -SHELL32.dll!SHGetFolderPath* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=12 (4) -... -SHELL32.dll!SHGetFolderPath* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (5) -... -SHELL32.dll!SHCreateDirectory* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (6) -... -SHELL32.dll!ILLoadFromStream* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (7) -... -SHELL32.dll!ILSaveToStream* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=12 (8) -... -SHELL32.dll!SHFileOperation* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=12 (9) -... -SHELL32.dll!SHGetItemFromDataObject - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=12 (10) -... -SHELL32.dll!SHGetItemFromDataObject - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=12 (11) -... -ole32.dll!* -SHELL32.dll!SHChangeNotifySuspendResume - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=14 (1) -... -*!CreateProcess* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=14 (2) -... -*!CreateProcess* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=14 (3) -... -*!base::LaunchApp* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=17 (1) -... -*!CreateWindow* - -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=17 (2) -GDI32.dll!* -GDI32.dll!CreateFontIndirectExW -GDI32.dll!CreateFontIndirectW - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=17 (3) -KERNELBASE.dll!LocalAlloc -... -USER32.dll!CreateWindow* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=18 a -... -*!CoInitialize* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=18 b -... -*!CoCreateInstance* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=18 c -... -*!CoUninitialize* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=18 d -... -UxTheme.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=40 a -... -WINSPOOL.DRV!* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=40 b -... -WINSPOOL.DRV!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=48 a -system call NtContinue -... -*!*SetThreadName - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=48 b -system call NtContinue -*!WTF::initializeCurrentThreadInternal - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=52 a -... -DBGHELP.dll!SymInitialize - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=52 b -... -DBGHELP.dll!SymEnumSourceFiles - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=52 c -... -msvcrt.dll!_RTDynamicCast - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp -instruction=test 0x*(%*) $0x?? -DBGHELP.dll!SymUnloadModule64 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=53 -ADVAPI32.dll!WmiMofEnumerateResourcesA -ADVAPI32.dll!WmiMofEnumerateResourcesA -ADVAPI32.dll!Sta*TraceW - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=58 -... -*!_cfltcvt_l - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=60 -USP10.dll!* -... -USP10.dll!ScriptStringAnalyse - -LEAK -IMM32.dll!ImmGetIMCCSize -IMM32.dll!ImmLockClientImc -IMM32.dll!ImmDisableIME -IMM32.dll!ImmSetActiveContext -USER32.dll!IMPSetIMEA - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=65 a -... -*!SystemFunction036 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=65 b -... -*!talk_base::CreateRandomString - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=68 a -... -WS2_32.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=68 b -... -ADVAPI32.dll!SetSecurityDescriptorDacl - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=68 c -... -MSWSOCK.dll!WSPStartup - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=68 d -... -ntdll.dll!RtlValidateUnicodeString - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=256 -*!_mtinit -*!__tmainCRTStartup -*!mainCRTStartup - -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=274 a -... -GDI32.dll!CreateDCW - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=274 b -... -GDI32.dll!CreateDCW - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=275 -... -*!_getptd* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=276 -... -ntdll.dll!RtlConvertUlongToLargeInteger -ntdll.dll!RtlConvertUlongToLargeInteger -ntdll.dll!KiUserExceptionDispatcher - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=305 -*!free -*!free -*!operator new -... -*!MiniDumpWriteDump - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=346 a -... -GDI32.dll!CloseEnhMetaFile - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=346 b -GDI32.dll!SetPolyFillMode -GDI32.dll!CreateICW - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=362 -USER32.dll!UnregisterClass* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=382 -... -ntdll.dll!CsrNewThread - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=397 -system call NtDeviceIoControlFile InputBuffer -ADVAPI32.dll!ImpersonateAnonymousToken - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=407 a -system call NtRequestWaitReplyPort -RPCRT4.dll!I_RpcSendReceive -RPCRT4.dll!NdrSendReceive - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=407 b -IMM32.dll!* -ntdll.dll!LdrInitializeThunk -ntdll.dll!LdrShutdownThread - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 a -ADVAPI32.dll!RegDeleteValue* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 b -... -ADVAPI32.dll!Crypt* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 c -... -RPCRT4.dll!NdrClientCall2 - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=412 d -RSAENH.dll!DllUnregisterServer -... -ADVAPI32.dll!CryptAcquireContextA -CRYPT32.dll!CryptEnumOIDFunction -... -CRYPT32.dll!CertFindCertificateInStore - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 e -... -RSAENH.dll!CPGenRandom - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 f -... -CRYPT??.dll!Crypt* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 g -*!replace_memcmp -... -*!testing::internal::CmpHelperEQ* -... -*!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody - -# We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't -# have frame pointers, and we have trouble unwinding from it. Therefore, we use -# this broad suppression, effectively disabling uninit checks in rsaenh.dll. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=412 h -RSAENH.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=425 a -CLBCatQ.DLL!DestroyStgDatabase -CLBCatQ.DLL!PostError -CLBCatQ.DLL!PostError - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=425 b -RPCRT4.dll!I_RpcBCacheFree -RPCRT4.dll!I_RpcBCacheFree -... -RPCRT4.dll!NdrClientCall2 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=425 c -msdmo.dll!* -msdmo.dll!* -DEVENUM.DLL!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=435 a -... -ntdll.dll!RtlSetSecurityObject -ntdll.dll!RtlNewSecurityObjectEx -ADVAPI32.dll!CreatePrivateObjectSecurityEx -NTMARTA.dll!AccRewriteSetNamedRights - -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=435 b -WLDAP32.dll!Ordinal325 -... -WLDAP32.dll!Ordinal325 -ntdll.dll!LdrInitializeThunk -ntdll.dll!LdrFindResourceDirectory_U -ntdll.dll!RtlValidateUnicodeString -ntdll.dll!LdrLoadDll -KERNEL32.dll!LoadLibraryExW - -# mod+offs suppression because the symbolic makes no sense and changes -# completely in the presence of WS2_32.dll symbols. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=438 -<WS2_32.dll+0x260c> -<WS2_32.dll+0x2b76> -<WS2_32.dll+0x2c61> - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=454 a -... -WINMM.dll!wave*GetNumDevs - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=454 b -... -WINMM.dll!wave*GetNumDevs - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=466 -ntdll.dll!RtlRunOnceBeginInitialize -ntdll.dll!RtlInitializeCriticalSectionAndSpinCount - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=471 a -*!media::AudioRendererAlgorithmOLA::Crossfade<unsigned char> -*!media::AudioRendererAlgorithmOLA::FillBuffer -*!media::AudioRendererAlgorithmOLATest_FillBuffer_* - -# Uninit reported in copy ctor. Would be nice if we could specify which ctor -# overload to suppress. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=471 b -*!WebCore::FormDataElement::FormDataElement - -# Another default copy ctor uninit. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=471 c -*!WebCore::CachedResourceLoader::InitiatorInfo::InitiatorInfo -... -*!WTF::Hash* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=473 a -system call NtDeviceIoControlFile InputBuffer -... -iphlpapi.dll!GetAdaptersAddresses - -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=473 b -ESENT.dll!* -ESENT.dll!* -ESENT.dll!* -ntdll.dll!Ldr*Init* -ntdll.dll!Ldr* -ntdll.dll!* -ntdll.dll!LdrLoadDll -... -iphlpapi.dll!GetPerAdapterInfo -... -iphlpapi.dll!GetAdaptersAddresses - -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=473 c -RPCRT4.dll!* -RPCRT4.dll!* -... -IPHLPAPI.DLL!GetAdaptersAddresses - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=475 -... -ADVAPI32.dll!CryptAcquireContextA -... -CRYPT32.dll!CryptMsgOpenToDecode -... -CRYPT32.dll!CryptQueryObject - -# Lots of leaks from our interactions with the system certificate store. May be -# worth reviewing our use of their API. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 a -KERNEL*.dll!LocalAlloc -... -CRYPT32.dll!CertGetCRLContextProperty - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 b -KERNEL*.dll!LocalAlloc -... -CRYPT32.dll!CertAddCRLContextToStore - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 c -KERNEL*.dll!LocalAlloc -... -CRYPT32.dll!CertOpenStore - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 d -... -CRYPT32.dll!CertOpenSystemStore? - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 e -... -CRYPT32.dll!CertGetCertificateChain - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 f -... -CRYPT32.dll!CertCompareIntegerBlob - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 g -... -CRYPT32.dll!CryptUnprotectData - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 h -KERNEL*.dll!LocalAlloc -... -CRYPT32.dll!CertEnumCertificatesInStore - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 i -... -CRYPT32.dll!CryptProtectData - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=476 j -... -CRYPT32.dll!CryptExportPublicKeyInfoEx - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=502 a -system call NtSecureConnectPort parameter #3 -GDI32.dll!* -GDI32.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=502 b -system call NtGdiEnumFonts parameter #6 -GDI32.dll!* -GDI32.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=511 a -RPCRT4.dll!... -ole32.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=511 b -ole32.dll!* -ole32.dll!* -ole32.dll!StringFromGUID2 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=512 a -... -*!browser_sync::Cryptographer::PackBootstrapToken -*!browser_sync::Cryptographer::GetBootstrapToken - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=512 b -... -*!Encrypt* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=513 a -*!v8* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=513 b -*!* -*!v8* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=513 c -<not in a module> -... -*!v8* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=546 -... -mscms.dll!* -... -GDI32.dll!* -*!IconUtil::Create*HICON* - -LEAK -name=http://crbug.com/92152 -... -USER32.dll!CreateWindowExW -*!views::TooltipManagerWin::Init -*!views::TooltipManagerWin::TooltipManagerWin - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=567 a -dbghelp.dll!* -... -dbghelp.dll!StackWalk64 - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=567 b -*!* -dbghelp.dll!* -... -dbghelp.dll!StackWalk64 - -# Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and -# TppWorkerThread w/ syms. We used to use mod+offs here, but that was too -# brittle, so we switched to RPCRT4.dll!*. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=569 -RPCRT4.dll!... -ntdll.dll!* -ntdll.dll!* -KERNEL*.dll!BaseThreadInitThunk - -# TODO(timurrrr): investigate these -UNINITIALIZED READ -name=http://crbug.com/TODO a -... -*!win_util::GetLogonSessionOnlyDACL - -UNINITIALIZED READ -name=http://crbug.com/TODO b -... -ntshrui.dll!IsPathSharedW - -UNINITIALIZED READ -name=http://crbug.com/TODO c -... -*!NetApiBufferFree - -UNINITIALIZED READ -name=http://crbug.com/TODO d -... -*!ShellExecute* - -UNINITIALIZED READ -name=http://crbug.com/TODO e -... -*!SHParseDisplayName - -UNINITIALIZED READ -name=http://crbug.com/TODO f -... -*!GetCanonicalPathInfo* - -UNINITIALIZED READ -name=http://crbug.com/TODO g -... -SHELL32.dll!Ordinal* - -UNINITIALIZED READ -name=http://crbug.com/TODO h -... -GDI32.dll!GetTextExtentPoint32* - -UNINITIALIZED READ -name=http://crbug.com/TODO i -... -*!SyncSocketClientListener::OnMsgClassResponse - -UNINITIALIZED READ -name=http://crbug.com/TODO j -... -*!*NSPRInitSingleton* - -UNINITIALIZED READ -name=http://crbug.com/TODO k -*!NdrSimpleStructFree - -UNINITIALIZED READ -name=http://crbug.com/TODO l -ntdll.dll!RtlpNtOpenKey -ntdll.dll!RtlMakeSelfRelativeSD -ntdll.dll!RtlAbsoluteToSelfRelativeSD -ADVAPI32.dll!MakeSelfRelativeSD - -UNINITIALIZED READ -name=http://crbug.com/TODO m -... -CRYPT32.dll!I_CertSyncStore - -# This matches the same stack as DrMem i#751, but it's an uninit read instead of -# a leak. Must be some early thread initialization. Doesn't look like -# bit-level though. -UNINITIALIZED READ -name=http://crbug.com/TODO n -RPCRT4.dll!* -RPCRT4.dll!* -RPCRT4.dll!* -ntdll.dll!* -ntdll.dll!* -KERNEL*.dll!BaseThreadInitThunk - -# No idea where this is from, but Chrome isn't even on the stack. -POSSIBLE LEAK -name=http://crbug.com/TODO o -RPCRT4.dll!... -ole32.dll!OleInitialize -ole32.dll!... -KERNEL32.dll!BaseThreadInitThunk - -# Matches lots of RPC related leaks. So far RPC handles have been mostly owned -# by system libraries and are not something we can fix easily. -POSSIBLE LEAK -name=http://crbug.com/TODO p -RPCRT4.dll!* -RPCRT4.dll!* -RPCRT4.dll!NDRCContextBinding - -# No idea, but all system code, not interesting. -POSSIBLE LEAK -name=http://crbug.com/TODO q -RPCRT4.dll!... -RPCRT4.dll!* -RPCRT4.dll!* -ole32.dll!... -ole32.dll!* -ole32.dll!* -... -SHELL32.dll!* - -LEAK -name=http://crbug.com/109278 video device COM leaks -... -*!media::VideoCaptureDevice::* - -LEAK -name=http://crbug.com/109278 audio device COM leaks -... -*!media::GetInputDeviceNamesWin - -# False pos uninit in shell32 when resolving links. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=745 -SHELL*.dll!* -... -SHELL*.dll!* -*!file_util::ResolveShortcut - -# Probable false pos uninit in ffmpeg. Probably due to running off the end of a -# buffer with SSE/MMX instructions whose results are then masked out later. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 a -*!ff_pred4x4_vertical_vp8_mmxext - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 b -*!ff_pred4x4_down_left_mmxext - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 c -*!ff_vorbis_floor1_render_list - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 d -*!ff_put_vp8_epel8_h6_ssse3 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 e -*!ff_put_vp8_epel8_h4_ssse3 - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 f -*!ff_fft_permute_sse - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=747 g -*!ff_simple_idct_add_mmx - -# ffmpeg seems to leak a pthread condition variable. -LEAK -name=http://crbug.com/110042 -*!ptw32_new -*!pthread_self -*!sem_wait -*!pthread_cond_wait -*!ff_thread_decode_frame -*!avcodec_decode_video2 - -# Improperly handled ioctl in bcrypt. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=748 -system call NtDeviceIoControlFile InputBuffer -bcrypt.dll!BCryptUnregisterConfigChangeNotify -bcrypt.dll!BCryptGetFipsAlgorithmMode -ntdll.dll!RtlQueryEnvironmentVariable - -# Not sure what this is. -POSSIBLE LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=749 -... -fwpuclnt.dll!* -... -RPCRT4.dll!* -... -fwpuclnt.dll!* -... -WS2_32.dll!* -*!talk_base::SafeGetHostByName -*!talk_base::SocketAddress::GetLocalIPs -*!talk_base::SocketAddress::IsLocalIP -*!cricket::Transport::VerifyCandidate -*!cricket::Session::OnRemoteCandidates -*!cricket::Session::OnTransportInfoMessage -*!cricket::Session::OnIncomingMessage -*!cricket::SessionManager::OnIncomingMessage - -# More uninit false pos in rpcrt4.dll not caught by default suppressions. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=529 -RPCRT4.dll!* -... -*!base::LaunchProcess - -# System leak from CreateEnvironmentBlock. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=757 -... -USERENV.dll!CreateEnvironmentBlock - -# Looks like another instance of 753 -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=753 -... -ntdll.dll!RtlLoadString - -# More bit manip fps -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=493 -USP10.dll!ScriptPositionSingleGlyph - -# Various TLS leaks that we don't understand yet. We should be finding a root -# for these. -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=778 a -KERNELBASE.dll!TlsSetValue - -# Originally filed as: http://crbug.com/109281 -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=778 b -*!operator new -*!operator new[] -*!*::ConstructTlsVector -*!base::ThreadLocalStorage::StaticSlot::Get - -# This is an NSS PRThread object installed in TLS. Why isn't this detected as a -# root? See also http://crbug.com/32624 -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=778 c -*!PR_Calloc -*!_PR_AttachThread -*!_PRI_AttachThread - -# Bit-level fps in rich edit layer. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=791 -RICHED20.dll!* -RICHED20.dll!* - -# Already suppressed by drmemory default supp we don't have yet. -LEAK -name=i#757: RPC binding leaks in sspicli.dll -RPCRT4.dll!* -... -SspiCli.dll!* -SspiCli.dll!Cre* - -# Async NtReadFile false positives. This was fixed in drmemory r772, remove -# this supp when we pull that rev. -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=798 -system call NtReadFile parameter #5 -KERNEL32.dll!ReadFile - -# Probable syscall false positive. -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=809 -system call NtGdiPolyPolyDraw parameter #1 -*!gfx::Path::CreateNativeRegion - -# Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces -# coming out of this module (sometimes only one frame), which makes it hard to -# write precise suppressions. Until we have bit-level tracking (DRMi#113) we -# should keep this. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard -RPCRT4.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=841 a -... -CRYPTNET.dll!I_CryptNetGetConnectivity - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=841 b -... -webio.dll!* - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=841 c -... -winhttp.dll!* - -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=841 d -... -CRYPTNET.dll!I_CryptNetGetConnectivity - -# Often missing a ntdll.dll!KiUserCallbackDispatcher frame. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=810 -instruction=test %edx %edx -USER32.dll!GetClassLongW -... -*!ui::CenterAndSizeWindow - -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=815 -KERNEL*.dll!... -dxgi.dll!* -USER32.dll!GetMonitorInfoA -ntdll.dll!KiUserCallbackDispatcher -dxgi.dll!* -WinSATAPI.DLL!* - -# Suppress anything in cmd.exe. It's safer to suppress these than disable -# following, since someone might launch a Chrome process via cmd.exe. -LEAK -name=cmd.exe -... -cmd.exe!* - -# Possible true system use after free. -UNADDRESSABLE ACCESS -name=http://code.google.com/p/drmemory/issues/detail?id=623 -KERNELBASE.dll!TlsGetValue -OLEAUT32.dll!SysFreeString -OLEAUT32.dll!SysAllocStringByteLen -OLEACC.dll!* -OLEACC.dll!* -OLEACC.dll!* -OLEACC.dll!* - -# basic_streambuf seems to leak something in creating a std::_Mutex -LEAK -name=http://code.google.com/p/drmemory/issues/detail?id=857 -ntdll.dll!... -ntdll.dll!RtlInitializeCriticalSection -*!_Mtxinit -*!std::_Mutex::_Mutex -*!std::basic_streambuf<*> - -# stdext::hash_map<> seems to swap uninitialized floats. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=931 -*!std::swap<float> -*!std::_Hash<* - -# syscall false positive on handling NtQuerySystemInformation, fix in soon. -UNINITIALIZED READ -name=http://code.google.com/p/drmemory/issues/detail?id=932 -KERNEL32.dll!K32GetPerformanceInfo - -# Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. -LEAK -name=GDI SetBrushOrgEx leak -GDI32.dll!... -GDI32.dll!GetTextMetricsW -*!gfx::PlatformFontWin::CreateHFontRef -*!gfx::PlatformFontWin::GetBaseFontRef - -############################################################### -# Benign issues in Chromium - -# This test intentionally leaks an object and checks that it's never deleted. -LEAK -name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak -... -*!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody - -LEAK -name=deliberate histogram leak -... -*!replace_operator_new -... -*!*::*Histogram::FactoryGet - -LEAK -name=deliberate leak for SampleMap -... -*!base::SampleMap::Accumulate -*!base::SparseHistogram::Add - -LEAK -name=deliberate LazyInstance leak -... -*!*LeakyLazyInstance* -... -*!base::LazyInstance*::Pointer - -LEAK -name=http://crbug.com/79933 (1) -... -*!TestURLRequestContext::Init - -LEAK -name=http://crbug.com/79933 (2) -... -*!TestURLRequestContext::TestURLRequestContext -*!TestURLRequestContextGetter::GetURLRequestContext -*!notifier::SingleLoginAttempt::SingleLoginAttempt -*!notifier::Login::StartConnection -*!syncer::InvalidationNotifier::UpdateCredentials -*!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials - -LEAK -name=http://crbug.com/79933 (3) -... -*!TestURLRequestContext::TestURLRequestContext -*!TestURLRequestContextGetter::GetURLRequestContext -*!URLFetcher::Core::StartURLRequest - -LEAK -name=http://crbug.com/79933 (4) -*!generic_cpp_alloc -*!operator new -*!std::_Allocate<net::SSLConfigService::Observer *> -*!std::allocator<net::SSLConfigService::Observer *>::allocate -*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::_Insert_n -*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::insert -*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::push_back -*!ObserverListBase<net::SSLConfigService::Observer>::AddObserver -... -*!net::HttpNetworkSession::HttpNetworkSession -*!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket -*!notifier::XmppClientSocketFactory::CreateTransportClientSocket -*!notifier::ChromeAsyncSocket::Connect -*!buzz::XmppClient::ProcessStartXmppLogin -*!buzz::XmppClient::Process -*!talk_base::Task::Step -*!talk_base::TaskRunner::InternalRunTasks -*!talk_base::TaskRunner::RunTasks -*!notifier::TaskPump::CheckAndRunTasks -*!base::internal::RunnableAdapter<void (__thiscall notifier::TaskPump::*)(void)>::Run - -# Test intentionally leaks an object. -LEAK -name=http://crbug.com/86301 -*!replace_operator_new -... -*!*_DeadReplyLoopDoesNotDelete_Test::TestBody - -# Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it. -LEAK -name=Firefox 3 NSS dll leak -nspr4.dll!* -... -*!NSSDecryptor::~NSSDecryptor - -# We get uninit reports inside GMock when it prints the bytes of references to -# partially initialized objects passed to unexpected method calls. -UNINITIALIZED READ -name=GMock printing uninit data -... -*!testing::internal2::PrintBytesInObjectTo - -############################################################### -# Real issues in Chromium - -LEAK -name=http://crbug.com/32085 -... -chrome.dll!NotificationRegistrar::Add - -LEAK -name=http://crbug.com/32623 -... -*!ssl3_HandleHandshakeMessage -*!ssl3_HandleHandshake -*!ssl3_HandleRecord -*!ssl3_GatherCompleteHandshake -... -*!SSL_ForceHandshake -*!net::SSLServerSocketNSS::DoHandshake -*!net::SSLServerSocketNSS::DoHandshakeLoop - -UNINITIALIZED READ -name=http://crbug.com/57266 (1) -... -*!remoting::EncoderVp8::Encode - -UNINITIALIZED READ -name=http://crbug.com/57266 (2) -... -*!vp8_* - -LEAK -name=http://crbug.com/70062 -*!PR_Calloc -*!PR_NewLock -... -*!InitSessionCacheLocks -*!initSessionCacheLocksLazily -*!PR_CallOnce -*!ssl_InitSessionCacheLocks -*!lock_cache -*!ssl_LookupSID -*!ssl2_BeginClientHandshake -*!ssl_Do1stHandshake -*!SSL_ForceHandshake -*!net::SSL*SocketNSS::DoHandshake -*!net::SSL*SocketNSS::DoHandshakeLoop - -LEAK -name=http://crbug.com/74417 a -*!replace_operator_new -*!disk_cache::BackendImpl::CreateEntryImpl - -LEAK -name=http://crbug.com/74417 b -*!replace_operator_new -*!disk_cache::BackendImpl::NewEntry - -# One more disk_cache::BackendImpl leak. See also http://crbug.com/87500. -LEAK -name=http://crbug.com/74417 c -*!replace_operator_new -... -*!disk_cache::EntryImpl::UserBuffer::UserBuffer - -LEAK -name=http://crbug.com/75247 -... -*!replace_operator_new -*!AutofillDownloadTestHelper::AutofillDownloadTestHelper - -LEAK -name=http://crbug.com/78784 -*!generic_cpp_alloc -*!operator new -*!TestingProfile::CreateRequestContext -*!*ProfileSyncService*::SetUp - -LEAK -name=http://crbug.com/80550 (1) -... -*!RenderWidgetHost::WasHidden - -LEAK -name=http://crbug.com/80550 (2) -... -*!RenderWidgetHost::WasRestored - -LEAK -name=http://crbug.com/87612 -... -*!SSL_ConfigSecureServer -*!net::SSLServerSocketNSS::InitializeSSLOptions -*!net::SSLServerSocketNSS::Handshake - -LEAK -name=http://crbug.com/88640 -*!generic_cpp_alloc -*!operator new -*!ProfileImpl::InitRegisteredProtocolHandlers -*!ProfileImpl::DoFinalInit -*!ProfileImpl::OnPrefsLoaded - -LEAK -name=http://crbug.com/91465 -*!generic_cpp_alloc -*!operator new -*!browser_sync::internal::WeakHandleCore<browser_sync::JsBackend>::* -*!browser_sync::WeakHandle<browser_sync::JsBackend>::* -*!syncer::SyncManager::SyncInternal::Init - -LEAK -name=http://crbug.com/91491 -... -*!CrxUpdateService::ProcessPendingItems - -UNINITIALIZED READ -name=http://crbug.com/92026 (1) -softokn3.dll!FC_GetFunctionList -... -softokn3.dll!NSC_ModuleDBFunc - -UNINITIALIZED READ -name=http://crbug.com/92026 (2) -freebl3.dll!FREEBL_GetVector -... -softokn3.dll!NSC_ModuleDBFunc - -LEAK -name=http://crbug.com/92166 -... -*!replace_operator_new -*!views::NativeWidgetWin::OnCreate - -# Possible real Chromium issue in DoCrossfade. -UNINITIALIZED READ -name=http://crbug.com/110049 -*!media::DoCrossfade<*> -*!media::Crossfade -*!media::AudioRendererAlgorithmBase::FillBuffer - -# Known sqlite3 leaks. -LEAK -name=http://crbug.com/113847 (1) -... -*!sqlite3MemMalloc -*!mallocWithAlarm -*!sqlite3Malloc -... -*!yy_reduce - -LEAK -name=http://crbug.com/113847 (2) -... -*!openDatabase -*!sqlite3_open - -LEAK -name=http://crbug.com/115328 -... -*!GenericInfoViewTest_GenericInfoView_Test::TestBody - -UNINITIALIZED READ -name=http://crbug.com/116277 -*!MOZ_Z_deflate -*!zipCloseFileInZipRaw64 - -LEAK -name=http://crbug.com/117427 a -... -*!net::HostCache::Set -*!net::HostResolverImpl::CacheResult -*!net::HostResolverImpl::Job::CompleteRequests -*!net::HostResolverImpl::Job::OnProcTaskComplete -*!base::internal::RunnableAdapter<void (__thiscall net::HostResolverImpl::Job::*)(int,net::AddressList const &)>::Run - -# Probably related to 117427. Someone is not tearing down DNS resolution during -# testing. -LEAK -name=http://crbug.com/117427 b -*!generic_cpp_alloc -*!operator new -*!base::internal::WeakReferenceOwner::GetRef -*!base::SupportsWeakPtr<net::HostResolverImpl>::AsWeakPtr -*!net::HostResolverImpl::Job::Job -*!net::HostResolverImpl::Resolve -*!net::SingleRequestHostResolver::Resolve -*!net::TransportConnectJob::DoResolveHost -*!net::TransportConnectJob::DoLoop -*!net::TransportConnectJob::ConnectInternal -*!net::ConnectJob::Connect -*!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal -*!net::internal::ClientSocketPoolBaseHelper::RequestSocket -*!net::ClientSocketPoolBase<net::TransportSocketParams>::RequestSocket -*!net::TransportClientSocketPool::RequestSocket -*!net::ClientSocketHandle::Init<net::TransportSocketParams,net::TransportClientSocketPool> -*!net::`anonymous namespace'::InitSocketPoolHelper -*!net::InitSocketHandleForRawConnect -*!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone -*!base::internal::RunnableAdapter<void (__thiscall notifier::ProxyResolvingClientSocket::*)(int)>::Run - -# IE frame possible leak of COM object. -LEAK -name=http://crbug.com/122399 -ole32.dll!... -ole32.dll!CoTaskMemAlloc -urlmon.dll!... -urlmon.dll!CreateUri -IEFRAME.dll!* - -# RenderWidgetHelper leak in DelayProfileDestruction test. -LEAK -name=http://crbug.com/125565 -*!generic_cpp_alloc -*!operator new -*!RenderProcessHostImpl::RenderProcessHostImpl -*!SiteInstanceImpl::GetProcess -*!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody - -LEAK -name=http://crbug.com/125807 -*!generic_cpp_alloc -*!operator new -*!TransportSecurityPersister::TransportSecurityPersister -*!TransportSecurityPersisterTest::TransportSecurityPersisterTest |