Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(12)

Side by Side Diff: tools/valgrind/drmemory/suppressions_full.txt

Issue 2435853004: Remove DrMemory suppressions and test exclusions. (Closed)
Patch Set: Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 # This file contains suppressions for the Dr.Memory tool, see
2 # http://dev.chromium.org/developers/how-tos/using-drmemory
3 #
4 # This file should contain suppressions only for the reports happening
5 # in the 'full' mode (drmemory_full).
6 # For the reports that can happen in the light mode (a.k.a. drmemory_light),
7 # please use suppressions.txt instead.
8
9 ###############################################################
10 # Known reports on the third party we have no control over.
11
12 UNINITIALIZED READ
13 name=http://crbug.com/116277
14 ...
15 *!MOZ_Z_deflate
16
17 # TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
18 LEAK
19 name=https://github.com/DynamoRIO/drmemory/issues/406
20 ADVAPI32.dll!WmiOpenBlock
21 ADVAPI32.dll!WmiOpenBlock
22
23 # Leaks inside GoogleDesktop - it injects into our processes for some reason
24 LEAK
25 name=GoogleDesktop LEAK
26 ...
27 GoogleDesktopNetwork3.DLL!DllUnregisterServer
28
29 # They deliberately use uninit local var in sqlite random generator.
30 # Random bytes may mess up the call stack between randomByte and
31 # sqlite3_* frames (https://github.com/DynamoRIO/drmemory/issues/1514)
32 # so we also look for randomByte in form B.
33 UNINITIALIZED READ
34 name=sqlite3_randomness A
35 *.dll!sqlite3_randomness
36
37 UNINITIALIZED READ
38 name=sqlite3_randomness B
39 *.dll!randomByte
40
41 # Intentional leak in WebKit Template Framework for ThreadData.
42 LEAK
43 name=intentional WTF ThreadData leak
44 ...
45 *!WTF::wtfThreadData
46
47 # Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
48 LEAK
49 name=http://crbug.com/125558 a
50 KERNELBASE.dll!LocalAlloc
51 SECHOST.dll!...
52 SECHOST.dll!NotifyServiceStatusChange
53 WINHTTP.dll!...
54 WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
55 *!net::ProxyResolverWinHttp::GetProxyForURL
56
57 # Tiny locale-related leaks in ntdll. Probably system bug.
58 LEAK
59 name=http://crbug.com/125558 b
60 ntdll.dll!...
61 ntdll.dll!*
62 KERNELBASE.dll!...
63 KERNELBASE.dll!GetCPInfoExW
64 webio.dll!*
65 webio.dll!*
66 webio.dll!*
67 WINHTTP.dll!...
68 WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
69 *!net::ProxyConfigServiceWin::GetCurrentProxyConfig
70
71 UNINITIALIZED READ
72 name=http://crbug.com/30704 #f
73 libpng.dll!wk_png_write_find_filter
74 libpng.dll!wk_png_write_row
75
76 ###############################################################
77 # Suppress some false reports due to bugs in Dr.Memory like wrong analysis
78 # assumptions or unhandled syscalls
79
80 # Please note: the following suppressions were written in the abscense of
81 # private symbols so may need to be updated when we switch to auto-loading PDBs
82 UNINITIALIZED READ
83 name=https://github.com/DynamoRIO/drmemory/issues/12 (1)
84 ntdll.dll!Rtl*
85 ntdll.dll!Rtl*
86 ntdll.dll!RtlFindActivationContextSectionString
87
88 UNINITIALIZED READ
89 name=https://github.com/DynamoRIO/drmemory/issues/12 (2)
90 ...
91 SHELL32.dll!SHFileOperation*
92
93 UNINITIALIZED READ
94 name=https://github.com/DynamoRIO/drmemory/issues/12 (3)
95 ...
96 SHELL32.dll!SHGetFolderPath*
97
98 LEAK
99 name=https://github.com/DynamoRIO/drmemory/issues/12 (4)
100 ...
101 SHELL32.dll!SHGetFolderPath*
102
103 UNINITIALIZED READ
104 name=https://github.com/DynamoRIO/drmemory/issues/12 (5)
105 ...
106 SHELL32.dll!SHCreateDirectory*
107
108 UNINITIALIZED READ
109 name=https://github.com/DynamoRIO/drmemory/issues/12 (6)
110 ...
111 SHELL32.dll!ILLoadFromStream*
112
113 UNINITIALIZED READ
114 name=https://github.com/DynamoRIO/drmemory/issues/12 (7)
115 ...
116 SHELL32.dll!ILSaveToStream*
117
118 LEAK
119 name=https://github.com/DynamoRIO/drmemory/issues/12 (8)
120 ...
121 SHELL32.dll!SHFileOperation*
122
123 UNINITIALIZED READ
124 name=https://github.com/DynamoRIO/drmemory/issues/12 (9)
125 ...
126 SHELL32.dll!SHGetItemFromDataObject
127
128 LEAK
129 name=https://github.com/DynamoRIO/drmemory/issues/12 (10)
130 ...
131 SHELL32.dll!SHGetItemFromDataObject
132
133 LEAK
134 name=https://github.com/DynamoRIO/drmemory/issues/12 (11)
135 ...
136 ole32.dll!*
137 SHELL32.dll!SHChangeNotifySuspendResume
138
139 UNINITIALIZED READ
140 name=https://github.com/DynamoRIO/drmemory/issues/14 (1)
141 ...
142 *!CreateProcess*
143
144 LEAK
145 name=https://github.com/DynamoRIO/drmemory/issues/14 (2)
146 ...
147 *!CreateProcess*
148
149 UNINITIALIZED READ
150 name=https://github.com/DynamoRIO/drmemory/issues/14 (3)
151 ...
152 *!base::LaunchApp*
153
154 UNINITIALIZED READ
155 name=https://github.com/DynamoRIO/drmemory/issues/17 (1)
156 ...
157 *!CreateWindow*
158
159 POSSIBLE LEAK
160 name=https://github.com/DynamoRIO/drmemory/issues/17 (2)
161 GDI32.dll!*
162 GDI32.dll!CreateFontIndirectExW
163 GDI32.dll!CreateFontIndirectW
164
165 LEAK
166 name=https://github.com/DynamoRIO/drmemory/issues/17 (3)
167 KERNELBASE.dll!LocalAlloc
168 ...
169 USER32.dll!CreateWindow*
170
171 UNINITIALIZED READ
172 name=https://github.com/DynamoRIO/drmemory/issues/18 a
173 ...
174 *!CoInitialize*
175
176 UNINITIALIZED READ
177 name=https://github.com/DynamoRIO/drmemory/issues/18 b
178 ...
179 *!CoCreateInstance*
180
181 UNINITIALIZED READ
182 name=https://github.com/DynamoRIO/drmemory/issues/18 c
183 ...
184 *!CoUninitialize*
185
186 UNINITIALIZED READ
187 name=https://github.com/DynamoRIO/drmemory/issues/18 d
188 ...
189 UxTheme.dll!*
190
191 UNINITIALIZED READ
192 name=https://github.com/DynamoRIO/drmemory/issues/40 a
193 ...
194 WINSPOOL.DRV!*
195
196 LEAK
197 name=https://github.com/DynamoRIO/drmemory/issues/40 b
198 ...
199 WINSPOOL.DRV!*
200
201 UNINITIALIZED READ
202 name=https://github.com/DynamoRIO/drmemory/issues/48 a
203 system call NtContinue
204 ...
205 *!*SetThreadName
206
207 UNINITIALIZED READ
208 name=https://github.com/DynamoRIO/drmemory/issues/48 b
209 system call NtContinue
210 *!WTF::initializeCurrentThreadInternal
211
212 UNINITIALIZED READ
213 name=https://github.com/DynamoRIO/drmemory/issues/52 a
214 ...
215 DBGHELP.dll!SymInitialize
216
217 UNINITIALIZED READ
218 name=https://github.com/DynamoRIO/drmemory/issues/52 b
219 ...
220 DBGHELP.dll!SymEnumSourceFiles
221
222 UNINITIALIZED READ
223 name=https://github.com/DynamoRIO/drmemory/issues/52 c
224 ...
225 msvcrt.dll!_RTDynamicCast
226
227 UNINITIALIZED READ
228 name=https://github.com/DynamoRIO/drmemory/issues/52 bit-level fp in dbghelp
229 instruction=test 0x*(%*) $0x??
230 DBGHELP.dll!SymUnloadModule64
231
232 UNINITIALIZED READ
233 name=https://github.com/DynamoRIO/drmemory/issues/53
234 ADVAPI32.dll!WmiMofEnumerateResourcesA
235 ADVAPI32.dll!WmiMofEnumerateResourcesA
236 ADVAPI32.dll!Sta*TraceW
237
238 UNINITIALIZED READ
239 name=https://github.com/DynamoRIO/drmemory/issues/58
240 ...
241 *!_cfltcvt_l
242
243 UNINITIALIZED READ
244 name=https://github.com/DynamoRIO/drmemory/issues/60
245 USP10.dll!*
246 ...
247 USP10.dll!ScriptStringAnalyse
248
249 LEAK
250 IMM32.dll!ImmGetIMCCSize
251 IMM32.dll!ImmLockClientImc
252 IMM32.dll!ImmDisableIME
253 IMM32.dll!ImmSetActiveContext
254 USER32.dll!IMPSetIMEA
255
256 UNINITIALIZED READ
257 name=https://github.com/DynamoRIO/drmemory/issues/65 a
258 ...
259 *!SystemFunction036
260
261 UNINITIALIZED READ
262 name=https://github.com/DynamoRIO/drmemory/issues/65 b
263 ...
264 *!talk_base::CreateRandomString
265
266 UNINITIALIZED READ
267 name=https://github.com/DynamoRIO/drmemory/issues/68 a
268 ...
269 WS2_32.dll!*
270
271 UNINITIALIZED READ
272 name=https://github.com/DynamoRIO/drmemory/issues/68 b
273 ...
274 ADVAPI32.dll!SetSecurityDescriptorDacl
275
276 UNINITIALIZED READ
277 name=https://github.com/DynamoRIO/drmemory/issues/68 c
278 ...
279 MSWSOCK.dll!WSPStartup
280
281 UNINITIALIZED READ
282 name=https://github.com/DynamoRIO/drmemory/issues/68 d
283 ...
284 ntdll.dll!RtlValidateUnicodeString
285
286 LEAK
287 name=https://github.com/DynamoRIO/drmemory/issues/256
288 *!_mtinit
289 *!__tmainCRTStartup
290 *!mainCRTStartup
291
292 POSSIBLE LEAK
293 name=https://github.com/DynamoRIO/drmemory/issues/274 a
294 ...
295 GDI32.dll!CreateDCW
296
297 LEAK
298 name=https://github.com/DynamoRIO/drmemory/issues/274 b
299 ...
300 GDI32.dll!CreateDCW
301
302 LEAK
303 name=https://github.com/DynamoRIO/drmemory/issues/275
304 ...
305 *!_getptd*
306
307 UNINITIALIZED READ
308 name=https://github.com/DynamoRIO/drmemory/issues/276
309 ...
310 ntdll.dll!RtlConvertUlongToLargeInteger
311 ntdll.dll!RtlConvertUlongToLargeInteger
312 ntdll.dll!KiUserExceptionDispatcher
313
314 LEAK
315 name=https://github.com/DynamoRIO/drmemory/issues/305
316 *!free
317 *!free
318 *!operator new
319 ...
320 *!MiniDumpWriteDump
321
322 UNINITIALIZED READ
323 name=https://github.com/DynamoRIO/drmemory/issues/346 a
324 ...
325 GDI32.dll!CloseEnhMetaFile
326
327 UNINITIALIZED READ
328 name=https://github.com/DynamoRIO/drmemory/issues/346 b
329 GDI32.dll!SetPolyFillMode
330 GDI32.dll!CreateICW
331
332 UNINITIALIZED READ
333 name=https://github.com/DynamoRIO/drmemory/issues/362
334 USER32.dll!UnregisterClass*
335
336 LEAK
337 name=https://github.com/DynamoRIO/drmemory/issues/382
338 ...
339 ntdll.dll!CsrNewThread
340
341 UNINITIALIZED READ
342 name=https://github.com/DynamoRIO/drmemory/issues/397
343 system call NtDeviceIoControlFile InputBuffer
344 ADVAPI32.dll!ImpersonateAnonymousToken
345
346 UNINITIALIZED READ
347 name=https://github.com/DynamoRIO/drmemory/issues/407 a
348 system call NtRequestWaitReplyPort
349 RPCRT4.dll!I_RpcSendReceive
350 RPCRT4.dll!NdrSendReceive
351
352 UNINITIALIZED READ
353 name=https://github.com/DynamoRIO/drmemory/issues/407 b
354 IMM32.dll!*
355 ntdll.dll!LdrInitializeThunk
356 ntdll.dll!LdrShutdownThread
357
358 UNINITIALIZED READ
359 name=https://github.com/DynamoRIO/drmemory/issues/412 a
360 ADVAPI32.dll!RegDeleteValue*
361
362 UNINITIALIZED READ
363 name=https://github.com/DynamoRIO/drmemory/issues/412 b
364 ...
365 ADVAPI32.dll!Crypt*
366
367 UNINITIALIZED READ
368 name=https://github.com/DynamoRIO/drmemory/issues/412 c
369 ...
370 RPCRT4.dll!NdrClientCall2
371
372 LEAK
373 name=https://github.com/DynamoRIO/drmemory/issues/412 d
374 RSAENH.dll!DllUnregisterServer
375 ...
376 ADVAPI32.dll!CryptAcquireContextA
377 CRYPT32.dll!CryptEnumOIDFunction
378 ...
379 CRYPT32.dll!CertFindCertificateInStore
380
381 UNINITIALIZED READ
382 name=https://github.com/DynamoRIO/drmemory/issues/412 e
383 ...
384 RSAENH.dll!CPGenRandom
385
386 UNINITIALIZED READ
387 name=https://github.com/DynamoRIO/drmemory/issues/412 f
388 ...
389 CRYPT??.dll!Crypt*
390
391 UNINITIALIZED READ
392 name=https://github.com/DynamoRIO/drmemory/issues/412 g
393 *!replace_memcmp
394 ...
395 *!testing::internal::CmpHelperEQ*
396 ...
397 *!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
398
399 # We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't
400 # have frame pointers, and we have trouble unwinding from it. Therefore, we use
401 # this broad suppression, effectively disabling uninit checks in rsaenh.dll.
402 UNINITIALIZED READ
403 name=https://github.com/DynamoRIO/drmemory/issues/412 h
404 RSAENH.dll!*
405
406 UNINITIALIZED READ
407 name=https://github.com/DynamoRIO/drmemory/issues/425 a
408 CLBCatQ.DLL!DestroyStgDatabase
409 CLBCatQ.DLL!PostError
410 CLBCatQ.DLL!PostError
411
412 LEAK
413 name=https://github.com/DynamoRIO/drmemory/issues/425 b
414 RPCRT4.dll!I_RpcBCacheFree
415 RPCRT4.dll!I_RpcBCacheFree
416 ...
417 RPCRT4.dll!NdrClientCall2
418
419 UNINITIALIZED READ
420 name=https://github.com/DynamoRIO/drmemory/issues/425 c
421 msdmo.dll!*
422 msdmo.dll!*
423 DEVENUM.DLL!*
424
425 UNINITIALIZED READ
426 name=https://github.com/DynamoRIO/drmemory/issues/435 a
427 ...
428 ntdll.dll!RtlSetSecurityObject
429 ntdll.dll!RtlNewSecurityObjectEx
430 ADVAPI32.dll!CreatePrivateObjectSecurityEx
431 NTMARTA.dll!AccRewriteSetNamedRights
432
433 POSSIBLE LEAK
434 name=https://github.com/DynamoRIO/drmemory/issues/435 b
435 WLDAP32.dll!Ordinal325
436 ...
437 WLDAP32.dll!Ordinal325
438 ntdll.dll!LdrInitializeThunk
439 ntdll.dll!LdrFindResourceDirectory_U
440 ntdll.dll!RtlValidateUnicodeString
441 ntdll.dll!LdrLoadDll
442 KERNEL32.dll!LoadLibraryExW
443
444 # mod+offs suppression because the symbolic makes no sense and changes
445 # completely in the presence of WS2_32.dll symbols.
446 LEAK
447 name=https://github.com/DynamoRIO/drmemory/issues/438
448 <WS2_32.dll+0x260c>
449 <WS2_32.dll+0x2b76>
450 <WS2_32.dll+0x2c61>
451
452 UNINITIALIZED READ
453 name=https://github.com/DynamoRIO/drmemory/issues/454 a
454 ...
455 WINMM.dll!wave*GetNumDevs
456
457 LEAK
458 name=https://github.com/DynamoRIO/drmemory/issues/454 b
459 ...
460 WINMM.dll!wave*GetNumDevs
461
462 LEAK
463 name=https://github.com/DynamoRIO/drmemory/issues/466
464 ntdll.dll!RtlRunOnceBeginInitialize
465 ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
466
467 UNINITIALIZED READ
468 name=https://github.com/DynamoRIO/drmemory/issues/473 a
469 system call NtDeviceIoControlFile InputBuffer
470 ...
471 iphlpapi.dll!GetAdaptersAddresses
472
473 POSSIBLE LEAK
474 name=https://github.com/DynamoRIO/drmemory/issues/473 b
475 ESENT.dll!*
476 ESENT.dll!*
477 ESENT.dll!*
478 ntdll.dll!Ldr*Init*
479 ntdll.dll!Ldr*
480 ntdll.dll!*
481 ntdll.dll!LdrLoadDll
482 ...
483 iphlpapi.dll!GetPerAdapterInfo
484 ...
485 iphlpapi.dll!GetAdaptersAddresses
486
487 POSSIBLE LEAK
488 name=https://github.com/DynamoRIO/drmemory/issues/473 c
489 RPCRT4.dll!*
490 RPCRT4.dll!*
491 ...
492 IPHLPAPI.DLL!GetAdaptersAddresses
493
494 LEAK
495 name=https://github.com/DynamoRIO/drmemory/issues/475
496 ...
497 ADVAPI32.dll!CryptAcquireContextA
498 ...
499 CRYPT32.dll!CryptMsgOpenToDecode
500 ...
501 CRYPT32.dll!CryptQueryObject
502
503 # Lots of leaks from our interactions with the system certificate store. May be
504 # worth reviewing our use of their API.
505 LEAK
506 name=https://github.com/DynamoRIO/drmemory/issues/476 a
507 KERNEL*.dll!LocalAlloc
508 ...
509 CRYPT32.dll!CertGetCRLContextProperty
510
511 LEAK
512 name=https://github.com/DynamoRIO/drmemory/issues/476 b
513 KERNEL*.dll!LocalAlloc
514 ...
515 CRYPT32.dll!CertAddCRLContextToStore
516
517 LEAK
518 name=https://github.com/DynamoRIO/drmemory/issues/476 c
519 KERNEL*.dll!LocalAlloc
520 ...
521 CRYPT32.dll!CertOpenStore
522
523 LEAK
524 name=https://github.com/DynamoRIO/drmemory/issues/476 d
525 ...
526 CRYPT32.dll!CertOpenSystemStore?
527
528 LEAK
529 name=https://github.com/DynamoRIO/drmemory/issues/476 e
530 ...
531 CRYPT32.dll!CertGetCertificateChain
532
533 LEAK
534 name=https://github.com/DynamoRIO/drmemory/issues/476 f
535 ...
536 CRYPT32.dll!CertCompareIntegerBlob
537
538 LEAK
539 name=https://github.com/DynamoRIO/drmemory/issues/476 g
540 ...
541 CRYPT32.dll!CryptUnprotectData
542
543 LEAK
544 name=https://github.com/DynamoRIO/drmemory/issues/476 h
545 KERNEL*.dll!LocalAlloc
546 ...
547 CRYPT32.dll!CertEnumCertificatesInStore
548
549 LEAK
550 name=https://github.com/DynamoRIO/drmemory/issues/476 i
551 ...
552 CRYPT32.dll!CryptProtectData
553
554 LEAK
555 name=https://github.com/DynamoRIO/drmemory/issues/476 j
556 ...
557 CRYPT32.dll!CryptExportPublicKeyInfoEx
558
559 UNINITIALIZED READ
560 name=https://github.com/DynamoRIO/drmemory/issues/502 a
561 system call NtSecureConnectPort parameter #3
562 GDI32.dll!*
563 GDI32.dll!*
564
565 UNINITIALIZED READ
566 name=https://github.com/DynamoRIO/drmemory/issues/502 b
567 system call NtGdiEnumFonts parameter #6
568 GDI32.dll!*
569 GDI32.dll!*
570
571 UNINITIALIZED READ
572 name=https://github.com/DynamoRIO/drmemory/issues/511 a
573 RPCRT4.dll!...
574 ole32.dll!*
575
576 UNINITIALIZED READ
577 name=https://github.com/DynamoRIO/drmemory/issues/511 b
578 ole32.dll!*
579 ole32.dll!*
580 ole32.dll!StringFromGUID2
581
582 UNINITIALIZED READ
583 name=https://github.com/DynamoRIO/drmemory/issues/512 a
584 ...
585 *!browser_sync::Cryptographer::PackBootstrapToken
586 *!browser_sync::Cryptographer::GetBootstrapToken
587
588 UNINITIALIZED READ
589 name=https://github.com/DynamoRIO/drmemory/issues/512 b
590 ...
591 *!Encrypt*
592
593 # TODO(bruening): remove these once we have v8 bitfields handled
594 UNINITIALIZED READ
595 name=https://github.com/DynamoRIO/drmemory/issues/513 a
596 *!v8*
597
598 UNINITIALIZED READ
599 name=https://github.com/DynamoRIO/drmemory/issues/513 b
600 *!*
601 *!v8*
602
603 UNINITIALIZED READ
604 name=https://github.com/DynamoRIO/drmemory/issues/513 c
605 <not in a module>
606 ...
607 *!v8*
608
609 # We have seen some cases (not yet understood: crbug.com/364146) where v8.dll
610 # has no symbols. These are all on the bots using component build, so we use
611 # v8.dll. TODO(bruening): remove these once we've fixed the symbol issue.
612 UNINITIALIZED READ
613 name=https://github.com/DynamoRIO/drmemory/issues/513 d
614 v8.dll!*
615
616 UNINITIALIZED READ
617 name=https://github.com/DynamoRIO/drmemory/issues/513 e
618 <not in a module>
619 ...
620 v8.dll!*
621
622 UNINITIALIZED READ
623 name=https://github.com/DynamoRIO/drmemory/issues/546
624 ...
625 mscms.dll!*
626 ...
627 GDI32.dll!*
628 *!IconUtil::Create*HICON*
629
630 LEAK
631 name=http://crbug.com/92152
632 ...
633 USER32.dll!CreateWindowExW
634 *!views::TooltipManagerWin::Init
635 *!views::TooltipManagerWin::TooltipManagerWin
636
637 UNINITIALIZED READ
638 name=https://github.com/DynamoRIO/drmemory/issues/567 a
639 dbghelp.dll!*
640 ...
641 dbghelp.dll!StackWalk64
642
643 LEAK
644 name=https://github.com/DynamoRIO/drmemory/issues/567 b
645 *!*
646 dbghelp.dll!*
647 ...
648 dbghelp.dll!StackWalk64
649
650 # Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
651 # TppWorkerThread w/ syms. We used to use mod+offs here, but that was too
652 # brittle, so we switched to RPCRT4.dll!*.
653 LEAK
654 name=https://github.com/DynamoRIO/drmemory/issues/569
655 RPCRT4.dll!...
656 ntdll.dll!*
657 ntdll.dll!*
658 KERNEL*.dll!BaseThreadInitThunk
659
660 # TODO(timurrrr): investigate these
661 UNINITIALIZED READ
662 name=http://crbug.com/TODO a
663 ...
664 *!win_util::GetLogonSessionOnlyDACL
665
666 UNINITIALIZED READ
667 name=http://crbug.com/TODO b
668 ...
669 ntshrui.dll!IsPathSharedW
670
671 UNINITIALIZED READ
672 name=http://crbug.com/TODO c
673 ...
674 *!NetApiBufferFree
675
676 UNINITIALIZED READ
677 name=http://crbug.com/TODO d
678 ...
679 *!ShellExecute*
680
681 UNINITIALIZED READ
682 name=http://crbug.com/TODO e
683 ...
684 *!SHParseDisplayName
685
686 UNINITIALIZED READ
687 name=http://crbug.com/TODO f
688 ...
689 *!GetCanonicalPathInfo*
690
691 UNINITIALIZED READ
692 name=http://crbug.com/TODO g
693 ...
694 SHELL32.dll!Ordinal*
695
696 UNINITIALIZED READ
697 name=http://crbug.com/TODO h
698 ...
699 GDI32.dll!GetTextExtentPoint32*
700
701 UNINITIALIZED READ
702 name=http://crbug.com/TODO i
703 ...
704 *!SyncSocketClientListener::OnMsgClassResponse
705
706 UNINITIALIZED READ
707 name=http://crbug.com/TODO j
708 ...
709 *!*NSPRInitSingleton*
710
711 UNINITIALIZED READ
712 name=http://crbug.com/TODO k
713 *!NdrSimpleStructFree
714
715 UNINITIALIZED READ
716 name=http://crbug.com/TODO l
717 ntdll.dll!RtlpNtOpenKey
718 ntdll.dll!RtlMakeSelfRelativeSD
719 ntdll.dll!RtlAbsoluteToSelfRelativeSD
720 ADVAPI32.dll!MakeSelfRelativeSD
721
722 UNINITIALIZED READ
723 name=http://crbug.com/TODO m
724 ...
725 CRYPT32.dll!I_CertSyncStore
726
727 # This matches the same stack as DrMem i#751, but it's an uninit read instead of
728 # a leak. Must be some early thread initialization. Doesn't look like
729 # bit-level though.
730 UNINITIALIZED READ
731 name=http://crbug.com/TODO n
732 RPCRT4.dll!*
733 RPCRT4.dll!*
734 RPCRT4.dll!*
735 ntdll.dll!*
736 ntdll.dll!*
737 KERNEL*.dll!BaseThreadInitThunk
738
739 # No idea where this is from, but Chrome isn't even on the stack.
740 POSSIBLE LEAK
741 name=http://crbug.com/TODO o
742 RPCRT4.dll!...
743 ole32.dll!OleInitialize
744 ole32.dll!...
745 KERNEL32.dll!BaseThreadInitThunk
746
747 # Matches lots of RPC related leaks. So far RPC handles have been mostly owned
748 # by system libraries and are not something we can fix easily.
749 POSSIBLE LEAK
750 name=http://crbug.com/TODO p
751 RPCRT4.dll!*
752 RPCRT4.dll!*
753 RPCRT4.dll!NDRCContextBinding
754
755 # No idea, but all system code, not interesting.
756 POSSIBLE LEAK
757 name=http://crbug.com/TODO q
758 RPCRT4.dll!...
759 RPCRT4.dll!*
760 RPCRT4.dll!*
761 ole32.dll!...
762 ole32.dll!*
763 ole32.dll!*
764 ...
765 SHELL32.dll!*
766
767 LEAK
768 name=http://crbug.com/109278 video device COM leaks
769 ...
770 *!media::VideoCaptureDevice::*
771
772 LEAK
773 name=http://crbug.com/109278 audio device COM leaks
774 ...
775 *!media::GetInputDeviceNamesWin
776
777 # False pos uninit in shell32 when resolving links.
778 UNINITIALIZED READ
779 name=https://github.com/DynamoRIO/drmemory/issues/745
780 SHELL*.dll!*
781 ...
782 SHELL*.dll!*
783 *!file_util::ResolveShortcut
784
785 # Probable false pos uninit in ffmpeg. Probably due to running off the end of a
786 # buffer with SSE/MMX instructions whose results are then masked out later.
787 UNINITIALIZED READ
788 name=https://github.com/DynamoRIO/drmemory/issues/747 a
789 *!ff_pred4x4_vertical_vp8_mmxext
790
791 UNINITIALIZED READ
792 name=https://github.com/DynamoRIO/drmemory/issues/747 b
793 *!ff_pred4x4_down_left_mmxext
794
795 UNINITIALIZED READ
796 name=https://github.com/DynamoRIO/drmemory/issues/747 c
797 *!ff_vorbis_floor1_render_list
798
799 UNINITIALIZED READ
800 name=https://github.com/DynamoRIO/drmemory/issues/747 d
801 *!ff_put_vp8_epel8_h6_ssse3
802
803 UNINITIALIZED READ
804 name=https://github.com/DynamoRIO/drmemory/issues/747 e
805 *!ff_put_vp8_epel8_h4_ssse3
806
807 UNINITIALIZED READ
808 name=https://github.com/DynamoRIO/drmemory/issues/747 f
809 *!ff_fft_permute_sse
810
811 UNINITIALIZED READ
812 name=https://github.com/DynamoRIO/drmemory/issues/747 g
813 *!ff_simple_idct_add_mmx
814
815 # ffmpeg seems to leak a pthread condition variable.
816 LEAK
817 name=http://crbug.com/110042
818 *!ptw32_new
819 *!pthread_self
820 *!sem_wait
821 *!pthread_cond_wait
822 *!ff_thread_decode_frame
823 *!avcodec_decode_video2
824
825 # Improperly handled ioctl in bcrypt.
826 UNINITIALIZED READ
827 name=https://github.com/DynamoRIO/drmemory/issues/748
828 system call NtDeviceIoControlFile InputBuffer
829 ...
830 bcrypt.dll!BCryptUnregisterConfigChangeNotify
831 bcrypt.dll!BCryptGetFipsAlgorithmMode
832 ntdll.dll!RtlQueryEnvironmentVariable
833
834 # Not sure what this is.
835 POSSIBLE LEAK
836 name=https://github.com/DynamoRIO/drmemory/issues/749
837 ...
838 fwpuclnt.dll!*
839 ...
840 RPCRT4.dll!*
841 ...
842 fwpuclnt.dll!*
843 ...
844 WS2_32.dll!*
845 *!talk_base::SafeGetHostByName
846 *!talk_base::SocketAddress::GetLocalIPs
847 *!talk_base::SocketAddress::IsLocalIP
848 *!cricket::Transport::VerifyCandidate
849 *!cricket::Session::OnRemoteCandidates
850 *!cricket::Session::OnTransportInfoMessage
851 *!cricket::Session::OnIncomingMessage
852 *!cricket::SessionManager::OnIncomingMessage
853
854 # More uninit false pos in rpcrt4.dll not caught by default suppressions.
855 UNINITIALIZED READ
856 name=https://github.com/DynamoRIO/drmemory/issues/529
857 RPCRT4.dll!*
858 ...
859 *!base::LaunchProcess
860
861 # System leak from CreateEnvironmentBlock.
862 LEAK
863 name=https://github.com/DynamoRIO/drmemory/issues/757
864 ...
865 USERENV.dll!CreateEnvironmentBlock
866
867 # Looks like another instance of 753
868 LEAK
869 name=https://github.com/DynamoRIO/drmemory/issues/753
870 ...
871 ntdll.dll!RtlLoadString
872
873 # More bit manip fps
874 UNINITIALIZED READ
875 name=https://github.com/DynamoRIO/drmemory/issues/493
876 USP10.dll!ScriptPositionSingleGlyph
877
878 # Various TLS leaks that we don't understand yet. We should be finding a root
879 # for these.
880 LEAK
881 name=https://github.com/DynamoRIO/drmemory/issues/778 a
882 KERNELBASE.dll!TlsSetValue
883
884 # Originally filed as: http://crbug.com/109281
885 LEAK
886 name=https://github.com/DynamoRIO/drmemory/issues/778 b
887 *!operator new
888 *!operator new[]
889 *!*::ConstructTlsVector
890 *!base::ThreadLocalStorage::StaticSlot::Get
891
892 # This is an NSS PRThread object installed in TLS. Why isn't this detected as a
893 # root? See also http://crbug.com/32624
894 LEAK
895 name=https://github.com/DynamoRIO/drmemory/issues/778 c
896 *!PR_Calloc
897 *!_PR_AttachThread
898 *!_PRI_AttachThread
899
900 # Bit-level fps in rich edit layer.
901 UNINITIALIZED READ
902 name=https://github.com/DynamoRIO/drmemory/issues/791
903 RICHED20.dll!*
904 RICHED20.dll!*
905
906 # Already suppressed by drmemory default supp we don't have yet.
907 LEAK
908 name=i#757: RPC binding leaks in sspicli.dll
909 RPCRT4.dll!*
910 ...
911 SspiCli.dll!*
912 SspiCli.dll!Cre*
913
914 # Async NtReadFile false positives. This was fixed in drmemory r772, remove
915 # this supp when we pull that rev.
916 UNADDRESSABLE ACCESS
917 name=https://github.com/DynamoRIO/drmemory/issues/798
918 system call NtReadFile parameter #5
919 KERNEL32.dll!ReadFile
920
921 # Probable syscall false positive.
922 UNADDRESSABLE ACCESS
923 name=https://github.com/DynamoRIO/drmemory/issues/809
924 system call NtGdiPolyPolyDraw parameter #1
925 *!gfx::Path::CreateNativeRegion
926
927 # Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces
928 # coming out of this module (sometimes only one frame), which makes it hard to
929 # write precise suppressions. Until we have bit-level tracking (DRMi#113) we
930 # should keep this.
931 UNINITIALIZED READ
932 name=https://github.com/DynamoRIO/drmemory/issues/113 rpcrt4.dll wildcard
933 RPCRT4.dll!*
934
935 UNINITIALIZED READ
936 name=https://github.com/DynamoRIO/drmemory/issues/841 a
937 ...
938 CRYPTNET.dll!I_CryptNetGetConnectivity
939
940 UNINITIALIZED READ
941 name=https://github.com/DynamoRIO/drmemory/issues/841 b
942 ...
943 webio.dll!*
944
945 UNINITIALIZED READ
946 name=https://github.com/DynamoRIO/drmemory/issues/841 c
947 ...
948 winhttp.dll!*
949
950 LEAK
951 name=https://github.com/DynamoRIO/drmemory/issues/841 d
952 ...
953 CRYPTNET.dll!I_CryptNetGetConnectivity
954
955 # Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
956 UNINITIALIZED READ
957 name=https://github.com/DynamoRIO/drmemory/issues/810
958 instruction=test %edx %edx
959 USER32.dll!GetClassLongW
960 ...
961 *!ui::CenterAndSizeWindow
962
963 UNINITIALIZED READ
964 name=https://github.com/DynamoRIO/drmemory/issues/815
965 KERNEL*.dll!...
966 dxgi.dll!*
967 USER32.dll!GetMonitorInfoA
968 ntdll.dll!KiUserCallbackDispatcher
969 dxgi.dll!*
970 WinSATAPI.DLL!*
971
972 # Suppress anything in cmd.exe. It's safer to suppress these than disable
973 # following, since someone might launch a Chrome process via cmd.exe.
974 LEAK
975 name=cmd.exe
976 ...
977 cmd.exe!*
978
979 # Possible true system use after free.
980 UNADDRESSABLE ACCESS
981 name=https://github.com/DynamoRIO/drmemory/issues/623
982 KERNELBASE.dll!TlsGetValue
983 OLEAUT32.dll!SysFreeString
984 OLEAUT32.dll!SysAllocStringByteLen
985 OLEACC.dll!*
986 OLEACC.dll!*
987 OLEACC.dll!*
988 OLEACC.dll!*
989
990 # basic_streambuf seems to leak something in creating a std::_Mutex
991 LEAK
992 name=https://github.com/DynamoRIO/drmemory/issues/857
993 ntdll.dll!...
994 ntdll.dll!RtlInitializeCriticalSection
995 *!_Mtxinit
996 *!std::_Mutex::_Mutex
997 *!std::basic_streambuf<>
998
999 # Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though.
1000 LEAK
1001 name=GDI SetBrushOrgEx leak
1002 GDI32.dll!...
1003 GDI32.dll!GetTextMetricsW
1004 *!gfx::PlatformFontWin::CreateHFontRef
1005 *!gfx::PlatformFontWin::GetBaseFontRef
1006
1007 ###############################################################
1008 # Benign issues in Chromium
1009
1010 # This test intentionally leaks an object and checks that it's never deleted.
1011 LEAK
1012 name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
1013 ...
1014 *!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
1015
1016 LEAK
1017 name=deliberate histogram leak
1018 ...
1019 *!replace_operator_new
1020 ...
1021 *!*::*Histogram::FactoryGet
1022
1023 LEAK
1024 name=deliberate leak for SampleMap
1025 ...
1026 *!base::SampleMap::Accumulate
1027 *!base::SparseHistogram::Add
1028
1029 LEAK
1030 name=deliberate LazyInstance leak
1031 ...
1032 *!*LeakyLazyInstance*
1033 ...
1034 *!base::LazyInstance*::Pointer
1035
1036 # Test intentionally leaks an object.
1037 LEAK
1038 name=http://crbug.com/86301
1039 *!replace_operator_new
1040 ...
1041 *!*_DeadReplyLoopDoesNotDelete_Test::TestBody
1042
1043 # Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it.
1044 LEAK
1045 name=Firefox 3 NSS dll leak
1046 nspr4.dll!*
1047 ...
1048 *!NSSDecryptor::~NSSDecryptor
1049
1050 # We get uninit reports inside GMock when it prints the bytes of references to
1051 # partially initialized objects passed to unexpected method calls.
1052 UNINITIALIZED READ
1053 name=http://crbug.com/64887 (GMock printing uninit data)
1054 ...
1055 *!testing::*::PrintBytesInObjectTo*
1056
1057 # This is an EXPECT_DEATH() that hits a RELEASE_ASSERT(),
1058 # which intentionally writes to NULL in order to crash.
1059 UNADDRESSABLE ACCESS
1060 name=https://crbug.com/497344
1061 blink_platform.dll!blink::SecurityOrigin::addSuborigin
1062 *!blink::SecurityOriginTest_Suborigins_Test::TestBody
1063
1064 ###############################################################
1065 # Proactively borrowed from memcheck/suppressions.txt.
1066 # We have not yet seen these, but we are expanding the sets of tests
1067 # we're running, and we've hit redness in the past that could have
1068 # been avoided by already having the Memcheck suppressions.
1069 # TODO(bruening): review the entire file (not just these) once we're
1070 # at the peak set of tests we plan to run and remove the unused ones.
1071
1072 UNINITIALIZED READ
1073 name=bug_101781
1074 *!encode_one_block
1075 *!encode_mcu_huff
1076 *!compress_data
1077 *!process_data_simple_main
1078 *!chromium_jpeg_write_scanlines
1079 *!gfx::JPEGCodec::Encode
1080 *!gfx::JPEGEncodedDataFromImage
1081 *!history::TopSites::EncodeBitmap
1082 *!history::TopSites::SetPageThumbnail
1083 *!history::ExpireHistoryTest::AddExampleData
1084 *!history::ExpireHistoryTest::*
1085
1086 UNINITIALIZED READ
1087 name=bug_101781_d
1088 *!testing::AssertionResult testing::internal::CmpHelperGE<>
1089 *!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody
1090
1091 UNINITIALIZED READ
1092 name=bug_105907
1093 ...
1094 *!skia::BGRAConvolve2D
1095 *!skia::ImageOperations::ResizeBasic*
1096 *!skia::ImageOperations::Resize*
1097
1098 UNINITIALIZED READ
1099 name=bug_112278
1100 *!fetch_texel_2d_f_rgba8888
1101 *!sample_2d_linear
1102 *!sample_linear_2d
1103 *!fetch_texel_lod
1104 *!fetch_texel
1105 *!_mesa_execute_program
1106 *!run_program
1107 *!_swrast_exec_fragment_program
1108 *!shade_texture_span
1109 *!_swrast_write_rgba_span
1110 *!general_triangle
1111 *!_swrast_validate_triangle
1112 *!_swrast_Triangle
1113 *!triangle_rgba
1114 *!_tnl_render_triangles_elts
1115 *!run_render
1116 *!_tnl_run_pipeline
1117 *!_tnl_draw_prims
1118 *!_tnl_vbo_draw_prims
1119 *!vbo_validated_drawrangeelements
1120 *!vbo_exec_DrawElements
1121 *!neutral_DrawElements
1122
1123 UNINITIALIZED READ
1124 name=bug_112278b
1125 *!fetch_texel_2d_f_rgba8888
1126 *!sample_2d_nearest
1127 *!sample_nearest_2d
1128 *!fetch_texel_lod
1129 *!fetch_texel
1130 *!_mesa_execute_program
1131 *!run_program
1132 *!_swrast_exec_fragment_program
1133 *!shade_texture_span
1134 *!_swrast_write_rgba_span
1135 *!general_triangle
1136 ...
1137 *!_swrast_Triangle
1138 *!triangle_rgba
1139 ...
1140 *!run_render
1141 *!_tnl_run_pipeline
1142 *!_tnl_draw_prims
1143 *!_tnl_vbo_draw_prims
1144
1145 UNINITIALIZED READ
1146 name=bug_115419_1
1147 *!fetch_texel_2d_f_rgba8888
1148 *!texture_get_row
1149 *!fast_read_rgba_pixels
1150 *!read_rgba_pixels
1151 *!_swrast_ReadPixels
1152 *!_mesa_ReadPixels
1153 *!glReadPixels
1154 *!gpu::gles2::GLES2DecoderImpl::HandleReadPixels
1155 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1156 *!gpu::CommandParser::ProcessCommand
1157 *!gpu::CommandExecutor::PutChanged
1158 *!webkit::gpu::GLInProcessContext::PumpCommands
1159
1160 UNINITIALIZED READ
1161 name=bug_115419_2
1162 *!get_src_arg_mask
1163 *!_mesa_remove_extra_move_use
1164 *!_mesa_optimize_program
1165 *!get_mesa_program
1166 *!_mesa_ir_link_shader
1167 *!_mesa_glsl_link_shader
1168 *!link_program
1169 *!_mesa_LinkProgramARB
1170 *!glLinkProgram
1171 ...
1172 *!gpu::gles2::GLES2DecoderImpl::DoLinkProgram*
1173 *!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram*
1174 *!gpu::gles2::GLES2DecoderImpl::DoCommand
1175 *!gpu::CommandParser::ProcessCommand
1176 *!gpu::CommandExecutor::PutChanged
1177 *!webkit::gpu::GLInProcessContext::PumpCommands
1178
1179 UNINITIALIZED READ
1180 name=bug_138058
1181 ...
1182 *!blink::WebVTTParser::constructTreeFromToken
1183 *!blink::WebVTTParser::createDocumentFragmentFromCueText
1184 *!blink::TextTrackCue::getCueAsHTML
1185 *!blink::TextTrackCue::updateDisplayTree
1186 *!blink::HTMLMediaElement::updateActiveTextTrackCues
1187
1188 UNINITIALIZED READ
1189 name=bug_138220_a
1190 *!blink::HTMLInputElement::dataList
1191 *!blink::HTMLInputElement::list
1192 *!blink::RenderSliderContainer::layout
1193 *!blink::RenderBlock::layoutBlockChild
1194 *!blink::RenderBlock::layoutBlockChildren
1195 *!blink::RenderBlock::layoutBlock
1196 *!blink::RenderBlock::layout
1197 *!blink::RenderSlider::layout
1198
1199 UNINITIALIZED READ
1200 name=bug_138220_b
1201 *!blink::HTMLInputElement::dataList
1202 *!blink::HTMLInputElement::list
1203 *!blink::RenderTheme::paintSliderTicks
1204 *!blink::RenderThemeChromiumLinux::paintSliderTrack
1205 *!blink::RenderTheme::paint
1206 *!blink::RenderBox::paintBoxDecorations
1207 *!blink::RenderBlock::paintObject
1208
1209 UNINITIALIZED READ
1210 name=bug_162825
1211 *!bcmp
1212 *!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator<
1213 *!std::less<>::operator
1214 ...
1215 *!std::map<>::find
1216 ...
1217 *!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
1218
1219 UNINITIALIZED READ
1220 name=bug_176616_a
1221 *!WebTestRunner::WebViewTestProxyBase::didCreateDataSource
1222 *!WebTestRunner::WebViewTestProxy<>::didCreateDataSource
1223 *!blink::FrameLoaderClientImpl::createDocumentLoader
1224 *!blink::FrameLoader::init
1225 *!blink::Frame::init
1226 *!blink::WebFrameImpl::initializeAsMainFrame
1227 *!blink::WebViewImpl::initializeMainFrame
1228 *!TestShell::createNewWindow
1229 *!TestShell::createMainWindow
1230 *!TestShell::initialize
1231
1232 UNINITIALIZED READ
1233 name=bug_176616_b
1234 *!WebTestRunner::TestRunner::reset
1235 *!WebTestRunner::TestInterfaces::resetAll
1236 *!WebTestRunner::WebTestInterfaces::resetAll
1237 *!TestShell::resetTestController
1238 *!runTest
1239
1240 UNINITIALIZED READ
1241 name=bug_222883
1242 *!v8::internal::ScavengeVisitor::ScavengePointer
1243 *!v8::internal::ScavengeVisitor::VisitPointers
1244 *!v8::internal::StandardFrame::IterateExpressions
1245 ...
1246 *!v8::internal::Heap::Scavenge
1247 *!v8::internal::Heap::PerformGarbageCollection*
1248
1249 UNINITIALIZED READ
1250 name=bug_238170a
1251 *!blink::ElementRuleCollector::collectMatchingRules
1252 *!blink::ElementRuleCollector::hasAnyMatchingRules
1253
1254 UNINITIALIZED READ
1255 name=bug_238170b
1256 *!blink::ElementRuleCollector::collectMatchingRules
1257 *!blink::StyleResolver::matchAuthorRules
1258
1259 UNINITIALIZED READ
1260 name=bug_238170c
1261 *!blink::ReplaceSelectionCommand::doApply
1262 *!blink::CompositeEditCommand::apply
1263 *!blink::applyCommand
1264
1265 UNINITIALIZED READ
1266 name=bug_259789
1267 *!blink::::adjustAttributes
1268 *!blink::WebGLRenderingContext::maybeRestoreContext
1269 *!blink::Timer<>::fired
1270 *!blink::ThreadTimers::sharedTimerFiredInternal
1271 *!blink::ThreadTimers::sharedTimerFired
1272 *!content::BlinkPlatformImpl::DoTimeout
1273
1274 UNINITIALIZED READ
1275 name=bug_290405
1276 *!GrGradientEffect::onIsEqual
1277 *!GrEffect::isEqual
1278 *!GrEffectStage::DeferredStage::isEqual
1279 *!GrDrawState::DeferredState::isEqual
1280 *!GrInOrderDrawBuffer::needsNewState
1281 *!GrInOrderDrawBuffer::onDraw
1282 *!GrDrawTarget::drawIndexedInstances
1283 *!GrTextContext::flushGlyphs
1284
1285 UNINITIALIZED READ
1286 name=bug_290435
1287 *!blink::AudioContext::scheduleNodeDeletion
1288 *!blink::AudioContext::handlePostRenderTasks
1289 *!blink::AudioDestinationNode::render
1290 *!blink::OfflineAudioDestinationNode::offlineRender
1291
1292 UNINITIALIZED READ
1293 name=bug_364724
1294 *!base::MD5DigestToBase16
1295 *!content::WebKitTestRunner::CaptureDumpPixels
1296
1297 UNINITIALIZED READ
1298 name=bug_298143
1299 ...
1300 *!blink::TypeConversionsV8Internal*AttributeGetter*
1301
1302 UNINITIALIZED READ
1303 name=bug_299804
1304 *!GrConfigConversionEffect::TestForPreservingPMConversions
1305 *!::test_pm_conversions
1306 *!GrContext::createPMToUPMEffect
1307 *!GrContext::readRenderTargetPixels
1308 *!SkGpuDevice::onReadPixels
1309 *!SkBaseDevice::readPixels
1310 *!SkCanvas::readPixels
1311 *!DeferredDevice::onReadPixels
1312 *!SkBaseDevice::readPixels
1313 *!SkCanvas::readPixels
1314 *!blink::GraphicsContext::readPixels
1315 *!WTF::PassRefPtr<>
1316 *!blink::ImageBuffer::getUnmultipliedImageData
1317 *!blink::CanvasRenderingContext2D::getImageData
1318 *!blink::CanvasRenderingContext2D::getImageData
1319 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethod
1320 *!blink::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback
1321 *!v8::internal::FunctionCallbackArguments::Call
1322 *!v8::internal::HandleApiCallHelper<>
1323
1324 UNINITIALIZED READ
1325 name=bug_309477
1326 *!WebTestRunner::EventSender::reset
1327 *!WebTestRunner::TestInterfaces::resetTestHelperControllers
1328 *!WebTestRunner::TestInterfaces::resetAll
1329 ...
1330 *!content::ShellRenderProcessObserver::WebKitInitialized
1331 *!content::RenderThreadImpl::EnsureWebKitInitialized
1332 *!content::RenderThreadImpl::OnCreateNewView
1333
1334 ###############################################################
1335 # Real issues in Chromium
1336
1337 LEAK
1338 name=http://crbug.com/32085
1339 ...
1340 chrome.dll!NotificationRegistrar::Add
1341
1342 UNINITIALIZED READ
1343 name=http://crbug.com/57266 (1)
1344 ...
1345 *!remoting::EncoderVp8::Encode
1346
1347 UNINITIALIZED READ
1348 name=http://crbug.com/57266 (2)
1349 ...
1350 *!vp8_*
1351
1352 LEAK
1353 name=http://crbug.com/74417 a
1354 *!replace_operator_new
1355 *!disk_cache::BackendImpl::CreateEntryImpl
1356
1357 LEAK
1358 name=http://crbug.com/74417 b
1359 *!replace_operator_new
1360 *!disk_cache::BackendImpl::NewEntry
1361
1362 # One more disk_cache::BackendImpl leak. See also http://crbug.com/87500.
1363 LEAK
1364 name=http://crbug.com/74417 c
1365 *!replace_operator_new
1366 ...
1367 *!disk_cache::EntryImpl::UserBuffer::UserBuffer
1368
1369 LEAK
1370 name=http://crbug.com/75247
1371 ...
1372 *!replace_operator_new
1373 *!AutofillDownloadTestHelper::AutofillDownloadTestHelper
1374
1375 LEAK
1376 name=http://crbug.com/78784
1377 *!generic_cpp_alloc
1378 *!operator new
1379 *!TestingProfile::CreateRequestContext
1380 *!*ProfileSyncService*::SetUp
1381
1382 LEAK
1383 name=http://crbug.com/80550 (1)
1384 ...
1385 *!RenderWidgetHost::WasHidden
1386
1387 LEAK
1388 name=http://crbug.com/80550 (2)
1389 ...
1390 *!RenderWidgetHost::WasRestored
1391
1392 LEAK
1393 name=http://crbug.com/88640
1394 *!generic_cpp_alloc
1395 *!operator new
1396 *!ProfileImpl::InitRegisteredProtocolHandlers
1397 *!ProfileImpl::DoFinalInit
1398 *!ProfileImpl::OnPrefsLoaded
1399
1400 LEAK
1401 name=http://crbug.com/91465
1402 *!generic_cpp_alloc
1403 *!operator new
1404 *!browser_sync::internal::WeakHandleCore<>::*
1405 *!browser_sync::WeakHandle<>::*
1406 *!syncer::SyncManager::SyncInternal::Init
1407
1408 LEAK
1409 name=http://crbug.com/91491
1410 ...
1411 *!CrxUpdateService::ProcessPendingItems
1412
1413 UNINITIALIZED READ
1414 name=http://crbug.com/92026 (1)
1415 softokn3.dll!FC_GetFunctionList
1416 ...
1417 softokn3.dll!NSC_ModuleDBFunc
1418
1419 UNINITIALIZED READ
1420 name=http://crbug.com/92026 (2)
1421 freebl3.dll!FREEBL_GetVector
1422 ...
1423 softokn3.dll!NSC_ModuleDBFunc
1424
1425 # Possible real Chromium issue in DoCrossfade.
1426 UNINITIALIZED READ
1427 name=http://crbug.com/110049
1428 *!media::DoCrossfade<>
1429 *!media::Crossfade
1430 *!media::AudioRendererAlgorithmBase::FillBuffer
1431
1432 # Known sqlite3 leaks.
1433 LEAK
1434 name=http://crbug.com/113847 (1)
1435 ...
1436 *!sqlite3MemMalloc
1437 *!mallocWithAlarm
1438 *!sqlite3Malloc
1439 ...
1440 *!yy_reduce
1441
1442 LEAK
1443 name=http://crbug.com/113847 (2)
1444 ...
1445 *!openDatabase
1446 *!sqlite3_open
1447
1448 LEAK
1449 name=http://crbug.com/115328
1450 ...
1451 *!GenericInfoViewTest_GenericInfoView_Test::TestBody
1452
1453 # IE frame possible leak of COM object.
1454 LEAK
1455 name=http://crbug.com/122399
1456 ole32.dll!...
1457 ole32.dll!CoTaskMemAlloc
1458 urlmon.dll!...
1459 urlmon.dll!CreateUri
1460 IEFRAME.dll!*
1461
1462 # RenderWidgetHelper leak in DelayProfileDestruction test.
1463 LEAK
1464 name=http://crbug.com/125565
1465 *!generic_cpp_alloc
1466 *!operator new
1467 *!RenderProcessHostImpl::RenderProcessHostImpl
1468 *!SiteInstanceImpl::GetProcess
1469 *!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
1470
1471 LEAK
1472 name=http://crbug.com/125807
1473 *!generic_cpp_alloc
1474 *!operator new
1475 *!TransportSecurityPersister::TransportSecurityPersister
1476 *!TransportSecurityPersisterTest::TransportSecurityPersisterTest
1477
1478 UNINITIALIZED READ
1479 name=bug_113076
1480 *!media::ConvertYUVToRGB32_C
1481 *!media::LinearScaleYUVToRGB32RowWithRange_C
1482 *!media::ScaleYUVToRGB32WithRect
1483
1484 UNINITIALIZED READ
1485 name=bug_343248
1486 osmesa.dll!LINTERP
1487 osmesa.dll!INTERP_4F
1488 osmesa.dll!_tnl_generic_interp
1489
1490 UNINITIALIZED READ
1491 name=bug_340752
1492 ...
1493 *!*::ThreadState::visitStack
1494
1495 UNINITIALIZED READ
1496 name=bug_343663
1497 blink_web.dll!blink::RenderBlock::computeInlinePreferredLogicalWidths
1498
1499 UNADDRESSABLE ACCESS
1500 name=BUG_343958
1501 blink_web.dll!blink::Node::getFlag
1502 blink_web.dll!blink::Node::inDocument
1503 blink_web.dll!blink::Node::isDescendantOf
1504 blink_web.dll!blink::CompositeEditCommand::cloneParagraphUnderNewElement
1505 blink_web.dll!blink::CompositeEditCommand::moveParagraphWithClones
1506
1507 UNINITIALIZED READ
1508 name=BUG_344076
1509 blink_web.dll!blink::Editor::canSmartReplaceWithPasteboard
1510 blink_web.dll!blink::Editor::pasteAsPlainTextWithPasteboard
1511 blink_web.dll!blink::Editor::pasteAsPlainText
1512 blink_web.dll!blink::executePasteAndMatchStyle
1513 blink_web.dll!blink::Editor::Command::execute
1514 blink_web.dll!blink::Document::execCommand
1515
1516 UNINITIALIZED READ
1517 name=BUG_349128
1518 content.dll!std::*
1519 ...
1520 content.dll!content::BrowserAccessibilityManagerWin::*
1521 ...
1522 *!*::UpdateNode
1523
1524 # There are so many osmesa errors we have to suppress (mostly the unpack_RGB*
1525 # variety) that it's a performance hit. We avoid that by requesting
1526 # whole-module suppression
1527 # (see https://github.com/DynamoRIO/drmemory/issues/1529).
1528 UNINITIALIZED READ
1529 name=bug_347967_all_osmesa
1530 osmesa.dll!*
1531
1532 UNINITIALIZED READ
1533 name=bug_347967
1534 osmesa.dll!unpack_RGB*888
1535 osmesa.dll!_mesa_unpack_rgba_row
1536 osmesa.dll!slow_read_rgba_pixels
1537 osmesa.dll!read_rgba_pixels
1538 osmesa.dll!_mesa_readpixels
1539 ...
1540 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
1541 gpu.dll!gpu::CommandParser::ProcessCommand
1542 gpu.dll!gpu::CommandExecutor::PutChanged
1543
1544 UNINITIALIZED READ
1545 name=bug_347967,bug_348357
1546 osmesa.dll!clip_span
1547 osmesa.dll!_swrast_write_rgba_span
1548 osmesa.dll!general_triangle
1549 ...
1550 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements
1551 gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements
1552 gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
1553 gpu.dll!gpu::CommandParser::ProcessCommand
1554
1555 UNINITIALIZED READ
1556 name=bug_361594
1557 ...
1558 skia.dll!SkA8_Shader_Blitter::blitH
1559 skia.dll!SkBlitter::blitRect
1560 skia.dll!blitrect
1561 skia.dll!SkScan::FillIRect
1562 ...
1563 skia.dll!SkDraw::drawRect
1564 skia.dll!SkDraw::drawBitmap
1565 skia.dll!SkBitmapDevice::drawBitmap
1566 skia.dll!SkCanvas::internalDrawBitmap
1567 skia.dll!SkCanvas::drawBitmap
1568 content.dll!content::ScreenshotData::EncodeOnWorker
1569
1570 UNINITIALIZED READ
1571 name=bug_365101
1572 *!device::BluetoothAdapterWin::AdapterStateChanged
1573
1574 UNINITIALIZED READ
1575 name=bug_364146
1576 ...
1577 v8.dll!*
1578 net_with_v8.dll!net::ProxyResolverV8::Context::*
1579
1580 UNINITIALIZED READ
1581 name=bug_334448
1582 *!CLD2::UTF8GenericReplaceInternal
1583 *!CLD2::UTF8GenericReplace
1584 *!CLD2::ScriptScanner::LowerScriptSpan
1585 *!CLD2::ScriptScanner::GetOneScriptSpanLower
1586 *!CLD2::DetectLanguageSummaryV2
1587 *!CLD2::DetectLanguageSummary
1588
1589 UNINITIALIZED READ
1590 name=bug_42043
1591 ...
1592 QuickTime.qts!*
1593
1594 HANDLE LEAK
1595 name=bug_370178
1596 system call NtCreateEvent
1597 KERNELBASE.dll!CreateEventExW
1598 KERNELBASE.dll!CreateEventW
1599 base.dll!base::WaitableEvent::WaitableEvent
1600 gpu.dll!gpu::InProcessCommandBuffer::Initialize
1601 gl_in_process_context.dll!gpu::`anonymous namespace'::GLInProcessContextImpl::In itialize
1602 gl_in_process_context.dll!gpu::GLInProcessContext::CreateContext
1603
1604 UNINITIALIZED READ
1605 name=bug_371844
1606 *!device::GamepadProvider::PadState::Match
1607 *!device::GamepadProvider::DoPoll
1608
1609 UNINITIALIZED READ
1610 name=bug_371950
1611 media.dll!ConvertYUVToRGB32Row_SSE
1612 media.dll!media::ConvertYUVToRGB32_SSE
1613 media.dll!media::ConvertVideoFrameToBitmap
1614 media.dll!media::SkCanvasVideoRenderer::Paint
1615 cc.dll!cc::VideoResourceUpdater::CreateForSoftwarePlanes
1616 cc.dll!cc::VideoResourceUpdater::CreateExternalResourcesFromVideoFrame
1617 cc.dll!cc::VideoLayerImpl::WillDraw
1618
1619 UNINITIALIZED READ
1620 name=bug_371959
1621 content.dll!webrtc::PeerConnection::DoInitialize
1622 content.dll!webrtc::PeerConnection::Initialize
1623 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection_s
1624 content.dll!webrtc::PeerConnectionFactory::OnMessage
1625 content.dll!jingle_glue::JingleThreadWrapper::Send
1626 content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection
1627 content.dll!webrtc::PeerConnectionFactoryInterface::CreatePeerConnection
1628
1629 # This suppression is deliberately general, as bugs reported in
1630 # ProcessOutgoingMessages are difficult to track down until we
1631 # get our annotations in place.
1632 # TODO(bruening): add annotations once we have the infrastructure.
1633 UNINITIALIZED READ
1634 name=bug_371991
1635 system call NtWriteFile parameter #5
1636 KERNELBASE.dll!WriteFile
1637 KERNEL32.dll!WriteFile*
1638 *!IPC::Channel*::ProcessOutgoingMessages
1639
1640 UNINITIALIZED READ
1641 name=bug_372254
1642 *!content::*::NotifyPluginProcessHostHelper
1643
1644 UNINITIALIZED READ
1645 name=drm_i#1546
1646 *!testing::internal::CmpHelperEQ<>
1647 ...
1648 *!content::BrowserPluginTest_ResizeFlowControl_Test::TestBody
1649
1650 UNINITIALIZED READ
1651 name=bug_374410
1652 *!ui::NativeThemeWin::PaintScrollbarTrack
1653 *!ui::NativeThemeWin::PaintDirect
1654
1655 UNINITIALIZED READ
1656 name=bug_377728
1657 ...
1658 *!Hunspell::suggest
1659 *!HunspellEngine::FillSuggestionList
1660 *!SpellcheckLanguage::SpellCheckWord
1661 *!SpellCheck::SpellCheckWord
1662
1663 UNADDRESSABLE ACCESS
1664 name=bug_389132
1665 content.dll!crypto_kernel_do_load_cipher_type
1666 content.dll!crypto_kernel_load_cipher_type
1667 content.dll!crypto_kernel_init
1668 content.dll!cricket::SrtpSession::SetKey
1669 content.dll!cricket::SrtpSession::SetSend
1670 content.dll!cricket::SrtpFilter::SetRtpParams
1671 content.dll!cricket::BaseChannel::SetupDtlsSrtp
1672 content.dll!cricket::BaseChannel::ChannelWritable_w
1673 content.dll!cricket::BaseChannel::OnWritableState
1674
1675 UNINITIALIZED READ
1676 name=bug_392585
1677 system call NtCreateFile parameter #9
1678 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1679
1680 UNADDRESSABLE ACCESS
1681 name=bug_398850
1682 ...
1683 wtf.dll!WTF::PlatformCondition::timedWait
1684
1685 UNINITIALIZED READ
1686 name=bug_399293
1687 blink_web.dll!blink::InputMethodController::extendSelectionAndDelete
1688 blink_web.dll!blink::WebLocalFrameImpl::extendSelectionAndDelete
1689 content.dll!content::RenderFrameImpl::OnExtendSelectionAndDelete
1690 *!content::RenderViewImplTest_OnExtendSelectionAndDelete_Test::TestBody
1691 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1692
1693 UNINITIALIZED READ
1694 name=bug_399842
1695 skia.dll!S32A_Opaque_BlitRow32_SSE4
1696
1697 UNINITIALIZED READ
1698 name=bug_414268
1699 pdf.dll!chrome_pdf::PDFiumEngine::OnMouseMove
1700 pdf.dll!chrome_pdf::PDFiumEngine::HandleEvent
1701 pdf.dll!chrome_pdf::OutOfProcessInstance::HandleInputEvent
1702 pdf.dll!pp::InputEvent_HandleEvent
1703 ppapi_proxy.dll!ppapi::CallWhileUnlocked<>
1704 ppapi_proxy.dll!ppapi::proxy::PPP_InputEvent_Proxy::OnMsgHandleFilteredInputEven t
1705
1706 UNADDRESSABLE ACCESS
1707 name=bug_425097
1708 ...
1709 *!ash::test::ShelfViewTest_CheckDragAndDropFromOverflowBubbleToShelf_Test::TestB ody
1710
1711 UNINITIALIZED READ
1712 name=bug_432067
1713 system call NtCreateFile parameter #9
1714 MSWSOCK.dll!*
1715 content.dll!content::AppCacheStorageImpl::DatabaseTask::CallRun
1716
1717 UNADDRESSABLE ACCESS
1718 name=bug_436131
1719 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
1720 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
1721 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1722
1723 UNADDRESSABLE ACCESS
1724 name=bug_436131_b
1725 views.dll!base::ObserverListBase<>::RemoveObserver
1726 *!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
1727 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1728
1729 UNADDRESSABLE ACCESS
1730 name=bug_436131_c
1731 *!ash::test::ShelfViewTestAPI::GetPreferredSize
1732 *!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
1733 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1734
1735 UNINITIALIZED READ
1736 name=bug_455417
1737 *!std::char_traits<>::compare
1738 ...
1739 *!*::*URLRequest*::TestBody
1740
1741 UNINITIALIZED READ
1742 name=bug_468169
1743 ...
1744 *!encode_nonrd_sb_row
1745 *!vp9_encode_tile
1746
1747 UNINITIALIZED READ
1748 name=bug_470848
1749 blink_platform.dll!blink::Heap::RegionTree::lookup
1750 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1751
1752 HANDLE LEAK
1753 name=https://crbug.com/480741
1754 system call NtDuplicateObject
1755 KERNELBASE.dll!DuplicateHandle
1756 KERNEL32.dll!DuplicateHandle
1757 base.dll!base::SharedMemory::ShareToProcessCommon
1758 gl_wrapper.dll!gl::GLImageSharedMemory::Initialize
1759 *!*::GpuChannel::CreateImageForGpuMemoryBuffer
1760 *!*::GpuCommandBufferStub::OnCreateImage
1761
1762 HANDLE LEAK
1763 name=https://crbug.com/481305
1764 system call NtCreateSection
1765 KERNELBASE.dll!CreateFileMappingW
1766 base.dll!base::SharedMemory::Create
1767 base.dll!base::SharedMemory::CreateAnonymous
1768 content.dll!content::ChildThreadImpl::AllocateSharedMemory
1769 content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
1770 content.dll!content::RenderThreadImpl::AllocateSharedMemory
1771 ...
1772 content.dll!content::WebGraphicsContext3DCommandBufferImpl::CreateContext
1773
1774 HANDLE LEAK
1775 name=https://crbug.com/489779
1776 system call NtUserCreateWindowEx
1777 USER32.dll!UnregisterClassW
1778 USER32.dll!UnregisterClassW
1779 USER32.dll!CreateWindowExW
1780 gfx.dll!gfx::WindowImpl::Init
1781 win_window.dll!ui::WinWindow::WinWindow
1782 aura.dll!aura::WindowTreeHostPlatform::WindowTreeHostPlatform
1783 aura.dll!aura::WindowTreeHost::Create
1784
1785 UNINITIALIZED READ
1786 name=bug_493167
1787 system call NtWriteFile parameter #5
1788 KERNELBASE.dll!WriteFile
1789 KERNEL32.dll!WriteFile
1790 *!base::File::WriteAtCurrentPos
1791 *!sessions::SessionBackend::AppendCommandsToFile
1792 *!sessions::SessionBackend::AppendCommands
1793
1794 UNADDRESSABLE ACCESS
1795 name=bug_505734
1796 webcore_shared.dll!blink::FocusController::focusedOrMainFrame
1797 content.dll!content::RenderWidget::GetSelectionBounds
1798 content.dll!content::RenderWidget::UpdateSelectionBounds
1799 content.dll!content::RenderWidget::WillBeginCompositorFrame
1800 cc.dll!base::internal::InvokeHelper<>::MakeItSo
1801 cc.dll!base::internal::Invoker<>::Run
1802
1803 UNADDRESSABLE ACCESS
1804 name=bug_506557_a
1805 drmemorylib.dll!replace_memmove
1806 base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
1807 base.dll!base::trace_event::TraceEventSystemStatsMonitor::~TraceEventSystemStats Monitor
1808 content.dll!content::BrowserMainLoop::ShutdownThreadsAndCleanUp
1809 content.dll!content::BrowserMainRunnerImpl::Shutdown
1810 content.dll!content::BrowserMain
1811 content.dll!content::RunNamedProcessTypeMain
1812 content.dll!content::ContentMainRunnerImpl::Run
1813 content.dll!content::ContentMain
1814 *!content::BrowserTestBase::SetUp
1815 *!InProcessBrowserTest::SetUp
1816 *!testing::internal::HandleExceptionsInMethodIfSupported<>
1817
1818 UNINITIALIZED READ
1819 name=bug_506557_b
1820 base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
1821 content.dll!content::V8SamplingProfiler::~V8SamplingProfiler
1822 content.dll!content::RenderThreadImpl::~RenderThreadImpl
1823 content.dll!content::RenderThreadImpl::`vector deleting destructor'
1824 content.dll!content::ChildProcess::~ChildProcess
1825 content.dll!content::RenderProcessImpl::`scalar deleting destructor'
1826 content.dll!content::InProcessRendererThread::CleanUp
1827 base.dll!base::`anonymous namespace'::ThreadFunc
1828 KERNEL32.dll!BaseThreadInitThunk
1829
1830 UNADDRESSABLE ACCESS
1831 name=bug_506557_c
1832 base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
1833 content.dll!content::V8SamplingProfiler::~V8SamplingProfiler
1834 content.dll!content::RenderThreadImpl::~RenderThreadImpl
1835 content.dll!content::RenderThreadImpl::`vector deleting destructor'
1836 content.dll!content::ChildProcess::~ChildProcess
1837 content.dll!content::RenderProcessImpl::`scalar deleting destructor'
1838 content.dll!content::InProcessRendererThread::CleanUp
1839 base.dll!base::`anonymous namespace'::ThreadFunc
1840 KERNEL32.dll!BaseThreadInitThunk
1841
1842 UNADDRESSABLE ACCESS
1843 name=bug_506557_d
1844 base.dll!std::vector<>::push_back
1845 base.dll!base::trace_event::TraceLog::AddEnabledStateObserver
1846 base.dll!base::trace_event::MemoryDumpManager::Initialize
1847 content.dll!content::ChildThreadImpl::Init
1848 content.dll!content::ChildThreadImpl::ChildThreadImpl
1849 content.dll!content::RenderThreadImpl::RenderThreadImpl
1850 content.dll!content::InProcessRendererThread::Init
1851 base.dll!base::`anonymous namespace'::ThreadFunc
1852 KERNEL32.dll!BaseThreadInitThunk
1853
1854 UNADDRESSABLE ACCESS
1855 name=bug_506557_e
1856 base.dll!std::vector<>::push_back
1857 base.dll!base::trace_event::TraceLog::AddEnabledStateObserver
1858 content.dll!content::V8SamplingProfiler::V8SamplingProfiler
1859 content.dll!content::RenderThreadImpl::EnsureWebKitInitialized
1860 content.dll!content::RenderThreadImpl::OnCreateNewView
1861 content.dll!ViewMsg_New::Dispatch<>
1862 content.dll!content::RenderThreadImpl::OnControlMessageReceived
1863 content.dll!content::ChildThreadImpl::OnMessageReceived
1864 ipc.dll!IPC::ChannelProxy::Context::OnDispatchMessage
1865 ipc.dll!base::internal::Invoker<>::Run
1866 base.dll!base::debug::TaskAnnotator::RunTask
1867 scheduler.dll!scheduler::TaskQueueManager::ProcessTaskFromWorkQueue
1868 scheduler.dll!scheduler::TaskQueueManager::DoWork
1869 scheduler.dll!base::internal::Invoker<>::Run
1870 base.dll!base::debug::TaskAnnotator::RunTask
1871 base.dll!base::MessageLoop::RunTask
1872 base.dll!base::MessageLoop::DeferOrRunPendingTask
1873 base.dll!base::MessageLoop::DoWork
1874 base.dll!base::MessagePumpForUI::DoRunLoop
1875 base.dll!base::MessagePumpWin::Run
1876 base.dll!base::MessageLoop::RunHandler
1877 base.dll!base::MessageLoop::Run
1878 base.dll!base::Thread::Run
1879 base.dll!base::Thread::ThreadMain
1880 base.dll!base::`anonymous namespace'::ThreadFunc
1881 KERNEL32.dll!BaseThreadInitThunk
1882
1883 UNINITIALIZED READ
1884 name=bug_508794a
1885 ...
1886 ucrtbase.dll!ismbblead
1887 ucrtbase.dll!free_base
1888 ucrtbase.dll!_stdio_common_vsnwprintf_s
1889 ucrtbase.dll!_stdio_common_vsnwprintf_s
1890 *!base::vswprintf
1891 *!base::`anonymous namespace'::StringAppendVT<>
1892 *!base::StringPrintf
1893 *!content::AccessibilityTreeFormatterWin::ToString
1894 *!content::AccessibilityTreeFormatter::RecursiveFormatAccessibilityTree
1895
1896 UNADDRESSABLE ACCESS
1897 name=bug_508794b
1898 ucrtbase.dll!wcsnlen
1899 ucrtbase.dll!ismbblead
1900 ucrtbase.dll!free_base
1901 ucrtbase.dll!_stdio_common_vsnwprintf_s
1902 ucrtbase.dll!_stdio_common_vsnwprintf_s
1903 *!base::vswprintf
1904 *!base::`anonymous namespace'::StringAppendVT<>
1905 *!base::StringPrintf
1906 *!content::AccessibilityTreeFormatterWin::ToString
1907 *!content::AccessibilityTreeFormatter::RecursiveFormatAccessibilityTree
1908
1909 UNADDRESSABLE ACCESS
1910 name=bug_534881
1911 ...
1912 v8.dll!v8::internal::`anonymous namespace'::Invoke
1913 v8.dll!v8::internal::Execution::Call
1914 v8.dll!v8::Function::Call
1915 webcore_shared.dll!blink::V8ScriptRunner::callFunction
1916 webcore_shared.dll!blink::ScriptController::callFunction
1917 ...
1918 webcore_shared.dll!blink::LocalDOMWindow::dispatchEvent
1919
1920 UNINITIALIZED READ
1921 name=bug_519041_a
1922 ntdll.dll!RtlSetLastWin32ErrorAndNtStatusFromNtStatus
1923
1924 UNINITIALIZED READ
1925 name=bug_519041_b
1926 ntdll.dll!RtlDecodePointer
1927
1928 UNADDRESSABLE ACCESS
1929 name=bug_545273
1930 v8.dll!v8::internal::LookupIterator::LookupIterator
1931 v8.dll!v8::internal::LookupIterator::PropertyOrElement
1932 v8.dll!v8::internal::Runtime::GetObjectProperty
1933 v8.dll!v8::internal::KeyedLoadIC::Load
1934 v8.dll!v8::internal::Runtime_KeyedLoadIC_Miss
1935 v8.dll!v8::internal::`anonymous namespace'::Invoke
1936 v8.dll!v8::internal::Execution::Call
1937 ...
1938 net_with_v8.dll!net::ProxyResolverV8::Context::*
1939
1940 HANDLE LEAK
1941 name=bug_548039
1942 system call NtCreateSection
1943 KERNELBASE.dll!CreateFileMappingW
1944 base.dll!base::SharedMemory::Create
1945 content.dll!content::ChildThreadImpl::AllocateSharedMemory
1946 content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
1947 content.dll!content::RenderThreadImpl::AllocateSharedMemory
1948 ...
1949 content.dll!content::WebGraphicsContext3DCommandBufferImpl::CreateContext
1950 content.dll!content::WebGraphicsContext3DCommandBufferImpl::MaybeInitializeGL
1951
1952 # Dr. Memory does not yet propagate uninits through ymm registers so we
1953 # avoid any false positives in the meantime that might show up in
1954 # libyuv and other code:
1955 UNINITIALIZED READ
1956 name=https://github.com/DynamoRIO/drmemory/issues/1485
1957 instruction=*ymm*
1958 media.dll!*
1959
1960 HANDLE LEAK
1961 name=bug_562701
1962 system call NtCreateSection
1963 KERNELBASE.dll!CreateFileMappingW
1964 base.dll!base::SharedMemory::Create
1965 content.dll!content::ChildThreadImpl::AllocateSharedMemory
1966 content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
1967 content.dll!content::ImageDataPlatformBackend::Init
1968 content.dll!content::PPB_ImageData_Impl::Init
1969 content.dll!content::PPB_ImageData_Impl::Create
1970 content.dll!content::ResourceCreationImpl::CreateImageData
1971 ppapi_proxy.dll!ppapi::proxy::PPB_ImageData_Proxy::CreateImageData
1972 ppapi_proxy.dll!ppapi::proxy::PPB_ImageData_Proxy::OnHostMsgCreatePlatform
1973
1974 INVALID HEAP ARGUMENT
1975 name=bug_571551_a
1976 ...
1977 media.dll!mkvmuxer::Segment::DoNewClusterProcessing
1978 media.dll!mkvmuxer::Segment::AddGenericFrame
1979 media.dll!mkvmuxer::Segment::AddFrame
1980 media.dll!media::WebmMuxer::AddFrame
1981 media.dll!media::WebmMuxer::OnEncodedVideo
1982 content.dll!content::MediaRecorderHandler::OnEncodedVideo
1983
1984 UNADDRESSABLE ACCESS
1985 name=bug_571551_b
1986 ...
1987 media.dll!mkvmuxer::Segment::DoNewClusterProcessing
1988 media.dll!mkvmuxer::Segment::AddGenericFrame
1989 media.dll!mkvmuxer::Segment::AddFrame
1990 media.dll!media::WebmMuxer::AddFrame
1991 media.dll!media::WebmMuxer::OnEncodedVideo
1992 content.dll!content::MediaRecorderHandler::OnEncodedVideo
1993
1994 HANDLE LEAK
1995 name=bug_571553
1996 system call NtUserWindowFromPoint
1997 content.dll!content::RenderWidgetHostViewAura::UpdateCursorIfOverSelf
1998 content.dll!content::RenderWidgetHostViewAura::SetIsLoading
1999 content.dll!content::RenderWidgetHostImpl::SetIsLoading
2000 content.dll!content::RenderFrameHostManager::SetIsLoading
2001
2002 HANDLE LEAK
2003 name=bug_571554_a
2004 system call NtGdiCreateDIBSection
2005 GDI32.dll!CreateDIBSection
2006 skia.dll!`anonymous namespace'::CreateHBitmap
2007 skia.dll!skia::BitmapPlatformDevice::Create
2008 skia.dll!skia::CreatePlatformCanvas
2009 surface.dll!TransportDIB::GetPlatformCanvas
2010 content.dll!content::ImageDataPlatformBackend::Map
2011 content.dll!content::PepperGraphics2DHost::Init
2012 content.dll!content::PepperGraphics2DHost::Create
2013 content.dll!content::ContentRendererPepperHostFactory::CreateResourceHost
2014
2015 HANDLE LEAK
2016 name=bug_571554_b
2017 system call NtCreateSection
2018 KERNELBASE.dll!CreateFileMappingW
2019 base.dll!base::SharedMemory::Create
2020 content.dll!content::ChildThreadImpl::AllocateSharedMemory
2021 content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
2022 content.dll!content::ImageDataPlatformBackend::Init
2023 content.dll!content::PPB_ImageData_Impl::Init
2024 content.dll!content::PepperGraphics2DHost::Init
2025 content.dll!content::PepperGraphics2DHost::Create
2026 content.dll!content::ContentRendererPepperHostFactory::CreateResourceHost
2027
2028 UNINITIALIZED READ
2029 name=bug_593594
2030 blink_platform.dll!qcms_transform_data_rgba_out_lut_sse2
2031 blink_platform.dll!qcms_transform_data_type
2032 blink_platform.dll!blink::JPEGImageDecoder::outputScanlines
2033 blink_platform.dll!blink::JPEGImageReader::decode
2034
2035 UNINITIALIZED READ
2036 name=bug_594657
2037 *!std::_Tree<>::_Eqrange<>
2038 *!courgette::adjustment_method_2::AssignmentProblem::Declassify
2039 *!courgette::adjustment_method_2::AssignmentProblem::AssignOne
2040 *!courgette::adjustment_method_2::AssignmentProblem::FindAndAssignBestLeader
2041 *!courgette::adjustment_method_2::AssignmentProblem::Solve
2042 *!courgette::adjustment_method_2::Adjuster::Solve
2043 *!courgette::adjustment_method_2::Adjuster::Finish
2044 *!courgette::adjustment_method_2::Adjuster::Adjust
2045 *!courgette::Adjust
2046
2047 UNINITIALIZED READ
2048 name=bug_594781a
2049 chromium_sqlite3.dll!PSCreateMemoryPropertyStore
2050 ...
2051 chromium_sqlite3.dll!StgDeserializePropVariant
2052
2053 UNADDRESSABLE ACCESS
2054 name=bug_594781b
2055 ...
2056 chromium_sqlite3.dll!PropVariantToGUID
2057 sql.dll!sql::Connection::GetUniqueStatement
2058
2059 HANDLE LEAK
2060 name=bug_594829a
2061 system call NtDuplicateObject
2062 KERNELBASE.dll!DuplicateHandle
2063 KERNEL32.dll!DuplicateHandle
2064 *!sandbox::BrokerServicesBase::AddTargetPeer
2065 content.dll!content::StartSandboxedProcess
2066
2067 HANDLE LEAK
2068 name=bug_594829b
2069 system call NtCreateUserProcess
2070 KERNEL32.dll!CreateProcessInternalW
2071 KERNEL32.dll!CreateProcessW
2072 base.dll!base::LaunchProcess
2073 base.dll!base::LaunchProcess
2074 content.dll!content::StartSandboxedProcess
2075
2076 HANDLE LEAK
2077 name=bug_595093a
2078 system call NtCreateFile
2079 KERNELBASE.dll!CreateFileW
2080 KERNEL32.dll!CreateFileW
2081 net.dll!disk_cache::File::Init
2082 net.dll!disk_cache::MappedFile::Init
2083 net.dll!disk_cache::BackendImpl::InitBackingStore
2084 net.dll!disk_cache::BackendImpl::SyncInit
2085 net.dll!disk_cache::BackendIO::ExecuteBackendOperation
2086
2087 HANDLE LEAK
2088 name=bug_595093b
2089 system call NtCreateSection
2090 KERNELBASE.dll!CreateFileMappingW
2091 net.dll!disk_cache::MappedFile::Init
2092 net.dll!disk_cache::BackendImpl::InitBackingStore
2093 net.dll!disk_cache::BackendImpl::SyncInit
2094 net.dll!disk_cache::BackendIO::ExecuteBackendOperation
2095
2096 HANDLE LEAK
2097 name=bug_595105
2098 system call NtDuplicateObject
2099 KERNELBASE.dll!DuplicateHandle
2100 KERNEL32.dll!DuplicateHandle
2101 base.dll!`anonymous namespace'::CreateFileMappingWithReducedPermissions
2102 base.dll!base::SharedMemory::Create
2103 base.dll!base::SharedMemory::CreateAndMapAnonymous
2104 content.dll!content::GpuMemoryBufferImplSharedMemory::Create
2105 content.dll!content::BrowserGpuMemoryBufferManager::HandleCreateGpuMemoryBufferO nIO
2106
2107 HANDLE LEAK
2108 name=bug_595146
2109 system call NtCreateFile
2110 KERNELBASE.dll!CreateFileW
2111 KERNEL32.dll!CreateFileW
2112 base.dll!base::File::DoInitialize
2113 base.dll!base::File::Initialize
2114 net.dll!net::FileStream::Context::OpenFileImpl
2115
2116 HANDLE LEAK
2117 name=bug_595149
2118 system call NtCreateIoCompletion
2119 KERNELBASE.dll!CreateIoCompletionPort
2120 base.dll!base::MessagePumpForIO::MessagePumpForIO
2121
2122 HANDLE LEAK
2123 name=bug_598364
2124 system call NtGdiCreateDIBSection
2125 GDI32.dll!CreateDIBSection
2126 skia.dll!`anonymous namespace'::CreateHBitmap
2127 skia.dll!skia::BitmapPlatformDevice::Create
2128 ...
2129 webcore_shared.dll!blink::ScriptController::createPluginWrapper
2130 webcore_shared.dll!blink::HTMLPlugInElement::pluginWrapper
2131
2132 UNINITIALIZED READ
2133 name=bug_616564
2134 system call NtFsControlFile FILE_PIPE_WAIT_FOR_BUFFER Timeout+NameLength
2135 KERNELBASE.dll!WaitNamedPipeW
2136 mojo_system_impl.dll!mojo::edk::NamedPlatformChannelPair::PassClientHandleFromPa rentProcess
2137 content.dll!content::`anonymous namespace'::InitializeMojoIPCChannel
2138 content.dll!content::ChildThreadImpl::Init
2139 content.dll!content::ChildThreadImpl::ChildThreadImpl
2140 content.dll!content::UtilityThreadImpl::UtilityThreadImpl
2141 content.dll!content::UtilityMain
2142
2143 UNADDRESSABLE ACCESS
2144 name=bug_617740
2145 media.dll!mkvmuxer::Segment::WriteFramesAll
2146 media.dll!mkvmuxer::Segment::Finalize
2147 media.dll!media::WebmMuxer::~WebmMuxer
2148
2149 HANDLE LEAK
2150 name=bug_628485
2151 system call NtCreateSemaphore
2152 KERNELBASE.dll!CreateSemaphoreExW
2153 KERNEL32.dll!CreateSemaphoreW
2154 content.dll!vp8cx_create_encoder_threads
2155 content.dll!vp8_create_compressor
2156 content.dll!vp8e_init
OLDNEW
« no previous file with comments | « tools/valgrind/drmemory/suppressions.txt ('k') | tools/valgrind/gtest_exclude/base_unittests.gtest-drmemory_win32.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698