| Index: tools/valgrind/drmemory/suppressions_full.txt
|
| diff --git a/tools/valgrind/drmemory/suppressions_full.txt b/tools/valgrind/drmemory/suppressions_full.txt
|
| deleted file mode 100644
|
| index 94033b2390bf3480555ee586fa5e44a29212f2a6..0000000000000000000000000000000000000000
|
| --- a/tools/valgrind/drmemory/suppressions_full.txt
|
| +++ /dev/null
|
| @@ -1,2156 +0,0 @@
|
| -# This file contains suppressions for the Dr.Memory tool, see
|
| -# http://dev.chromium.org/developers/how-tos/using-drmemory
|
| -#
|
| -# This file should contain suppressions only for the reports happening
|
| -# in the 'full' mode (drmemory_full).
|
| -# For the reports that can happen in the light mode (a.k.a. drmemory_light),
|
| -# please use suppressions.txt instead.
|
| -
|
| -###############################################################
|
| -# Known reports on the third party we have no control over.
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/116277
|
| -...
|
| -*!MOZ_Z_deflate
|
| -
|
| -# TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/406
|
| -ADVAPI32.dll!WmiOpenBlock
|
| -ADVAPI32.dll!WmiOpenBlock
|
| -
|
| -# Leaks inside GoogleDesktop - it injects into our processes for some reason
|
| -LEAK
|
| -name=GoogleDesktop LEAK
|
| -...
|
| -GoogleDesktopNetwork3.DLL!DllUnregisterServer
|
| -
|
| -# They deliberately use uninit local var in sqlite random generator.
|
| -# Random bytes may mess up the call stack between randomByte and
|
| -# sqlite3_* frames (https://github.com/DynamoRIO/drmemory/issues/1514)
|
| -# so we also look for randomByte in form B.
|
| -UNINITIALIZED READ
|
| -name=sqlite3_randomness A
|
| -*.dll!sqlite3_randomness
|
| -
|
| -UNINITIALIZED READ
|
| -name=sqlite3_randomness B
|
| -*.dll!randomByte
|
| -
|
| -# Intentional leak in WebKit Template Framework for ThreadData.
|
| -LEAK
|
| -name=intentional WTF ThreadData leak
|
| -...
|
| -*!WTF::wtfThreadData
|
| -
|
| -# Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
|
| -LEAK
|
| -name=http://crbug.com/125558 a
|
| -KERNELBASE.dll!LocalAlloc
|
| -SECHOST.dll!...
|
| -SECHOST.dll!NotifyServiceStatusChange
|
| -WINHTTP.dll!...
|
| -WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
|
| -*!net::ProxyResolverWinHttp::GetProxyForURL
|
| -
|
| -# Tiny locale-related leaks in ntdll. Probably system bug.
|
| -LEAK
|
| -name=http://crbug.com/125558 b
|
| -ntdll.dll!...
|
| -ntdll.dll!*
|
| -KERNELBASE.dll!...
|
| -KERNELBASE.dll!GetCPInfoExW
|
| -webio.dll!*
|
| -webio.dll!*
|
| -webio.dll!*
|
| -WINHTTP.dll!...
|
| -WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
|
| -*!net::ProxyConfigServiceWin::GetCurrentProxyConfig
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/30704 #f
|
| -libpng.dll!wk_png_write_find_filter
|
| -libpng.dll!wk_png_write_row
|
| -
|
| -###############################################################
|
| -# Suppress some false reports due to bugs in Dr.Memory like wrong analysis
|
| -# assumptions or unhandled syscalls
|
| -
|
| -# Please note: the following suppressions were written in the abscense of
|
| -# private symbols so may need to be updated when we switch to auto-loading PDBs
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/12 (1)
|
| -ntdll.dll!Rtl*
|
| -ntdll.dll!Rtl*
|
| -ntdll.dll!RtlFindActivationContextSectionString
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/12 (2)
|
| -...
|
| -SHELL32.dll!SHFileOperation*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/12 (3)
|
| -...
|
| -SHELL32.dll!SHGetFolderPath*
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/12 (4)
|
| -...
|
| -SHELL32.dll!SHGetFolderPath*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/12 (5)
|
| -...
|
| -SHELL32.dll!SHCreateDirectory*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/12 (6)
|
| -...
|
| -SHELL32.dll!ILLoadFromStream*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/12 (7)
|
| -...
|
| -SHELL32.dll!ILSaveToStream*
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/12 (8)
|
| -...
|
| -SHELL32.dll!SHFileOperation*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/12 (9)
|
| -...
|
| -SHELL32.dll!SHGetItemFromDataObject
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/12 (10)
|
| -...
|
| -SHELL32.dll!SHGetItemFromDataObject
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/12 (11)
|
| -...
|
| -ole32.dll!*
|
| -SHELL32.dll!SHChangeNotifySuspendResume
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/14 (1)
|
| -...
|
| -*!CreateProcess*
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/14 (2)
|
| -...
|
| -*!CreateProcess*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/14 (3)
|
| -...
|
| -*!base::LaunchApp*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/17 (1)
|
| -...
|
| -*!CreateWindow*
|
| -
|
| -POSSIBLE LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/17 (2)
|
| -GDI32.dll!*
|
| -GDI32.dll!CreateFontIndirectExW
|
| -GDI32.dll!CreateFontIndirectW
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/17 (3)
|
| -KERNELBASE.dll!LocalAlloc
|
| -...
|
| -USER32.dll!CreateWindow*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/18 a
|
| -...
|
| -*!CoInitialize*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/18 b
|
| -...
|
| -*!CoCreateInstance*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/18 c
|
| -...
|
| -*!CoUninitialize*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/18 d
|
| -...
|
| -UxTheme.dll!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/40 a
|
| -...
|
| -WINSPOOL.DRV!*
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/40 b
|
| -...
|
| -WINSPOOL.DRV!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/48 a
|
| -system call NtContinue
|
| -...
|
| -*!*SetThreadName
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/48 b
|
| -system call NtContinue
|
| -*!WTF::initializeCurrentThreadInternal
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/52 a
|
| -...
|
| -DBGHELP.dll!SymInitialize
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/52 b
|
| -...
|
| -DBGHELP.dll!SymEnumSourceFiles
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/52 c
|
| -...
|
| -msvcrt.dll!_RTDynamicCast
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/52 bit-level fp in dbghelp
|
| -instruction=test 0x*(%*) $0x??
|
| -DBGHELP.dll!SymUnloadModule64
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/53
|
| -ADVAPI32.dll!WmiMofEnumerateResourcesA
|
| -ADVAPI32.dll!WmiMofEnumerateResourcesA
|
| -ADVAPI32.dll!Sta*TraceW
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/58
|
| -...
|
| -*!_cfltcvt_l
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/60
|
| -USP10.dll!*
|
| -...
|
| -USP10.dll!ScriptStringAnalyse
|
| -
|
| -LEAK
|
| -IMM32.dll!ImmGetIMCCSize
|
| -IMM32.dll!ImmLockClientImc
|
| -IMM32.dll!ImmDisableIME
|
| -IMM32.dll!ImmSetActiveContext
|
| -USER32.dll!IMPSetIMEA
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/65 a
|
| -...
|
| -*!SystemFunction036
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/65 b
|
| -...
|
| -*!talk_base::CreateRandomString
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/68 a
|
| -...
|
| -WS2_32.dll!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/68 b
|
| -...
|
| -ADVAPI32.dll!SetSecurityDescriptorDacl
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/68 c
|
| -...
|
| -MSWSOCK.dll!WSPStartup
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/68 d
|
| -...
|
| -ntdll.dll!RtlValidateUnicodeString
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/256
|
| -*!_mtinit
|
| -*!__tmainCRTStartup
|
| -*!mainCRTStartup
|
| -
|
| -POSSIBLE LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/274 a
|
| -...
|
| -GDI32.dll!CreateDCW
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/274 b
|
| -...
|
| -GDI32.dll!CreateDCW
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/275
|
| -...
|
| -*!_getptd*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/276
|
| -...
|
| -ntdll.dll!RtlConvertUlongToLargeInteger
|
| -ntdll.dll!RtlConvertUlongToLargeInteger
|
| -ntdll.dll!KiUserExceptionDispatcher
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/305
|
| -*!free
|
| -*!free
|
| -*!operator new
|
| -...
|
| -*!MiniDumpWriteDump
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/346 a
|
| -...
|
| -GDI32.dll!CloseEnhMetaFile
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/346 b
|
| -GDI32.dll!SetPolyFillMode
|
| -GDI32.dll!CreateICW
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/362
|
| -USER32.dll!UnregisterClass*
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/382
|
| -...
|
| -ntdll.dll!CsrNewThread
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/397
|
| -system call NtDeviceIoControlFile InputBuffer
|
| -ADVAPI32.dll!ImpersonateAnonymousToken
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/407 a
|
| -system call NtRequestWaitReplyPort
|
| -RPCRT4.dll!I_RpcSendReceive
|
| -RPCRT4.dll!NdrSendReceive
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/407 b
|
| -IMM32.dll!*
|
| -ntdll.dll!LdrInitializeThunk
|
| -ntdll.dll!LdrShutdownThread
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/412 a
|
| -ADVAPI32.dll!RegDeleteValue*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/412 b
|
| -...
|
| -ADVAPI32.dll!Crypt*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/412 c
|
| -...
|
| -RPCRT4.dll!NdrClientCall2
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/412 d
|
| -RSAENH.dll!DllUnregisterServer
|
| -...
|
| -ADVAPI32.dll!CryptAcquireContextA
|
| -CRYPT32.dll!CryptEnumOIDFunction
|
| -...
|
| -CRYPT32.dll!CertFindCertificateInStore
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/412 e
|
| -...
|
| -RSAENH.dll!CPGenRandom
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/412 f
|
| -...
|
| -CRYPT??.dll!Crypt*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/412 g
|
| -*!replace_memcmp
|
| -...
|
| -*!testing::internal::CmpHelperEQ*
|
| -...
|
| -*!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
|
| -
|
| -# We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't
|
| -# have frame pointers, and we have trouble unwinding from it. Therefore, we use
|
| -# this broad suppression, effectively disabling uninit checks in rsaenh.dll.
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/412 h
|
| -RSAENH.dll!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/425 a
|
| -CLBCatQ.DLL!DestroyStgDatabase
|
| -CLBCatQ.DLL!PostError
|
| -CLBCatQ.DLL!PostError
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/425 b
|
| -RPCRT4.dll!I_RpcBCacheFree
|
| -RPCRT4.dll!I_RpcBCacheFree
|
| -...
|
| -RPCRT4.dll!NdrClientCall2
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/425 c
|
| -msdmo.dll!*
|
| -msdmo.dll!*
|
| -DEVENUM.DLL!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/435 a
|
| -...
|
| -ntdll.dll!RtlSetSecurityObject
|
| -ntdll.dll!RtlNewSecurityObjectEx
|
| -ADVAPI32.dll!CreatePrivateObjectSecurityEx
|
| -NTMARTA.dll!AccRewriteSetNamedRights
|
| -
|
| -POSSIBLE LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/435 b
|
| -WLDAP32.dll!Ordinal325
|
| -...
|
| -WLDAP32.dll!Ordinal325
|
| -ntdll.dll!LdrInitializeThunk
|
| -ntdll.dll!LdrFindResourceDirectory_U
|
| -ntdll.dll!RtlValidateUnicodeString
|
| -ntdll.dll!LdrLoadDll
|
| -KERNEL32.dll!LoadLibraryExW
|
| -
|
| -# mod+offs suppression because the symbolic makes no sense and changes
|
| -# completely in the presence of WS2_32.dll symbols.
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/438
|
| -<WS2_32.dll+0x260c>
|
| -<WS2_32.dll+0x2b76>
|
| -<WS2_32.dll+0x2c61>
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/454 a
|
| -...
|
| -WINMM.dll!wave*GetNumDevs
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/454 b
|
| -...
|
| -WINMM.dll!wave*GetNumDevs
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/466
|
| -ntdll.dll!RtlRunOnceBeginInitialize
|
| -ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/473 a
|
| -system call NtDeviceIoControlFile InputBuffer
|
| -...
|
| -iphlpapi.dll!GetAdaptersAddresses
|
| -
|
| -POSSIBLE LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/473 b
|
| -ESENT.dll!*
|
| -ESENT.dll!*
|
| -ESENT.dll!*
|
| -ntdll.dll!Ldr*Init*
|
| -ntdll.dll!Ldr*
|
| -ntdll.dll!*
|
| -ntdll.dll!LdrLoadDll
|
| -...
|
| -iphlpapi.dll!GetPerAdapterInfo
|
| -...
|
| -iphlpapi.dll!GetAdaptersAddresses
|
| -
|
| -POSSIBLE LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/473 c
|
| -RPCRT4.dll!*
|
| -RPCRT4.dll!*
|
| -...
|
| -IPHLPAPI.DLL!GetAdaptersAddresses
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/475
|
| -...
|
| -ADVAPI32.dll!CryptAcquireContextA
|
| -...
|
| -CRYPT32.dll!CryptMsgOpenToDecode
|
| -...
|
| -CRYPT32.dll!CryptQueryObject
|
| -
|
| -# Lots of leaks from our interactions with the system certificate store. May be
|
| -# worth reviewing our use of their API.
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/476 a
|
| -KERNEL*.dll!LocalAlloc
|
| -...
|
| -CRYPT32.dll!CertGetCRLContextProperty
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/476 b
|
| -KERNEL*.dll!LocalAlloc
|
| -...
|
| -CRYPT32.dll!CertAddCRLContextToStore
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/476 c
|
| -KERNEL*.dll!LocalAlloc
|
| -...
|
| -CRYPT32.dll!CertOpenStore
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/476 d
|
| -...
|
| -CRYPT32.dll!CertOpenSystemStore?
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/476 e
|
| -...
|
| -CRYPT32.dll!CertGetCertificateChain
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/476 f
|
| -...
|
| -CRYPT32.dll!CertCompareIntegerBlob
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/476 g
|
| -...
|
| -CRYPT32.dll!CryptUnprotectData
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/476 h
|
| -KERNEL*.dll!LocalAlloc
|
| -...
|
| -CRYPT32.dll!CertEnumCertificatesInStore
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/476 i
|
| -...
|
| -CRYPT32.dll!CryptProtectData
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/476 j
|
| -...
|
| -CRYPT32.dll!CryptExportPublicKeyInfoEx
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/502 a
|
| -system call NtSecureConnectPort parameter #3
|
| -GDI32.dll!*
|
| -GDI32.dll!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/502 b
|
| -system call NtGdiEnumFonts parameter #6
|
| -GDI32.dll!*
|
| -GDI32.dll!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/511 a
|
| -RPCRT4.dll!...
|
| -ole32.dll!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/511 b
|
| -ole32.dll!*
|
| -ole32.dll!*
|
| -ole32.dll!StringFromGUID2
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/512 a
|
| -...
|
| -*!browser_sync::Cryptographer::PackBootstrapToken
|
| -*!browser_sync::Cryptographer::GetBootstrapToken
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/512 b
|
| -...
|
| -*!Encrypt*
|
| -
|
| -# TODO(bruening): remove these once we have v8 bitfields handled
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/513 a
|
| -*!v8*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/513 b
|
| -*!*
|
| -*!v8*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/513 c
|
| -<not in a module>
|
| -...
|
| -*!v8*
|
| -
|
| -# We have seen some cases (not yet understood: crbug.com/364146) where v8.dll
|
| -# has no symbols. These are all on the bots using component build, so we use
|
| -# v8.dll. TODO(bruening): remove these once we've fixed the symbol issue.
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/513 d
|
| -v8.dll!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/513 e
|
| -<not in a module>
|
| -...
|
| -v8.dll!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/546
|
| -...
|
| -mscms.dll!*
|
| -...
|
| -GDI32.dll!*
|
| -*!IconUtil::Create*HICON*
|
| -
|
| -LEAK
|
| -name=http://crbug.com/92152
|
| -...
|
| -USER32.dll!CreateWindowExW
|
| -*!views::TooltipManagerWin::Init
|
| -*!views::TooltipManagerWin::TooltipManagerWin
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/567 a
|
| -dbghelp.dll!*
|
| -...
|
| -dbghelp.dll!StackWalk64
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/567 b
|
| -*!*
|
| -dbghelp.dll!*
|
| -...
|
| -dbghelp.dll!StackWalk64
|
| -
|
| -# Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
|
| -# TppWorkerThread w/ syms. We used to use mod+offs here, but that was too
|
| -# brittle, so we switched to RPCRT4.dll!*.
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/569
|
| -RPCRT4.dll!...
|
| -ntdll.dll!*
|
| -ntdll.dll!*
|
| -KERNEL*.dll!BaseThreadInitThunk
|
| -
|
| -# TODO(timurrrr): investigate these
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO a
|
| -...
|
| -*!win_util::GetLogonSessionOnlyDACL
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO b
|
| -...
|
| -ntshrui.dll!IsPathSharedW
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO c
|
| -...
|
| -*!NetApiBufferFree
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO d
|
| -...
|
| -*!ShellExecute*
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO e
|
| -...
|
| -*!SHParseDisplayName
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO f
|
| -...
|
| -*!GetCanonicalPathInfo*
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO g
|
| -...
|
| -SHELL32.dll!Ordinal*
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO h
|
| -...
|
| -GDI32.dll!GetTextExtentPoint32*
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO i
|
| -...
|
| -*!SyncSocketClientListener::OnMsgClassResponse
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO j
|
| -...
|
| -*!*NSPRInitSingleton*
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO k
|
| -*!NdrSimpleStructFree
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO l
|
| -ntdll.dll!RtlpNtOpenKey
|
| -ntdll.dll!RtlMakeSelfRelativeSD
|
| -ntdll.dll!RtlAbsoluteToSelfRelativeSD
|
| -ADVAPI32.dll!MakeSelfRelativeSD
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO m
|
| -...
|
| -CRYPT32.dll!I_CertSyncStore
|
| -
|
| -# This matches the same stack as DrMem i#751, but it's an uninit read instead of
|
| -# a leak. Must be some early thread initialization. Doesn't look like
|
| -# bit-level though.
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/TODO n
|
| -RPCRT4.dll!*
|
| -RPCRT4.dll!*
|
| -RPCRT4.dll!*
|
| -ntdll.dll!*
|
| -ntdll.dll!*
|
| -KERNEL*.dll!BaseThreadInitThunk
|
| -
|
| -# No idea where this is from, but Chrome isn't even on the stack.
|
| -POSSIBLE LEAK
|
| -name=http://crbug.com/TODO o
|
| -RPCRT4.dll!...
|
| -ole32.dll!OleInitialize
|
| -ole32.dll!...
|
| -KERNEL32.dll!BaseThreadInitThunk
|
| -
|
| -# Matches lots of RPC related leaks. So far RPC handles have been mostly owned
|
| -# by system libraries and are not something we can fix easily.
|
| -POSSIBLE LEAK
|
| -name=http://crbug.com/TODO p
|
| -RPCRT4.dll!*
|
| -RPCRT4.dll!*
|
| -RPCRT4.dll!NDRCContextBinding
|
| -
|
| -# No idea, but all system code, not interesting.
|
| -POSSIBLE LEAK
|
| -name=http://crbug.com/TODO q
|
| -RPCRT4.dll!...
|
| -RPCRT4.dll!*
|
| -RPCRT4.dll!*
|
| -ole32.dll!...
|
| -ole32.dll!*
|
| -ole32.dll!*
|
| -...
|
| -SHELL32.dll!*
|
| -
|
| -LEAK
|
| -name=http://crbug.com/109278 video device COM leaks
|
| -...
|
| -*!media::VideoCaptureDevice::*
|
| -
|
| -LEAK
|
| -name=http://crbug.com/109278 audio device COM leaks
|
| -...
|
| -*!media::GetInputDeviceNamesWin
|
| -
|
| -# False pos uninit in shell32 when resolving links.
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/745
|
| -SHELL*.dll!*
|
| -...
|
| -SHELL*.dll!*
|
| -*!file_util::ResolveShortcut
|
| -
|
| -# Probable false pos uninit in ffmpeg. Probably due to running off the end of a
|
| -# buffer with SSE/MMX instructions whose results are then masked out later.
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/747 a
|
| -*!ff_pred4x4_vertical_vp8_mmxext
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/747 b
|
| -*!ff_pred4x4_down_left_mmxext
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/747 c
|
| -*!ff_vorbis_floor1_render_list
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/747 d
|
| -*!ff_put_vp8_epel8_h6_ssse3
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/747 e
|
| -*!ff_put_vp8_epel8_h4_ssse3
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/747 f
|
| -*!ff_fft_permute_sse
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/747 g
|
| -*!ff_simple_idct_add_mmx
|
| -
|
| -# ffmpeg seems to leak a pthread condition variable.
|
| -LEAK
|
| -name=http://crbug.com/110042
|
| -*!ptw32_new
|
| -*!pthread_self
|
| -*!sem_wait
|
| -*!pthread_cond_wait
|
| -*!ff_thread_decode_frame
|
| -*!avcodec_decode_video2
|
| -
|
| -# Improperly handled ioctl in bcrypt.
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/748
|
| -system call NtDeviceIoControlFile InputBuffer
|
| -...
|
| -bcrypt.dll!BCryptUnregisterConfigChangeNotify
|
| -bcrypt.dll!BCryptGetFipsAlgorithmMode
|
| -ntdll.dll!RtlQueryEnvironmentVariable
|
| -
|
| -# Not sure what this is.
|
| -POSSIBLE LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/749
|
| -...
|
| -fwpuclnt.dll!*
|
| -...
|
| -RPCRT4.dll!*
|
| -...
|
| -fwpuclnt.dll!*
|
| -...
|
| -WS2_32.dll!*
|
| -*!talk_base::SafeGetHostByName
|
| -*!talk_base::SocketAddress::GetLocalIPs
|
| -*!talk_base::SocketAddress::IsLocalIP
|
| -*!cricket::Transport::VerifyCandidate
|
| -*!cricket::Session::OnRemoteCandidates
|
| -*!cricket::Session::OnTransportInfoMessage
|
| -*!cricket::Session::OnIncomingMessage
|
| -*!cricket::SessionManager::OnIncomingMessage
|
| -
|
| -# More uninit false pos in rpcrt4.dll not caught by default suppressions.
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/529
|
| -RPCRT4.dll!*
|
| -...
|
| -*!base::LaunchProcess
|
| -
|
| -# System leak from CreateEnvironmentBlock.
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/757
|
| -...
|
| -USERENV.dll!CreateEnvironmentBlock
|
| -
|
| -# Looks like another instance of 753
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/753
|
| -...
|
| -ntdll.dll!RtlLoadString
|
| -
|
| -# More bit manip fps
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/493
|
| -USP10.dll!ScriptPositionSingleGlyph
|
| -
|
| -# Various TLS leaks that we don't understand yet. We should be finding a root
|
| -# for these.
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/778 a
|
| -KERNELBASE.dll!TlsSetValue
|
| -
|
| -# Originally filed as: http://crbug.com/109281
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/778 b
|
| -*!operator new
|
| -*!operator new[]
|
| -*!*::ConstructTlsVector
|
| -*!base::ThreadLocalStorage::StaticSlot::Get
|
| -
|
| -# This is an NSS PRThread object installed in TLS. Why isn't this detected as a
|
| -# root? See also http://crbug.com/32624
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/778 c
|
| -*!PR_Calloc
|
| -*!_PR_AttachThread
|
| -*!_PRI_AttachThread
|
| -
|
| -# Bit-level fps in rich edit layer.
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/791
|
| -RICHED20.dll!*
|
| -RICHED20.dll!*
|
| -
|
| -# Already suppressed by drmemory default supp we don't have yet.
|
| -LEAK
|
| -name=i#757: RPC binding leaks in sspicli.dll
|
| -RPCRT4.dll!*
|
| -...
|
| -SspiCli.dll!*
|
| -SspiCli.dll!Cre*
|
| -
|
| -# Async NtReadFile false positives. This was fixed in drmemory r772, remove
|
| -# this supp when we pull that rev.
|
| -UNADDRESSABLE ACCESS
|
| -name=https://github.com/DynamoRIO/drmemory/issues/798
|
| -system call NtReadFile parameter #5
|
| -KERNEL32.dll!ReadFile
|
| -
|
| -# Probable syscall false positive.
|
| -UNADDRESSABLE ACCESS
|
| -name=https://github.com/DynamoRIO/drmemory/issues/809
|
| -system call NtGdiPolyPolyDraw parameter #1
|
| -*!gfx::Path::CreateNativeRegion
|
| -
|
| -# Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces
|
| -# coming out of this module (sometimes only one frame), which makes it hard to
|
| -# write precise suppressions. Until we have bit-level tracking (DRMi#113) we
|
| -# should keep this.
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/113 rpcrt4.dll wildcard
|
| -RPCRT4.dll!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/841 a
|
| -...
|
| -CRYPTNET.dll!I_CryptNetGetConnectivity
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/841 b
|
| -...
|
| -webio.dll!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/841 c
|
| -...
|
| -winhttp.dll!*
|
| -
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/841 d
|
| -...
|
| -CRYPTNET.dll!I_CryptNetGetConnectivity
|
| -
|
| -# Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/810
|
| -instruction=test %edx %edx
|
| -USER32.dll!GetClassLongW
|
| -...
|
| -*!ui::CenterAndSizeWindow
|
| -
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/815
|
| -KERNEL*.dll!...
|
| -dxgi.dll!*
|
| -USER32.dll!GetMonitorInfoA
|
| -ntdll.dll!KiUserCallbackDispatcher
|
| -dxgi.dll!*
|
| -WinSATAPI.DLL!*
|
| -
|
| -# Suppress anything in cmd.exe. It's safer to suppress these than disable
|
| -# following, since someone might launch a Chrome process via cmd.exe.
|
| -LEAK
|
| -name=cmd.exe
|
| -...
|
| -cmd.exe!*
|
| -
|
| -# Possible true system use after free.
|
| -UNADDRESSABLE ACCESS
|
| -name=https://github.com/DynamoRIO/drmemory/issues/623
|
| -KERNELBASE.dll!TlsGetValue
|
| -OLEAUT32.dll!SysFreeString
|
| -OLEAUT32.dll!SysAllocStringByteLen
|
| -OLEACC.dll!*
|
| -OLEACC.dll!*
|
| -OLEACC.dll!*
|
| -OLEACC.dll!*
|
| -
|
| -# basic_streambuf seems to leak something in creating a std::_Mutex
|
| -LEAK
|
| -name=https://github.com/DynamoRIO/drmemory/issues/857
|
| -ntdll.dll!...
|
| -ntdll.dll!RtlInitializeCriticalSection
|
| -*!_Mtxinit
|
| -*!std::_Mutex::_Mutex
|
| -*!std::basic_streambuf<>
|
| -
|
| -# Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though.
|
| -LEAK
|
| -name=GDI SetBrushOrgEx leak
|
| -GDI32.dll!...
|
| -GDI32.dll!GetTextMetricsW
|
| -*!gfx::PlatformFontWin::CreateHFontRef
|
| -*!gfx::PlatformFontWin::GetBaseFontRef
|
| -
|
| -###############################################################
|
| -# Benign issues in Chromium
|
| -
|
| -# This test intentionally leaks an object and checks that it's never deleted.
|
| -LEAK
|
| -name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
|
| -...
|
| -*!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
|
| -
|
| -LEAK
|
| -name=deliberate histogram leak
|
| -...
|
| -*!replace_operator_new
|
| -...
|
| -*!*::*Histogram::FactoryGet
|
| -
|
| -LEAK
|
| -name=deliberate leak for SampleMap
|
| -...
|
| -*!base::SampleMap::Accumulate
|
| -*!base::SparseHistogram::Add
|
| -
|
| -LEAK
|
| -name=deliberate LazyInstance leak
|
| -...
|
| -*!*LeakyLazyInstance*
|
| -...
|
| -*!base::LazyInstance*::Pointer
|
| -
|
| -# Test intentionally leaks an object.
|
| -LEAK
|
| -name=http://crbug.com/86301
|
| -*!replace_operator_new
|
| -...
|
| -*!*_DeadReplyLoopDoesNotDelete_Test::TestBody
|
| -
|
| -# Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it.
|
| -LEAK
|
| -name=Firefox 3 NSS dll leak
|
| -nspr4.dll!*
|
| -...
|
| -*!NSSDecryptor::~NSSDecryptor
|
| -
|
| -# We get uninit reports inside GMock when it prints the bytes of references to
|
| -# partially initialized objects passed to unexpected method calls.
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/64887 (GMock printing uninit data)
|
| -...
|
| -*!testing::*::PrintBytesInObjectTo*
|
| -
|
| -# This is an EXPECT_DEATH() that hits a RELEASE_ASSERT(),
|
| -# which intentionally writes to NULL in order to crash.
|
| -UNADDRESSABLE ACCESS
|
| -name=https://crbug.com/497344
|
| -blink_platform.dll!blink::SecurityOrigin::addSuborigin
|
| -*!blink::SecurityOriginTest_Suborigins_Test::TestBody
|
| -
|
| -###############################################################
|
| -# Proactively borrowed from memcheck/suppressions.txt.
|
| -# We have not yet seen these, but we are expanding the sets of tests
|
| -# we're running, and we've hit redness in the past that could have
|
| -# been avoided by already having the Memcheck suppressions.
|
| -# TODO(bruening): review the entire file (not just these) once we're
|
| -# at the peak set of tests we plan to run and remove the unused ones.
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_101781
|
| -*!encode_one_block
|
| -*!encode_mcu_huff
|
| -*!compress_data
|
| -*!process_data_simple_main
|
| -*!chromium_jpeg_write_scanlines
|
| -*!gfx::JPEGCodec::Encode
|
| -*!gfx::JPEGEncodedDataFromImage
|
| -*!history::TopSites::EncodeBitmap
|
| -*!history::TopSites::SetPageThumbnail
|
| -*!history::ExpireHistoryTest::AddExampleData
|
| -*!history::ExpireHistoryTest::*
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_101781_d
|
| -*!testing::AssertionResult testing::internal::CmpHelperGE<>
|
| -*!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_105907
|
| -...
|
| -*!skia::BGRAConvolve2D
|
| -*!skia::ImageOperations::ResizeBasic*
|
| -*!skia::ImageOperations::Resize*
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_112278
|
| -*!fetch_texel_2d_f_rgba8888
|
| -*!sample_2d_linear
|
| -*!sample_linear_2d
|
| -*!fetch_texel_lod
|
| -*!fetch_texel
|
| -*!_mesa_execute_program
|
| -*!run_program
|
| -*!_swrast_exec_fragment_program
|
| -*!shade_texture_span
|
| -*!_swrast_write_rgba_span
|
| -*!general_triangle
|
| -*!_swrast_validate_triangle
|
| -*!_swrast_Triangle
|
| -*!triangle_rgba
|
| -*!_tnl_render_triangles_elts
|
| -*!run_render
|
| -*!_tnl_run_pipeline
|
| -*!_tnl_draw_prims
|
| -*!_tnl_vbo_draw_prims
|
| -*!vbo_validated_drawrangeelements
|
| -*!vbo_exec_DrawElements
|
| -*!neutral_DrawElements
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_112278b
|
| -*!fetch_texel_2d_f_rgba8888
|
| -*!sample_2d_nearest
|
| -*!sample_nearest_2d
|
| -*!fetch_texel_lod
|
| -*!fetch_texel
|
| -*!_mesa_execute_program
|
| -*!run_program
|
| -*!_swrast_exec_fragment_program
|
| -*!shade_texture_span
|
| -*!_swrast_write_rgba_span
|
| -*!general_triangle
|
| -...
|
| -*!_swrast_Triangle
|
| -*!triangle_rgba
|
| -...
|
| -*!run_render
|
| -*!_tnl_run_pipeline
|
| -*!_tnl_draw_prims
|
| -*!_tnl_vbo_draw_prims
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_115419_1
|
| -*!fetch_texel_2d_f_rgba8888
|
| -*!texture_get_row
|
| -*!fast_read_rgba_pixels
|
| -*!read_rgba_pixels
|
| -*!_swrast_ReadPixels
|
| -*!_mesa_ReadPixels
|
| -*!glReadPixels
|
| -*!gpu::gles2::GLES2DecoderImpl::HandleReadPixels
|
| -*!gpu::gles2::GLES2DecoderImpl::DoCommand
|
| -*!gpu::CommandParser::ProcessCommand
|
| -*!gpu::CommandExecutor::PutChanged
|
| -*!webkit::gpu::GLInProcessContext::PumpCommands
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_115419_2
|
| -*!get_src_arg_mask
|
| -*!_mesa_remove_extra_move_use
|
| -*!_mesa_optimize_program
|
| -*!get_mesa_program
|
| -*!_mesa_ir_link_shader
|
| -*!_mesa_glsl_link_shader
|
| -*!link_program
|
| -*!_mesa_LinkProgramARB
|
| -*!glLinkProgram
|
| -...
|
| -*!gpu::gles2::GLES2DecoderImpl::DoLinkProgram*
|
| -*!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram*
|
| -*!gpu::gles2::GLES2DecoderImpl::DoCommand
|
| -*!gpu::CommandParser::ProcessCommand
|
| -*!gpu::CommandExecutor::PutChanged
|
| -*!webkit::gpu::GLInProcessContext::PumpCommands
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_138058
|
| -...
|
| -*!blink::WebVTTParser::constructTreeFromToken
|
| -*!blink::WebVTTParser::createDocumentFragmentFromCueText
|
| -*!blink::TextTrackCue::getCueAsHTML
|
| -*!blink::TextTrackCue::updateDisplayTree
|
| -*!blink::HTMLMediaElement::updateActiveTextTrackCues
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_138220_a
|
| -*!blink::HTMLInputElement::dataList
|
| -*!blink::HTMLInputElement::list
|
| -*!blink::RenderSliderContainer::layout
|
| -*!blink::RenderBlock::layoutBlockChild
|
| -*!blink::RenderBlock::layoutBlockChildren
|
| -*!blink::RenderBlock::layoutBlock
|
| -*!blink::RenderBlock::layout
|
| -*!blink::RenderSlider::layout
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_138220_b
|
| -*!blink::HTMLInputElement::dataList
|
| -*!blink::HTMLInputElement::list
|
| -*!blink::RenderTheme::paintSliderTicks
|
| -*!blink::RenderThemeChromiumLinux::paintSliderTrack
|
| -*!blink::RenderTheme::paint
|
| -*!blink::RenderBox::paintBoxDecorations
|
| -*!blink::RenderBlock::paintObject
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_162825
|
| -*!bcmp
|
| -*!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator<
|
| -*!std::less<>::operator
|
| -...
|
| -*!std::map<>::find
|
| -...
|
| -*!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_176616_a
|
| -*!WebTestRunner::WebViewTestProxyBase::didCreateDataSource
|
| -*!WebTestRunner::WebViewTestProxy<>::didCreateDataSource
|
| -*!blink::FrameLoaderClientImpl::createDocumentLoader
|
| -*!blink::FrameLoader::init
|
| -*!blink::Frame::init
|
| -*!blink::WebFrameImpl::initializeAsMainFrame
|
| -*!blink::WebViewImpl::initializeMainFrame
|
| -*!TestShell::createNewWindow
|
| -*!TestShell::createMainWindow
|
| -*!TestShell::initialize
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_176616_b
|
| -*!WebTestRunner::TestRunner::reset
|
| -*!WebTestRunner::TestInterfaces::resetAll
|
| -*!WebTestRunner::WebTestInterfaces::resetAll
|
| -*!TestShell::resetTestController
|
| -*!runTest
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_222883
|
| -*!v8::internal::ScavengeVisitor::ScavengePointer
|
| -*!v8::internal::ScavengeVisitor::VisitPointers
|
| -*!v8::internal::StandardFrame::IterateExpressions
|
| -...
|
| -*!v8::internal::Heap::Scavenge
|
| -*!v8::internal::Heap::PerformGarbageCollection*
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_238170a
|
| -*!blink::ElementRuleCollector::collectMatchingRules
|
| -*!blink::ElementRuleCollector::hasAnyMatchingRules
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_238170b
|
| -*!blink::ElementRuleCollector::collectMatchingRules
|
| -*!blink::StyleResolver::matchAuthorRules
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_238170c
|
| -*!blink::ReplaceSelectionCommand::doApply
|
| -*!blink::CompositeEditCommand::apply
|
| -*!blink::applyCommand
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_259789
|
| -*!blink::::adjustAttributes
|
| -*!blink::WebGLRenderingContext::maybeRestoreContext
|
| -*!blink::Timer<>::fired
|
| -*!blink::ThreadTimers::sharedTimerFiredInternal
|
| -*!blink::ThreadTimers::sharedTimerFired
|
| -*!content::BlinkPlatformImpl::DoTimeout
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_290405
|
| -*!GrGradientEffect::onIsEqual
|
| -*!GrEffect::isEqual
|
| -*!GrEffectStage::DeferredStage::isEqual
|
| -*!GrDrawState::DeferredState::isEqual
|
| -*!GrInOrderDrawBuffer::needsNewState
|
| -*!GrInOrderDrawBuffer::onDraw
|
| -*!GrDrawTarget::drawIndexedInstances
|
| -*!GrTextContext::flushGlyphs
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_290435
|
| -*!blink::AudioContext::scheduleNodeDeletion
|
| -*!blink::AudioContext::handlePostRenderTasks
|
| -*!blink::AudioDestinationNode::render
|
| -*!blink::OfflineAudioDestinationNode::offlineRender
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_364724
|
| -*!base::MD5DigestToBase16
|
| -*!content::WebKitTestRunner::CaptureDumpPixels
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_298143
|
| -...
|
| -*!blink::TypeConversionsV8Internal*AttributeGetter*
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_299804
|
| -*!GrConfigConversionEffect::TestForPreservingPMConversions
|
| -*!::test_pm_conversions
|
| -*!GrContext::createPMToUPMEffect
|
| -*!GrContext::readRenderTargetPixels
|
| -*!SkGpuDevice::onReadPixels
|
| -*!SkBaseDevice::readPixels
|
| -*!SkCanvas::readPixels
|
| -*!DeferredDevice::onReadPixels
|
| -*!SkBaseDevice::readPixels
|
| -*!SkCanvas::readPixels
|
| -*!blink::GraphicsContext::readPixels
|
| -*!WTF::PassRefPtr<>
|
| -*!blink::ImageBuffer::getUnmultipliedImageData
|
| -*!blink::CanvasRenderingContext2D::getImageData
|
| -*!blink::CanvasRenderingContext2D::getImageData
|
| -*!blink::CanvasRenderingContext2DV8Internal::getImageDataMethod
|
| -*!blink::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback
|
| -*!v8::internal::FunctionCallbackArguments::Call
|
| -*!v8::internal::HandleApiCallHelper<>
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_309477
|
| -*!WebTestRunner::EventSender::reset
|
| -*!WebTestRunner::TestInterfaces::resetTestHelperControllers
|
| -*!WebTestRunner::TestInterfaces::resetAll
|
| -...
|
| -*!content::ShellRenderProcessObserver::WebKitInitialized
|
| -*!content::RenderThreadImpl::EnsureWebKitInitialized
|
| -*!content::RenderThreadImpl::OnCreateNewView
|
| -
|
| -###############################################################
|
| -# Real issues in Chromium
|
| -
|
| -LEAK
|
| -name=http://crbug.com/32085
|
| -...
|
| -chrome.dll!NotificationRegistrar::Add
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/57266 (1)
|
| -...
|
| -*!remoting::EncoderVp8::Encode
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/57266 (2)
|
| -...
|
| -*!vp8_*
|
| -
|
| -LEAK
|
| -name=http://crbug.com/74417 a
|
| -*!replace_operator_new
|
| -*!disk_cache::BackendImpl::CreateEntryImpl
|
| -
|
| -LEAK
|
| -name=http://crbug.com/74417 b
|
| -*!replace_operator_new
|
| -*!disk_cache::BackendImpl::NewEntry
|
| -
|
| -# One more disk_cache::BackendImpl leak. See also http://crbug.com/87500.
|
| -LEAK
|
| -name=http://crbug.com/74417 c
|
| -*!replace_operator_new
|
| -...
|
| -*!disk_cache::EntryImpl::UserBuffer::UserBuffer
|
| -
|
| -LEAK
|
| -name=http://crbug.com/75247
|
| -...
|
| -*!replace_operator_new
|
| -*!AutofillDownloadTestHelper::AutofillDownloadTestHelper
|
| -
|
| -LEAK
|
| -name=http://crbug.com/78784
|
| -*!generic_cpp_alloc
|
| -*!operator new
|
| -*!TestingProfile::CreateRequestContext
|
| -*!*ProfileSyncService*::SetUp
|
| -
|
| -LEAK
|
| -name=http://crbug.com/80550 (1)
|
| -...
|
| -*!RenderWidgetHost::WasHidden
|
| -
|
| -LEAK
|
| -name=http://crbug.com/80550 (2)
|
| -...
|
| -*!RenderWidgetHost::WasRestored
|
| -
|
| -LEAK
|
| -name=http://crbug.com/88640
|
| -*!generic_cpp_alloc
|
| -*!operator new
|
| -*!ProfileImpl::InitRegisteredProtocolHandlers
|
| -*!ProfileImpl::DoFinalInit
|
| -*!ProfileImpl::OnPrefsLoaded
|
| -
|
| -LEAK
|
| -name=http://crbug.com/91465
|
| -*!generic_cpp_alloc
|
| -*!operator new
|
| -*!browser_sync::internal::WeakHandleCore<>::*
|
| -*!browser_sync::WeakHandle<>::*
|
| -*!syncer::SyncManager::SyncInternal::Init
|
| -
|
| -LEAK
|
| -name=http://crbug.com/91491
|
| -...
|
| -*!CrxUpdateService::ProcessPendingItems
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/92026 (1)
|
| -softokn3.dll!FC_GetFunctionList
|
| -...
|
| -softokn3.dll!NSC_ModuleDBFunc
|
| -
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/92026 (2)
|
| -freebl3.dll!FREEBL_GetVector
|
| -...
|
| -softokn3.dll!NSC_ModuleDBFunc
|
| -
|
| -# Possible real Chromium issue in DoCrossfade.
|
| -UNINITIALIZED READ
|
| -name=http://crbug.com/110049
|
| -*!media::DoCrossfade<>
|
| -*!media::Crossfade
|
| -*!media::AudioRendererAlgorithmBase::FillBuffer
|
| -
|
| -# Known sqlite3 leaks.
|
| -LEAK
|
| -name=http://crbug.com/113847 (1)
|
| -...
|
| -*!sqlite3MemMalloc
|
| -*!mallocWithAlarm
|
| -*!sqlite3Malloc
|
| -...
|
| -*!yy_reduce
|
| -
|
| -LEAK
|
| -name=http://crbug.com/113847 (2)
|
| -...
|
| -*!openDatabase
|
| -*!sqlite3_open
|
| -
|
| -LEAK
|
| -name=http://crbug.com/115328
|
| -...
|
| -*!GenericInfoViewTest_GenericInfoView_Test::TestBody
|
| -
|
| -# IE frame possible leak of COM object.
|
| -LEAK
|
| -name=http://crbug.com/122399
|
| -ole32.dll!...
|
| -ole32.dll!CoTaskMemAlloc
|
| -urlmon.dll!...
|
| -urlmon.dll!CreateUri
|
| -IEFRAME.dll!*
|
| -
|
| -# RenderWidgetHelper leak in DelayProfileDestruction test.
|
| -LEAK
|
| -name=http://crbug.com/125565
|
| -*!generic_cpp_alloc
|
| -*!operator new
|
| -*!RenderProcessHostImpl::RenderProcessHostImpl
|
| -*!SiteInstanceImpl::GetProcess
|
| -*!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
|
| -
|
| -LEAK
|
| -name=http://crbug.com/125807
|
| -*!generic_cpp_alloc
|
| -*!operator new
|
| -*!TransportSecurityPersister::TransportSecurityPersister
|
| -*!TransportSecurityPersisterTest::TransportSecurityPersisterTest
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_113076
|
| -*!media::ConvertYUVToRGB32_C
|
| -*!media::LinearScaleYUVToRGB32RowWithRange_C
|
| -*!media::ScaleYUVToRGB32WithRect
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_343248
|
| -osmesa.dll!LINTERP
|
| -osmesa.dll!INTERP_4F
|
| -osmesa.dll!_tnl_generic_interp
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_340752
|
| -...
|
| -*!*::ThreadState::visitStack
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_343663
|
| -blink_web.dll!blink::RenderBlock::computeInlinePreferredLogicalWidths
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=BUG_343958
|
| -blink_web.dll!blink::Node::getFlag
|
| -blink_web.dll!blink::Node::inDocument
|
| -blink_web.dll!blink::Node::isDescendantOf
|
| -blink_web.dll!blink::CompositeEditCommand::cloneParagraphUnderNewElement
|
| -blink_web.dll!blink::CompositeEditCommand::moveParagraphWithClones
|
| -
|
| -UNINITIALIZED READ
|
| -name=BUG_344076
|
| -blink_web.dll!blink::Editor::canSmartReplaceWithPasteboard
|
| -blink_web.dll!blink::Editor::pasteAsPlainTextWithPasteboard
|
| -blink_web.dll!blink::Editor::pasteAsPlainText
|
| -blink_web.dll!blink::executePasteAndMatchStyle
|
| -blink_web.dll!blink::Editor::Command::execute
|
| -blink_web.dll!blink::Document::execCommand
|
| -
|
| -UNINITIALIZED READ
|
| -name=BUG_349128
|
| -content.dll!std::*
|
| -...
|
| -content.dll!content::BrowserAccessibilityManagerWin::*
|
| -...
|
| -*!*::UpdateNode
|
| -
|
| -# There are so many osmesa errors we have to suppress (mostly the unpack_RGB*
|
| -# variety) that it's a performance hit. We avoid that by requesting
|
| -# whole-module suppression
|
| -# (see https://github.com/DynamoRIO/drmemory/issues/1529).
|
| -UNINITIALIZED READ
|
| -name=bug_347967_all_osmesa
|
| -osmesa.dll!*
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_347967
|
| -osmesa.dll!unpack_RGB*888
|
| -osmesa.dll!_mesa_unpack_rgba_row
|
| -osmesa.dll!slow_read_rgba_pixels
|
| -osmesa.dll!read_rgba_pixels
|
| -osmesa.dll!_mesa_readpixels
|
| -...
|
| -gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
|
| -gpu.dll!gpu::CommandParser::ProcessCommand
|
| -gpu.dll!gpu::CommandExecutor::PutChanged
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_347967,bug_348357
|
| -osmesa.dll!clip_span
|
| -osmesa.dll!_swrast_write_rgba_span
|
| -osmesa.dll!general_triangle
|
| -...
|
| -gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements
|
| -gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements
|
| -gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
|
| -gpu.dll!gpu::CommandParser::ProcessCommand
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_361594
|
| -...
|
| -skia.dll!SkA8_Shader_Blitter::blitH
|
| -skia.dll!SkBlitter::blitRect
|
| -skia.dll!blitrect
|
| -skia.dll!SkScan::FillIRect
|
| -...
|
| -skia.dll!SkDraw::drawRect
|
| -skia.dll!SkDraw::drawBitmap
|
| -skia.dll!SkBitmapDevice::drawBitmap
|
| -skia.dll!SkCanvas::internalDrawBitmap
|
| -skia.dll!SkCanvas::drawBitmap
|
| -content.dll!content::ScreenshotData::EncodeOnWorker
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_365101
|
| -*!device::BluetoothAdapterWin::AdapterStateChanged
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_364146
|
| -...
|
| -v8.dll!*
|
| -net_with_v8.dll!net::ProxyResolverV8::Context::*
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_334448
|
| -*!CLD2::UTF8GenericReplaceInternal
|
| -*!CLD2::UTF8GenericReplace
|
| -*!CLD2::ScriptScanner::LowerScriptSpan
|
| -*!CLD2::ScriptScanner::GetOneScriptSpanLower
|
| -*!CLD2::DetectLanguageSummaryV2
|
| -*!CLD2::DetectLanguageSummary
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_42043
|
| -...
|
| -QuickTime.qts!*
|
| -
|
| -HANDLE LEAK
|
| -name=bug_370178
|
| -system call NtCreateEvent
|
| -KERNELBASE.dll!CreateEventExW
|
| -KERNELBASE.dll!CreateEventW
|
| -base.dll!base::WaitableEvent::WaitableEvent
|
| -gpu.dll!gpu::InProcessCommandBuffer::Initialize
|
| -gl_in_process_context.dll!gpu::`anonymous namespace'::GLInProcessContextImpl::Initialize
|
| -gl_in_process_context.dll!gpu::GLInProcessContext::CreateContext
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_371844
|
| -*!device::GamepadProvider::PadState::Match
|
| -*!device::GamepadProvider::DoPoll
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_371950
|
| -media.dll!ConvertYUVToRGB32Row_SSE
|
| -media.dll!media::ConvertYUVToRGB32_SSE
|
| -media.dll!media::ConvertVideoFrameToBitmap
|
| -media.dll!media::SkCanvasVideoRenderer::Paint
|
| -cc.dll!cc::VideoResourceUpdater::CreateForSoftwarePlanes
|
| -cc.dll!cc::VideoResourceUpdater::CreateExternalResourcesFromVideoFrame
|
| -cc.dll!cc::VideoLayerImpl::WillDraw
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_371959
|
| -content.dll!webrtc::PeerConnection::DoInitialize
|
| -content.dll!webrtc::PeerConnection::Initialize
|
| -content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection_s
|
| -content.dll!webrtc::PeerConnectionFactory::OnMessage
|
| -content.dll!jingle_glue::JingleThreadWrapper::Send
|
| -content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection
|
| -content.dll!webrtc::PeerConnectionFactoryInterface::CreatePeerConnection
|
| -
|
| -# This suppression is deliberately general, as bugs reported in
|
| -# ProcessOutgoingMessages are difficult to track down until we
|
| -# get our annotations in place.
|
| -# TODO(bruening): add annotations once we have the infrastructure.
|
| -UNINITIALIZED READ
|
| -name=bug_371991
|
| -system call NtWriteFile parameter #5
|
| -KERNELBASE.dll!WriteFile
|
| -KERNEL32.dll!WriteFile*
|
| -*!IPC::Channel*::ProcessOutgoingMessages
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_372254
|
| -*!content::*::NotifyPluginProcessHostHelper
|
| -
|
| -UNINITIALIZED READ
|
| -name=drm_i#1546
|
| -*!testing::internal::CmpHelperEQ<>
|
| -...
|
| -*!content::BrowserPluginTest_ResizeFlowControl_Test::TestBody
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_374410
|
| -*!ui::NativeThemeWin::PaintScrollbarTrack
|
| -*!ui::NativeThemeWin::PaintDirect
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_377728
|
| -...
|
| -*!Hunspell::suggest
|
| -*!HunspellEngine::FillSuggestionList
|
| -*!SpellcheckLanguage::SpellCheckWord
|
| -*!SpellCheck::SpellCheckWord
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_389132
|
| -content.dll!crypto_kernel_do_load_cipher_type
|
| -content.dll!crypto_kernel_load_cipher_type
|
| -content.dll!crypto_kernel_init
|
| -content.dll!cricket::SrtpSession::SetKey
|
| -content.dll!cricket::SrtpSession::SetSend
|
| -content.dll!cricket::SrtpFilter::SetRtpParams
|
| -content.dll!cricket::BaseChannel::SetupDtlsSrtp
|
| -content.dll!cricket::BaseChannel::ChannelWritable_w
|
| -content.dll!cricket::BaseChannel::OnWritableState
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_392585
|
| -system call NtCreateFile parameter #9
|
| -*!testing::internal::HandleExceptionsInMethodIfSupported<>
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_398850
|
| -...
|
| -wtf.dll!WTF::PlatformCondition::timedWait
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_399293
|
| -blink_web.dll!blink::InputMethodController::extendSelectionAndDelete
|
| -blink_web.dll!blink::WebLocalFrameImpl::extendSelectionAndDelete
|
| -content.dll!content::RenderFrameImpl::OnExtendSelectionAndDelete
|
| -*!content::RenderViewImplTest_OnExtendSelectionAndDelete_Test::TestBody
|
| -*!testing::internal::HandleExceptionsInMethodIfSupported<>
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_399842
|
| -skia.dll!S32A_Opaque_BlitRow32_SSE4
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_414268
|
| -pdf.dll!chrome_pdf::PDFiumEngine::OnMouseMove
|
| -pdf.dll!chrome_pdf::PDFiumEngine::HandleEvent
|
| -pdf.dll!chrome_pdf::OutOfProcessInstance::HandleInputEvent
|
| -pdf.dll!pp::InputEvent_HandleEvent
|
| -ppapi_proxy.dll!ppapi::CallWhileUnlocked<>
|
| -ppapi_proxy.dll!ppapi::proxy::PPP_InputEvent_Proxy::OnMsgHandleFilteredInputEvent
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_425097
|
| -...
|
| -*!ash::test::ShelfViewTest_CheckDragAndDropFromOverflowBubbleToShelf_Test::TestBody
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_432067
|
| -system call NtCreateFile parameter #9
|
| -MSWSOCK.dll!*
|
| -content.dll!content::AppCacheStorageImpl::DatabaseTask::CallRun
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_436131
|
| -*!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
|
| -*!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
|
| -*!testing::internal::HandleExceptionsInMethodIfSupported<>
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_436131_b
|
| -views.dll!base::ObserverListBase<>::RemoveObserver
|
| -*!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
|
| -*!testing::internal::HandleExceptionsInMethodIfSupported<>
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_436131_c
|
| -*!ash::test::ShelfViewTestAPI::GetPreferredSize
|
| -*!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
|
| -*!testing::internal::HandleExceptionsInMethodIfSupported<>
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_455417
|
| -*!std::char_traits<>::compare
|
| -...
|
| -*!*::*URLRequest*::TestBody
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_468169
|
| -...
|
| -*!encode_nonrd_sb_row
|
| -*!vp9_encode_tile
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_470848
|
| -blink_platform.dll!blink::Heap::RegionTree::lookup
|
| -*!testing::internal::HandleExceptionsInMethodIfSupported<>
|
| -
|
| -HANDLE LEAK
|
| -name=https://crbug.com/480741
|
| -system call NtDuplicateObject
|
| -KERNELBASE.dll!DuplicateHandle
|
| -KERNEL32.dll!DuplicateHandle
|
| -base.dll!base::SharedMemory::ShareToProcessCommon
|
| -gl_wrapper.dll!gl::GLImageSharedMemory::Initialize
|
| -*!*::GpuChannel::CreateImageForGpuMemoryBuffer
|
| -*!*::GpuCommandBufferStub::OnCreateImage
|
| -
|
| -HANDLE LEAK
|
| -name=https://crbug.com/481305
|
| -system call NtCreateSection
|
| -KERNELBASE.dll!CreateFileMappingW
|
| -base.dll!base::SharedMemory::Create
|
| -base.dll!base::SharedMemory::CreateAnonymous
|
| -content.dll!content::ChildThreadImpl::AllocateSharedMemory
|
| -content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
|
| -content.dll!content::RenderThreadImpl::AllocateSharedMemory
|
| -...
|
| -content.dll!content::WebGraphicsContext3DCommandBufferImpl::CreateContext
|
| -
|
| -HANDLE LEAK
|
| -name=https://crbug.com/489779
|
| -system call NtUserCreateWindowEx
|
| -USER32.dll!UnregisterClassW
|
| -USER32.dll!UnregisterClassW
|
| -USER32.dll!CreateWindowExW
|
| -gfx.dll!gfx::WindowImpl::Init
|
| -win_window.dll!ui::WinWindow::WinWindow
|
| -aura.dll!aura::WindowTreeHostPlatform::WindowTreeHostPlatform
|
| -aura.dll!aura::WindowTreeHost::Create
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_493167
|
| -system call NtWriteFile parameter #5
|
| -KERNELBASE.dll!WriteFile
|
| -KERNEL32.dll!WriteFile
|
| -*!base::File::WriteAtCurrentPos
|
| -*!sessions::SessionBackend::AppendCommandsToFile
|
| -*!sessions::SessionBackend::AppendCommands
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_505734
|
| -webcore_shared.dll!blink::FocusController::focusedOrMainFrame
|
| -content.dll!content::RenderWidget::GetSelectionBounds
|
| -content.dll!content::RenderWidget::UpdateSelectionBounds
|
| -content.dll!content::RenderWidget::WillBeginCompositorFrame
|
| -cc.dll!base::internal::InvokeHelper<>::MakeItSo
|
| -cc.dll!base::internal::Invoker<>::Run
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_506557_a
|
| -drmemorylib.dll!replace_memmove
|
| -base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
|
| -base.dll!base::trace_event::TraceEventSystemStatsMonitor::~TraceEventSystemStatsMonitor
|
| -content.dll!content::BrowserMainLoop::ShutdownThreadsAndCleanUp
|
| -content.dll!content::BrowserMainRunnerImpl::Shutdown
|
| -content.dll!content::BrowserMain
|
| -content.dll!content::RunNamedProcessTypeMain
|
| -content.dll!content::ContentMainRunnerImpl::Run
|
| -content.dll!content::ContentMain
|
| -*!content::BrowserTestBase::SetUp
|
| -*!InProcessBrowserTest::SetUp
|
| -*!testing::internal::HandleExceptionsInMethodIfSupported<>
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_506557_b
|
| -base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
|
| -content.dll!content::V8SamplingProfiler::~V8SamplingProfiler
|
| -content.dll!content::RenderThreadImpl::~RenderThreadImpl
|
| -content.dll!content::RenderThreadImpl::`vector deleting destructor'
|
| -content.dll!content::ChildProcess::~ChildProcess
|
| -content.dll!content::RenderProcessImpl::`scalar deleting destructor'
|
| -content.dll!content::InProcessRendererThread::CleanUp
|
| -base.dll!base::`anonymous namespace'::ThreadFunc
|
| -KERNEL32.dll!BaseThreadInitThunk
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_506557_c
|
| -base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
|
| -content.dll!content::V8SamplingProfiler::~V8SamplingProfiler
|
| -content.dll!content::RenderThreadImpl::~RenderThreadImpl
|
| -content.dll!content::RenderThreadImpl::`vector deleting destructor'
|
| -content.dll!content::ChildProcess::~ChildProcess
|
| -content.dll!content::RenderProcessImpl::`scalar deleting destructor'
|
| -content.dll!content::InProcessRendererThread::CleanUp
|
| -base.dll!base::`anonymous namespace'::ThreadFunc
|
| -KERNEL32.dll!BaseThreadInitThunk
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_506557_d
|
| -base.dll!std::vector<>::push_back
|
| -base.dll!base::trace_event::TraceLog::AddEnabledStateObserver
|
| -base.dll!base::trace_event::MemoryDumpManager::Initialize
|
| -content.dll!content::ChildThreadImpl::Init
|
| -content.dll!content::ChildThreadImpl::ChildThreadImpl
|
| -content.dll!content::RenderThreadImpl::RenderThreadImpl
|
| -content.dll!content::InProcessRendererThread::Init
|
| -base.dll!base::`anonymous namespace'::ThreadFunc
|
| -KERNEL32.dll!BaseThreadInitThunk
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_506557_e
|
| -base.dll!std::vector<>::push_back
|
| -base.dll!base::trace_event::TraceLog::AddEnabledStateObserver
|
| -content.dll!content::V8SamplingProfiler::V8SamplingProfiler
|
| -content.dll!content::RenderThreadImpl::EnsureWebKitInitialized
|
| -content.dll!content::RenderThreadImpl::OnCreateNewView
|
| -content.dll!ViewMsg_New::Dispatch<>
|
| -content.dll!content::RenderThreadImpl::OnControlMessageReceived
|
| -content.dll!content::ChildThreadImpl::OnMessageReceived
|
| -ipc.dll!IPC::ChannelProxy::Context::OnDispatchMessage
|
| -ipc.dll!base::internal::Invoker<>::Run
|
| -base.dll!base::debug::TaskAnnotator::RunTask
|
| -scheduler.dll!scheduler::TaskQueueManager::ProcessTaskFromWorkQueue
|
| -scheduler.dll!scheduler::TaskQueueManager::DoWork
|
| -scheduler.dll!base::internal::Invoker<>::Run
|
| -base.dll!base::debug::TaskAnnotator::RunTask
|
| -base.dll!base::MessageLoop::RunTask
|
| -base.dll!base::MessageLoop::DeferOrRunPendingTask
|
| -base.dll!base::MessageLoop::DoWork
|
| -base.dll!base::MessagePumpForUI::DoRunLoop
|
| -base.dll!base::MessagePumpWin::Run
|
| -base.dll!base::MessageLoop::RunHandler
|
| -base.dll!base::MessageLoop::Run
|
| -base.dll!base::Thread::Run
|
| -base.dll!base::Thread::ThreadMain
|
| -base.dll!base::`anonymous namespace'::ThreadFunc
|
| -KERNEL32.dll!BaseThreadInitThunk
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_508794a
|
| -...
|
| -ucrtbase.dll!ismbblead
|
| -ucrtbase.dll!free_base
|
| -ucrtbase.dll!_stdio_common_vsnwprintf_s
|
| -ucrtbase.dll!_stdio_common_vsnwprintf_s
|
| -*!base::vswprintf
|
| -*!base::`anonymous namespace'::StringAppendVT<>
|
| -*!base::StringPrintf
|
| -*!content::AccessibilityTreeFormatterWin::ToString
|
| -*!content::AccessibilityTreeFormatter::RecursiveFormatAccessibilityTree
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_508794b
|
| -ucrtbase.dll!wcsnlen
|
| -ucrtbase.dll!ismbblead
|
| -ucrtbase.dll!free_base
|
| -ucrtbase.dll!_stdio_common_vsnwprintf_s
|
| -ucrtbase.dll!_stdio_common_vsnwprintf_s
|
| -*!base::vswprintf
|
| -*!base::`anonymous namespace'::StringAppendVT<>
|
| -*!base::StringPrintf
|
| -*!content::AccessibilityTreeFormatterWin::ToString
|
| -*!content::AccessibilityTreeFormatter::RecursiveFormatAccessibilityTree
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_534881
|
| -...
|
| -v8.dll!v8::internal::`anonymous namespace'::Invoke
|
| -v8.dll!v8::internal::Execution::Call
|
| -v8.dll!v8::Function::Call
|
| -webcore_shared.dll!blink::V8ScriptRunner::callFunction
|
| -webcore_shared.dll!blink::ScriptController::callFunction
|
| -...
|
| -webcore_shared.dll!blink::LocalDOMWindow::dispatchEvent
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_519041_a
|
| -ntdll.dll!RtlSetLastWin32ErrorAndNtStatusFromNtStatus
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_519041_b
|
| -ntdll.dll!RtlDecodePointer
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_545273
|
| -v8.dll!v8::internal::LookupIterator::LookupIterator
|
| -v8.dll!v8::internal::LookupIterator::PropertyOrElement
|
| -v8.dll!v8::internal::Runtime::GetObjectProperty
|
| -v8.dll!v8::internal::KeyedLoadIC::Load
|
| -v8.dll!v8::internal::Runtime_KeyedLoadIC_Miss
|
| -v8.dll!v8::internal::`anonymous namespace'::Invoke
|
| -v8.dll!v8::internal::Execution::Call
|
| -...
|
| -net_with_v8.dll!net::ProxyResolverV8::Context::*
|
| -
|
| -HANDLE LEAK
|
| -name=bug_548039
|
| -system call NtCreateSection
|
| -KERNELBASE.dll!CreateFileMappingW
|
| -base.dll!base::SharedMemory::Create
|
| -content.dll!content::ChildThreadImpl::AllocateSharedMemory
|
| -content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
|
| -content.dll!content::RenderThreadImpl::AllocateSharedMemory
|
| -...
|
| -content.dll!content::WebGraphicsContext3DCommandBufferImpl::CreateContext
|
| -content.dll!content::WebGraphicsContext3DCommandBufferImpl::MaybeInitializeGL
|
| -
|
| -# Dr. Memory does not yet propagate uninits through ymm registers so we
|
| -# avoid any false positives in the meantime that might show up in
|
| -# libyuv and other code:
|
| -UNINITIALIZED READ
|
| -name=https://github.com/DynamoRIO/drmemory/issues/1485
|
| -instruction=*ymm*
|
| -media.dll!*
|
| -
|
| -HANDLE LEAK
|
| -name=bug_562701
|
| -system call NtCreateSection
|
| -KERNELBASE.dll!CreateFileMappingW
|
| -base.dll!base::SharedMemory::Create
|
| -content.dll!content::ChildThreadImpl::AllocateSharedMemory
|
| -content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
|
| -content.dll!content::ImageDataPlatformBackend::Init
|
| -content.dll!content::PPB_ImageData_Impl::Init
|
| -content.dll!content::PPB_ImageData_Impl::Create
|
| -content.dll!content::ResourceCreationImpl::CreateImageData
|
| -ppapi_proxy.dll!ppapi::proxy::PPB_ImageData_Proxy::CreateImageData
|
| -ppapi_proxy.dll!ppapi::proxy::PPB_ImageData_Proxy::OnHostMsgCreatePlatform
|
| -
|
| -INVALID HEAP ARGUMENT
|
| -name=bug_571551_a
|
| -...
|
| -media.dll!mkvmuxer::Segment::DoNewClusterProcessing
|
| -media.dll!mkvmuxer::Segment::AddGenericFrame
|
| -media.dll!mkvmuxer::Segment::AddFrame
|
| -media.dll!media::WebmMuxer::AddFrame
|
| -media.dll!media::WebmMuxer::OnEncodedVideo
|
| -content.dll!content::MediaRecorderHandler::OnEncodedVideo
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_571551_b
|
| -...
|
| -media.dll!mkvmuxer::Segment::DoNewClusterProcessing
|
| -media.dll!mkvmuxer::Segment::AddGenericFrame
|
| -media.dll!mkvmuxer::Segment::AddFrame
|
| -media.dll!media::WebmMuxer::AddFrame
|
| -media.dll!media::WebmMuxer::OnEncodedVideo
|
| -content.dll!content::MediaRecorderHandler::OnEncodedVideo
|
| -
|
| -HANDLE LEAK
|
| -name=bug_571553
|
| -system call NtUserWindowFromPoint
|
| -content.dll!content::RenderWidgetHostViewAura::UpdateCursorIfOverSelf
|
| -content.dll!content::RenderWidgetHostViewAura::SetIsLoading
|
| -content.dll!content::RenderWidgetHostImpl::SetIsLoading
|
| -content.dll!content::RenderFrameHostManager::SetIsLoading
|
| -
|
| -HANDLE LEAK
|
| -name=bug_571554_a
|
| -system call NtGdiCreateDIBSection
|
| -GDI32.dll!CreateDIBSection
|
| -skia.dll!`anonymous namespace'::CreateHBitmap
|
| -skia.dll!skia::BitmapPlatformDevice::Create
|
| -skia.dll!skia::CreatePlatformCanvas
|
| -surface.dll!TransportDIB::GetPlatformCanvas
|
| -content.dll!content::ImageDataPlatformBackend::Map
|
| -content.dll!content::PepperGraphics2DHost::Init
|
| -content.dll!content::PepperGraphics2DHost::Create
|
| -content.dll!content::ContentRendererPepperHostFactory::CreateResourceHost
|
| -
|
| -HANDLE LEAK
|
| -name=bug_571554_b
|
| -system call NtCreateSection
|
| -KERNELBASE.dll!CreateFileMappingW
|
| -base.dll!base::SharedMemory::Create
|
| -content.dll!content::ChildThreadImpl::AllocateSharedMemory
|
| -content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
|
| -content.dll!content::ImageDataPlatformBackend::Init
|
| -content.dll!content::PPB_ImageData_Impl::Init
|
| -content.dll!content::PepperGraphics2DHost::Init
|
| -content.dll!content::PepperGraphics2DHost::Create
|
| -content.dll!content::ContentRendererPepperHostFactory::CreateResourceHost
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_593594
|
| -blink_platform.dll!qcms_transform_data_rgba_out_lut_sse2
|
| -blink_platform.dll!qcms_transform_data_type
|
| -blink_platform.dll!blink::JPEGImageDecoder::outputScanlines
|
| -blink_platform.dll!blink::JPEGImageReader::decode
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_594657
|
| -*!std::_Tree<>::_Eqrange<>
|
| -*!courgette::adjustment_method_2::AssignmentProblem::Declassify
|
| -*!courgette::adjustment_method_2::AssignmentProblem::AssignOne
|
| -*!courgette::adjustment_method_2::AssignmentProblem::FindAndAssignBestLeader
|
| -*!courgette::adjustment_method_2::AssignmentProblem::Solve
|
| -*!courgette::adjustment_method_2::Adjuster::Solve
|
| -*!courgette::adjustment_method_2::Adjuster::Finish
|
| -*!courgette::adjustment_method_2::Adjuster::Adjust
|
| -*!courgette::Adjust
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_594781a
|
| -chromium_sqlite3.dll!PSCreateMemoryPropertyStore
|
| -...
|
| -chromium_sqlite3.dll!StgDeserializePropVariant
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_594781b
|
| -...
|
| -chromium_sqlite3.dll!PropVariantToGUID
|
| -sql.dll!sql::Connection::GetUniqueStatement
|
| -
|
| -HANDLE LEAK
|
| -name=bug_594829a
|
| -system call NtDuplicateObject
|
| -KERNELBASE.dll!DuplicateHandle
|
| -KERNEL32.dll!DuplicateHandle
|
| -*!sandbox::BrokerServicesBase::AddTargetPeer
|
| -content.dll!content::StartSandboxedProcess
|
| -
|
| -HANDLE LEAK
|
| -name=bug_594829b
|
| -system call NtCreateUserProcess
|
| -KERNEL32.dll!CreateProcessInternalW
|
| -KERNEL32.dll!CreateProcessW
|
| -base.dll!base::LaunchProcess
|
| -base.dll!base::LaunchProcess
|
| -content.dll!content::StartSandboxedProcess
|
| -
|
| -HANDLE LEAK
|
| -name=bug_595093a
|
| -system call NtCreateFile
|
| -KERNELBASE.dll!CreateFileW
|
| -KERNEL32.dll!CreateFileW
|
| -net.dll!disk_cache::File::Init
|
| -net.dll!disk_cache::MappedFile::Init
|
| -net.dll!disk_cache::BackendImpl::InitBackingStore
|
| -net.dll!disk_cache::BackendImpl::SyncInit
|
| -net.dll!disk_cache::BackendIO::ExecuteBackendOperation
|
| -
|
| -HANDLE LEAK
|
| -name=bug_595093b
|
| -system call NtCreateSection
|
| -KERNELBASE.dll!CreateFileMappingW
|
| -net.dll!disk_cache::MappedFile::Init
|
| -net.dll!disk_cache::BackendImpl::InitBackingStore
|
| -net.dll!disk_cache::BackendImpl::SyncInit
|
| -net.dll!disk_cache::BackendIO::ExecuteBackendOperation
|
| -
|
| -HANDLE LEAK
|
| -name=bug_595105
|
| -system call NtDuplicateObject
|
| -KERNELBASE.dll!DuplicateHandle
|
| -KERNEL32.dll!DuplicateHandle
|
| -base.dll!`anonymous namespace'::CreateFileMappingWithReducedPermissions
|
| -base.dll!base::SharedMemory::Create
|
| -base.dll!base::SharedMemory::CreateAndMapAnonymous
|
| -content.dll!content::GpuMemoryBufferImplSharedMemory::Create
|
| -content.dll!content::BrowserGpuMemoryBufferManager::HandleCreateGpuMemoryBufferOnIO
|
| -
|
| -HANDLE LEAK
|
| -name=bug_595146
|
| -system call NtCreateFile
|
| -KERNELBASE.dll!CreateFileW
|
| -KERNEL32.dll!CreateFileW
|
| -base.dll!base::File::DoInitialize
|
| -base.dll!base::File::Initialize
|
| -net.dll!net::FileStream::Context::OpenFileImpl
|
| -
|
| -HANDLE LEAK
|
| -name=bug_595149
|
| -system call NtCreateIoCompletion
|
| -KERNELBASE.dll!CreateIoCompletionPort
|
| -base.dll!base::MessagePumpForIO::MessagePumpForIO
|
| -
|
| -HANDLE LEAK
|
| -name=bug_598364
|
| -system call NtGdiCreateDIBSection
|
| -GDI32.dll!CreateDIBSection
|
| -skia.dll!`anonymous namespace'::CreateHBitmap
|
| -skia.dll!skia::BitmapPlatformDevice::Create
|
| -...
|
| -webcore_shared.dll!blink::ScriptController::createPluginWrapper
|
| -webcore_shared.dll!blink::HTMLPlugInElement::pluginWrapper
|
| -
|
| -UNINITIALIZED READ
|
| -name=bug_616564
|
| -system call NtFsControlFile FILE_PIPE_WAIT_FOR_BUFFER Timeout+NameLength
|
| -KERNELBASE.dll!WaitNamedPipeW
|
| -mojo_system_impl.dll!mojo::edk::NamedPlatformChannelPair::PassClientHandleFromParentProcess
|
| -content.dll!content::`anonymous namespace'::InitializeMojoIPCChannel
|
| -content.dll!content::ChildThreadImpl::Init
|
| -content.dll!content::ChildThreadImpl::ChildThreadImpl
|
| -content.dll!content::UtilityThreadImpl::UtilityThreadImpl
|
| -content.dll!content::UtilityMain
|
| -
|
| -UNADDRESSABLE ACCESS
|
| -name=bug_617740
|
| -media.dll!mkvmuxer::Segment::WriteFramesAll
|
| -media.dll!mkvmuxer::Segment::Finalize
|
| -media.dll!media::WebmMuxer::~WebmMuxer
|
| -
|
| -HANDLE LEAK
|
| -name=bug_628485
|
| -system call NtCreateSemaphore
|
| -KERNELBASE.dll!CreateSemaphoreExW
|
| -KERNEL32.dll!CreateSemaphoreW
|
| -content.dll!vp8cx_create_encoder_threads
|
| -content.dll!vp8_create_compressor
|
| -content.dll!vp8e_init
|
|
|