1# This file contains suppressions for the Dr.Memory tool, see
2# http://dev.chromium.org/developers/how-tos/using-drmemory
3#
4# This file should contain suppressions only for the reports happening
5# in the 'full' mode (drmemory_full).
6# For the reports that can happen in the light mode (a.k.a. drmemory_light),
7# please use suppressions.txt instead.
8
9###############################################################
10# Known reports on the third party we have no control over.
11UNINITIALIZED READ
12name=deflate UNINIT
13...
14*!deflate_*
15*!MOZ_Z_deflate
16
17# TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
18LEAK
19name=http://code.google.com/p/drmemory/issues/detail?id=406
20ADVAPI32.dll!WmiOpenBlock
21ADVAPI32.dll!WmiOpenBlock
22
23# Leaks inside GoogleDesktop - it injects into our processes for some reason
24LEAK
25name=GoogleDesktop LEAK
26...
27GoogleDesktopNetwork3.DLL!DllUnregisterServer
28
29# They deliberately use uninit local var in sqlite random generator
30# random byte may mess up the call stack between randomByte and
31# sqlite3_randomness
32UNINITIALIZED READ
33name=sqlite3_randomness UNINIT
34*!randomByte
35...
36*!sqlite3_randomness
37
38# Intentional leak in WebKit Template Framework for ThreadData.
39LEAK
40name=intentional WTF ThreadData leak
41...
42*!WTF::wtfThreadData
43
44# Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
45LEAK
46name=http://crbug.com/125558 a
47KERNELBASE.dll!LocalAlloc
48SECHOST.dll!...
49SECHOST.dll!NotifyServiceStatusChange
50WINHTTP.dll!...
51WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
52*!net::ProxyResolverWinHttp::GetProxyForURL
53
54# Tiny locale-related leaks in ntdll.  Probably system bug.
55LEAK
56name=http://crbug.com/125558 b
57ntdll.dll!...
58ntdll.dll!*
59KERNELBASE.dll!...
60KERNELBASE.dll!GetCPInfoExW
61webio.dll!*
62webio.dll!*
63webio.dll!*
64WINHTTP.dll!...
65WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
66*!net::ProxyConfigServiceWin::GetCurrentProxyConfig
67
68UNINITIALIZED READ
69name=http://crbug.com/30704 #f
70libpng.dll!wk_png_write_find_filter
71libpng.dll!wk_png_write_row
72
73###############################################################
74# Suppress some false reports due to bugs in Dr.Memory like wrong analysis
75# assumptions or unhandled syscalls
76
77# Please note: the following suppressions were written in the abscense of
78# private symbols so may need to be updated when we switch to auto-loading PDBs
79UNINITIALIZED READ
80name=http://code.google.com/p/drmemory/issues/detail?id=12 (1)
81ntdll.dll!Rtl*
82ntdll.dll!Rtl*
83ntdll.dll!RtlFindActivationContextSectionString
84
85UNINITIALIZED READ
86name=http://code.google.com/p/drmemory/issues/detail?id=12 (2)
87...
88SHELL32.dll!SHFileOperation*
89
90UNINITIALIZED READ
91name=http://code.google.com/p/drmemory/issues/detail?id=12 (3)
92...
93SHELL32.dll!SHGetFolderPath*
94
95LEAK
96name=http://code.google.com/p/drmemory/issues/detail?id=12 (4)
97...
98SHELL32.dll!SHGetFolderPath*
99
100UNINITIALIZED READ
101name=http://code.google.com/p/drmemory/issues/detail?id=12 (5)
102...
103SHELL32.dll!SHCreateDirectory*
104
105UNINITIALIZED READ
106name=http://code.google.com/p/drmemory/issues/detail?id=12 (6)
107...
108SHELL32.dll!ILLoadFromStream*
109
110UNINITIALIZED READ
111name=http://code.google.com/p/drmemory/issues/detail?id=12 (7)
112...
113SHELL32.dll!ILSaveToStream*
114
115LEAK
116name=http://code.google.com/p/drmemory/issues/detail?id=12 (8)
117...
118SHELL32.dll!SHFileOperation*
119
120UNINITIALIZED READ
121name=http://code.google.com/p/drmemory/issues/detail?id=12 (9)
122...
123SHELL32.dll!SHGetItemFromDataObject
124
125LEAK
126name=http://code.google.com/p/drmemory/issues/detail?id=12 (10)
127...
128SHELL32.dll!SHGetItemFromDataObject
129
130LEAK
131name=http://code.google.com/p/drmemory/issues/detail?id=12 (11)
132...
133ole32.dll!*
134SHELL32.dll!SHChangeNotifySuspendResume
135
136UNINITIALIZED READ
137name=http://code.google.com/p/drmemory/issues/detail?id=14 (1)
138...
139*!CreateProcess*
140
141LEAK
142name=http://code.google.com/p/drmemory/issues/detail?id=14 (2)
143...
144*!CreateProcess*
145
146UNINITIALIZED READ
147name=http://code.google.com/p/drmemory/issues/detail?id=14 (3)
148...
149*!base::LaunchApp*
150
151UNINITIALIZED READ
152name=http://code.google.com/p/drmemory/issues/detail?id=17 (1)
153...
154*!CreateWindow*
155
156POSSIBLE LEAK
157name=http://code.google.com/p/drmemory/issues/detail?id=17 (2)
158GDI32.dll!*
159GDI32.dll!CreateFontIndirectExW
160GDI32.dll!CreateFontIndirectW
161
162LEAK
163name=http://code.google.com/p/drmemory/issues/detail?id=17 (3)
164KERNELBASE.dll!LocalAlloc
165...
166USER32.dll!CreateWindow*
167
168UNINITIALIZED READ
169name=http://code.google.com/p/drmemory/issues/detail?id=18 a
170...
171*!CoInitialize*
172
173UNINITIALIZED READ
174name=http://code.google.com/p/drmemory/issues/detail?id=18 b
175...
176*!CoCreateInstance*
177
178UNINITIALIZED READ
179name=http://code.google.com/p/drmemory/issues/detail?id=18 c
180...
181*!CoUninitialize*
182
183UNINITIALIZED READ
184name=http://code.google.com/p/drmemory/issues/detail?id=18 d
185...
186UxTheme.dll!*
187
188UNINITIALIZED READ
189name=http://code.google.com/p/drmemory/issues/detail?id=40 a
190...
191WINSPOOL.DRV!*
192
193LEAK
194name=http://code.google.com/p/drmemory/issues/detail?id=40 b
195...
196WINSPOOL.DRV!*
197
198UNINITIALIZED READ
199name=http://code.google.com/p/drmemory/issues/detail?id=48 a
200system call NtContinue
201...
202*!*SetThreadName
203
204UNINITIALIZED READ
205name=http://code.google.com/p/drmemory/issues/detail?id=48 b
206system call NtContinue
207*!WTF::initializeCurrentThreadInternal
208
209UNINITIALIZED READ
210name=http://code.google.com/p/drmemory/issues/detail?id=52 a
211...
212DBGHELP.dll!SymInitialize
213
214UNINITIALIZED READ
215name=http://code.google.com/p/drmemory/issues/detail?id=52 b
216...
217DBGHELP.dll!SymEnumSourceFiles
218
219UNINITIALIZED READ
220name=http://code.google.com/p/drmemory/issues/detail?id=52 c
221...
222msvcrt.dll!_RTDynamicCast
223
224UNINITIALIZED READ
225name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp
226instruction=test   0x*(%*) $0x??
227DBGHELP.dll!SymUnloadModule64
228
229UNINITIALIZED READ
230name=http://code.google.com/p/drmemory/issues/detail?id=53
231ADVAPI32.dll!WmiMofEnumerateResourcesA
232ADVAPI32.dll!WmiMofEnumerateResourcesA
233ADVAPI32.dll!Sta*TraceW
234
235UNINITIALIZED READ
236name=http://code.google.com/p/drmemory/issues/detail?id=58
237...
238*!_cfltcvt_l
239
240UNINITIALIZED READ
241name=http://code.google.com/p/drmemory/issues/detail?id=60
242USP10.dll!*
243...
244USP10.dll!ScriptStringAnalyse
245
246LEAK
247IMM32.dll!ImmGetIMCCSize
248IMM32.dll!ImmLockClientImc
249IMM32.dll!ImmDisableIME
250IMM32.dll!ImmSetActiveContext
251USER32.dll!IMPSetIMEA
252
253UNINITIALIZED READ
254name=http://code.google.com/p/drmemory/issues/detail?id=65 a
255...
256*!SystemFunction036
257
258UNINITIALIZED READ
259name=http://code.google.com/p/drmemory/issues/detail?id=65 b
260...
261*!talk_base::CreateRandomString
262
263UNINITIALIZED READ
264name=http://code.google.com/p/drmemory/issues/detail?id=68 a
265...
266WS2_32.dll!*
267
268UNINITIALIZED READ
269name=http://code.google.com/p/drmemory/issues/detail?id=68 b
270...
271ADVAPI32.dll!SetSecurityDescriptorDacl
272
273UNINITIALIZED READ
274name=http://code.google.com/p/drmemory/issues/detail?id=68 c
275...
276MSWSOCK.dll!WSPStartup
277
278UNINITIALIZED READ
279name=http://code.google.com/p/drmemory/issues/detail?id=68 d
280...
281ntdll.dll!RtlValidateUnicodeString
282
283LEAK
284name=http://code.google.com/p/drmemory/issues/detail?id=256
285*!_mtinit
286*!__tmainCRTStartup
287*!mainCRTStartup
288
289POSSIBLE LEAK
290name=http://code.google.com/p/drmemory/issues/detail?id=274 a
291...
292GDI32.dll!CreateDCW
293
294LEAK
295name=http://code.google.com/p/drmemory/issues/detail?id=274 b
296...
297GDI32.dll!CreateDCW
298
299LEAK
300name=http://code.google.com/p/drmemory/issues/detail?id=275
301...
302*!_getptd*
303
304UNINITIALIZED READ
305name=http://code.google.com/p/drmemory/issues/detail?id=276
306...
307ntdll.dll!RtlConvertUlongToLargeInteger
308ntdll.dll!RtlConvertUlongToLargeInteger
309ntdll.dll!KiUserExceptionDispatcher
310
311LEAK
312name=http://code.google.com/p/drmemory/issues/detail?id=305
313*!free
314*!free
315*!operator new
316...
317*!MiniDumpWriteDump
318
319UNINITIALIZED READ
320name=http://code.google.com/p/drmemory/issues/detail?id=346 a
321...
322GDI32.dll!CloseEnhMetaFile
323
324UNINITIALIZED READ
325name=http://code.google.com/p/drmemory/issues/detail?id=346 b
326GDI32.dll!SetPolyFillMode
327GDI32.dll!CreateICW
328
329UNINITIALIZED READ
330name=http://code.google.com/p/drmemory/issues/detail?id=362
331USER32.dll!UnregisterClass*
332
333LEAK
334name=http://code.google.com/p/drmemory/issues/detail?id=382
335...
336ntdll.dll!CsrNewThread
337
338UNINITIALIZED READ
339name=http://code.google.com/p/drmemory/issues/detail?id=397
340system call NtDeviceIoControlFile InputBuffer
341ADVAPI32.dll!ImpersonateAnonymousToken
342
343UNINITIALIZED READ
344name=http://code.google.com/p/drmemory/issues/detail?id=407 a
345system call NtRequestWaitReplyPort
346RPCRT4.dll!I_RpcSendReceive
347RPCRT4.dll!NdrSendReceive
348
349UNINITIALIZED READ
350name=http://code.google.com/p/drmemory/issues/detail?id=407 b
351IMM32.dll!*
352ntdll.dll!LdrInitializeThunk
353ntdll.dll!LdrShutdownThread
354
355UNINITIALIZED READ
356name=http://code.google.com/p/drmemory/issues/detail?id=412 a
357ADVAPI32.dll!RegDeleteValue*
358
359UNINITIALIZED READ
360name=http://code.google.com/p/drmemory/issues/detail?id=412 b
361...
362ADVAPI32.dll!Crypt*
363
364UNINITIALIZED READ
365name=http://code.google.com/p/drmemory/issues/detail?id=412 c
366...
367RPCRT4.dll!NdrClientCall2
368
369LEAK
370name=http://code.google.com/p/drmemory/issues/detail?id=412 d
371RSAENH.dll!DllUnregisterServer
372...
373ADVAPI32.dll!CryptAcquireContextA
374CRYPT32.dll!CryptEnumOIDFunction
375...
376CRYPT32.dll!CertFindCertificateInStore
377
378UNINITIALIZED READ
379name=http://code.google.com/p/drmemory/issues/detail?id=412 e
380...
381RSAENH.dll!CPGenRandom
382
383UNINITIALIZED READ
384name=http://code.google.com/p/drmemory/issues/detail?id=412 f
385...
386CRYPT??.dll!Crypt*
387
388UNINITIALIZED READ
389name=http://code.google.com/p/drmemory/issues/detail?id=412 g
390*!replace_memcmp
391...
392*!testing::internal::CmpHelperEQ*
393...
394*!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
395
396# We get these sometimes from AesEncrypt and AesExpandKey.  AesEncrypt doesn't
397# have frame pointers, and we have trouble unwinding from it.  Therefore, we use
398# this broad suppression, effectively disabling uninit checks in rsaenh.dll.
399UNINITIALIZED READ
400name=http://code.google.com/p/drmemory/issues/detail?id=412 h
401RSAENH.dll!*
402
403UNINITIALIZED READ
404name=http://code.google.com/p/drmemory/issues/detail?id=425 a
405CLBCatQ.DLL!DestroyStgDatabase
406CLBCatQ.DLL!PostError
407CLBCatQ.DLL!PostError
408
409LEAK
410name=http://code.google.com/p/drmemory/issues/detail?id=425 b
411RPCRT4.dll!I_RpcBCacheFree
412RPCRT4.dll!I_RpcBCacheFree
413...
414RPCRT4.dll!NdrClientCall2
415
416UNINITIALIZED READ
417name=http://code.google.com/p/drmemory/issues/detail?id=425 c
418msdmo.dll!*
419msdmo.dll!*
420DEVENUM.DLL!*
421
422UNINITIALIZED READ
423name=http://code.google.com/p/drmemory/issues/detail?id=435 a
424...
425ntdll.dll!RtlSetSecurityObject
426ntdll.dll!RtlNewSecurityObjectEx
427ADVAPI32.dll!CreatePrivateObjectSecurityEx
428NTMARTA.dll!AccRewriteSetNamedRights
429
430POSSIBLE LEAK
431name=http://code.google.com/p/drmemory/issues/detail?id=435 b
432WLDAP32.dll!Ordinal325
433...
434WLDAP32.dll!Ordinal325
435ntdll.dll!LdrInitializeThunk
436ntdll.dll!LdrFindResourceDirectory_U
437ntdll.dll!RtlValidateUnicodeString
438ntdll.dll!LdrLoadDll
439KERNEL32.dll!LoadLibraryExW
440
441# mod+offs suppression because the symbolic makes no sense and changes
442# completely in the presence of WS2_32.dll symbols.
443LEAK
444name=http://code.google.com/p/drmemory/issues/detail?id=438
445<WS2_32.dll+0x260c>
446<WS2_32.dll+0x2b76>
447<WS2_32.dll+0x2c61>
448
449UNINITIALIZED READ
450name=http://code.google.com/p/drmemory/issues/detail?id=454 a
451...
452WINMM.dll!wave*GetNumDevs
453
454LEAK
455name=http://code.google.com/p/drmemory/issues/detail?id=454 b
456...
457WINMM.dll!wave*GetNumDevs
458
459LEAK
460name=http://code.google.com/p/drmemory/issues/detail?id=466
461ntdll.dll!RtlRunOnceBeginInitialize
462ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
463
464UNINITIALIZED READ
465name=http://code.google.com/p/drmemory/issues/detail?id=471 a
466*!media::AudioRendererAlgorithmOLA::Crossfade<unsigned char>
467*!media::AudioRendererAlgorithmOLA::FillBuffer
468*!media::AudioRendererAlgorithmOLATest_FillBuffer_*
469
470# Uninit reported in copy ctor.  Would be nice if we could specify which ctor
471# overload to suppress.
472UNINITIALIZED READ
473name=http://code.google.com/p/drmemory/issues/detail?id=471 b
474*!WebCore::FormDataElement::FormDataElement
475
476# Another default copy ctor uninit.
477UNINITIALIZED READ
478name=http://code.google.com/p/drmemory/issues/detail?id=471 c
479*!WebCore::CachedResourceLoader::InitiatorInfo::InitiatorInfo
480...
481*!WTF::Hash*
482
483UNINITIALIZED READ
484name=http://code.google.com/p/drmemory/issues/detail?id=473 a
485system call NtDeviceIoControlFile InputBuffer
486...
487iphlpapi.dll!GetAdaptersAddresses
488
489POSSIBLE LEAK
490name=http://code.google.com/p/drmemory/issues/detail?id=473 b
491ESENT.dll!*
492ESENT.dll!*
493ESENT.dll!*
494ntdll.dll!Ldr*Init*
495ntdll.dll!Ldr*
496ntdll.dll!*
497ntdll.dll!LdrLoadDll
498...
499iphlpapi.dll!GetPerAdapterInfo
500...
501iphlpapi.dll!GetAdaptersAddresses
502
503POSSIBLE LEAK
504name=http://code.google.com/p/drmemory/issues/detail?id=473 c
505RPCRT4.dll!*
506RPCRT4.dll!*
507...
508IPHLPAPI.DLL!GetAdaptersAddresses
509
510LEAK
511name=http://code.google.com/p/drmemory/issues/detail?id=475
512...
513ADVAPI32.dll!CryptAcquireContextA
514...
515CRYPT32.dll!CryptMsgOpenToDecode
516...
517CRYPT32.dll!CryptQueryObject
518
519# Lots of leaks from our interactions with the system certificate store.  May be
520# worth reviewing our use of their API.
521LEAK
522name=http://code.google.com/p/drmemory/issues/detail?id=476 a
523KERNEL*.dll!LocalAlloc
524...
525CRYPT32.dll!CertGetCRLContextProperty
526
527LEAK
528name=http://code.google.com/p/drmemory/issues/detail?id=476 b
529KERNEL*.dll!LocalAlloc
530...
531CRYPT32.dll!CertAddCRLContextToStore
532
533LEAK
534name=http://code.google.com/p/drmemory/issues/detail?id=476 c
535KERNEL*.dll!LocalAlloc
536...
537CRYPT32.dll!CertOpenStore
538
539LEAK
540name=http://code.google.com/p/drmemory/issues/detail?id=476 d
541...
542CRYPT32.dll!CertOpenSystemStore?
543
544LEAK
545name=http://code.google.com/p/drmemory/issues/detail?id=476 e
546...
547CRYPT32.dll!CertGetCertificateChain
548
549LEAK
550name=http://code.google.com/p/drmemory/issues/detail?id=476 f
551...
552CRYPT32.dll!CertCompareIntegerBlob
553
554LEAK
555name=http://code.google.com/p/drmemory/issues/detail?id=476 g
556...
557CRYPT32.dll!CryptUnprotectData
558
559LEAK
560name=http://code.google.com/p/drmemory/issues/detail?id=476 h
561KERNEL*.dll!LocalAlloc
562...
563CRYPT32.dll!CertEnumCertificatesInStore
564
565LEAK
566name=http://code.google.com/p/drmemory/issues/detail?id=476 i
567...
568CRYPT32.dll!CryptProtectData
569
570LEAK
571name=http://code.google.com/p/drmemory/issues/detail?id=476 j
572...
573CRYPT32.dll!CryptExportPublicKeyInfoEx
574
575UNINITIALIZED READ
576name=http://code.google.com/p/drmemory/issues/detail?id=502 a
577system call NtSecureConnectPort parameter #3
578GDI32.dll!*
579GDI32.dll!*
580
581UNINITIALIZED READ
582name=http://code.google.com/p/drmemory/issues/detail?id=502 b
583system call NtGdiEnumFonts parameter #6
584GDI32.dll!*
585GDI32.dll!*
586
587UNINITIALIZED READ
588name=http://code.google.com/p/drmemory/issues/detail?id=511 a
589RPCRT4.dll!...
590ole32.dll!*
591
592UNINITIALIZED READ
593name=http://code.google.com/p/drmemory/issues/detail?id=511 b
594ole32.dll!*
595ole32.dll!*
596ole32.dll!StringFromGUID2
597
598UNINITIALIZED READ
599name=http://code.google.com/p/drmemory/issues/detail?id=512 a
600...
601*!browser_sync::Cryptographer::PackBootstrapToken
602*!browser_sync::Cryptographer::GetBootstrapToken
603
604UNINITIALIZED READ
605name=http://code.google.com/p/drmemory/issues/detail?id=512 b
606...
607*!Encrypt*
608
609UNINITIALIZED READ
610name=http://code.google.com/p/drmemory/issues/detail?id=513 a
611*!v8*
612
613UNINITIALIZED READ
614name=http://code.google.com/p/drmemory/issues/detail?id=513 b
615*!*
616*!v8*
617
618UNINITIALIZED READ
619name=http://code.google.com/p/drmemory/issues/detail?id=513 c
620<not in a module>
621...
622*!v8*
623
624UNINITIALIZED READ
625name=http://code.google.com/p/drmemory/issues/detail?id=546
626...
627mscms.dll!*
628...
629GDI32.dll!*
630*!IconUtil::Create*HICON*
631
632LEAK
633name=http://crbug.com/92152
634...
635USER32.dll!CreateWindowExW
636*!views::TooltipManagerWin::Init
637*!views::TooltipManagerWin::TooltipManagerWin
638
639UNINITIALIZED READ
640name=http://code.google.com/p/drmemory/issues/detail?id=567 a
641dbghelp.dll!*
642...
643dbghelp.dll!StackWalk64
644
645LEAK
646name=http://code.google.com/p/drmemory/issues/detail?id=567 b
647*!*
648dbghelp.dll!*
649...
650dbghelp.dll!StackWalk64
651
652# Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
653# TppWorkerThread w/ syms.  We used to use mod+offs here, but that was too
654# brittle, so we switched to RPCRT4.dll!*.
655LEAK
656name=http://code.google.com/p/drmemory/issues/detail?id=569
657RPCRT4.dll!...
658ntdll.dll!*
659ntdll.dll!*
660KERNEL*.dll!BaseThreadInitThunk
661
662# TODO(timurrrr): investigate these
663UNINITIALIZED READ
664name=http://crbug.com/TODO a
665...
666*!win_util::GetLogonSessionOnlyDACL
667
668UNINITIALIZED READ
669name=http://crbug.com/TODO b
670...
671ntshrui.dll!IsPathSharedW
672
673UNINITIALIZED READ
674name=http://crbug.com/TODO c
675...
676*!NetApiBufferFree
677
678UNINITIALIZED READ
679name=http://crbug.com/TODO d
680...
681*!ShellExecute*
682
683UNINITIALIZED READ
684name=http://crbug.com/TODO e
685...
686*!SHParseDisplayName
687
688UNINITIALIZED READ
689name=http://crbug.com/TODO f
690...
691*!GetCanonicalPathInfo*
692
693UNINITIALIZED READ
694name=http://crbug.com/TODO g
695...
696SHELL32.dll!Ordinal*
697
698UNINITIALIZED READ
699name=http://crbug.com/TODO h
700...
701GDI32.dll!GetTextExtentPoint32*
702
703UNINITIALIZED READ
704name=http://crbug.com/TODO i
705...
706*!SyncSocketClientListener::OnMsgClassResponse
707
708UNINITIALIZED READ
709name=http://crbug.com/TODO j
710...
711*!*NSPRInitSingleton*
712
713UNINITIALIZED READ
714name=http://crbug.com/TODO k
715*!NdrSimpleStructFree
716
717UNINITIALIZED READ
718name=http://crbug.com/TODO l
719ntdll.dll!RtlpNtOpenKey
720ntdll.dll!RtlMakeSelfRelativeSD
721ntdll.dll!RtlAbsoluteToSelfRelativeSD
722ADVAPI32.dll!MakeSelfRelativeSD
723
724UNINITIALIZED READ
725name=http://crbug.com/TODO m
726...
727CRYPT32.dll!I_CertSyncStore
728
729# This matches the same stack as DrMem i#751, but it's an uninit read instead of
730# a leak.  Must be some early thread initialization.  Doesn't look like
731# bit-level though.
732UNINITIALIZED READ
733name=http://crbug.com/TODO n
734RPCRT4.dll!*
735RPCRT4.dll!*
736RPCRT4.dll!*
737ntdll.dll!*
738ntdll.dll!*
739KERNEL*.dll!BaseThreadInitThunk
740
741# No idea where this is from, but Chrome isn't even on the stack.
742POSSIBLE LEAK
743name=http://crbug.com/TODO o
744RPCRT4.dll!...
745ole32.dll!OleInitialize
746ole32.dll!...
747KERNEL32.dll!BaseThreadInitThunk
748
749# Matches lots of RPC related leaks.  So far RPC handles have been mostly owned
750# by system libraries and are not something we can fix easily.
751POSSIBLE LEAK
752name=http://crbug.com/TODO p
753RPCRT4.dll!*
754RPCRT4.dll!*
755RPCRT4.dll!NDRCContextBinding
756
757# No idea, but all system code, not interesting.
758POSSIBLE LEAK
759name=http://crbug.com/TODO q
760RPCRT4.dll!...
761RPCRT4.dll!*
762RPCRT4.dll!*
763ole32.dll!...
764ole32.dll!*
765ole32.dll!*
766...
767SHELL32.dll!*
768
769LEAK
770name=http://crbug.com/109278 video device COM leaks
771...
772*!media::VideoCaptureDevice::*
773
774LEAK
775name=http://crbug.com/109278 audio device COM leaks
776...
777*!media::GetInputDeviceNamesWin
778
779# False pos uninit in shell32 when resolving links.
780UNINITIALIZED READ
781name=http://code.google.com/p/drmemory/issues/detail?id=745
782SHELL*.dll!*
783...
784SHELL*.dll!*
785*!file_util::ResolveShortcut
786
787# Probable false pos uninit in ffmpeg.  Probably due to running off the end of a
788# buffer with SSE/MMX instructions whose results are then masked out later.
789UNINITIALIZED READ
790name=http://code.google.com/p/drmemory/issues/detail?id=747 a
791*!ff_pred4x4_vertical_vp8_mmxext
792
793UNINITIALIZED READ
794name=http://code.google.com/p/drmemory/issues/detail?id=747 b
795*!ff_pred4x4_down_left_mmxext
796
797UNINITIALIZED READ
798name=http://code.google.com/p/drmemory/issues/detail?id=747 c
799*!ff_vorbis_floor1_render_list
800
801UNINITIALIZED READ
802name=http://code.google.com/p/drmemory/issues/detail?id=747 d
803*!ff_put_vp8_epel8_h6_ssse3
804
805UNINITIALIZED READ
806name=http://code.google.com/p/drmemory/issues/detail?id=747 e
807*!ff_put_vp8_epel8_h4_ssse3
808
809UNINITIALIZED READ
810name=http://code.google.com/p/drmemory/issues/detail?id=747 f
811*!ff_fft_permute_sse
812
813UNINITIALIZED READ
814name=http://code.google.com/p/drmemory/issues/detail?id=747 g
815*!ff_simple_idct_add_mmx
816
817# ffmpeg seems to leak a pthread condition variable.
818LEAK
819name=http://crbug.com/110042
820*!ptw32_new
821*!pthread_self
822*!sem_wait
823*!pthread_cond_wait
824*!ff_thread_decode_frame
825*!avcodec_decode_video2
826
827# Improperly handled ioctl in bcrypt.
828UNINITIALIZED READ
829name=http://code.google.com/p/drmemory/issues/detail?id=748
830system call NtDeviceIoControlFile InputBuffer
831bcrypt.dll!BCryptUnregisterConfigChangeNotify
832bcrypt.dll!BCryptGetFipsAlgorithmMode
833ntdll.dll!RtlQueryEnvironmentVariable
834
835# Not sure what this is.
836POSSIBLE LEAK
837name=http://code.google.com/p/drmemory/issues/detail?id=749
838...
839fwpuclnt.dll!*
840...
841RPCRT4.dll!*
842...
843fwpuclnt.dll!*
844...
845WS2_32.dll!*
846*!talk_base::SafeGetHostByName
847*!talk_base::SocketAddress::GetLocalIPs
848*!talk_base::SocketAddress::IsLocalIP
849*!cricket::Transport::VerifyCandidate
850*!cricket::Session::OnRemoteCandidates
851*!cricket::Session::OnTransportInfoMessage
852*!cricket::Session::OnIncomingMessage
853*!cricket::SessionManager::OnIncomingMessage
854
855# More uninit false pos in rpcrt4.dll not caught by default suppressions.
856UNINITIALIZED READ
857name=http://code.google.com/p/drmemory/issues/detail?id=529
858RPCRT4.dll!*
859...
860*!base::LaunchProcess
861
862# System leak from CreateEnvironmentBlock.
863LEAK
864name=http://code.google.com/p/drmemory/issues/detail?id=757
865...
866USERENV.dll!CreateEnvironmentBlock
867
868# Looks like another instance of 753
869LEAK
870name=http://code.google.com/p/drmemory/issues/detail?id=753
871...
872ntdll.dll!RtlLoadString
873
874# More bit manip fps
875UNINITIALIZED READ
876name=http://code.google.com/p/drmemory/issues/detail?id=493
877USP10.dll!ScriptPositionSingleGlyph
878
879# Various TLS leaks that we don't understand yet.  We should be finding a root
880# for these.
881LEAK
882name=http://code.google.com/p/drmemory/issues/detail?id=778 a
883KERNELBASE.dll!TlsSetValue
884
885# Originally filed as: http://crbug.com/109281
886LEAK
887name=http://code.google.com/p/drmemory/issues/detail?id=778 b
888*!operator new
889*!operator new[]
890*!*::ConstructTlsVector
891*!base::ThreadLocalStorage::StaticSlot::Get
892
893# This is an NSS PRThread object installed in TLS.  Why isn't this detected as a
894# root?  See also http://crbug.com/32624
895LEAK
896name=http://code.google.com/p/drmemory/issues/detail?id=778 c
897*!PR_Calloc
898*!_PR_AttachThread
899*!_PRI_AttachThread
900
901# Bit-level fps in rich edit layer.
902UNINITIALIZED READ
903name=http://code.google.com/p/drmemory/issues/detail?id=791
904RICHED20.dll!*
905RICHED20.dll!*
906
907# Already suppressed by drmemory default supp we don't have yet.
908LEAK
909name=i#757: RPC binding leaks in sspicli.dll
910RPCRT4.dll!*
911...
912SspiCli.dll!*
913SspiCli.dll!Cre*
914
915# Async NtReadFile false positives.  This was fixed in drmemory r772, remove
916# this supp when we pull that rev.
917UNADDRESSABLE ACCESS
918name=http://code.google.com/p/drmemory/issues/detail?id=798
919system call NtReadFile parameter #5
920KERNEL32.dll!ReadFile
921
922# Probable syscall false positive.
923UNADDRESSABLE ACCESS
924name=http://code.google.com/p/drmemory/issues/detail?id=809
925system call NtGdiPolyPolyDraw parameter #1
926*!gfx::Path::CreateNativeRegion
927
928# Very wide suppression for all uninits in rpcrt4.dll.  We get bad stack traces
929# coming out of this module (sometimes only one frame), which makes it hard to
930# write precise suppressions.  Until we have bit-level tracking (DRMi#113) we
931# should keep this.
932UNINITIALIZED READ
933name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard
934RPCRT4.dll!*
935
936UNINITIALIZED READ
937name=http://code.google.com/p/drmemory/issues/detail?id=841 a
938...
939CRYPTNET.dll!I_CryptNetGetConnectivity
940
941UNINITIALIZED READ
942name=http://code.google.com/p/drmemory/issues/detail?id=841 b
943...
944webio.dll!*
945
946UNINITIALIZED READ
947name=http://code.google.com/p/drmemory/issues/detail?id=841 c
948...
949winhttp.dll!*
950
951LEAK
952name=http://code.google.com/p/drmemory/issues/detail?id=841 d
953...
954CRYPTNET.dll!I_CryptNetGetConnectivity
955
956# Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
957UNINITIALIZED READ
958name=http://code.google.com/p/drmemory/issues/detail?id=810
959instruction=test   %edx %edx
960USER32.dll!GetClassLongW
961...
962*!ui::CenterAndSizeWindow
963
964UNINITIALIZED READ
965name=http://code.google.com/p/drmemory/issues/detail?id=815
966KERNEL*.dll!...
967dxgi.dll!*
968USER32.dll!GetMonitorInfoA
969ntdll.dll!KiUserCallbackDispatcher
970dxgi.dll!*
971WinSATAPI.DLL!*
972
973# Suppress anything in cmd.exe.  It's safer to suppress these than disable
974# following, since someone might launch a Chrome process via cmd.exe.
975LEAK
976name=cmd.exe
977...
978cmd.exe!*
979
980# Possible true system use after free.
981UNADDRESSABLE ACCESS
982name=http://code.google.com/p/drmemory/issues/detail?id=623
983KERNELBASE.dll!TlsGetValue
984OLEAUT32.dll!SysFreeString
985OLEAUT32.dll!SysAllocStringByteLen
986OLEACC.dll!*
987OLEACC.dll!*
988OLEACC.dll!*
989OLEACC.dll!*
990
991# basic_streambuf seems to leak something in creating a std::_Mutex
992LEAK
993name=http://code.google.com/p/drmemory/issues/detail?id=857
994ntdll.dll!...
995ntdll.dll!RtlInitializeCriticalSection
996*!_Mtxinit
997*!std::_Mutex::_Mutex
998*!std::basic_streambuf<*>
999
1000# stdext::hash_map<> seems to swap uninitialized floats.
1001UNINITIALIZED READ
1002name=http://code.google.com/p/drmemory/issues/detail?id=931
1003*!std::swap<float>
1004*!std::_Hash<*
1005
1006# syscall false positive on handling NtQuerySystemInformation, fix in soon.
1007UNINITIALIZED READ
1008name=http://code.google.com/p/drmemory/issues/detail?id=932
1009KERNEL32.dll!K32GetPerformanceInfo
1010
1011# Seems to create a DC, sometimes.  GetTextMetrics returns no pointers, though.
1012LEAK
1013name=GDI SetBrushOrgEx leak
1014GDI32.dll!...
1015GDI32.dll!GetTextMetricsW
1016*!gfx::PlatformFontWin::CreateHFontRef
1017*!gfx::PlatformFontWin::GetBaseFontRef
1018
1019###############################################################
1020# Benign issues in Chromium
1021
1022# This test intentionally leaks an object and checks that it's never deleted.
1023LEAK
1024name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
1025...
1026*!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
1027
1028LEAK
1029name=deliberate histogram leak
1030...
1031*!replace_operator_new
1032...
1033*!*::*Histogram::FactoryGet
1034
1035LEAK
1036name=deliberate leak for SampleMap
1037...
1038*!base::SampleMap::Accumulate
1039*!base::SparseHistogram::Add
1040
1041LEAK
1042name=deliberate LazyInstance leak
1043...
1044*!*LeakyLazyInstance*
1045...
1046*!base::LazyInstance*::Pointer
1047
1048LEAK
1049name=http://crbug.com/79933 (1)
1050...
1051*!TestURLRequestContext::Init
1052
1053LEAK
1054name=http://crbug.com/79933 (2)
1055...
1056*!TestURLRequestContext::TestURLRequestContext
1057*!TestURLRequestContextGetter::GetURLRequestContext
1058*!notifier::SingleLoginAttempt::SingleLoginAttempt
1059*!notifier::Login::StartConnection
1060*!syncer::InvalidationNotifier::UpdateCredentials
1061*!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials
1062
1063LEAK
1064name=http://crbug.com/79933 (3)
1065...
1066*!TestURLRequestContext::TestURLRequestContext
1067*!TestURLRequestContextGetter::GetURLRequestContext
1068*!URLFetcher::Core::StartURLRequest
1069
1070LEAK
1071name=http://crbug.com/79933 (4)
1072*!generic_cpp_alloc
1073*!operator new
1074*!std::_Allocate<net::SSLConfigService::Observer *>
1075*!std::allocator<net::SSLConfigService::Observer *>::allocate
1076*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::_Insert_n
1077*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::insert
1078*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::push_back
1079*!ObserverListBase<net::SSLConfigService::Observer>::AddObserver
1080...
1081*!net::HttpNetworkSession::HttpNetworkSession
1082*!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
1083*!notifier::XmppClientSocketFactory::CreateTransportClientSocket
1084*!notifier::ChromeAsyncSocket::Connect
1085*!buzz::XmppClient::ProcessStartXmppLogin
1086*!buzz::XmppClient::Process
1087*!talk_base::Task::Step
1088*!talk_base::TaskRunner::InternalRunTasks
1089*!talk_base::TaskRunner::RunTasks
1090*!notifier::TaskPump::CheckAndRunTasks
1091*!base::internal::RunnableAdapter<void (__thiscall notifier::TaskPump::*)(void)>::Run
1092
1093# Test intentionally leaks an object.
1094LEAK
1095name=http://crbug.com/86301
1096*!replace_operator_new
1097...
1098*!*_DeadReplyLoopDoesNotDelete_Test::TestBody
1099
1100# Leak in a binary copy of Firefox 3's NSS dll.  Not much we can do about it.
1101LEAK
1102name=Firefox 3 NSS dll leak
1103nspr4.dll!*
1104...
1105*!NSSDecryptor::~NSSDecryptor
1106
1107# We get uninit reports inside GMock when it prints the bytes of references to
1108# partially initialized objects passed to unexpected method calls.
1109UNINITIALIZED READ
1110name=GMock printing uninit data
1111...
1112*!testing::internal2::PrintBytesInObjectTo
1113
1114###############################################################
1115# Real issues in Chromium
1116
1117LEAK
1118name=http://crbug.com/32085
1119...
1120chrome.dll!NotificationRegistrar::Add
1121
1122LEAK
1123name=http://crbug.com/32623
1124...
1125*!ssl3_HandleHandshakeMessage
1126*!ssl3_HandleHandshake
1127*!ssl3_HandleRecord
1128*!ssl3_GatherCompleteHandshake
1129...
1130*!SSL_ForceHandshake
1131*!net::SSLServerSocketNSS::DoHandshake
1132*!net::SSLServerSocketNSS::DoHandshakeLoop
1133
1134UNINITIALIZED READ
1135name=http://crbug.com/57266 (1)
1136...
1137*!remoting::EncoderVp8::Encode
1138
1139UNINITIALIZED READ
1140name=http://crbug.com/57266 (2)
1141...
1142*!vp8_*
1143
1144LEAK
1145name=http://crbug.com/70062
1146*!PR_Calloc
1147*!PR_NewLock
1148...
1149*!InitSessionCacheLocks
1150*!initSessionCacheLocksLazily
1151*!PR_CallOnce
1152*!ssl_InitSessionCacheLocks
1153*!lock_cache
1154*!ssl_LookupSID
1155*!ssl2_BeginClientHandshake
1156*!ssl_Do1stHandshake
1157*!SSL_ForceHandshake
1158*!net::SSL*SocketNSS::DoHandshake
1159*!net::SSL*SocketNSS::DoHandshakeLoop
1160
1161LEAK
1162name=http://crbug.com/74417 a
1163*!replace_operator_new
1164*!disk_cache::BackendImpl::CreateEntryImpl
1165
1166LEAK
1167name=http://crbug.com/74417 b
1168*!replace_operator_new
1169*!disk_cache::BackendImpl::NewEntry
1170
1171# One more disk_cache::BackendImpl leak.  See also http://crbug.com/87500.
1172LEAK
1173name=http://crbug.com/74417 c
1174*!replace_operator_new
1175...
1176*!disk_cache::EntryImpl::UserBuffer::UserBuffer
1177
1178LEAK
1179name=http://crbug.com/75247
1180...
1181*!replace_operator_new
1182*!AutofillDownloadTestHelper::AutofillDownloadTestHelper
1183
1184LEAK
1185name=http://crbug.com/78784
1186*!generic_cpp_alloc
1187*!operator new
1188*!TestingProfile::CreateRequestContext
1189*!*ProfileSyncService*::SetUp
1190
1191LEAK
1192name=http://crbug.com/80550 (1)
1193...
1194*!RenderWidgetHost::WasHidden
1195
1196LEAK
1197name=http://crbug.com/80550 (2)
1198...
1199*!RenderWidgetHost::WasRestored
1200
1201LEAK
1202name=http://crbug.com/87612
1203...
1204*!SSL_ConfigSecureServer
1205*!net::SSLServerSocketNSS::InitializeSSLOptions
1206*!net::SSLServerSocketNSS::Handshake
1207
1208LEAK
1209name=http://crbug.com/88640
1210*!generic_cpp_alloc
1211*!operator new
1212*!ProfileImpl::InitRegisteredProtocolHandlers
1213*!ProfileImpl::DoFinalInit
1214*!ProfileImpl::OnPrefsLoaded
1215
1216LEAK
1217name=http://crbug.com/91465
1218*!generic_cpp_alloc
1219*!operator new
1220*!browser_sync::internal::WeakHandleCore<browser_sync::JsBackend>::*
1221*!browser_sync::WeakHandle<browser_sync::JsBackend>::*
1222*!syncer::SyncManager::SyncInternal::Init
1223
1224LEAK
1225name=http://crbug.com/91491
1226...
1227*!CrxUpdateService::ProcessPendingItems
1228
1229UNINITIALIZED READ
1230name=http://crbug.com/92026 (1)
1231softokn3.dll!FC_GetFunctionList
1232...
1233softokn3.dll!NSC_ModuleDBFunc
1234
1235UNINITIALIZED READ
1236name=http://crbug.com/92026 (2)
1237freebl3.dll!FREEBL_GetVector
1238...
1239softokn3.dll!NSC_ModuleDBFunc
1240
1241LEAK
1242name=http://crbug.com/92166
1243...
1244*!replace_operator_new
1245*!views::NativeWidgetWin::OnCreate
1246
1247# Possible real Chromium issue in DoCrossfade.
1248UNINITIALIZED READ
1249name=http://crbug.com/110049
1250*!media::DoCrossfade<*>
1251*!media::Crossfade
1252*!media::AudioRendererAlgorithmBase::FillBuffer
1253
1254# Known sqlite3 leaks.
1255LEAK
1256name=http://crbug.com/113847 (1)
1257...
1258*!sqlite3MemMalloc
1259*!mallocWithAlarm
1260*!sqlite3Malloc
1261...
1262*!yy_reduce
1263
1264LEAK
1265name=http://crbug.com/113847 (2)
1266...
1267*!openDatabase
1268*!sqlite3_open
1269
1270LEAK
1271name=http://crbug.com/115328
1272...
1273*!GenericInfoViewTest_GenericInfoView_Test::TestBody
1274
1275UNINITIALIZED READ
1276name=http://crbug.com/116277
1277*!MOZ_Z_deflate
1278*!zipCloseFileInZipRaw64
1279
1280LEAK
1281name=http://crbug.com/117427 a
1282...
1283*!net::HostCache::Set
1284*!net::HostResolverImpl::CacheResult
1285*!net::HostResolverImpl::Job::CompleteRequests
1286*!net::HostResolverImpl::Job::OnProcTaskComplete
1287*!base::internal::RunnableAdapter<void (__thiscall net::HostResolverImpl::Job::*)(int,net::AddressList const &)>::Run
1288
1289# Probably related to 117427.  Someone is not tearing down DNS resolution during
1290# testing.
1291LEAK
1292name=http://crbug.com/117427 b
1293*!generic_cpp_alloc
1294*!operator new
1295*!base::internal::WeakReferenceOwner::GetRef
1296*!base::SupportsWeakPtr<net::HostResolverImpl>::AsWeakPtr
1297*!net::HostResolverImpl::Job::Job
1298*!net::HostResolverImpl::Resolve
1299*!net::SingleRequestHostResolver::Resolve
1300*!net::TransportConnectJob::DoResolveHost
1301*!net::TransportConnectJob::DoLoop
1302*!net::TransportConnectJob::ConnectInternal
1303*!net::ConnectJob::Connect
1304*!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
1305*!net::internal::ClientSocketPoolBaseHelper::RequestSocket
1306*!net::ClientSocketPoolBase<net::TransportSocketParams>::RequestSocket
1307*!net::TransportClientSocketPool::RequestSocket
1308*!net::ClientSocketHandle::Init<net::TransportSocketParams,net::TransportClientSocketPool>
1309*!net::`anonymous namespace'::InitSocketPoolHelper
1310*!net::InitSocketHandleForRawConnect
1311*!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
1312*!base::internal::RunnableAdapter<void (__thiscall notifier::ProxyResolvingClientSocket::*)(int)>::Run
1313
1314# IE frame possible leak of COM object.
1315LEAK
1316name=http://crbug.com/122399
1317ole32.dll!...
1318ole32.dll!CoTaskMemAlloc
1319urlmon.dll!...
1320urlmon.dll!CreateUri
1321IEFRAME.dll!*
1322
1323# RenderWidgetHelper leak in DelayProfileDestruction test.
1324LEAK
1325name=http://crbug.com/125565
1326*!generic_cpp_alloc
1327*!operator new
1328*!RenderProcessHostImpl::RenderProcessHostImpl
1329*!SiteInstanceImpl::GetProcess
1330*!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
1331
1332LEAK
1333name=http://crbug.com/125807
1334*!generic_cpp_alloc
1335*!operator new
1336*!TransportSecurityPersister::TransportSecurityPersister
1337*!TransportSecurityPersisterTest::TransportSecurityPersisterTest
1338