blob: a03efb6cb785f6da09924a424c16f9ec734c5def [file] [log] [blame]
# This file contains suppressions for the Dr.Memory tool, see
# http://dev.chromium.org/developers/how-tos/using-drmemory
#
# This file should contain suppressions only for the reports happening
# in the 'full' mode (drmemory_full).
# For the reports that can happen in the light mode (a.k.a. drmemory_light),
# please use suppressions.txt instead.
###############################################################
# Known reports on the third party we have no control over.
UNINITIALIZED READ
name=http://crbug.com/116277
...
*!MOZ_Z_deflate
# TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/406
ADVAPI32.dll!WmiOpenBlock
ADVAPI32.dll!WmiOpenBlock
# Leaks inside GoogleDesktop - it injects into our processes for some reason
LEAK
name=GoogleDesktop LEAK
...
GoogleDesktopNetwork3.DLL!DllUnregisterServer
# They deliberately use uninit local var in sqlite random generator.
# Random bytes may mess up the call stack between randomByte and
# sqlite3_* frames (https://github.com/DynamoRIO/drmemory/issues/1514)
# so we also look for randomByte in form B.
UNINITIALIZED READ
name=sqlite3_randomness A
*.dll!sqlite3_randomness
UNINITIALIZED READ
name=sqlite3_randomness B
*.dll!randomByte
# Intentional leak in WebKit Template Framework for ThreadData.
LEAK
name=intentional WTF ThreadData leak
...
*!WTF::wtfThreadData
# Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
LEAK
name=http://crbug.com/125558 a
KERNELBASE.dll!LocalAlloc
SECHOST.dll!...
SECHOST.dll!NotifyServiceStatusChange
WINHTTP.dll!...
WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
*!net::ProxyResolverWinHttp::GetProxyForURL
# Tiny locale-related leaks in ntdll. Probably system bug.
LEAK
name=http://crbug.com/125558 b
ntdll.dll!...
ntdll.dll!*
KERNELBASE.dll!...
KERNELBASE.dll!GetCPInfoExW
webio.dll!*
webio.dll!*
webio.dll!*
WINHTTP.dll!...
WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
*!net::ProxyConfigServiceWin::GetCurrentProxyConfig
UNINITIALIZED READ
name=http://crbug.com/30704 #f
libpng.dll!wk_png_write_find_filter
libpng.dll!wk_png_write_row
###############################################################
# Suppress some false reports due to bugs in Dr.Memory like wrong analysis
# assumptions or unhandled syscalls
# Please note: the following suppressions were written in the abscense of
# private symbols so may need to be updated when we switch to auto-loading PDBs
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/12 (1)
ntdll.dll!Rtl*
ntdll.dll!Rtl*
ntdll.dll!RtlFindActivationContextSectionString
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/12 (2)
...
SHELL32.dll!SHFileOperation*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/12 (3)
...
SHELL32.dll!SHGetFolderPath*
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/12 (4)
...
SHELL32.dll!SHGetFolderPath*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/12 (5)
...
SHELL32.dll!SHCreateDirectory*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/12 (6)
...
SHELL32.dll!ILLoadFromStream*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/12 (7)
...
SHELL32.dll!ILSaveToStream*
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/12 (8)
...
SHELL32.dll!SHFileOperation*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/12 (9)
...
SHELL32.dll!SHGetItemFromDataObject
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/12 (10)
...
SHELL32.dll!SHGetItemFromDataObject
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/12 (11)
...
ole32.dll!*
SHELL32.dll!SHChangeNotifySuspendResume
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/14 (1)
...
*!CreateProcess*
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/14 (2)
...
*!CreateProcess*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/14 (3)
...
*!base::LaunchApp*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/17 (1)
...
*!CreateWindow*
POSSIBLE LEAK
name=https://github.com/DynamoRIO/drmemory/issues/17 (2)
GDI32.dll!*
GDI32.dll!CreateFontIndirectExW
GDI32.dll!CreateFontIndirectW
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/17 (3)
KERNELBASE.dll!LocalAlloc
...
USER32.dll!CreateWindow*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/18 a
...
*!CoInitialize*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/18 b
...
*!CoCreateInstance*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/18 c
...
*!CoUninitialize*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/18 d
...
UxTheme.dll!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/40 a
...
WINSPOOL.DRV!*
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/40 b
...
WINSPOOL.DRV!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/48 a
system call NtContinue
...
*!*SetThreadName
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/48 b
system call NtContinue
*!WTF::initializeCurrentThreadInternal
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/52 a
...
DBGHELP.dll!SymInitialize
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/52 b
...
DBGHELP.dll!SymEnumSourceFiles
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/52 c
...
msvcrt.dll!_RTDynamicCast
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/52 bit-level fp in dbghelp
instruction=test 0x*(%*) $0x??
DBGHELP.dll!SymUnloadModule64
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/53
ADVAPI32.dll!WmiMofEnumerateResourcesA
ADVAPI32.dll!WmiMofEnumerateResourcesA
ADVAPI32.dll!Sta*TraceW
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/58
...
*!_cfltcvt_l
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/60
USP10.dll!*
...
USP10.dll!ScriptStringAnalyse
LEAK
IMM32.dll!ImmGetIMCCSize
IMM32.dll!ImmLockClientImc
IMM32.dll!ImmDisableIME
IMM32.dll!ImmSetActiveContext
USER32.dll!IMPSetIMEA
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/65 a
...
*!SystemFunction036
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/65 b
...
*!talk_base::CreateRandomString
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/68 a
...
WS2_32.dll!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/68 b
...
ADVAPI32.dll!SetSecurityDescriptorDacl
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/68 c
...
MSWSOCK.dll!WSPStartup
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/68 d
...
ntdll.dll!RtlValidateUnicodeString
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/256
*!_mtinit
*!__tmainCRTStartup
*!mainCRTStartup
POSSIBLE LEAK
name=https://github.com/DynamoRIO/drmemory/issues/274 a
...
GDI32.dll!CreateDCW
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/274 b
...
GDI32.dll!CreateDCW
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/275
...
*!_getptd*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/276
...
ntdll.dll!RtlConvertUlongToLargeInteger
ntdll.dll!RtlConvertUlongToLargeInteger
ntdll.dll!KiUserExceptionDispatcher
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/305
*!free
*!free
*!operator new
...
*!MiniDumpWriteDump
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/346 a
...
GDI32.dll!CloseEnhMetaFile
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/346 b
GDI32.dll!SetPolyFillMode
GDI32.dll!CreateICW
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/362
USER32.dll!UnregisterClass*
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/382
...
ntdll.dll!CsrNewThread
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/397
system call NtDeviceIoControlFile InputBuffer
ADVAPI32.dll!ImpersonateAnonymousToken
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/407 a
system call NtRequestWaitReplyPort
RPCRT4.dll!I_RpcSendReceive
RPCRT4.dll!NdrSendReceive
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/407 b
IMM32.dll!*
ntdll.dll!LdrInitializeThunk
ntdll.dll!LdrShutdownThread
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/412 a
ADVAPI32.dll!RegDeleteValue*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/412 b
...
ADVAPI32.dll!Crypt*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/412 c
...
RPCRT4.dll!NdrClientCall2
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/412 d
RSAENH.dll!DllUnregisterServer
...
ADVAPI32.dll!CryptAcquireContextA
CRYPT32.dll!CryptEnumOIDFunction
...
CRYPT32.dll!CertFindCertificateInStore
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/412 e
...
RSAENH.dll!CPGenRandom
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/412 f
...
CRYPT??.dll!Crypt*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/412 g
*!replace_memcmp
...
*!testing::internal::CmpHelperEQ*
...
*!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody
# We get these sometimes from AesEncrypt and AesExpandKey. AesEncrypt doesn't
# have frame pointers, and we have trouble unwinding from it. Therefore, we use
# this broad suppression, effectively disabling uninit checks in rsaenh.dll.
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/412 h
RSAENH.dll!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/425 a
CLBCatQ.DLL!DestroyStgDatabase
CLBCatQ.DLL!PostError
CLBCatQ.DLL!PostError
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/425 b
RPCRT4.dll!I_RpcBCacheFree
RPCRT4.dll!I_RpcBCacheFree
...
RPCRT4.dll!NdrClientCall2
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/425 c
msdmo.dll!*
msdmo.dll!*
DEVENUM.DLL!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/435 a
...
ntdll.dll!RtlSetSecurityObject
ntdll.dll!RtlNewSecurityObjectEx
ADVAPI32.dll!CreatePrivateObjectSecurityEx
NTMARTA.dll!AccRewriteSetNamedRights
POSSIBLE LEAK
name=https://github.com/DynamoRIO/drmemory/issues/435 b
WLDAP32.dll!Ordinal325
...
WLDAP32.dll!Ordinal325
ntdll.dll!LdrInitializeThunk
ntdll.dll!LdrFindResourceDirectory_U
ntdll.dll!RtlValidateUnicodeString
ntdll.dll!LdrLoadDll
KERNEL32.dll!LoadLibraryExW
# mod+offs suppression because the symbolic makes no sense and changes
# completely in the presence of WS2_32.dll symbols.
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/438
<WS2_32.dll+0x260c>
<WS2_32.dll+0x2b76>
<WS2_32.dll+0x2c61>
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/454 a
...
WINMM.dll!wave*GetNumDevs
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/454 b
...
WINMM.dll!wave*GetNumDevs
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/466
ntdll.dll!RtlRunOnceBeginInitialize
ntdll.dll!RtlInitializeCriticalSectionAndSpinCount
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/473 a
system call NtDeviceIoControlFile InputBuffer
...
iphlpapi.dll!GetAdaptersAddresses
POSSIBLE LEAK
name=https://github.com/DynamoRIO/drmemory/issues/473 b
ESENT.dll!*
ESENT.dll!*
ESENT.dll!*
ntdll.dll!Ldr*Init*
ntdll.dll!Ldr*
ntdll.dll!*
ntdll.dll!LdrLoadDll
...
iphlpapi.dll!GetPerAdapterInfo
...
iphlpapi.dll!GetAdaptersAddresses
POSSIBLE LEAK
name=https://github.com/DynamoRIO/drmemory/issues/473 c
RPCRT4.dll!*
RPCRT4.dll!*
...
IPHLPAPI.DLL!GetAdaptersAddresses
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/475
...
ADVAPI32.dll!CryptAcquireContextA
...
CRYPT32.dll!CryptMsgOpenToDecode
...
CRYPT32.dll!CryptQueryObject
# Lots of leaks from our interactions with the system certificate store. May be
# worth reviewing our use of their API.
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/476 a
KERNEL*.dll!LocalAlloc
...
CRYPT32.dll!CertGetCRLContextProperty
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/476 b
KERNEL*.dll!LocalAlloc
...
CRYPT32.dll!CertAddCRLContextToStore
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/476 c
KERNEL*.dll!LocalAlloc
...
CRYPT32.dll!CertOpenStore
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/476 d
...
CRYPT32.dll!CertOpenSystemStore?
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/476 e
...
CRYPT32.dll!CertGetCertificateChain
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/476 f
...
CRYPT32.dll!CertCompareIntegerBlob
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/476 g
...
CRYPT32.dll!CryptUnprotectData
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/476 h
KERNEL*.dll!LocalAlloc
...
CRYPT32.dll!CertEnumCertificatesInStore
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/476 i
...
CRYPT32.dll!CryptProtectData
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/476 j
...
CRYPT32.dll!CryptExportPublicKeyInfoEx
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/502 a
system call NtSecureConnectPort parameter #3
GDI32.dll!*
GDI32.dll!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/502 b
system call NtGdiEnumFonts parameter #6
GDI32.dll!*
GDI32.dll!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/511 a
RPCRT4.dll!...
ole32.dll!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/511 b
ole32.dll!*
ole32.dll!*
ole32.dll!StringFromGUID2
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/512 a
...
*!browser_sync::Cryptographer::PackBootstrapToken
*!browser_sync::Cryptographer::GetBootstrapToken
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/512 b
...
*!Encrypt*
# TODO(bruening): remove these once we have v8 bitfields handled
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/513 a
*!v8*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/513 b
*!*
*!v8*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/513 c
<not in a module>
...
*!v8*
# We have seen some cases (not yet understood: crbug.com/364146) where v8.dll
# has no symbols. These are all on the bots using component build, so we use
# v8.dll. TODO(bruening): remove these once we've fixed the symbol issue.
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/513 d
v8.dll!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/513 e
<not in a module>
...
v8.dll!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/546
...
mscms.dll!*
...
GDI32.dll!*
*!IconUtil::Create*HICON*
LEAK
name=http://crbug.com/92152
...
USER32.dll!CreateWindowExW
*!views::TooltipManagerWin::Init
*!views::TooltipManagerWin::TooltipManagerWin
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/567 a
dbghelp.dll!*
...
dbghelp.dll!StackWalk64
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/567 b
*!*
dbghelp.dll!*
...
dbghelp.dll!StackWalk64
# Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
# TppWorkerThread w/ syms. We used to use mod+offs here, but that was too
# brittle, so we switched to RPCRT4.dll!*.
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/569
RPCRT4.dll!...
ntdll.dll!*
ntdll.dll!*
KERNEL*.dll!BaseThreadInitThunk
# TODO(timurrrr): investigate these
UNINITIALIZED READ
name=http://crbug.com/TODO a
...
*!win_util::GetLogonSessionOnlyDACL
UNINITIALIZED READ
name=http://crbug.com/TODO b
...
ntshrui.dll!IsPathSharedW
UNINITIALIZED READ
name=http://crbug.com/TODO c
...
*!NetApiBufferFree
UNINITIALIZED READ
name=http://crbug.com/TODO d
...
*!ShellExecute*
UNINITIALIZED READ
name=http://crbug.com/TODO e
...
*!SHParseDisplayName
UNINITIALIZED READ
name=http://crbug.com/TODO f
...
*!GetCanonicalPathInfo*
UNINITIALIZED READ
name=http://crbug.com/TODO g
...
SHELL32.dll!Ordinal*
UNINITIALIZED READ
name=http://crbug.com/TODO h
...
GDI32.dll!GetTextExtentPoint32*
UNINITIALIZED READ
name=http://crbug.com/TODO i
...
*!SyncSocketClientListener::OnMsgClassResponse
UNINITIALIZED READ
name=http://crbug.com/TODO j
...
*!*NSPRInitSingleton*
UNINITIALIZED READ
name=http://crbug.com/TODO k
*!NdrSimpleStructFree
UNINITIALIZED READ
name=http://crbug.com/TODO l
ntdll.dll!RtlpNtOpenKey
ntdll.dll!RtlMakeSelfRelativeSD
ntdll.dll!RtlAbsoluteToSelfRelativeSD
ADVAPI32.dll!MakeSelfRelativeSD
UNINITIALIZED READ
name=http://crbug.com/TODO m
...
CRYPT32.dll!I_CertSyncStore
# This matches the same stack as DrMem i#751, but it's an uninit read instead of
# a leak. Must be some early thread initialization. Doesn't look like
# bit-level though.
UNINITIALIZED READ
name=http://crbug.com/TODO n
RPCRT4.dll!*
RPCRT4.dll!*
RPCRT4.dll!*
ntdll.dll!*
ntdll.dll!*
KERNEL*.dll!BaseThreadInitThunk
# No idea where this is from, but Chrome isn't even on the stack.
POSSIBLE LEAK
name=http://crbug.com/TODO o
RPCRT4.dll!...
ole32.dll!OleInitialize
ole32.dll!...
KERNEL32.dll!BaseThreadInitThunk
# Matches lots of RPC related leaks. So far RPC handles have been mostly owned
# by system libraries and are not something we can fix easily.
POSSIBLE LEAK
name=http://crbug.com/TODO p
RPCRT4.dll!*
RPCRT4.dll!*
RPCRT4.dll!NDRCContextBinding
# No idea, but all system code, not interesting.
POSSIBLE LEAK
name=http://crbug.com/TODO q
RPCRT4.dll!...
RPCRT4.dll!*
RPCRT4.dll!*
ole32.dll!...
ole32.dll!*
ole32.dll!*
...
SHELL32.dll!*
LEAK
name=http://crbug.com/109278 video device COM leaks
...
*!media::VideoCaptureDevice::*
LEAK
name=http://crbug.com/109278 audio device COM leaks
...
*!media::GetInputDeviceNamesWin
# False pos uninit in shell32 when resolving links.
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/745
SHELL*.dll!*
...
SHELL*.dll!*
*!file_util::ResolveShortcut
# Probable false pos uninit in ffmpeg. Probably due to running off the end of a
# buffer with SSE/MMX instructions whose results are then masked out later.
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/747 a
*!ff_pred4x4_vertical_vp8_mmxext
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/747 b
*!ff_pred4x4_down_left_mmxext
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/747 c
*!ff_vorbis_floor1_render_list
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/747 d
*!ff_put_vp8_epel8_h6_ssse3
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/747 e
*!ff_put_vp8_epel8_h4_ssse3
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/747 f
*!ff_fft_permute_sse
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/747 g
*!ff_simple_idct_add_mmx
# ffmpeg seems to leak a pthread condition variable.
LEAK
name=http://crbug.com/110042
*!ptw32_new
*!pthread_self
*!sem_wait
*!pthread_cond_wait
*!ff_thread_decode_frame
*!avcodec_decode_video2
# Improperly handled ioctl in bcrypt.
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/748
system call NtDeviceIoControlFile InputBuffer
...
bcrypt.dll!BCryptUnregisterConfigChangeNotify
bcrypt.dll!BCryptGetFipsAlgorithmMode
ntdll.dll!RtlQueryEnvironmentVariable
# Not sure what this is.
POSSIBLE LEAK
name=https://github.com/DynamoRIO/drmemory/issues/749
...
fwpuclnt.dll!*
...
RPCRT4.dll!*
...
fwpuclnt.dll!*
...
WS2_32.dll!*
*!talk_base::SafeGetHostByName
*!talk_base::SocketAddress::GetLocalIPs
*!talk_base::SocketAddress::IsLocalIP
*!cricket::Transport::VerifyCandidate
*!cricket::Session::OnRemoteCandidates
*!cricket::Session::OnTransportInfoMessage
*!cricket::Session::OnIncomingMessage
*!cricket::SessionManager::OnIncomingMessage
# More uninit false pos in rpcrt4.dll not caught by default suppressions.
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/529
RPCRT4.dll!*
...
*!base::LaunchProcess
# System leak from CreateEnvironmentBlock.
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/757
...
USERENV.dll!CreateEnvironmentBlock
# Looks like another instance of 753
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/753
...
ntdll.dll!RtlLoadString
# More bit manip fps
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/493
USP10.dll!ScriptPositionSingleGlyph
# Various TLS leaks that we don't understand yet. We should be finding a root
# for these.
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/778 a
KERNELBASE.dll!TlsSetValue
# Originally filed as: http://crbug.com/109281
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/778 b
*!operator new
*!operator new[]
*!*::ConstructTlsVector
*!base::ThreadLocalStorage::StaticSlot::Get
# This is an NSS PRThread object installed in TLS. Why isn't this detected as a
# root? See also http://crbug.com/32624
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/778 c
*!PR_Calloc
*!_PR_AttachThread
*!_PRI_AttachThread
# Bit-level fps in rich edit layer.
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/791
RICHED20.dll!*
RICHED20.dll!*
# Already suppressed by drmemory default supp we don't have yet.
LEAK
name=i#757: RPC binding leaks in sspicli.dll
RPCRT4.dll!*
...
SspiCli.dll!*
SspiCli.dll!Cre*
# Async NtReadFile false positives. This was fixed in drmemory r772, remove
# this supp when we pull that rev.
UNADDRESSABLE ACCESS
name=https://github.com/DynamoRIO/drmemory/issues/798
system call NtReadFile parameter #5
KERNEL32.dll!ReadFile
# Probable syscall false positive.
UNADDRESSABLE ACCESS
name=https://github.com/DynamoRIO/drmemory/issues/809
system call NtGdiPolyPolyDraw parameter #1
*!gfx::Path::CreateNativeRegion
# Very wide suppression for all uninits in rpcrt4.dll. We get bad stack traces
# coming out of this module (sometimes only one frame), which makes it hard to
# write precise suppressions. Until we have bit-level tracking (DRMi#113) we
# should keep this.
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/113 rpcrt4.dll wildcard
RPCRT4.dll!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/841 a
...
CRYPTNET.dll!I_CryptNetGetConnectivity
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/841 b
...
webio.dll!*
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/841 c
...
winhttp.dll!*
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/841 d
...
CRYPTNET.dll!I_CryptNetGetConnectivity
# Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/810
instruction=test %edx %edx
USER32.dll!GetClassLongW
...
*!ui::CenterAndSizeWindow
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/815
KERNEL*.dll!...
dxgi.dll!*
USER32.dll!GetMonitorInfoA
ntdll.dll!KiUserCallbackDispatcher
dxgi.dll!*
WinSATAPI.DLL!*
# Suppress anything in cmd.exe. It's safer to suppress these than disable
# following, since someone might launch a Chrome process via cmd.exe.
LEAK
name=cmd.exe
...
cmd.exe!*
# Possible true system use after free.
UNADDRESSABLE ACCESS
name=https://github.com/DynamoRIO/drmemory/issues/623
KERNELBASE.dll!TlsGetValue
OLEAUT32.dll!SysFreeString
OLEAUT32.dll!SysAllocStringByteLen
OLEACC.dll!*
OLEACC.dll!*
OLEACC.dll!*
OLEACC.dll!*
# basic_streambuf seems to leak something in creating a std::_Mutex
LEAK
name=https://github.com/DynamoRIO/drmemory/issues/857
ntdll.dll!...
ntdll.dll!RtlInitializeCriticalSection
*!_Mtxinit
*!std::_Mutex::_Mutex
*!std::basic_streambuf<>
# Seems to create a DC, sometimes. GetTextMetrics returns no pointers, though.
LEAK
name=GDI SetBrushOrgEx leak
GDI32.dll!...
GDI32.dll!GetTextMetricsW
*!gfx::PlatformFontWin::CreateHFontRef
*!gfx::PlatformFontWin::GetBaseFontRef
###############################################################
# Benign issues in Chromium
# This test intentionally leaks an object and checks that it's never deleted.
LEAK
name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
...
*!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody
LEAK
name=deliberate histogram leak
...
*!replace_operator_new
...
*!*::*Histogram::FactoryGet
LEAK
name=deliberate leak for SampleMap
...
*!base::SampleMap::Accumulate
*!base::SparseHistogram::Add
LEAK
name=deliberate LazyInstance leak
...
*!*LeakyLazyInstance*
...
*!base::LazyInstance*::Pointer
# Test intentionally leaks an object.
LEAK
name=http://crbug.com/86301
*!replace_operator_new
...
*!*_DeadReplyLoopDoesNotDelete_Test::TestBody
# Leak in a binary copy of Firefox 3's NSS dll. Not much we can do about it.
LEAK
name=Firefox 3 NSS dll leak
nspr4.dll!*
...
*!NSSDecryptor::~NSSDecryptor
# We get uninit reports inside GMock when it prints the bytes of references to
# partially initialized objects passed to unexpected method calls.
UNINITIALIZED READ
name=http://crbug.com/64887 (GMock printing uninit data)
...
*!testing::*::PrintBytesInObjectTo*
# This is an EXPECT_DEATH() that hits a RELEASE_ASSERT(),
# which intentionally writes to NULL in order to crash.
UNADDRESSABLE ACCESS
name=https://crbug.com/497344
blink_platform.dll!blink::SecurityOrigin::addSuborigin
*!blink::SecurityOriginTest_Suborigins_Test::TestBody
###############################################################
# Proactively borrowed from memcheck/suppressions.txt.
# We have not yet seen these, but we are expanding the sets of tests
# we're running, and we've hit redness in the past that could have
# been avoided by already having the Memcheck suppressions.
# TODO(bruening): review the entire file (not just these) once we're
# at the peak set of tests we plan to run and remove the unused ones.
UNINITIALIZED READ
name=bug_101781
*!encode_one_block
*!encode_mcu_huff
*!compress_data
*!process_data_simple_main
*!chromium_jpeg_write_scanlines
*!gfx::JPEGCodec::Encode
*!gfx::JPEGEncodedDataFromImage
*!history::TopSites::EncodeBitmap
*!history::TopSites::SetPageThumbnail
*!history::ExpireHistoryTest::AddExampleData
*!history::ExpireHistoryTest::*
UNINITIALIZED READ
name=bug_101781_d
*!testing::AssertionResult testing::internal::CmpHelperGE<>
*!gfx::JPEGCodec_EncodeDecodeRGBA_Test::TestBody
UNINITIALIZED READ
name=bug_105907
...
*!skia::BGRAConvolve2D
*!skia::ImageOperations::ResizeBasic*
*!skia::ImageOperations::Resize*
UNINITIALIZED READ
name=bug_112278
*!fetch_texel_2d_f_rgba8888
*!sample_2d_linear
*!sample_linear_2d
*!fetch_texel_lod
*!fetch_texel
*!_mesa_execute_program
*!run_program
*!_swrast_exec_fragment_program
*!shade_texture_span
*!_swrast_write_rgba_span
*!general_triangle
*!_swrast_validate_triangle
*!_swrast_Triangle
*!triangle_rgba
*!_tnl_render_triangles_elts
*!run_render
*!_tnl_run_pipeline
*!_tnl_draw_prims
*!_tnl_vbo_draw_prims
*!vbo_validated_drawrangeelements
*!vbo_exec_DrawElements
*!neutral_DrawElements
UNINITIALIZED READ
name=bug_112278b
*!fetch_texel_2d_f_rgba8888
*!sample_2d_nearest
*!sample_nearest_2d
*!fetch_texel_lod
*!fetch_texel
*!_mesa_execute_program
*!run_program
*!_swrast_exec_fragment_program
*!shade_texture_span
*!_swrast_write_rgba_span
*!general_triangle
...
*!_swrast_Triangle
*!triangle_rgba
...
*!run_render
*!_tnl_run_pipeline
*!_tnl_draw_prims
*!_tnl_vbo_draw_prims
UNINITIALIZED READ
name=bug_115419_1
*!fetch_texel_2d_f_rgba8888
*!texture_get_row
*!fast_read_rgba_pixels
*!read_rgba_pixels
*!_swrast_ReadPixels
*!_mesa_ReadPixels
*!glReadPixels
*!gpu::gles2::GLES2DecoderImpl::HandleReadPixels
*!gpu::gles2::GLES2DecoderImpl::DoCommand
*!gpu::CommandParser::ProcessCommand
*!gpu::CommandExecutor::PutChanged
*!webkit::gpu::GLInProcessContext::PumpCommands
UNINITIALIZED READ
name=bug_115419_2
*!get_src_arg_mask
*!_mesa_remove_extra_move_use
*!_mesa_optimize_program
*!get_mesa_program
*!_mesa_ir_link_shader
*!_mesa_glsl_link_shader
*!link_program
*!_mesa_LinkProgramARB
*!glLinkProgram
...
*!gpu::gles2::GLES2DecoderImpl::DoLinkProgram*
*!gpu::gles2::GLES2DecoderImpl::HandleLinkProgram*
*!gpu::gles2::GLES2DecoderImpl::DoCommand
*!gpu::CommandParser::ProcessCommand
*!gpu::CommandExecutor::PutChanged
*!webkit::gpu::GLInProcessContext::PumpCommands
UNINITIALIZED READ
name=bug_138058
...
*!blink::WebVTTParser::constructTreeFromToken
*!blink::WebVTTParser::createDocumentFragmentFromCueText
*!blink::TextTrackCue::getCueAsHTML
*!blink::TextTrackCue::updateDisplayTree
*!blink::HTMLMediaElement::updateActiveTextTrackCues
UNINITIALIZED READ
name=bug_138220_a
*!blink::HTMLInputElement::dataList
*!blink::HTMLInputElement::list
*!blink::RenderSliderContainer::layout
*!blink::RenderBlock::layoutBlockChild
*!blink::RenderBlock::layoutBlockChildren
*!blink::RenderBlock::layoutBlock
*!blink::RenderBlock::layout
*!blink::RenderSlider::layout
UNINITIALIZED READ
name=bug_138220_b
*!blink::HTMLInputElement::dataList
*!blink::HTMLInputElement::list
*!blink::RenderTheme::paintSliderTicks
*!blink::RenderThemeChromiumLinux::paintSliderTrack
*!blink::RenderTheme::paint
*!blink::RenderBox::paintBoxDecorations
*!blink::RenderBlock::paintObject
UNINITIALIZED READ
name=bug_162825
*!bcmp
*!gpu::gles2::ShaderTranslatorCache::ShaderTranslatorInitParams::operator<
*!std::less<>::operator
...
*!std::map<>::find
...
*!gpu::gles2::GLES2DecoderImpl::InitializeShaderTranslator
UNINITIALIZED READ
name=bug_176616_a
*!WebTestRunner::WebTestProxyBase::didCreateDataSource
*!WebTestRunner::WebTestProxy<>::didCreateDataSource
*!blink::FrameLoaderClientImpl::createDocumentLoader
*!blink::FrameLoader::init
*!blink::Frame::init
*!blink::WebFrameImpl::initializeAsMainFrame
*!blink::WebViewImpl::initializeMainFrame
*!TestShell::createNewWindow
*!TestShell::createMainWindow
*!TestShell::initialize
UNINITIALIZED READ
name=bug_176616_b
*!WebTestRunner::TestRunner::reset
*!WebTestRunner::TestInterfaces::resetAll
*!WebTestRunner::WebTestInterfaces::resetAll
*!TestShell::resetTestController
*!runTest
UNINITIALIZED READ
name=bug_222883
*!v8::internal::ScavengeVisitor::ScavengePointer
*!v8::internal::ScavengeVisitor::VisitPointers
*!v8::internal::StandardFrame::IterateExpressions
...
*!v8::internal::Heap::Scavenge
*!v8::internal::Heap::PerformGarbageCollection*
UNINITIALIZED READ
name=bug_238170a
*!blink::ElementRuleCollector::collectMatchingRules
*!blink::ElementRuleCollector::hasAnyMatchingRules
UNINITIALIZED READ
name=bug_238170b
*!blink::ElementRuleCollector::collectMatchingRules
*!blink::StyleResolver::matchAuthorRules
UNINITIALIZED READ
name=bug_238170c
*!blink::ReplaceSelectionCommand::doApply
*!blink::CompositeEditCommand::apply
*!blink::applyCommand
UNINITIALIZED READ
name=bug_259789
*!blink::::adjustAttributes
*!blink::WebGLRenderingContext::maybeRestoreContext
*!blink::Timer<>::fired
*!blink::ThreadTimers::sharedTimerFiredInternal
*!blink::ThreadTimers::sharedTimerFired
*!content::BlinkPlatformImpl::DoTimeout
UNINITIALIZED READ
name=bug_290405
*!GrGradientEffect::onIsEqual
*!GrEffect::isEqual
*!GrEffectStage::DeferredStage::isEqual
*!GrDrawState::DeferredState::isEqual
*!GrInOrderDrawBuffer::needsNewState
*!GrInOrderDrawBuffer::onDraw
*!GrDrawTarget::drawIndexedInstances
*!GrTextContext::flushGlyphs
UNINITIALIZED READ
name=bug_290435
*!blink::AudioContext::scheduleNodeDeletion
*!blink::AudioContext::handlePostRenderTasks
*!blink::AudioDestinationNode::render
*!blink::OfflineAudioDestinationNode::offlineRender
UNINITIALIZED READ
name=bug_364724
*!base::MD5DigestToBase16
*!content::WebKitTestRunner::CaptureDumpPixels
UNINITIALIZED READ
name=bug_298143
...
*!blink::TypeConversionsV8Internal*AttributeGetter*
UNINITIALIZED READ
name=bug_299804
*!GrConfigConversionEffect::TestForPreservingPMConversions
*!::test_pm_conversions
*!GrContext::createPMToUPMEffect
*!GrContext::readRenderTargetPixels
*!SkGpuDevice::onReadPixels
*!SkBaseDevice::readPixels
*!SkCanvas::readPixels
*!DeferredDevice::onReadPixels
*!SkBaseDevice::readPixels
*!SkCanvas::readPixels
*!blink::GraphicsContext::readPixels
*!WTF::PassRefPtr<>
*!blink::ImageBuffer::getUnmultipliedImageData
*!blink::CanvasRenderingContext2D::getImageData
*!blink::CanvasRenderingContext2D::getImageData
*!blink::CanvasRenderingContext2DV8Internal::getImageDataMethod
*!blink::CanvasRenderingContext2DV8Internal::getImageDataMethodCallback
*!v8::internal::FunctionCallbackArguments::Call
*!v8::internal::HandleApiCallHelper<>
UNINITIALIZED READ
name=bug_309477
*!WebTestRunner::EventSender::reset
*!WebTestRunner::TestInterfaces::resetTestHelperControllers
*!WebTestRunner::TestInterfaces::resetAll
...
*!content::ShellRenderProcessObserver::WebKitInitialized
*!content::RenderThreadImpl::EnsureWebKitInitialized
*!content::RenderThreadImpl::OnCreateNewView
###############################################################
# Real issues in Chromium
LEAK
name=http://crbug.com/32085
...
chrome.dll!NotificationRegistrar::Add
UNINITIALIZED READ
name=http://crbug.com/57266 (1)
...
*!remoting::EncoderVp8::Encode
UNINITIALIZED READ
name=http://crbug.com/57266 (2)
...
*!vp8_*
LEAK
name=http://crbug.com/70062
*!PR_Calloc
*!PR_NewLock
...
*!InitSessionCacheLocks
*!initSessionCacheLocksLazily
*!PR_CallOnce
*!ssl_InitSessionCacheLocks
*!lock_cache
*!ssl_LookupSID
*!ssl2_BeginClientHandshake
*!ssl_Do1stHandshake
*!SSL_ForceHandshake
*!net::SSL*SocketNSS::DoHandshake
*!net::SSL*SocketNSS::DoHandshakeLoop
LEAK
name=http://crbug.com/74417 a
*!replace_operator_new
*!disk_cache::BackendImpl::CreateEntryImpl
LEAK
name=http://crbug.com/74417 b
*!replace_operator_new
*!disk_cache::BackendImpl::NewEntry
# One more disk_cache::BackendImpl leak. See also http://crbug.com/87500.
LEAK
name=http://crbug.com/74417 c
*!replace_operator_new
...
*!disk_cache::EntryImpl::UserBuffer::UserBuffer
LEAK
name=http://crbug.com/75247
...
*!replace_operator_new
*!AutofillDownloadTestHelper::AutofillDownloadTestHelper
LEAK
name=http://crbug.com/78784
*!generic_cpp_alloc
*!operator new
*!TestingProfile::CreateRequestContext
*!*ProfileSyncService*::SetUp
LEAK
name=http://crbug.com/80550 (1)
...
*!RenderWidgetHost::WasHidden
LEAK
name=http://crbug.com/80550 (2)
...
*!RenderWidgetHost::WasRestored
LEAK
name=http://crbug.com/87612
...
*!SSL_ConfigSecureServer
*!net::SSLServerSocketNSS::InitializeSSLOptions
*!net::SSLServerSocketNSS::Handshake
LEAK
name=http://crbug.com/88640
*!generic_cpp_alloc
*!operator new
*!ProfileImpl::InitRegisteredProtocolHandlers
*!ProfileImpl::DoFinalInit
*!ProfileImpl::OnPrefsLoaded
LEAK
name=http://crbug.com/91465
*!generic_cpp_alloc
*!operator new
*!browser_sync::internal::WeakHandleCore<>::*
*!browser_sync::WeakHandle<>::*
*!syncer::SyncManager::SyncInternal::Init
LEAK
name=http://crbug.com/91491
...
*!CrxUpdateService::ProcessPendingItems
UNINITIALIZED READ
name=http://crbug.com/92026 (1)
softokn3.dll!FC_GetFunctionList
...
softokn3.dll!NSC_ModuleDBFunc
UNINITIALIZED READ
name=http://crbug.com/92026 (2)
freebl3.dll!FREEBL_GetVector
...
softokn3.dll!NSC_ModuleDBFunc
# Possible real Chromium issue in DoCrossfade.
UNINITIALIZED READ
name=http://crbug.com/110049
*!media::DoCrossfade<>
*!media::Crossfade
*!media::AudioRendererAlgorithmBase::FillBuffer
# Known sqlite3 leaks.
LEAK
name=http://crbug.com/113847 (1)
...
*!sqlite3MemMalloc
*!mallocWithAlarm
*!sqlite3Malloc
...
*!yy_reduce
LEAK
name=http://crbug.com/113847 (2)
...
*!openDatabase
*!sqlite3_open
LEAK
name=http://crbug.com/115328
...
*!GenericInfoViewTest_GenericInfoView_Test::TestBody
# IE frame possible leak of COM object.
LEAK
name=http://crbug.com/122399
ole32.dll!...
ole32.dll!CoTaskMemAlloc
urlmon.dll!...
urlmon.dll!CreateUri
IEFRAME.dll!*
# RenderWidgetHelper leak in DelayProfileDestruction test.
LEAK
name=http://crbug.com/125565
*!generic_cpp_alloc
*!operator new
*!RenderProcessHostImpl::RenderProcessHostImpl
*!SiteInstanceImpl::GetProcess
*!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody
LEAK
name=http://crbug.com/125807
*!generic_cpp_alloc
*!operator new
*!TransportSecurityPersister::TransportSecurityPersister
*!TransportSecurityPersisterTest::TransportSecurityPersisterTest
UNINITIALIZED READ
name=bug_113076
*!media::ConvertYUVToRGB32_C
*!media::LinearScaleYUVToRGB32RowWithRange_C
*!media::ScaleYUVToRGB32WithRect
UNINITIALIZED READ
name=bug_343248
osmesa.dll!LINTERP
osmesa.dll!INTERP_4F
osmesa.dll!_tnl_generic_interp
UNINITIALIZED READ
name=bug_340752
...
*!*::ThreadState::visitStack
UNINITIALIZED READ
name=bug_343663
blink_web.dll!blink::RenderBlock::computeInlinePreferredLogicalWidths
UNINITIALIZED READ
name=bug_343797
...
blink_web.dll!blink::MediaQueryExp::create
blink_web.dll!blink::BisonCSSParser::createFloatingMediaQueryExp
blink_web.dll!cssyyparse
UNINITIALIZED READ
name=bug_343915
blink_web.dll!blink::BisonCSSParser::parseFlex
blink_web.dll!blink::BisonCSSParser::parseValue
blink_web.dll!cssyyparse
UNADDRESSABLE ACCESS
name=BUG_343958
blink_web.dll!blink::Node::getFlag
blink_web.dll!blink::Node::inDocument
blink_web.dll!blink::Node::isDescendantOf
blink_web.dll!blink::CompositeEditCommand::cloneParagraphUnderNewElement
blink_web.dll!blink::CompositeEditCommand::moveParagraphWithClones
UNINITIALIZED READ
name=BUG_344076
blink_web.dll!blink::Editor::canSmartReplaceWithPasteboard
blink_web.dll!blink::Editor::pasteAsPlainTextWithPasteboard
blink_web.dll!blink::Editor::pasteAsPlainText
blink_web.dll!blink::executePasteAndMatchStyle
blink_web.dll!blink::Editor::Command::execute
blink_web.dll!blink::Document::execCommand
UNINITIALIZED READ
name=BUG_349128
content.dll!std::*
...
content.dll!content::BrowserAccessibilityManagerWin::*
...
*!*::UpdateNode
# There are so many osmesa errors we have to suppress (mostly the unpack_RGB*
# variety) that it's a performance hit. We avoid that by requesting
# whole-module suppression
# (see https://github.com/DynamoRIO/drmemory/issues/1529).
UNINITIALIZED READ
name=bug_347967_all_osmesa
osmesa.dll!*
UNINITIALIZED READ
name=bug_347967
osmesa.dll!unpack_RGB*888
osmesa.dll!_mesa_unpack_rgba_row
osmesa.dll!slow_read_rgba_pixels
osmesa.dll!read_rgba_pixels
osmesa.dll!_mesa_readpixels
...
gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
gpu.dll!gpu::CommandParser::ProcessCommand
gpu.dll!gpu::CommandExecutor::PutChanged
UNINITIALIZED READ
name=bug_347967,bug_348357
osmesa.dll!clip_span
osmesa.dll!_swrast_write_rgba_span
osmesa.dll!general_triangle
...
gpu.dll!gpu::gles2::GLES2DecoderImpl::DoDrawElements
gpu.dll!gpu::gles2::GLES2DecoderImpl::HandleDrawElements
gpu.dll!gpu::gles2::GLES2DecoderImpl::DoCommand
gpu.dll!gpu::CommandParser::ProcessCommand
UNINITIALIZED READ
name=bug_361594
...
skia.dll!SkA8_Shader_Blitter::blitH
skia.dll!SkBlitter::blitRect
skia.dll!blitrect
skia.dll!SkScan::FillIRect
...
skia.dll!SkDraw::drawRect
skia.dll!SkDraw::drawBitmap
skia.dll!SkBitmapDevice::drawBitmap
skia.dll!SkCanvas::internalDrawBitmap
skia.dll!SkCanvas::drawBitmap
content.dll!content::ScreenshotData::EncodeOnWorker
UNINITIALIZED READ
name=bug_363487
blink_web.dll!blink::RenderLayerCompositor::updateIfNeeded
blink_web.dll!blink::RenderLayerCompositor::updateIfNeededRecursive
blink_web.dll!blink::FrameView::updateLayoutAndStyleForPainting
blink_web.dll!blink::PageAnimator::updateLayoutAndStyleForPainting
UNINITIALIZED READ
name=bug_365101
*!device::BluetoothAdapterWin::AdapterStateChanged
UNINITIALIZED READ
name=bug_364146
...
v8.dll!*
net_with_v8.dll!net::ProxyResolverV8::Context::*
UNINITIALIZED READ
name=bug_334448
*!CLD2::UTF8GenericReplaceInternal
*!CLD2::UTF8GenericReplace
*!CLD2::ScriptScanner::LowerScriptSpan
*!CLD2::ScriptScanner::GetOneScriptSpanLower
*!CLD2::DetectLanguageSummaryV2
*!CLD2::DetectLanguageSummary
UNINITIALIZED READ
name=bug_42043
...
QuickTime.qts!*
UNINITIALIZED READ
name=bug_369141
...
*!blink::RenderLayerClipper::updateClipRects
*!blink::RenderLayerClipper::parentClipRects
*!blink::RenderLayerClipper::backgroundClipRect
HANDLE LEAK
name=bug_370178
system call NtCreateEvent
KERNELBASE.dll!CreateEventExW
KERNELBASE.dll!CreateEventW
base.dll!base::WaitableEvent::WaitableEvent
gpu.dll!gpu::InProcessCommandBuffer::Initialize
gl_in_process_context.dll!gpu::`anonymous namespace'::GLInProcessContextImpl::Initialize
gl_in_process_context.dll!gpu::GLInProcessContext::CreateContext
UNINITIALIZED READ
name=bug_371844
*!content::GamepadProvider::PadState::Match
*!content::GamepadProvider::DoPoll
UNINITIALIZED READ
name=bug_371950
media.dll!ConvertYUVToRGB32Row_SSE
media.dll!media::ConvertYUVToRGB32_SSE
media.dll!media::ConvertVideoFrameToBitmap
media.dll!media::SkCanvasVideoRenderer::Paint
cc.dll!cc::VideoResourceUpdater::CreateForSoftwarePlanes
cc.dll!cc::VideoResourceUpdater::CreateExternalResourcesFromVideoFrame
cc.dll!cc::VideoLayerImpl::WillDraw
UNINITIALIZED READ
name=bug_371959
content.dll!webrtc::PeerConnection::DoInitialize
content.dll!webrtc::PeerConnection::Initialize
content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection_s
content.dll!webrtc::PeerConnectionFactory::OnMessage
content.dll!jingle_glue::JingleThreadWrapper::Send
content.dll!webrtc::PeerConnectionFactory::CreatePeerConnection
content.dll!webrtc::PeerConnectionFactoryInterface::CreatePeerConnection
# This suppression is deliberately general, as bugs reported in
# ProcessOutgoingMessages are difficult to track down until we
# get our annotations in place.
# TODO(bruening): add annotations once we have the infrastructure.
UNINITIALIZED READ
name=bug_371991
system call NtWriteFile parameter #5
KERNELBASE.dll!WriteFile
KERNEL32.dll!WriteFile*
*!IPC::Channel*::ProcessOutgoingMessages
UNINITIALIZED READ
name=bug_372254
*!content::*::NotifyPluginProcessHostHelper
UNINITIALIZED READ
name=drm_i#1546
*!testing::internal::CmpHelperEQ<>
...
*!content::BrowserPluginTest_ResizeFlowControl_Test::TestBody
UNINITIALIZED READ
name=bug_374410
*!ui::NativeThemeWin::PaintScrollbarTrack
*!ui::NativeThemeWin::PaintDirect
UNINITIALIZED READ
name=bug_377728
...
*!Hunspell::suggest
*!HunspellEngine::FillSuggestionList
*!SpellcheckLanguage::SpellCheckWord
*!SpellCheck::SpellCheckWord
UNINITIALIZED READ
name=bug_387373
*!blink::WebEmbeddedWorkerImpl::startWorkerContext
*!content::EmbeddedWorkerDispatcher::OnStartWorker
*!EmbeddedWorkerMsg_StartWorker::Dispatch<>
UNADDRESSABLE ACCESS
name=bug_389132
content.dll!crypto_kernel_do_load_cipher_type
content.dll!crypto_kernel_load_cipher_type
content.dll!crypto_kernel_init
content.dll!cricket::SrtpSession::SetKey
content.dll!cricket::SrtpSession::SetSend
content.dll!cricket::SrtpFilter::SetRtpParams
content.dll!cricket::BaseChannel::SetupDtlsSrtp
content.dll!cricket::BaseChannel::ChannelWritable_w
content.dll!cricket::BaseChannel::OnWritableState
UNINITIALIZED READ
name=bug_392585
system call NtCreateFile parameter #9
*!testing::internal::HandleExceptionsInMethodIfSupported<>
UNADDRESSABLE ACCESS
name=bug_398850
...
wtf.dll!WTF::PlatformCondition::timedWait
UNINITIALIZED READ
name=bug_399293
blink_web.dll!blink::InputMethodController::extendSelectionAndDelete
blink_web.dll!blink::WebLocalFrameImpl::extendSelectionAndDelete
content.dll!content::RenderFrameImpl::OnExtendSelectionAndDelete
*!content::RenderViewImplTest_OnExtendSelectionAndDelete_Test::TestBody
*!testing::internal::HandleExceptionsInMethodIfSupported<>
UNINITIALIZED READ
name=bug_398547
system call NtWriteFile parameter #5
KERNELBASE.dll!WriteFile
KERNEL32.dll!WriteFile
mojo_system_impl.dll!mojo::system::`anonymous namespace'::RawChannelWin::WriteNoLock
UNINITIALIZED READ
name=bug_399842
skia.dll!S32A_Opaque_BlitRow32_SSE4
HANDLE LEAK
name=bug_403544
system call NtCreateSemaphore
KERNELBASE.dll!CreateSemaphoreExW
...
v8.dll!v8::internal::SweeperThread::SweeperThread
...
blink_web.dll!blink::WorkerScriptController::WorkerScriptController
blink_web.dll!blink::WorkerGlobalScope::WorkerGlobalScope
blink_web.dll!blink::ServiceWorkerGlobalScope::ServiceWorkerGlobalScope
UNINITIALIZED READ
name=bug_414268
pdf.dll!chrome_pdf::PDFiumEngine::OnMouseMove
pdf.dll!chrome_pdf::PDFiumEngine::HandleEvent
pdf.dll!chrome_pdf::OutOfProcessInstance::HandleInputEvent
pdf.dll!pp::InputEvent_HandleEvent
ppapi_proxy.dll!ppapi::CallWhileUnlocked<>
ppapi_proxy.dll!ppapi::proxy::PPP_InputEvent_Proxy::OnMsgHandleFilteredInputEvent
UNADDRESSABLE ACCESS
name=bug_425097
...
*!ash::test::ShelfViewTest_CheckDragAndDropFromOverflowBubbleToShelf_Test::TestBody
UNINITIALIZED READ
name=bug_432067
system call NtCreateFile parameter #9
MSWSOCK.dll!*
content.dll!content::AppCacheStorageImpl::DatabaseTask::CallRun
UNADDRESSABLE ACCESS
name=bug_436131
*!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
*!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
*!testing::internal::HandleExceptionsInMethodIfSupported<>
UNADDRESSABLE ACCESS
name=bug_436131_b
views.dll!base::ObserverListBase<>::RemoveObserver
*!ash::test::ShelfViewTestAPI::RunMessageLoopUntilAnimationsDone
*!testing::internal::HandleExceptionsInMethodIfSupported<>
UNADDRESSABLE ACCESS
name=bug_436131_c
*!ash::test::ShelfViewTestAPI::GetPreferredSize
*!ash::test::ShelfViewTest_OverflowBubbleSize_Test::TestBody
*!testing::internal::HandleExceptionsInMethodIfSupported<>
UNINITIALIZED READ
name=bug_455417
*!std::char_traits<>::compare
...
*!*::*URLRequest*::TestBody
UNINITIALIZED READ
name=bug_468169
...
*!encode_nonrd_sb_row
*!vp9_encode_tile
UNINITIALIZED READ
name=bug_470848
blink_platform.dll!blink::Heap::RegionTree::lookup
*!testing::internal::HandleExceptionsInMethodIfSupported<>
HANDLE LEAK
name=https://crbug.com/480741
system call NtDuplicateObject
KERNELBASE.dll!DuplicateHandle
KERNEL32.dll!DuplicateHandle
base.dll!base::SharedMemory::ShareToProcessCommon
gl_wrapper.dll!gl::GLImageSharedMemory::Initialize
content.dll!content::GpuChannel::CreateImageForGpuMemoryBuffer
content.dll!content::GpuCommandBufferStub::OnCreateImage
HANDLE LEAK
name=https://crbug.com/481305
system call NtCreateSection
KERNELBASE.dll!CreateFileMappingW
base.dll!base::SharedMemory::Create
base.dll!base::SharedMemory::CreateAnonymous
content.dll!content::ChildThreadImpl::AllocateSharedMemory
content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
content.dll!content::RenderThreadImpl::AllocateSharedMemory
...
content.dll!content::WebGraphicsContext3DCommandBufferImpl::CreateContext
HANDLE LEAK
name=https://crbug.com/489779
system call NtUserCreateWindowEx
USER32.dll!UnregisterClassW
USER32.dll!UnregisterClassW
USER32.dll!CreateWindowExW
gfx.dll!gfx::WindowImpl::Init
win_window.dll!ui::WinWindow::WinWindow
aura.dll!aura::WindowTreeHostPlatform::WindowTreeHostPlatform
aura.dll!aura::WindowTreeHost::Create
UNINITIALIZED READ
name=bug_492821
*!blink::CSSPropertyParser::validUnit
...
*!blink::CSSPropertyParser::parseValue
*!blink::CSSPropertyParser::parseValue
*!blink::CSSParserImpl::consumeDeclarationValue
*!blink::CSSParserImpl::consumeDeclaration
*!blink::CSSParserImpl::consumeDeclarationList
*!blink::CSSParserImpl::consumeStyleRule
*!blink::CSSParserImpl::consumeQualifiedRule
*!blink::CSSParserImpl::consumeRuleList<>
*!blink::CSSParserImpl::parseStyleSheet
*!blink::CSSParser::parseSheet
*!blink::StyleSheetContents::parseStringAtPosition
*!blink::StyleEngine::parseSheet
*!blink::StyleEngine::createSheet
*!blink::StyleElement::createSheet
*!blink::StyleElement::process
UNINITIALIZED READ
name=bug_493167
system call NtWriteFile parameter #5
KERNELBASE.dll!WriteFile
KERNEL32.dll!WriteFile
*!base::File::WriteAtCurrentPos
*!sessions::SessionBackend::AppendCommandsToFile
*!sessions::SessionBackend::AppendCommands
UNADDRESSABLE ACCESS
name=bug_505734
webcore_shared.dll!blink::FocusController::focusedOrMainFrame
content.dll!content::RenderWidget::GetSelectionBounds
content.dll!content::RenderWidget::UpdateSelectionBounds
content.dll!content::RenderWidget::WillBeginCompositorFrame
cc.dll!base::internal::InvokeHelper<>::MakeItSo
cc.dll!base::internal::Invoker<>::Run
UNADDRESSABLE ACCESS
name=bug_506557_a
drmemorylib.dll!replace_memmove
base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
base.dll!base::trace_event::TraceEventSystemStatsMonitor::~TraceEventSystemStatsMonitor
content.dll!content::BrowserMainLoop::ShutdownThreadsAndCleanUp
content.dll!content::BrowserMainRunnerImpl::Shutdown
content.dll!content::BrowserMain
content.dll!content::RunNamedProcessTypeMain
content.dll!content::ContentMainRunnerImpl::Run
content.dll!content::ContentMain
*!content::BrowserTestBase::SetUp
*!InProcessBrowserTest::SetUp
*!testing::internal::HandleExceptionsInMethodIfSupported<>
UNINITIALIZED READ
name=bug_506557_b
base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
content.dll!content::V8SamplingProfiler::~V8SamplingProfiler
content.dll!content::RenderThreadImpl::~RenderThreadImpl
content.dll!content::RenderThreadImpl::`vector deleting destructor'
content.dll!content::ChildProcess::~ChildProcess
content.dll!content::RenderProcessImpl::`scalar deleting destructor'
content.dll!content::InProcessRendererThread::CleanUp
base.dll!base::`anonymous namespace'::ThreadFunc
KERNEL32.dll!BaseThreadInitThunk
UNADDRESSABLE ACCESS
name=bug_506557_c
base.dll!base::trace_event::TraceLog::RemoveEnabledStateObserver
content.dll!content::V8SamplingProfiler::~V8SamplingProfiler
content.dll!content::RenderThreadImpl::~RenderThreadImpl
content.dll!content::RenderThreadImpl::`vector deleting destructor'
content.dll!content::ChildProcess::~ChildProcess
content.dll!content::RenderProcessImpl::`scalar deleting destructor'
content.dll!content::InProcessRendererThread::CleanUp
base.dll!base::`anonymous namespace'::ThreadFunc
KERNEL32.dll!BaseThreadInitThunk
UNADDRESSABLE ACCESS
name=bug_506557_d
base.dll!std::vector<>::push_back
base.dll!base::trace_event::TraceLog::AddEnabledStateObserver
base.dll!base::trace_event::MemoryDumpManager::Initialize
content.dll!content::ChildThreadImpl::Init
content.dll!content::ChildThreadImpl::ChildThreadImpl
content.dll!content::RenderThreadImpl::RenderThreadImpl
content.dll!content::InProcessRendererThread::Init
base.dll!base::`anonymous namespace'::ThreadFunc
KERNEL32.dll!BaseThreadInitThunk
UNADDRESSABLE ACCESS
name=bug_506557_e
base.dll!std::vector<>::push_back
base.dll!base::trace_event::TraceLog::AddEnabledStateObserver
content.dll!content::V8SamplingProfiler::V8SamplingProfiler
content.dll!content::RenderThreadImpl::EnsureWebKitInitialized
content.dll!content::RenderThreadImpl::OnCreateNewView
content.dll!ViewMsg_New::Dispatch<>
content.dll!content::RenderThreadImpl::OnControlMessageReceived
content.dll!content::ChildThreadImpl::OnMessageReceived
ipc.dll!IPC::ChannelProxy::Context::OnDispatchMessage
ipc.dll!base::internal::Invoker<>::Run
base.dll!base::debug::TaskAnnotator::RunTask
scheduler.dll!scheduler::TaskQueueManager::ProcessTaskFromWorkQueue
scheduler.dll!scheduler::TaskQueueManager::DoWork
scheduler.dll!base::internal::Invoker<>::Run
base.dll!base::debug::TaskAnnotator::RunTask
base.dll!base::MessageLoop::RunTask
base.dll!base::MessageLoop::DeferOrRunPendingTask
base.dll!base::MessageLoop::DoWork
base.dll!base::MessagePumpForUI::DoRunLoop
base.dll!base::MessagePumpWin::Run
base.dll!base::MessageLoop::RunHandler
base.dll!base::MessageLoop::Run
base.dll!base::Thread::Run
base.dll!base::Thread::ThreadMain
base.dll!base::`anonymous namespace'::ThreadFunc
KERNEL32.dll!BaseThreadInitThunk
UNINITIALIZED READ
name=bug_508794a
...
ucrtbase.dll!ismbblead
ucrtbase.dll!free_base
ucrtbase.dll!_stdio_common_vsnwprintf_s
ucrtbase.dll!_stdio_common_vsnwprintf_s
*!base::vswprintf
*!base::`anonymous namespace'::StringAppendVT<>
*!base::StringPrintf
*!content::AccessibilityTreeFormatterWin::ToString
*!content::AccessibilityTreeFormatter::RecursiveFormatAccessibilityTree
UNADDRESSABLE ACCESS
name=bug_508794b
ucrtbase.dll!wcsnlen
ucrtbase.dll!ismbblead
ucrtbase.dll!free_base
ucrtbase.dll!_stdio_common_vsnwprintf_s
ucrtbase.dll!_stdio_common_vsnwprintf_s
*!base::vswprintf
*!base::`anonymous namespace'::StringAppendVT<>
*!base::StringPrintf
*!content::AccessibilityTreeFormatterWin::ToString
*!content::AccessibilityTreeFormatter::RecursiveFormatAccessibilityTree
UNADDRESSABLE ACCESS
name=bug_534881
...
v8.dll!v8::internal::`anonymous namespace'::Invoke
v8.dll!v8::internal::Execution::Call
v8.dll!v8::Function::Call
webcore_shared.dll!blink::V8ScriptRunner::callFunction
webcore_shared.dll!blink::ScriptController::callFunction
...
webcore_shared.dll!blink::LocalDOMWindow::dispatchEvent
UNINITIALIZED READ
name=bug_519041_a
ntdll.dll!RtlSetLastWin32ErrorAndNtStatusFromNtStatus
UNINITIALIZED READ
name=bug_519041_b
ntdll.dll!RtlDecodePointer
UNADDRESSABLE ACCESS
name=bug_545273
v8.dll!v8::internal::LookupIterator::LookupIterator
v8.dll!v8::internal::LookupIterator::PropertyOrElement
v8.dll!v8::internal::Runtime::GetObjectProperty
v8.dll!v8::internal::KeyedLoadIC::Load
v8.dll!v8::internal::Runtime_KeyedLoadIC_Miss
v8.dll!v8::internal::`anonymous namespace'::Invoke
v8.dll!v8::internal::Execution::Call
...
net_with_v8.dll!net::ProxyResolverV8::Context::*
HANDLE LEAK
name=bug_548039
system call NtCreateSection
KERNELBASE.dll!CreateFileMappingW
base.dll!base::SharedMemory::Create
content.dll!content::ChildThreadImpl::AllocateSharedMemory
content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
content.dll!content::RenderThreadImpl::AllocateSharedMemory
...
content.dll!content::WebGraphicsContext3DCommandBufferImpl::CreateContext
content.dll!content::WebGraphicsContext3DCommandBufferImpl::MaybeInitializeGL
# Dr. Memory does not yet propagate uninits through ymm registers so we
# avoid any false positives in the meantime that might show up in
# libyuv and other code:
UNINITIALIZED READ
name=https://github.com/DynamoRIO/drmemory/issues/1485
instruction=*ymm*
media.dll!*
HANDLE LEAK
name=bug_562701
system call NtCreateSection
KERNELBASE.dll!CreateFileMappingW
base.dll!base::SharedMemory::Create
content.dll!content::ChildThreadImpl::AllocateSharedMemory
content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
content.dll!content::ImageDataPlatformBackend::Init
content.dll!content::PPB_ImageData_Impl::Init
content.dll!content::PPB_ImageData_Impl::Create
content.dll!content::ResourceCreationImpl::CreateImageData
ppapi_proxy.dll!ppapi::proxy::PPB_ImageData_Proxy::CreateImageData
ppapi_proxy.dll!ppapi::proxy::PPB_ImageData_Proxy::OnHostMsgCreatePlatform
INVALID HEAP ARGUMENT
name=bug_571551_a
...
media.dll!mkvmuxer::Segment::DoNewClusterProcessing
media.dll!mkvmuxer::Segment::AddGenericFrame
media.dll!mkvmuxer::Segment::AddFrame
media.dll!media::WebmMuxer::AddFrame
media.dll!media::WebmMuxer::OnEncodedVideo
content.dll!content::MediaRecorderHandler::OnEncodedVideo
UNADDRESSABLE ACCESS
name=bug_571551_b
...
media.dll!mkvmuxer::Segment::DoNewClusterProcessing
media.dll!mkvmuxer::Segment::AddGenericFrame
media.dll!mkvmuxer::Segment::AddFrame
media.dll!media::WebmMuxer::AddFrame
media.dll!media::WebmMuxer::OnEncodedVideo
content.dll!content::MediaRecorderHandler::OnEncodedVideo
HANDLE LEAK
name=bug_571553
system call NtUserWindowFromPoint
content.dll!content::RenderWidgetHostViewAura::UpdateCursorIfOverSelf
content.dll!content::RenderWidgetHostViewAura::SetIsLoading
content.dll!content::RenderWidgetHostImpl::SetIsLoading
content.dll!content::RenderFrameHostManager::SetIsLoading
HANDLE LEAK
name=bug_571554_a
system call NtGdiCreateDIBSection
GDI32.dll!CreateDIBSection
skia.dll!`anonymous namespace'::CreateHBitmap
skia.dll!skia::BitmapPlatformDevice::Create
skia.dll!skia::CreatePlatformCanvas
surface.dll!TransportDIB::GetPlatformCanvas
content.dll!content::ImageDataPlatformBackend::Map
content.dll!content::PepperGraphics2DHost::Init
content.dll!content::PepperGraphics2DHost::Create
content.dll!content::ContentRendererPepperHostFactory::CreateResourceHost
HANDLE LEAK
name=bug_571554_b
system call NtCreateSection
KERNELBASE.dll!CreateFileMappingW
base.dll!base::SharedMemory::Create
content.dll!content::ChildThreadImpl::AllocateSharedMemory
content.dll!content::RenderThreadImpl::HostAllocateSharedMemoryBuffer
content.dll!content::ImageDataPlatformBackend::Init
content.dll!content::PPB_ImageData_Impl::Init
content.dll!content::PepperGraphics2DHost::Init
content.dll!content::PepperGraphics2DHost::Create
content.dll!content::ContentRendererPepperHostFactory::CreateResourceHost
UNINITIALIZED READ
name=bug_591092
webcore_shared.dll!std::_Equal<>
webcore_shared.dll!WTF::operator==<>
webcore_shared.dll!blink::CSSVariableData::operator==
webcore_shared.dll!blink::dataEquivalent<>
webcore_shared.dll!blink::dataEquivalent<>
...
webcore_shared.dll!blink::Document::updateStyle
webcore_shared.dll!blink::Document::updateLayoutTree
UNINITIALIZED READ
name=bug_593594
blink_platform.dll!qcms_transform_data_rgba_out_lut_sse2
blink_platform.dll!qcms_transform_data_type
blink_platform.dll!blink::JPEGImageDecoder::outputScanlines
blink_platform.dll!blink::JPEGImageReader::decode
UNINITIALIZED READ
name=bug_594657
*!std::_Tree<>::_Eqrange<>
*!courgette::adjustment_method_2::AssignmentProblem::Declassify
*!courgette::adjustment_method_2::AssignmentProblem::AssignOne
*!courgette::adjustment_method_2::AssignmentProblem::FindAndAssignBestLeader
*!courgette::adjustment_method_2::AssignmentProblem::Solve
*!courgette::adjustment_method_2::Adjuster::Solve
*!courgette::adjustment_method_2::Adjuster::Finish
*!courgette::adjustment_method_2::Adjuster::Adjust
*!courgette::Adjust
UNINITIALIZED READ
name=bug_594781a
chromium_sqlite3.dll!PSCreateMemoryPropertyStore
...
chromium_sqlite3.dll!StgDeserializePropVariant
UNADDRESSABLE ACCESS
name=bug_594781b
...
chromium_sqlite3.dll!PropVariantToGUID
sql.dll!sql::Connection::GetUniqueStatement
HANDLE LEAK
name=bug_594829a
system call NtDuplicateObject
KERNELBASE.dll!DuplicateHandle
KERNEL32.dll!DuplicateHandle
*!sandbox::BrokerServicesBase::AddTargetPeer
content.dll!content::StartSandboxedProcess
HANDLE LEAK
name=bug_594829b
system call NtCreateUserProcess
KERNEL32.dll!CreateProcessInternalW
KERNEL32.dll!CreateProcessW
base.dll!base::LaunchProcess
base.dll!base::LaunchProcess
content.dll!content::StartSandboxedProcess
HANDLE LEAK
name=bug_595093a
system call NtCreateFile
KERNELBASE.dll!CreateFileW
KERNEL32.dll!CreateFileW
net.dll!disk_cache::File::Init
net.dll!disk_cache::MappedFile::Init
net.dll!disk_cache::BackendImpl::InitBackingStore
net.dll!disk_cache::BackendImpl::SyncInit
net.dll!disk_cache::BackendIO::ExecuteBackendOperation
HANDLE LEAK
name=bug_595093b
system call NtCreateSection
KERNELBASE.dll!CreateFileMappingW
net.dll!disk_cache::MappedFile::Init
net.dll!disk_cache::BackendImpl::InitBackingStore
net.dll!disk_cache::BackendImpl::SyncInit
net.dll!disk_cache::BackendIO::ExecuteBackendOperation
HANDLE LEAK
name=bug_595105
system call NtDuplicateObject
KERNELBASE.dll!DuplicateHandle
KERNEL32.dll!DuplicateHandle
base.dll!`anonymous namespace'::CreateFileMappingWithReducedPermissions
base.dll!base::SharedMemory::Create
base.dll!base::SharedMemory::CreateAndMapAnonymous
content.dll!content::GpuMemoryBufferImplSharedMemory::Create
content.dll!content::BrowserGpuMemoryBufferManager::HandleCreateGpuMemoryBufferOnIO
HANDLE LEAK
name=bug_595146
system call NtCreateFile
KERNELBASE.dll!CreateFileW
KERNEL32.dll!CreateFileW
base.dll!base::File::DoInitialize
base.dll!base::File::Initialize
net.dll!net::FileStream::Context::OpenFileImpl
HANDLE LEAK
name=bug_595149
system call NtCreateIoCompletion
KERNELBASE.dll!CreateIoCompletionPort
base.dll!base::MessagePumpForIO::MessagePumpForIO
HANDLE LEAK
name=bug_598364
system call NtGdiCreateDIBSection
GDI32.dll!CreateDIBSection
skia.dll!`anonymous namespace'::CreateHBitmap
skia.dll!skia::BitmapPlatformDevice::Create
...
webcore_shared.dll!blink::ScriptController::createPluginWrapper
webcore_shared.dll!blink::HTMLPlugInElement::pluginWrapper