1# This file contains suppressions for the Dr.Memory tool, see 2# http://dev.chromium.org/developers/how-tos/using-drmemory 3# 4# This file should contain suppressions only for the reports happening 5# in the 'full' mode (drmemory_full). 6# For the reports that can happen in the light mode (a.k.a. drmemory_light), 7# please use suppressions.txt instead. 8 9############################################################### 10# Known reports on the third party we have no control over. 11UNINITIALIZED READ 12name=deflate UNINIT 13... 14*!deflate_* 15*!MOZ_Z_deflate 16 17# TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. 18LEAK 19name=http://code.google.com/p/drmemory/issues/detail?id=406 20ADVAPI32.dll!WmiOpenBlock 21ADVAPI32.dll!WmiOpenBlock 22 23# Leaks inside GoogleDesktop - it injects into our processes for some reason 24LEAK 25name=GoogleDesktop LEAK 26... 27GoogleDesktopNetwork3.DLL!DllUnregisterServer 28 29# They deliberately use uninit local var in sqlite random generator 30# random byte may mess up the call stack between randomByte and 31# sqlite3_randomness 32UNINITIALIZED READ 33name=sqlite3_randomness UNINIT 34*!randomByte 35... 36*!sqlite3_randomness 37 38# Intentional leak in WebKit Template Framework for ThreadData. 39LEAK 40name=intentional WTF ThreadData leak 41... 42*!WTF::wtfThreadData 43 44# Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT. 45LEAK 46name=http://crbug.com/125558 a 47KERNELBASE.dll!LocalAlloc 48SECHOST.dll!... 49SECHOST.dll!NotifyServiceStatusChange 50WINHTTP.dll!... 51WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl 52*!net::ProxyResolverWinHttp::GetProxyForURL 53 54# Tiny locale-related leaks in ntdll. Probably system bug. 55LEAK 56name=http://crbug.com/125558 b 57ntdll.dll!... 58ntdll.dll!* 59KERNELBASE.dll!... 60KERNELBASE.dll!GetCPInfoExW 61webio.dll!* 62webio.dll!* 63webio.dll!* 64WINHTTP.dll!... 65WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser 66*!net::ProxyConfigServiceWin::GetCurrentProxyConfig 67 68UNINITIALIZED READ 69name=http://crbug.com/30704 #f 70libpng.dll!wk_png_write_find_filter 71libpng.dll!wk_png_write_row 72 73############################################################### 74# Suppress some false reports due to bugs in Dr.Memory like wrong analysis 75# assumptions or unhandled syscalls 76 77# Please note: the following suppressions were written in the abscense of 78# private symbols so may need to be updated when we switch to auto-loading PDBs 79UNINITIALIZED READ 80name=http://code.google.com/p/drmemory/issues/detail?id=12 (1) 81ntdll.dll!Rtl* 82ntdll.dll!Rtl* 83ntdll.dll!RtlFindActivationContextSectionString 84 85UNINITIALIZED READ 86name=http://code.google.com/p/drmemory/issues/detail?id=12 (2) 87... 88SHELL32.dll!SHFileOperation* 89 90UNINITIALIZED READ 91name=http://code.google.com/p/drmemory/issues/detail?id=12 (3) 92... 93SHELL32.dll!SHGetFolderPath* 94 95LEAK 96name=http://code.google.com/p/drmemory/issues/detail?id=12 (4) 97... 98SHELL32.dll!SHGetFolderPath* 99 100UNINITIALIZED READ 101name=http://code.google.com/p/drmemory/issues/detail?id=12 (5) 102... 103SHELL32.dll!SHCreateDirectory* 104 105UNINITIALIZED READ 106name=http://code.google.com/p/drmemory/issues/detail?id=12 (6) 107... 108SHELL32.dll!ILLoadFromStream* 109 110UNINITIALIZED READ 111name=http://code.google.com/p/drmemory/issues/detail?id=12 (7) 112... 113SHELL32.dll!ILSaveToStream* 114 115LEAK 116name=http://code.google.com/p/drmemory/issues/detail?id=12 (8) 117... 118SHELL32.dll!SHFileOperation* 119 120UNINITIALIZED READ 121name=http://code.google.com/p/drmemory/issues/detail?id=12 (9) 122... 123SHELL32.dll!SHGetItemFromDataObject 124 125LEAK 126name=http://code.google.com/p/drmemory/issues/detail?id=12 (10) 127... 128SHELL32.dll!SHGetItemFromDataObject 129 130LEAK 131name=http://code.google.com/p/drmemory/issues/detail?id=12 (11) 132... 133ole32.dll!* 134SHELL32.dll!SHChangeNotifySuspendResume 135 136UNINITIALIZED READ 137name=http://code.google.com/p/drmemory/issues/detail?id=14 (1) 138... 139*!CreateProcess* 140 141LEAK 142name=http://code.google.com/p/drmemory/issues/detail?id=14 (2) 143... 144*!CreateProcess* 145 146UNINITIALIZED READ 147name=http://code.google.com/p/drmemory/issues/detail?id=14 (3) 148... 149*!base::LaunchApp* 150 151UNINITIALIZED READ 152name=http://code.google.com/p/drmemory/issues/detail?id=17 (1) 153... 154*!CreateWindow* 155 156POSSIBLE LEAK 157name=http://code.google.com/p/drmemory/issues/detail?id=17 (2) 158GDI32.dll!* 159GDI32.dll!CreateFontIndirectExW 160GDI32.dll!CreateFontIndirectW 161 162LEAK 163name=http://code.google.com/p/drmemory/issues/detail?id=17 (3) 164KERNELBASE.dll!LocalAlloc 165... 166USER32.dll!CreateWindow* 167 168UNINITIALIZED READ 169name=http://code.google.com/p/drmemory/issues/detail?id=18 a 170... 171*!CoInitialize* 172 173UNINITIALIZED READ 174name=http://code.google.com/p/drmemory/issues/detail?id=18 b 175... 176*!CoCreateInstance* 177 178UNINITIALIZED READ 179name=http://code.google.com/p/drmemory/issues/detail?id=18 c 180... 181*!CoUninitialize* 182 183UNINITIALIZED READ 184name=http://code.google.com/p/drmemory/issues/detail?id=18 d 185... 186UxTheme.dll!* 187 188UNINITIALIZED READ 189name=http://code.google.com/p/drmemory/issues/detail?id=40 a 190... 191WINSPOOL.DRV!* 192 193LEAK 194name=http://code.google.com/p/drmemory/issues/detail?id=40 b 195... 196WINSPOOL.DRV!* 197 198UNINITIALIZED READ 199name=http://code.google.com/p/drmemory/issues/detail?id=48 a 200system call NtContinue 201... 202*!*SetThreadName 203 204UNINITIALIZED READ 205name=http://code.google.com/p/drmemory/issues/detail?id=48 b 206system call NtContinue 207*!WTF::initializeCurrentThreadInternal 208 209UNINITIALIZED READ 210name=http://code.google.com/p/drmemory/issues/detail?id=52 a 211... 212DBGHELP.dll!SymInitialize 213 214UNINITIALIZED READ 215name=http://code.google.com/p/drmemory/issues/detail?id=52 b 216... 217DBGHELP.dll!SymEnumSourceFiles 218 219UNINITIALIZED READ 220name=http://code.google.com/p/drmemory/issues/detail?id=52 c 221... 222msvcrt.dll!_RTDynamicCast 223 224UNINITIALIZED READ 225name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp 226instruction=test 0x*(%*) $0x?? 227DBGHELP.dll!SymUnloadModule64 228 229UNINITIALIZED READ 230name=http://code.google.com/p/drmemory/issues/detail?id=53 231ADVAPI32.dll!WmiMofEnumerateResourcesA 232ADVAPI32.dll!WmiMofEnumerateResourcesA 233ADVAPI32.dll!Sta*TraceW 234 235UNINITIALIZED READ 236name=http://code.google.com/p/drmemory/issues/detail?id=58 237... 238*!_cfltcvt_l 239 240UNINITIALIZED READ 241name=http://code.google.com/p/drmemory/issues/detail?id=60 242USP10.dll!* 243... 244USP10.dll!ScriptStringAnalyse 245 246LEAK 247IMM32.dll!ImmGetIMCCSize 248IMM32.dll!ImmLockClientImc 249IMM32.dll!ImmDisableIME 250IMM32.dll!ImmSetActiveContext 251USER32.dll!IMPSetIMEA 252 253UNINITIALIZED READ 254name=http://code.google.com/p/drmemory/issues/detail?id=65 a 255... 256*!SystemFunction036 257 258UNINITIALIZED READ 259name=http://code.google.com/p/drmemory/issues/detail?id=65 b 260... 261*!talk_base::CreateRandomString 262 263UNINITIALIZED READ 264name=http://code.google.com/p/drmemory/issues/detail?id=68 a 265... 266WS2_32.dll!* 267 268UNINITIALIZED READ 269name=http://code.google.com/p/drmemory/issues/detail?id=68 b 270... 271ADVAPI32.dll!SetSecurityDescriptorDacl 272 273UNINITIALIZED READ 274name=http://code.google.com/p/drmemory/issues/detail?id=68 c 275... 276MSWSOCK.dll!WSPStartup 277 278UNINITIALIZED READ 279name=http://code.google.com/p/drmemory/issues/detail?id=68 d 280... 281ntdll.dll!RtlValidateUnicodeString 282 283LEAK 284name=http://code.google.com/p/drmemory/issues/detail?id=256 285*!_mtinit 286*!__tmainCRTStartup 287*!mainCRTStartup 288 289POSSIBLE LEAK 290name=http://code.google.com/p/drmemory/issues/detail?id=274 a 291... 292GDI32.dll!CreateDCW 293 294LEAK 295name=http://code.google.com/p/drmemory/issues/detail?id=274 b 296... 297GDI32.dll!CreateDCW 298 299LEAK 300name=http://code.google.com/p/drmemory/issues/detail?id=275 301... 302*!_getptd* 303 304UNINITIALIZED READ 305name=http://code.google.com/p/drmemory/issues/detail?id=276 306... 307ntdll.dll!RtlConvertUlongToLargeInteger 308ntdll.dll!RtlConvertUlongToLargeInteger 309ntdll.dll!KiUserExceptionDispatcher 310 311LEAK 312name=http://code.google.com/p/drmemory/issues/detail?id=305 313*!free 314*!free 315*!operator new 316... 317*!MiniDumpWriteDump 318 319UNINITIALIZED READ 320name=http://code.google.com/p/drmemory/issues/detail?id=346 a 321... 322GDI32.dll!CloseEnhMetaFile 323 324UNINITIALIZED READ 325name=http://code.google.com/p/drmemory/issues/detail?id=346 b 326GDI32.dll!SetPolyFillMode 327GDI32.dll!CreateICW 328 329UNINITIALIZED READ 330name=http://code.google.com/p/drmemory/issues/detail?id=362 331USER32.dll!UnregisterClass* 332 333LEAK 334name=http://code.google.com/p/drmemory/issues/detail?id=382 335... 336ntdll.dll!CsrNewThread 337 338UNINITIALIZED READ 339name=http://code.google.com/p/drmemory/issues/detail?id=397 340system call NtDeviceIoControlFile InputBuffer 341ADVAPI32.dll!ImpersonateAnonymousToken 342 343UNINITIALIZED READ 344name=http://code.google.com/p/drmemory/issues/detail?id=407 a 345system call NtRequestWaitReplyPort 346RPCRT4.dll!I_RpcSendReceive 347RPCRT4.dll!NdrSendReceive 348 349UNINITIALIZED READ 350name=http://code.google.com/p/drmemory/issues/detail?id=407 b 351IMM32.dll!* 352ntdll.dll!LdrInitializeThunk 353ntdll.dll!LdrShutdownThread 354 355UNINITIALIZED READ 356name=http://code.google.com/p/drmemory/issues/detail?id=412 a 357ADVAPI32.dll!RegDeleteValue* 358 359UNINITIALIZED READ 360name=http://code.google.com/p/drmemory/issues/detail?id=412 b 361... 362ADVAPI32.dll!Crypt* 363 364UNINITIALIZED READ 365name=http://code.google.com/p/drmemory/issues/detail?id=412 c 366... 367RPCRT4.dll!NdrClientCall2 368 369LEAK 370name=http://code.google.com/p/drmemory/issues/detail?id=412 d 371RSAENH.dll!DllUnregisterServer 372... 373ADVAPI32.dll!CryptAcquireContextA 374CRYPT32.dll!CryptEnumOIDFunction 375... 376CRYPT32.dll!CertFindCertificateInStore 377 378UNINITIALIZED READ 379name=http://code.google.com/p/drmemory/issues/detail?id=412 e 380... 381RSAENH.dll!CPGenRandom 382 383UNINITIALIZED READ 384name=http://code.google.com/p/drmemory/issues/detail?id=412 f 385... 386CRYPT??.dll!Crypt* 387 388UNINITIALIZED READ 389name=http://code.google.com/p/drmemory/issues/detail?id=412 g 390*!replace_memcmp 391... 392*!testing::internal::CmpHelperEQ* 393... 394*!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody 395 396# We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't 397# have frame pointers, and we have trouble unwinding from it. Therefore, we use 398# this broad suppression, effectively disabling uninit checks in rsaenh.dll. 399UNINITIALIZED READ 400name=http://code.google.com/p/drmemory/issues/detail?id=412 h 401RSAENH.dll!* 402 403UNINITIALIZED READ 404name=http://code.google.com/p/drmemory/issues/detail?id=425 a 405CLBCatQ.DLL!DestroyStgDatabase 406CLBCatQ.DLL!PostError 407CLBCatQ.DLL!PostError 408 409LEAK 410name=http://code.google.com/p/drmemory/issues/detail?id=425 b 411RPCRT4.dll!I_RpcBCacheFree 412RPCRT4.dll!I_RpcBCacheFree 413... 414RPCRT4.dll!NdrClientCall2 415 416UNINITIALIZED READ 417name=http://code.google.com/p/drmemory/issues/detail?id=425 c 418msdmo.dll!* 419msdmo.dll!* 420DEVENUM.DLL!* 421 422UNINITIALIZED READ 423name=http://code.google.com/p/drmemory/issues/detail?id=435 a 424... 425ntdll.dll!RtlSetSecurityObject 426ntdll.dll!RtlNewSecurityObjectEx 427ADVAPI32.dll!CreatePrivateObjectSecurityEx 428NTMARTA.dll!AccRewriteSetNamedRights 429 430POSSIBLE LEAK 431name=http://code.google.com/p/drmemory/issues/detail?id=435 b 432WLDAP32.dll!Ordinal325 433... 434WLDAP32.dll!Ordinal325 435ntdll.dll!LdrInitializeThunk 436ntdll.dll!LdrFindResourceDirectory_U 437ntdll.dll!RtlValidateUnicodeString 438ntdll.dll!LdrLoadDll 439KERNEL32.dll!LoadLibraryExW 440 441# mod+offs suppression because the symbolic makes no sense and changes 442# completely in the presence of WS2_32.dll symbols. 443LEAK 444name=http://code.google.com/p/drmemory/issues/detail?id=438 445<WS2_32.dll+0x260c> 446<WS2_32.dll+0x2b76> 447<WS2_32.dll+0x2c61> 448 449UNINITIALIZED READ 450name=http://code.google.com/p/drmemory/issues/detail?id=454 a 451... 452WINMM.dll!wave*GetNumDevs 453 454LEAK 455name=http://code.google.com/p/drmemory/issues/detail?id=454 b 456... 457WINMM.dll!wave*GetNumDevs 458 459LEAK 460name=http://code.google.com/p/drmemory/issues/detail?id=466 461ntdll.dll!RtlRunOnceBeginInitialize 462ntdll.dll!RtlInitializeCriticalSectionAndSpinCount 463 464UNINITIALIZED READ 465name=http://code.google.com/p/drmemory/issues/detail?id=471 a 466*!media::AudioRendererAlgorithmOLA::Crossfade<unsigned char> 467*!media::AudioRendererAlgorithmOLA::FillBuffer 468*!media::AudioRendererAlgorithmOLATest_FillBuffer_* 469 470# Uninit reported in copy ctor. Would be nice if we could specify which ctor 471# overload to suppress. 472UNINITIALIZED READ 473name=http://code.google.com/p/drmemory/issues/detail?id=471 b 474*!WebCore::FormDataElement::FormDataElement 475 476# Another default copy ctor uninit. 477UNINITIALIZED READ 478name=http://code.google.com/p/drmemory/issues/detail?id=471 c 479*!WebCore::CachedResourceLoader::InitiatorInfo::InitiatorInfo 480... 481*!WTF::Hash* 482 483UNINITIALIZED READ 484name=http://code.google.com/p/drmemory/issues/detail?id=473 a 485system call NtDeviceIoControlFile InputBuffer 486... 487iphlpapi.dll!GetAdaptersAddresses 488 489POSSIBLE LEAK 490name=http://code.google.com/p/drmemory/issues/detail?id=473 b 491ESENT.dll!* 492ESENT.dll!* 493ESENT.dll!* 494ntdll.dll!Ldr*Init* 495ntdll.dll!Ldr* 496ntdll.dll!* 497ntdll.dll!LdrLoadDll 498... 499iphlpapi.dll!GetPerAdapterInfo 500... 501iphlpapi.dll!GetAdaptersAddresses 502 503POSSIBLE LEAK 504name=http://code.google.com/p/drmemory/issues/detail?id=473 c 505RPCRT4.dll!* 506RPCRT4.dll!* 507... 508IPHLPAPI.DLL!GetAdaptersAddresses 509 510LEAK 511name=http://code.google.com/p/drmemory/issues/detail?id=475 512... 513ADVAPI32.dll!CryptAcquireContextA 514... 515CRYPT32.dll!CryptMsgOpenToDecode 516... 517CRYPT32.dll!CryptQueryObject 518 519# Lots of leaks from our interactions with the system certificate store. May be 520# worth reviewing our use of their API. 521LEAK 522name=http://code.google.com/p/drmemory/issues/detail?id=476 a 523KERNEL*.dll!LocalAlloc 524... 525CRYPT32.dll!CertGetCRLContextProperty 526 527LEAK 528name=http://code.google.com/p/drmemory/issues/detail?id=476 b 529KERNEL*.dll!LocalAlloc 530... 531CRYPT32.dll!CertAddCRLContextToStore 532 533LEAK 534name=http://code.google.com/p/drmemory/issues/detail?id=476 c 535KERNEL*.dll!LocalAlloc 536... 537CRYPT32.dll!CertOpenStore 538 539LEAK 540name=http://code.google.com/p/drmemory/issues/detail?id=476 d 541... 542CRYPT32.dll!CertOpenSystemStore? 543 544LEAK 545name=http://code.google.com/p/drmemory/issues/detail?id=476 e 546... 547CRYPT32.dll!CertGetCertificateChain 548 549LEAK 550name=http://code.google.com/p/drmemory/issues/detail?id=476 f 551... 552CRYPT32.dll!CertCompareIntegerBlob 553 554LEAK 555name=http://code.google.com/p/drmemory/issues/detail?id=476 g 556... 557CRYPT32.dll!CryptUnprotectData 558 559LEAK 560name=http://code.google.com/p/drmemory/issues/detail?id=476 h 561KERNEL*.dll!LocalAlloc 562... 563CRYPT32.dll!CertEnumCertificatesInStore 564 565LEAK 566name=http://code.google.com/p/drmemory/issues/detail?id=476 i 567... 568CRYPT32.dll!CryptProtectData 569 570LEAK 571name=http://code.google.com/p/drmemory/issues/detail?id=476 j 572... 573CRYPT32.dll!CryptExportPublicKeyInfoEx 574 575UNINITIALIZED READ 576name=http://code.google.com/p/drmemory/issues/detail?id=502 a 577system call NtSecureConnectPort parameter #3 578GDI32.dll!* 579GDI32.dll!* 580 581UNINITIALIZED READ 582name=http://code.google.com/p/drmemory/issues/detail?id=502 b 583system call NtGdiEnumFonts parameter #6 584GDI32.dll!* 585GDI32.dll!* 586 587UNINITIALIZED READ 588name=http://code.google.com/p/drmemory/issues/detail?id=511 a 589RPCRT4.dll!... 590ole32.dll!* 591 592UNINITIALIZED READ 593name=http://code.google.com/p/drmemory/issues/detail?id=511 b 594ole32.dll!* 595ole32.dll!* 596ole32.dll!StringFromGUID2 597 598UNINITIALIZED READ 599name=http://code.google.com/p/drmemory/issues/detail?id=512 a 600... 601*!browser_sync::Cryptographer::PackBootstrapToken 602*!browser_sync::Cryptographer::GetBootstrapToken 603 604UNINITIALIZED READ 605name=http://code.google.com/p/drmemory/issues/detail?id=512 b 606... 607*!Encrypt* 608 609UNINITIALIZED READ 610name=http://code.google.com/p/drmemory/issues/detail?id=513 a 611*!v8* 612 613UNINITIALIZED READ 614name=http://code.google.com/p/drmemory/issues/detail?id=513 b 615*!* 616*!v8* 617 618UNINITIALIZED READ 619name=http://code.google.com/p/drmemory/issues/detail?id=513 c 620<not in a module> 621... 622*!v8* 623 624UNINITIALIZED READ 625name=http://code.google.com/p/drmemory/issues/detail?id=546 626... 627mscms.dll!* 628... 629GDI32.dll!* 630*!IconUtil::Create*HICON* 631 632LEAK 633name=http://crbug.com/92152 634... 635USER32.dll!CreateWindowExW 636*!views::TooltipManagerWin::Init 637*!views::TooltipManagerWin::TooltipManagerWin 638 639UNINITIALIZED READ 640name=http://code.google.com/p/drmemory/issues/detail?id=567 a 641dbghelp.dll!* 642... 643dbghelp.dll!StackWalk64 644 645LEAK 646name=http://code.google.com/p/drmemory/issues/detail?id=567 b 647*!* 648dbghelp.dll!* 649... 650dbghelp.dll!StackWalk64 651 652# Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and 653# TppWorkerThread w/ syms. We used to use mod+offs here, but that was too 654# brittle, so we switched to RPCRT4.dll!*. 655LEAK 656name=http://code.google.com/p/drmemory/issues/detail?id=569 657RPCRT4.dll!... 658ntdll.dll!* 659ntdll.dll!* 660KERNEL*.dll!BaseThreadInitThunk 661 662# TODO(timurrrr): investigate these 663UNINITIALIZED READ 664name=http://crbug.com/TODO a 665... 666*!win_util::GetLogonSessionOnlyDACL 667 668UNINITIALIZED READ 669name=http://crbug.com/TODO b 670... 671ntshrui.dll!IsPathSharedW 672 673UNINITIALIZED READ 674name=http://crbug.com/TODO c 675... 676*!NetApiBufferFree 677 678UNINITIALIZED READ 679name=http://crbug.com/TODO d 680... 681*!ShellExecute* 682 683UNINITIALIZED READ 684name=http://crbug.com/TODO e 685... 686*!SHParseDisplayName 687 688UNINITIALIZED READ 689name=http://crbug.com/TODO f 690... 691*!GetCanonicalPathInfo* 692 693UNINITIALIZED READ 694name=http://crbug.com/TODO g 695... 696SHELL32.dll!Ordinal* 697 698UNINITIALIZED READ 699name=http://crbug.com/TODO h 700... 701GDI32.dll!GetTextExtentPoint32* 702 703UNINITIALIZED READ 704name=http://crbug.com/TODO i 705... 706*!SyncSocketClientListener::OnMsgClassResponse 707 708UNINITIALIZED READ 709name=http://crbug.com/TODO j 710... 711*!*NSPRInitSingleton* 712 713UNINITIALIZED READ 714name=http://crbug.com/TODO k 715*!NdrSimpleStructFree 716 717UNINITIALIZED READ 718name=http://crbug.com/TODO l 719ntdll.dll!RtlpNtOpenKey 720ntdll.dll!RtlMakeSelfRelativeSD 721ntdll.dll!RtlAbsoluteToSelfRelativeSD 722ADVAPI32.dll!MakeSelfRelativeSD 723 724UNINITIALIZED READ 725name=http://crbug.com/TODO m 726... 727CRYPT32.dll!I_CertSyncStore 728 729# This matches the same stack as DrMem i#751, but it's an uninit read instead of 730# a leak. Must be some early thread initialization. Doesn't look like 731# bit-level though. 732UNINITIALIZED READ 733name=http://crbug.com/TODO n 734RPCRT4.dll!* 735RPCRT4.dll!* 736RPCRT4.dll!* 737ntdll.dll!* 738ntdll.dll!* 739KERNEL*.dll!BaseThreadInitThunk 740 741# No idea where this is from, but Chrome isn't even on the stack. 742POSSIBLE LEAK 743name=http://crbug.com/TODO o 744RPCRT4.dll!... 745ole32.dll!OleInitialize 746ole32.dll!... 747KERNEL32.dll!BaseThreadInitThunk 748 749# Matches lots of RPC related leaks. So far RPC handles have been mostly owned 750# by system libraries and are not something we can fix easily. 751POSSIBLE LEAK 752name=http://crbug.com/TODO p 753RPCRT4.dll!* 754RPCRT4.dll!* 755RPCRT4.dll!NDRCContextBinding 756 757# No idea, but all system code, not interesting. 758POSSIBLE LEAK 759name=http://crbug.com/TODO q 760RPCRT4.dll!... 761RPCRT4.dll!* 762RPCRT4.dll!* 763ole32.dll!... 764ole32.dll!* 765ole32.dll!* 766... 767SHELL32.dll!* 768 769LEAK 770name=http://crbug.com/109278 video device COM leaks 771... 772*!media::VideoCaptureDevice::* 773 774LEAK 775name=http://crbug.com/109278 audio device COM leaks 776... 777*!media::GetInputDeviceNamesWin 778 779# False pos uninit in shell32 when resolving links. 780UNINITIALIZED READ 781name=http://code.google.com/p/drmemory/issues/detail?id=745 782SHELL*.dll!* 783... 784SHELL*.dll!* 785*!file_util::ResolveShortcut 786 787# Probable false pos uninit in ffmpeg. Probably due to running off the end of a 788# buffer with SSE/MMX instructions whose results are then masked out later. 789UNINITIALIZED READ 790name=http://code.google.com/p/drmemory/issues/detail?id=747 a 791*!ff_pred4x4_vertical_vp8_mmxext 792 793UNINITIALIZED READ 794name=http://code.google.com/p/drmemory/issues/detail?id=747 b 795*!ff_pred4x4_down_left_mmxext 796 797UNINITIALIZED READ 798name=http://code.google.com/p/drmemory/issues/detail?id=747 c 799*!ff_vorbis_floor1_render_list 800 801UNINITIALIZED READ 802name=http://code.google.com/p/drmemory/issues/detail?id=747 d 803*!ff_put_vp8_epel8_h6_ssse3 804 805UNINITIALIZED READ 806name=http://code.google.com/p/drmemory/issues/detail?id=747 e 807*!ff_put_vp8_epel8_h4_ssse3 808 809UNINITIALIZED READ 810name=http://code.google.com/p/drmemory/issues/detail?id=747 f 811*!ff_fft_permute_sse 812 813UNINITIALIZED READ 814name=http://code.google.com/p/drmemory/issues/detail?id=747 g 815*!ff_simple_idct_add_mmx 816 817# ffmpeg seems to leak a pthread condition variable. 818LEAK 819name=http://crbug.com/110042 820*!ptw32_new 821*!pthread_self 822*!sem_wait 823*!pthread_cond_wait 824*!ff_thread_decode_frame 825*!avcodec_decode_video2 826 827# Improperly handled ioctl in bcrypt. 828UNINITIALIZED READ 829name=http://code.google.com/p/drmemory/issues/detail?id=748 830system call NtDeviceIoControlFile InputBuffer 831bcrypt.dll!BCryptUnregisterConfigChangeNotify 832bcrypt.dll!BCryptGetFipsAlgorithmMode 833ntdll.dll!RtlQueryEnvironmentVariable 834 835# Not sure what this is. 836POSSIBLE LEAK 837name=http://code.google.com/p/drmemory/issues/detail?id=749 838... 839fwpuclnt.dll!* 840... 841RPCRT4.dll!* 842... 843fwpuclnt.dll!* 844... 845WS2_32.dll!* 846*!talk_base::SafeGetHostByName 847*!talk_base::SocketAddress::GetLocalIPs 848*!talk_base::SocketAddress::IsLocalIP 849*!cricket::Transport::VerifyCandidate 850*!cricket::Session::OnRemoteCandidates 851*!cricket::Session::OnTransportInfoMessage 852*!cricket::Session::OnIncomingMessage 853*!cricket::SessionManager::OnIncomingMessage 854 855# More uninit false pos in rpcrt4.dll not caught by default suppressions. 856UNINITIALIZED READ 857name=http://code.google.com/p/drmemory/issues/detail?id=529 858RPCRT4.dll!* 859... 860*!base::LaunchProcess 861 862# System leak from CreateEnvironmentBlock. 863LEAK 864name=http://code.google.com/p/drmemory/issues/detail?id=757 865... 866USERENV.dll!CreateEnvironmentBlock 867 868# Looks like another instance of 753 869LEAK 870name=http://code.google.com/p/drmemory/issues/detail?id=753 871... 872ntdll.dll!RtlLoadString 873 874# More bit manip fps 875UNINITIALIZED READ 876name=http://code.google.com/p/drmemory/issues/detail?id=493 877USP10.dll!ScriptPositionSingleGlyph 878 879# Various TLS leaks that we don't understand yet. We should be finding a root 880# for these. 881LEAK 882name=http://code.google.com/p/drmemory/issues/detail?id=778 a 883KERNELBASE.dll!TlsSetValue 884 885# Originally filed as: http://crbug.com/109281 886LEAK 887name=http://code.google.com/p/drmemory/issues/detail?id=778 b 888*!operator new 889*!operator new[] 890*!*::ConstructTlsVector 891*!base::ThreadLocalStorage::StaticSlot::Get 892 893# This is an NSS PRThread object installed in TLS. Why isn't this detected as a 894# root? See also http://crbug.com/32624 895LEAK 896name=http://code.google.com/p/drmemory/issues/detail?id=778 c 897*!PR_Calloc 898*!_PR_AttachThread 899*!_PRI_AttachThread 900 901# Bit-level fps in rich edit layer. 902UNINITIALIZED READ 903name=http://code.google.com/p/drmemory/issues/detail?id=791 904RICHED20.dll!* 905RICHED20.dll!* 906 907# Already suppressed by drmemory default supp we don't have yet. 908LEAK 909name=i#757: RPC binding leaks in sspicli.dll 910RPCRT4.dll!* 911... 912SspiCli.dll!* 913SspiCli.dll!Cre* 914 915# Async NtReadFile false positives. This was fixed in drmemory r772, remove 916# this supp when we pull that rev. 917UNADDRESSABLE ACCESS 918name=http://code.google.com/p/drmemory/issues/detail?id=798 919system call NtReadFile parameter #5 920KERNEL32.dll!ReadFile 921 922# Probable syscall false positive. 923UNADDRESSABLE ACCESS 924name=http://code.google.com/p/drmemory/issues/detail?id=809 925system call NtGdiPolyPolyDraw parameter #1 926*!gfx::Path::CreateNativeRegion 927 928# Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces 929# coming out of this module (sometimes only one frame), which makes it hard to 930# write precise suppressions. Until we have bit-level tracking (DRMi#113) we 931# should keep this. 932UNINITIALIZED READ 933name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard 934RPCRT4.dll!* 935 936UNINITIALIZED READ 937name=http://code.google.com/p/drmemory/issues/detail?id=841 a 938... 939CRYPTNET.dll!I_CryptNetGetConnectivity 940 941UNINITIALIZED READ 942name=http://code.google.com/p/drmemory/issues/detail?id=841 b 943... 944webio.dll!* 945 946UNINITIALIZED READ 947name=http://code.google.com/p/drmemory/issues/detail?id=841 c 948... 949winhttp.dll!* 950 951LEAK 952name=http://code.google.com/p/drmemory/issues/detail?id=841 d 953... 954CRYPTNET.dll!I_CryptNetGetConnectivity 955 956# Often missing a ntdll.dll!KiUserCallbackDispatcher frame. 957UNINITIALIZED READ 958name=http://code.google.com/p/drmemory/issues/detail?id=810 959instruction=test %edx %edx 960USER32.dll!GetClassLongW 961... 962*!ui::CenterAndSizeWindow 963 964UNINITIALIZED READ 965name=http://code.google.com/p/drmemory/issues/detail?id=815 966KERNEL*.dll!... 967dxgi.dll!* 968USER32.dll!GetMonitorInfoA 969ntdll.dll!KiUserCallbackDispatcher 970dxgi.dll!* 971WinSATAPI.DLL!* 972 973# Suppress anything in cmd.exe. It's safer to suppress these than disable 974# following, since someone might launch a Chrome process via cmd.exe. 975LEAK 976name=cmd.exe 977... 978cmd.exe!* 979 980# Possible true system use after free. 981UNADDRESSABLE ACCESS 982name=http://code.google.com/p/drmemory/issues/detail?id=623 983KERNELBASE.dll!TlsGetValue 984OLEAUT32.dll!SysFreeString 985OLEAUT32.dll!SysAllocStringByteLen 986OLEACC.dll!* 987OLEACC.dll!* 988OLEACC.dll!* 989OLEACC.dll!* 990 991# basic_streambuf seems to leak something in creating a std::_Mutex 992LEAK 993name=http://code.google.com/p/drmemory/issues/detail?id=857 994ntdll.dll!... 995ntdll.dll!RtlInitializeCriticalSection 996*!_Mtxinit 997*!std::_Mutex::_Mutex 998*!std::basic_streambuf<*> 999 1000# stdext::hash_map<> seems to swap uninitialized floats. 1001UNINITIALIZED READ 1002name=http://code.google.com/p/drmemory/issues/detail?id=931 1003*!std::swap<float> 1004*!std::_Hash<* 1005 1006# syscall false positive on handling NtQuerySystemInformation, fix in soon. 1007UNINITIALIZED READ 1008name=http://code.google.com/p/drmemory/issues/detail?id=932 1009KERNEL32.dll!K32GetPerformanceInfo 1010 1011# Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though. 1012LEAK 1013name=GDI SetBrushOrgEx leak 1014GDI32.dll!... 1015GDI32.dll!GetTextMetricsW 1016*!gfx::PlatformFontWin::CreateHFontRef 1017*!gfx::PlatformFontWin::GetBaseFontRef 1018 1019############################################################### 1020# Benign issues in Chromium 1021 1022# This test intentionally leaks an object and checks that it's never deleted. 1023LEAK 1024name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak 1025... 1026*!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody 1027 1028LEAK 1029name=deliberate histogram leak 1030... 1031*!replace_operator_new 1032... 1033*!*::*Histogram::FactoryGet 1034 1035LEAK 1036name=deliberate leak for SampleMap 1037... 1038*!base::SampleMap::Accumulate 1039*!base::SparseHistogram::Add 1040 1041LEAK 1042name=deliberate LazyInstance leak 1043... 1044*!*LeakyLazyInstance* 1045... 1046*!base::LazyInstance*::Pointer 1047 1048LEAK 1049name=http://crbug.com/79933 (1) 1050... 1051*!TestURLRequestContext::Init 1052 1053LEAK 1054name=http://crbug.com/79933 (2) 1055... 1056*!TestURLRequestContext::TestURLRequestContext 1057*!TestURLRequestContextGetter::GetURLRequestContext 1058*!notifier::SingleLoginAttempt::SingleLoginAttempt 1059*!notifier::Login::StartConnection 1060*!syncer::InvalidationNotifier::UpdateCredentials 1061*!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials 1062 1063LEAK 1064name=http://crbug.com/79933 (3) 1065... 1066*!TestURLRequestContext::TestURLRequestContext 1067*!TestURLRequestContextGetter::GetURLRequestContext 1068*!URLFetcher::Core::StartURLRequest 1069 1070LEAK 1071name=http://crbug.com/79933 (4) 1072*!generic_cpp_alloc 1073*!operator new 1074*!std::_Allocate<net::SSLConfigService::Observer *> 1075*!std::allocator<net::SSLConfigService::Observer *>::allocate 1076*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::_Insert_n 1077*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::insert 1078*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::push_back 1079*!ObserverListBase<net::SSLConfigService::Observer>::AddObserver 1080... 1081*!net::HttpNetworkSession::HttpNetworkSession 1082*!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket 1083*!notifier::XmppClientSocketFactory::CreateTransportClientSocket 1084*!notifier::ChromeAsyncSocket::Connect 1085*!buzz::XmppClient::ProcessStartXmppLogin 1086*!buzz::XmppClient::Process 1087*!talk_base::Task::Step 1088*!talk_base::TaskRunner::InternalRunTasks 1089*!talk_base::TaskRunner::RunTasks 1090*!notifier::TaskPump::CheckAndRunTasks 1091*!base::internal::RunnableAdapter<void (__thiscall notifier::TaskPump::*)(void)>::Run 1092 1093# Test intentionally leaks an object. 1094LEAK 1095name=http://crbug.com/86301 1096*!replace_operator_new 1097... 1098*!*_DeadReplyLoopDoesNotDelete_Test::TestBody 1099 1100# Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it. 1101LEAK 1102name=Firefox 3 NSS dll leak 1103nspr4.dll!* 1104... 1105*!NSSDecryptor::~NSSDecryptor 1106 1107# We get uninit reports inside GMock when it prints the bytes of references to 1108# partially initialized objects passed to unexpected method calls. 1109UNINITIALIZED READ 1110name=GMock printing uninit data 1111... 1112*!testing::internal2::PrintBytesInObjectTo 1113 1114############################################################### 1115# Real issues in Chromium 1116 1117LEAK 1118name=http://crbug.com/32085 1119... 1120chrome.dll!NotificationRegistrar::Add 1121 1122LEAK 1123name=http://crbug.com/32623 1124... 1125*!ssl3_HandleHandshakeMessage 1126*!ssl3_HandleHandshake 1127*!ssl3_HandleRecord 1128*!ssl3_GatherCompleteHandshake 1129... 1130*!SSL_ForceHandshake 1131*!net::SSLServerSocketNSS::DoHandshake 1132*!net::SSLServerSocketNSS::DoHandshakeLoop 1133 1134UNINITIALIZED READ 1135name=http://crbug.com/57266 (1) 1136... 1137*!remoting::EncoderVp8::Encode 1138 1139UNINITIALIZED READ 1140name=http://crbug.com/57266 (2) 1141... 1142*!vp8_* 1143 1144LEAK 1145name=http://crbug.com/70062 1146*!PR_Calloc 1147*!PR_NewLock 1148... 1149*!InitSessionCacheLocks 1150*!initSessionCacheLocksLazily 1151*!PR_CallOnce 1152*!ssl_InitSessionCacheLocks 1153*!lock_cache 1154*!ssl_LookupSID 1155*!ssl2_BeginClientHandshake 1156*!ssl_Do1stHandshake 1157*!SSL_ForceHandshake 1158*!net::SSL*SocketNSS::DoHandshake 1159*!net::SSL*SocketNSS::DoHandshakeLoop 1160 1161LEAK 1162name=http://crbug.com/74417 a 1163*!replace_operator_new 1164*!disk_cache::BackendImpl::CreateEntryImpl 1165 1166LEAK 1167name=http://crbug.com/74417 b 1168*!replace_operator_new 1169*!disk_cache::BackendImpl::NewEntry 1170 1171# One more disk_cache::BackendImpl leak. See also http://crbug.com/87500. 1172LEAK 1173name=http://crbug.com/74417 c 1174*!replace_operator_new 1175... 1176*!disk_cache::EntryImpl::UserBuffer::UserBuffer 1177 1178LEAK 1179name=http://crbug.com/75247 1180... 1181*!replace_operator_new 1182*!AutofillDownloadTestHelper::AutofillDownloadTestHelper 1183 1184LEAK 1185name=http://crbug.com/78784 1186*!generic_cpp_alloc 1187*!operator new 1188*!TestingProfile::CreateRequestContext 1189*!*ProfileSyncService*::SetUp 1190 1191LEAK 1192name=http://crbug.com/80550 (1) 1193... 1194*!RenderWidgetHost::WasHidden 1195 1196LEAK 1197name=http://crbug.com/80550 (2) 1198... 1199*!RenderWidgetHost::WasRestored 1200 1201LEAK 1202name=http://crbug.com/87612 1203... 1204*!SSL_ConfigSecureServer 1205*!net::SSLServerSocketNSS::InitializeSSLOptions 1206*!net::SSLServerSocketNSS::Handshake 1207 1208LEAK 1209name=http://crbug.com/88640 1210*!generic_cpp_alloc 1211*!operator new 1212*!ProfileImpl::InitRegisteredProtocolHandlers 1213*!ProfileImpl::DoFinalInit 1214*!ProfileImpl::OnPrefsLoaded 1215 1216LEAK 1217name=http://crbug.com/91465 1218*!generic_cpp_alloc 1219*!operator new 1220*!browser_sync::internal::WeakHandleCore<browser_sync::JsBackend>::* 1221*!browser_sync::WeakHandle<browser_sync::JsBackend>::* 1222*!syncer::SyncManager::SyncInternal::Init 1223 1224LEAK 1225name=http://crbug.com/91491 1226... 1227*!CrxUpdateService::ProcessPendingItems 1228 1229UNINITIALIZED READ 1230name=http://crbug.com/92026 (1) 1231softokn3.dll!FC_GetFunctionList 1232... 1233softokn3.dll!NSC_ModuleDBFunc 1234 1235UNINITIALIZED READ 1236name=http://crbug.com/92026 (2) 1237freebl3.dll!FREEBL_GetVector 1238... 1239softokn3.dll!NSC_ModuleDBFunc 1240 1241LEAK 1242name=http://crbug.com/92166 1243... 1244*!replace_operator_new 1245*!views::NativeWidgetWin::OnCreate 1246 1247# Possible real Chromium issue in DoCrossfade. 1248UNINITIALIZED READ 1249name=http://crbug.com/110049 1250*!media::DoCrossfade<*> 1251*!media::Crossfade 1252*!media::AudioRendererAlgorithmBase::FillBuffer 1253 1254# Known sqlite3 leaks. 1255LEAK 1256name=http://crbug.com/113847 (1) 1257... 1258*!sqlite3MemMalloc 1259*!mallocWithAlarm 1260*!sqlite3Malloc 1261... 1262*!yy_reduce 1263 1264LEAK 1265name=http://crbug.com/113847 (2) 1266... 1267*!openDatabase 1268*!sqlite3_open 1269 1270LEAK 1271name=http://crbug.com/115328 1272... 1273*!GenericInfoViewTest_GenericInfoView_Test::TestBody 1274 1275UNINITIALIZED READ 1276name=http://crbug.com/116277 1277*!MOZ_Z_deflate 1278*!zipCloseFileInZipRaw64 1279 1280LEAK 1281name=http://crbug.com/117427 a 1282... 1283*!net::HostCache::Set 1284*!net::HostResolverImpl::CacheResult 1285*!net::HostResolverImpl::Job::CompleteRequests 1286*!net::HostResolverImpl::Job::OnProcTaskComplete 1287*!base::internal::RunnableAdapter<void (__thiscall net::HostResolverImpl::Job::*)(int,net::AddressList const &)>::Run 1288 1289# Probably related to 117427. Someone is not tearing down DNS resolution during 1290# testing. 1291LEAK 1292name=http://crbug.com/117427 b 1293*!generic_cpp_alloc 1294*!operator new 1295*!base::internal::WeakReferenceOwner::GetRef 1296*!base::SupportsWeakPtr<net::HostResolverImpl>::AsWeakPtr 1297*!net::HostResolverImpl::Job::Job 1298*!net::HostResolverImpl::Resolve 1299*!net::SingleRequestHostResolver::Resolve 1300*!net::TransportConnectJob::DoResolveHost 1301*!net::TransportConnectJob::DoLoop 1302*!net::TransportConnectJob::ConnectInternal 1303*!net::ConnectJob::Connect 1304*!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal 1305*!net::internal::ClientSocketPoolBaseHelper::RequestSocket 1306*!net::ClientSocketPoolBase<net::TransportSocketParams>::RequestSocket 1307*!net::TransportClientSocketPool::RequestSocket 1308*!net::ClientSocketHandle::Init<net::TransportSocketParams,net::TransportClientSocketPool> 1309*!net::`anonymous namespace'::InitSocketPoolHelper 1310*!net::InitSocketHandleForRawConnect 1311*!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone 1312*!base::internal::RunnableAdapter<void (__thiscall notifier::ProxyResolvingClientSocket::*)(int)>::Run 1313 1314# IE frame possible leak of COM object. 1315LEAK 1316name=http://crbug.com/122399 1317ole32.dll!... 1318ole32.dll!CoTaskMemAlloc 1319urlmon.dll!... 1320urlmon.dll!CreateUri 1321IEFRAME.dll!* 1322 1323# RenderWidgetHelper leak in DelayProfileDestruction test. 1324LEAK 1325name=http://crbug.com/125565 1326*!generic_cpp_alloc 1327*!operator new 1328*!RenderProcessHostImpl::RenderProcessHostImpl 1329*!SiteInstanceImpl::GetProcess 1330*!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody 1331 1332LEAK 1333name=http://crbug.com/125807 1334*!generic_cpp_alloc 1335*!operator new 1336*!TransportSecurityPersister::TransportSecurityPersister 1337*!TransportSecurityPersisterTest::TransportSecurityPersisterTest 1338