Index: tools/valgrind/drmemory/suppressions.txt |
diff --git a/tools/valgrind/drmemory/suppressions.txt b/tools/valgrind/drmemory/suppressions.txt |
index 9c6df2327843239376909e66a9a12eda9743208a..4341669165aa2beecff73a034705db2ab3a59adc 100644 |
--- a/tools/valgrind/drmemory/suppressions.txt |
+++ b/tools/valgrind/drmemory/suppressions.txt |
@@ -1,615 +1,96 @@ |
+# This file contains suppressions for the Dr.Memory tool, see |
+# http://dev.chromium.org/developers/how-tos/using-drmemory |
+# |
+# This file contains suppressions for the DrMemroy reports happening |
+# in the 'light' mode (a.k.a. drmemory_light) as well as in the 'full' mode. |
+# Please use suppressions_full.txt for all the reports that can happen only |
+# in the full mode (drmemory_full), |
+ |
############################ |
# Known reports on the third party we have no control over. |
-UNINITIALIZED READ |
-... |
-*!deflate_* |
-*!MOZ_Z_deflate |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=406 |
-# TODO(timurrrr): check if these frames change when NT_SYMBOLS are present. |
-LEAK |
-ADVAPI32.dll!WmiOpenBlock |
-ADVAPI32.dll!WmiOpenBlock |
# Reports from Sophos antivirus |
UNADDRESSABLE ACCESS |
+name=Sophos UNADDR |
... |
sophos*.dll!* |
UNINITIALIZED READ |
+name=Sophos UNINIT |
... |
sophos*.dll!* |
LEAK |
+name=Sophos LEAK |
... |
sophos*.dll!* |
-# Leaks inside GoogleDesktop - it injects into our processes for some reason |
-LEAK |
-... |
-GoogleDesktopNetwork3.DLL!DllUnregisterServer |
- |
-# They deliberately use uninit local var in sqlite random generator |
-UNINITIALIZED READ |
-*!randomByte |
-*!sqlite3_randomness |
- |
############################ |
# Suppress some false reports due to bugs in Dr.Memory like wrong analysis |
# assumptions or unhandled syscalls |
-# http://code.google.com/p/drmemory/issues/detail?id=12 |
# Please note: the following suppressions were written in the abscense of |
# private symbols so may need to be updated when we switch to auto-loading PDBs |
-UNINITIALIZED READ |
-ntdll.dll!Rtl* |
-ntdll.dll!Rtl* |
-ntdll.dll!RtlFindActivationContextSectionString |
- |
-UNINITIALIZED READ |
-... |
-SHELL32.dll!SHFileOperation* |
- |
-UNINITIALIZED READ |
-... |
-SHELL32.dll!SHGetFolderPath* |
- |
-LEAK |
-... |
-SHELL32.dll!SHGetFolderPath* |
- |
-UNINITIALIZED READ |
-... |
-SHELL32.dll!SHCreateDirectory* |
UNADDRESSABLE ACCESS |
+name=http://code.google.com/p/drmemory/issues/detail?id=12 UNADDR |
... |
SHELL32.dll!SHFileOperation* |
-UNINITIALIZED READ |
-... |
-SHELL32.dll!ILLoadFromStream* |
- |
-UNINITIALIZED READ |
-... |
-SHELL32.dll!ILSaveToStream* |
- |
-LEAK |
-... |
-SHELL32.dll!SHFileOperation* |
- |
-UNINITIALIZED READ |
-... |
-SHELL32.dll!SHGetItemFromDataObject |
- |
-LEAK |
-... |
-SHELL32.dll!SHGetItemFromDataObject |
- |
-LEAK |
-... |
-ole32.dll!* |
-SHELL32.dll!SHChangeNotifySuspendResume |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=14 |
-UNINITIALIZED READ |
-... |
-*!CreateProcess* |
- |
-LEAK |
-... |
-*!CreateProcess* |
- |
-UNINITIALIZED READ |
-... |
-*!base::LaunchApp* |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=17 |
-UNINITIALIZED READ |
-... |
-*!CreateWindow* |
- |
-POSSIBLE LEAK |
-GDI32.dll!* |
-GDI32.dll!CreateFontIndirectExW |
-GDI32.dll!CreateFontIndirectW |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=18 |
-UNINITIALIZED READ |
-... |
-*!CoInitialize* |
- |
-UNINITIALIZED READ |
-... |
-*!CoCreateInstance* |
- |
-UNINITIALIZED READ |
-... |
-*!CoUninitialize* |
- |
-UNINITIALIZED READ |
-... |
-UxTheme.dll!* |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=40 |
-UNINITIALIZED READ |
-... |
-WINSPOOL.DRV!* |
- |
UNADDRESSABLE ACCESS |
+name=http://code.google.com/p/drmemory/issues/detail?id=40 UNADDR |
... |
WINSPOOL.DRV!* |
INVALID HEAP ARGUMENT |
+name=http://code.google.com/p/drmemory/issues/detail?id=40 INVALID HEAP |
... |
WINSPOOL.DRV!* |
-LEAK |
-... |
-WINSPOOL.DRV!* |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=48 |
-UNINITIALIZED READ |
-system call NtContinue |
-*!*SetThreadName |
- |
-UNINITIALIZED READ |
-system call NtContinue |
-*!WTF::initializeCurrentThreadInternal |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=52 |
-UNINITIALIZED READ |
-... |
-DBGHELP.dll!SymInitialize |
- |
-UNINITIALIZED READ |
-... |
-DBGHELP.dll!SymEnumSourceFiles |
- |
-UNINITIALIZED READ |
-... |
-msvcrt.dll!_RTDynamicCast |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=53 |
-UNINITIALIZED READ |
-ADVAPI32.dll!WmiMofEnumerateResourcesA |
-ADVAPI32.dll!WmiMofEnumerateResourcesA |
-ADVAPI32.dll!Sta*TraceW |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=58 |
-UNINITIALIZED READ |
-... |
-*!_cfltcvt_l |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=59 |
UNADDRESSABLE ACCESS |
+name=http://code.google.com/p/drmemory/issues/detail?id=59 |
... |
*!SetEnvironmentVariable* |
-# http://code.google.com/p/drmemory/issues/detail?id=60 |
-UNINITIALIZED READ |
-USP10.dll!* |
-... |
-USP10.dll!ScriptStringAnalyse |
- |
-LEAK |
-IMM32.dll!ImmGetIMCCSize |
-IMM32.dll!ImmLockClientImc |
-IMM32.dll!ImmDisableIME |
-IMM32.dll!ImmSetActiveContext |
-USER32.dll!IMPSetIMEA |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=65 |
-UNINITIALIZED READ |
-... |
-*!SystemFunction036 |
- |
-UNINITIALIZED READ |
-... |
-*!talk_base::CreateRandomString |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=68 |
-UNINITIALIZED READ |
-... |
-WS2_32.dll!* |
- |
-UNINITIALIZED READ |
-... |
-ADVAPI32.dll!SetSecurityDescriptorDacl |
- |
-UNINITIALIZED READ |
-... |
-MSWSOCK.dll!WSPStartup |
- |
UNADDRESSABLE ACCESS |
+name=http://code.google.com/p/drmemory/issues/detail?id=68 (UNADDR 1) |
... |
MSWSOCK.dll!WSPStartup |
-UNINITIALIZED READ |
-... |
-ntdll.dll!RtlValidateUnicodeString |
- |
UNADDRESSABLE ACCESS |
+name=http://code.google.com/p/drmemory/issues/detail?id=68 (UNADDR 2) |
... |
ntdll.dll!RtlValidateUnicodeString |
-# http://code.google.com/p/drmemory/issues/detail?id=256 |
-LEAK |
-*!_mtinit |
-*!__tmainCRTStartup |
-*!mainCRTStartup |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=274 |
-POSSIBLE LEAK |
-... |
-GDI32.dll!CreateDCW |
- |
-LEAK |
-... |
-GDI32.dll!CreateDCW |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=275 |
-LEAK |
-... |
-*!_getptd* |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=276 |
-UNINITIALIZED READ |
-... |
-ntdll.dll!RtlConvertUlongToLargeInteger |
-ntdll.dll!RtlConvertUlongToLargeInteger |
-ntdll.dll!KiUserExceptionDispatcher |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=305 |
-LEAK |
-*!free |
-*!free |
-*!operator new |
-... |
-*!MiniDumpWriteDump |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=346 |
-UNINITIALIZED READ |
-... |
-GDI32.dll!CloseEnhMetaFile |
- |
-UNINITIALIZED READ |
-GDI32.dll!SetPolyFillMode |
-GDI32.dll!CreateICW |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=362 |
-UNINITIALIZED READ |
-USER32.dll!UnregisterClass* |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=382 |
-LEAK |
-... |
-ntdll.dll!CsrNewThread |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=397 |
-UNINITIALIZED READ |
-system call NtDeviceIoControlFile InputBuffer |
-ADVAPI32.dll!ImpersonateAnonymousToken |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=407 |
-UNINITIALIZED READ |
-system call NtRequestWaitReplyPort |
-RPCRT4.dll!I_RpcSendReceive |
-RPCRT4.dll!NdrSendReceive |
- |
-UNINITIALIZED READ |
-IMM32.dll!* |
-ntdll.dll!LdrInitializeThunk |
-ntdll.dll!LdrShutdownThread |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=412 |
-UNINITIALIZED READ |
-ADVAPI32.dll!RegDeleteValue* |
- |
-UNINITIALIZED READ |
-... |
-ADVAPI32.dll!Crypt* |
- |
-UNINITIALIZED READ |
-... |
-RPCRT4.dll!NdrClientCall2 |
- |
-LEAK |
-RSAENH.dll!DllUnregisterServer |
-... |
-ADVAPI32.dll!CryptAcquireContextA |
-CRYPT32.dll!CryptEnumOIDFunction |
-... |
-CRYPT32.dll!CertFindCertificateInStore |
- |
-UNINITIALIZED READ |
-... |
-RSAENH.dll!CPGenRandom |
- |
-UNINITIALIZED READ |
-... |
-CRYPT??.dll!Crypt* |
- |
-UNINITIALIZED READ |
-*!replace_memcmp |
-... |
-*!testing::internal::CmpHelperEQ* |
-... |
-*!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=425 |
-UNINITIALIZED READ |
-CLBCatQ.DLL!DestroyStgDatabase |
-CLBCatQ.DLL!PostError |
-CLBCatQ.DLL!PostError |
- |
-LEAK |
-RPCRT4.dll!I_RpcBCacheFree |
-RPCRT4.dll!I_RpcBCacheFree |
-... |
-RPCRT4.dll!NdrClientCall2 |
- |
-UNINITIALIZED READ |
-msdmo.dll!* |
-msdmo.dll!* |
-DEVENUM.DLL!* |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=435 |
-UNINITIALIZED READ |
-... |
-ntdll.dll!RtlSetSecurityObject |
-ntdll.dll!RtlNewSecurityObjectEx |
-ADVAPI32.dll!CreatePrivateObjectSecurityEx |
-NTMARTA.dll!AccRewriteSetNamedRights |
- |
-POSSIBLE LEAK |
-WLDAP32.dll!Ordinal325 |
-... |
-WLDAP32.dll!Ordinal325 |
-ntdll.dll!LdrInitializeThunk |
-ntdll.dll!LdrFindResourceDirectory_U |
-ntdll.dll!RtlValidateUnicodeString |
-ntdll.dll!LdrLoadDll |
-KERNEL32.dll!LoadLibraryExW |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=438 |
-# mod+offs suppression because the symbolic makes no sense and changes |
-# completely in the presence of WS2_32.dll symbols. |
-LEAK |
-<WS2_32.dll+0x260c> |
-<WS2_32.dll+0x2b76> |
-<WS2_32.dll+0x2c61> |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=454 |
-UNINITIALIZED READ |
-... |
-WINMM.dll!wave*GetNumDevs |
- |
-LEAK |
-... |
-WINMM.dll!wave*GetNumDevs |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=466 |
-LEAK |
-ntdll.dll!RtlRunOnceBeginInitialize |
-ntdll.dll!RtlInitializeCriticalSectionAndSpinCount |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=471 |
-UNINITIALIZED READ |
-*!media::AudioRendererAlgorithmOLA::Crossfade<unsigned char> |
-*!media::AudioRendererAlgorithmOLA::FillBuffer |
-*!media::AudioRendererAlgorithmOLATest_FillBuffer_* |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=473 |
-UNINITIALIZED READ |
-system call NtDeviceIoControlFile InputBuffer |
-... |
-iphlpapi.dll!GetAdaptersAddresses |
- |
-POSSIBLE LEAK |
-ESENT.dll!* |
-ESENT.dll!* |
-ESENT.dll!* |
-ntdll.dll!Ldr*Init* |
-ntdll.dll!Ldr* |
-ntdll.dll!* |
-ntdll.dll!LdrLoadDll |
-... |
-iphlpapi.dll!GetPerAdapterInfo |
-... |
-iphlpapi.dll!GetAdaptersAddresses |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=475 |
-LEAK |
-... |
-ADVAPI32.dll!CryptAcquireContextA |
-... |
-CRYPT32.dll!CryptMsgOpenToDecode |
-... |
-CRYPT32.dll!CryptQueryObject |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=476 |
-LEAK |
-... |
-RPCRT4.dll!RpcBindingFromStringBindingW |
-... |
-NETAPI32.dll!DsRoleGetPrimaryDomainInformation |
-... |
-USERENV.dll!CreateEnvironmentBlock |
-... |
-CRYPT32.dll!CertOpenStore |
-... |
-CRYPT32.dll!CertCreateCertificateChainEngine |
- |
-LEAK |
-KERNEL32.dll!LocalAlloc |
-... |
-CRYPT32.dll!CryptDecodeObjectEx |
-... |
-CRYPT32.dll!CertGetCRLContextProperty |
-... |
-CRYPT32.dll!CertGetCertificateChain |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=511 |
-UNINITIALIZED READ |
-RPCRT4.dll!* |
-... |
-RPCRT4.dll!UuidCreate |
-ole32.dll!* |
- |
-UNINITIALIZED READ |
-ole32.dll!* |
-ole32.dll!* |
-ole32.dll!StringFromGUID2 |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=512 |
-UNINITIALIZED READ |
-... |
-*!browser_sync::Cryptographer::PackBootstrapToken |
-*!browser_sync::Cryptographer::GetBootstrapToken |
- |
-UNINITIALIZED READ |
-... |
-*!Encrypt* |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=513 |
-UNINITIALIZED READ |
-*!v8* |
- |
-UNINITIALIZED READ |
-*!* |
-*!v8* |
- |
-UNINITIALIZED READ |
-<not in a module> |
-... |
-*!v8* |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=546 |
-UNINITIALIZED READ |
-... |
-mscms.dll!* |
-... |
-GDI32.dll!* |
-*!IconUtil::Create*HICON* |
- |
-# http://crbug.com/92152 |
-LEAK |
-... |
-USER32.dll!CreateWindowExW |
-*!views::TooltipManagerWin::Init |
-*!views::TooltipManagerWin::TooltipManagerWin |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=567 |
-UNINITIALIZED READ |
-dbghelp.dll!* |
-... |
-dbghelp.dll!StackWalk64 |
- |
-LEAK |
-*!* |
-dbghelp.dll!* |
-... |
-dbghelp.dll!StackWalk64 |
- |
-# http://code.google.com/p/drmemory/issues/detail?id=569 |
-# symbols w/o PDB make no sense, so sticking with mod+offs |
-POSSIBLE LEAK |
-<RPCRT4.dll+0x10636> |
-<RPCRT4.dll+0x10610> |
-... |
-<RPCRT4.dll+0x3474?> |
-<ntdll.dll+0x64fde> |
-<ntdll.dll+0x447f3> |
- |
-# http://crbug.com/96433 |
-UNADDRESSABLE ACCESS |
-ntdll.dll!* |
-ntdll.dll!* |
-ntdll.dll!* |
-KERNELBASE.dll!LocalReAlloc |
-CRYPT32.dll!* |
-... |
-CRYPT32.dll!CertControlStore |
- |
############################ |
# TODO(timurrrr): investigate these |
-UNINITIALIZED READ |
-... |
-*!win_util::GetLogonSessionOnlyDACL |
- |
-UNINITIALIZED READ |
-... |
-ntshrui.dll!IsPathSharedW |
- |
-UNINITIALIZED READ |
-... |
-*!NetApiBufferFree |
- |
-UNINITIALIZED READ |
-... |
-*!ShellExecute* |
- |
UNADDRESSABLE ACCESS |
+name=TODO SHParseDisplayName |
... |
*!SHParseDisplayName |
-UNINITIALIZED READ |
-... |
-*!SHParseDisplayName |
- |
-UNINITIALIZED READ |
-... |
-*!GetCanonicalPathInfo* |
- |
UNADDRESSABLE ACCESS |
+name=TODO GetCanonicalPathInfo |
... |
*!GetCanonicalPathInfo* |
-UNINITIALIZED READ |
-... |
-SHELL32.dll!Ordinal* |
- |
UNADDRESSABLE ACCESS |
+name=TODO CreateDC |
... |
GDI32.dll!CreateDC* |
-UNINITIALIZED READ |
-... |
-GDI32.dll!GetTextExtentPoint32* |
- |
# This one looks interesting |
INVALID HEAP ARGUMENT |
+name=TODO ExitProcess |
... |
KERNEL32.dll!ExitProcess |
-UNINITIALIZED READ |
-... |
-*!SyncSocketClientListener::OnMsgClassResponse |
- |
-UNINITIALIZED READ |
-... |
-*!*NSPRInitSingleton* |
- |
-UNINITIALIZED READ |
-*!NdrSimpleStructFree |
- |
-UNINITIALIZED READ |
-ntdll.dll!RtlpNtOpenKey |
-ntdll.dll!RtlMakeSelfRelativeSD |
-ntdll.dll!RtlAbsoluteToSelfRelativeSD |
-ADVAPI32.dll!MakeSelfRelativeSD |
- |
-UNINITIALIZED READ |
-... |
-CRYPT32.dll!I_CertSyncStore |
- |
INVALID HEAP ARGUMENT |
name=http://crbug.com/103365 |
ppapi_tests.dll!* |
... |
ppapi_tests.dll!* |
-*!base::internal::Invoker2<*>::DoInvoke |
+*!base::internal::RunnableAdapter<*>::Run |
############################ |
# Intentional errors in Chromium tests (ToolsSanityTests) |
@@ -714,70 +195,32 @@ name=NPAPITesterBase.NoHangIfInitCrashes deliberate crash |
# TODO(bruening): switch to annotation once have support for that |
npapi_test_plugin.dll!NPAPIClient::PluginClient::Initialize |
-# This test intentionally leaks an object and checks that it's never deleted |
-LEAK |
-... |
-*!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody |
- |
# This test has a death test at the end that derefences a NULL pointer. |
UNADDRESSABLE ACCESS |
+name=BrowserAboutHandlerTest.WillHandleBrowserAboutURL deliberate crash |
... |
unit_tests.exe!BrowserAboutHandlerTest_WillHandleBrowserAboutURL_Test::TestBody |
-############################ |
-# Benign issues in Chromium |
- |
-# We deliberately leak different kinds of Histograms to avoid data races. |
-LEAK |
-... |
-*!operator new* |
-... |
-*!*::*Histogram::FactoryGet |
- |
-# Deliberate LazyInstance leaks |
-LEAK |
-... |
-*!*base::LeakyLazyInstanceTraits*::* |
-... |
-*!base::LazyInstance*::Pointer |
- |
# Deliberate NULL deref to crash the child process |
UNADDRESSABLE ACCESS |
+name=CrashingChildProcess deliberate crash |
*!CrashingChildProcess |
UNADDRESSABLE ACCESS |
+name=::Crasher::Run deliberate crash |
*!`anonymous namespace'::Crasher::Run |
-# http://crbug.com/79933 |
-LEAK |
-... |
-*!TestURLRequestContext::Init |
- |
-LEAK |
-... |
-*!TestURLRequestContext::TestURLRequestContext |
-*!TestURLRequestContextGetter::GetURLRequestContext |
-*!notifier::SingleLoginAttempt::SingleLoginAttempt |
-*!notifier::Login::StartConnection |
-*!sync_notifier::InvalidationNotifier::UpdateCredentials |
-*!sync_notifier::NonBlockingInvalidationNotifier::Core::UpdateCredentials |
- |
-LEAK |
-... |
-*!TestURLRequestContext::TestURLRequestContext |
-*!TestURLRequestContextGetter::GetURLRequestContext |
-*!URLFetcher::Core::StartURLRequest |
+############################ |
+# Benign issues in Chromium |
WARNING |
-# http://code.google.com/p/chromium/issues/detail?id=72463 |
-name=Ci#72463: prefetches in generated MemCopy |
+name=http://crbug.com/72463 - prefetches in generated MemCopy |
instruction=prefetch* |
-<not in a module> |
+<not in a module> |
chrome.dll!v8::internal::CopyChars* |
UNADDRESSABLE ACCESS |
-# http://code.google.com/p/drmemory/issues/detail?id=582 |
-name=bizarre cl-generated read-beyond-TOS |
+name=http://code.google.com/p/drmemory/issues/detail?id=582 bizarre cl-generated read-beyond-TOS |
instruction=mov 0xfffffffc(%esp) -> %eax |
chrome.dll!WebCore::RenderStyle::resetBorder* |
@@ -806,135 +249,14 @@ name=http://crbug.com/101717 (4) |
############################ |
# Real issues in Chromium |
-# http://crbug.com/32085 |
-LEAK |
-... |
-chrome.dll!NotificationRegistrar::Add |
- |
-# http://crbug.com/32623 |
-LEAK |
-... |
-*!ssl3_HandleHandshakeMessage |
-*!ssl3_HandleHandshake |
-*!ssl3_HandleRecord |
-*!ssl3_GatherCompleteHandshake |
-... |
-*!SSL_ForceHandshake |
-*!net::SSLServerSocketNSS::DoHandshake |
-*!net::SSLServerSocketNSS::DoHandshakeLoop |
- |
-# http://crbug.com/57266 (1) |
-UNINITIALIZED READ |
-... |
-*!remoting::EncoderVp8::Encode |
- |
-# http://crbug.com/57266 (2) |
-UNINITIALIZED READ |
-... |
-*!vp8_* |
- |
-# http://crbug.com/70062 |
-LEAK |
-*!PR_Calloc |
-*!PR_NewLock |
-... |
-*!InitSessionCacheLocks |
-*!initSessionCacheLocksLazily |
-*!PR_CallOnce |
-*!ssl_InitSessionCacheLocks |
-*!lock_cache |
-*!ssl_LookupSID |
-*!ssl2_BeginClientHandshake |
-*!ssl_Do1stHandshake |
-*!SSL_ForceHandshake |
-*!net::SSL*SocketNSS::DoHandshake |
-*!net::SSL*SocketNSS::DoHandshakeLoop |
- |
-# http://crbug.com/74417 |
-LEAK |
-*!operator new |
-*!disk_cache::BackendImpl::CreateEntryImpl |
- |
-# http://crbug.com/74425 |
-LEAK |
-*!operator new |
-*!disk_cache::BackendImpl::NewEntry |
- |
-# http://crbug.com/75247 |
-LEAK |
-... |
-*!operator new |
-*!AutofillDownloadTestHelper::AutofillDownloadTestHelper |
- |
-# http://crbug.com/78784 |
-LEAK |
-*!generic_cpp_alloc |
-*!operator new |
-*!TestingProfile::CreateRequestContext |
-*!*ProfileSyncService*::SetUp |
- |
-# http://crbug.com/78784 |
-LEAK |
-... |
-*!RenderWidgetHost::WasHidden |
- |
-LEAK |
-... |
-*!RenderWidgetHost::WasRestored |
- |
-# http://crbug.com/87612 |
-LEAK |
-... |
-*!SSL_ConfigSecureServer |
-*!net::SSLServerSocketNSS::InitializeSSLOptions |
-*!net::SSLServerSocketNSS::Handshake |
- |
-# http://crbug.com/88213 |
UNADDRESSABLE ACCESS |
+name=http://crbug.com/88213 |
*!base::win::ObjectWatcher::StopWatching |
*!base::win::ObjectWatcher::WillDestroyCurrentMessageLoop |
*!MessageLoop::~MessageLoop |
-# http://crbug.com/88640 |
-LEAK |
-*!generic_cpp_alloc |
-*!operator new |
-*!ProfileImpl::InitRegisteredProtocolHandlers |
-*!ProfileImpl::DoFinalInit |
-*!ProfileImpl::OnPrefsLoaded |
- |
-# http://crbug.com/91465 |
-LEAK |
-*!generic_cpp_alloc |
-*!operator new |
-*!browser_sync::internal::WeakHandleCore<browser_sync::JsBackend>::* |
-*!browser_sync::WeakHandle<browser_sync::JsBackend>::* |
-*!sync_api::SyncManager::SyncInternal::Init |
- |
-# http://crbug.com/91491 |
-LEAK |
-... |
-*!CrxUpdateService::ProcessPendingItems |
- |
-# http://crbug.com/92026 |
-UNINITIALIZED READ |
-softokn3.dll!FC_GetFunctionList |
-... |
-softokn3.dll!NSC_ModuleDBFunc |
- |
-UNINITIALIZED READ |
-freebl3.dll!FREEBL_GetVector |
-... |
-softokn3.dll!NSC_ModuleDBFunc |
- |
-# http://crbug.com/92166 |
-LEAK |
-... |
-*!operator new |
-*!views::NativeWidgetWin::OnCreate |
- |
-# http://crbug.com/96010 |
UNADDRESSABLE ACCESS |
+name=http://crbug.com/96010 |
... |
*!NotificationService::Notify |