123456789101112131415161718192021222324252627 |
- # This is originally copied from Chromium tools/memory/asan/blacklist_win.txt.
- # The rules in this file are only applied at compile time. If you can modify the
- # source in question, consider function attributes to disable instrumentation.
- # Bug 1200740 - ASan crash due to child process function interceptions
- # Sandbox executes some of its code before the ASan RTL gets initialized and
- # maps shadow memory. As a result, instrmented code tries to access unavailable
- # shadow memory and faults.
- fun:*TargetNtSetInformationThread@20
- fun:*TargetNtOpenThreadToken@20
- fun:*TargetNtOpenThreadTokenEx@24
- fun:*TargetNtMapViewOfSection@44
- fun:*AutoProtectMemory*sandbox*
- fun:*EatResolverThunk*sandbox*
- fun:*InterceptionAgent*sandbox*
- fun:*ResolverThunk*sandbox*
- fun:*Target*SandboxFactory*sandbox*
- fun:*ProcessState*sandbox*
- src:*pe_image.h
- src:*pe_image.cc
- src:*resolver_32.cc
- src:*filesystem_interception.cc
- src:*process_thread_interception.cc
- src:*registry_interception.cc
- src:*sandbox_nt_util.cc
- src:*sync_interception.cc
|