asan_blacklist_win.txt 1.0 KB

123456789101112131415161718192021222324252627
  1. # This is originally copied from Chromium tools/memory/asan/blacklist_win.txt.
  2. # The rules in this file are only applied at compile time. If you can modify the
  3. # source in question, consider function attributes to disable instrumentation.
  4. # Bug 1200740 - ASan crash due to child process function interceptions
  5. # Sandbox executes some of its code before the ASan RTL gets initialized and
  6. # maps shadow memory. As a result, instrmented code tries to access unavailable
  7. # shadow memory and faults.
  8. fun:*TargetNtSetInformationThread@20
  9. fun:*TargetNtOpenThreadToken@20
  10. fun:*TargetNtOpenThreadTokenEx@24
  11. fun:*TargetNtMapViewOfSection@44
  12. fun:*AutoProtectMemory*sandbox*
  13. fun:*EatResolverThunk*sandbox*
  14. fun:*InterceptionAgent*sandbox*
  15. fun:*ResolverThunk*sandbox*
  16. fun:*Target*SandboxFactory*sandbox*
  17. fun:*ProcessState*sandbox*
  18. src:*pe_image.h
  19. src:*pe_image.cc
  20. src:*resolver_32.cc
  21. src:*filesystem_interception.cc
  22. src:*process_thread_interception.cc
  23. src:*registry_interception.cc
  24. src:*sandbox_nt_util.cc
  25. src:*sync_interception.cc