2016-11-10 04:18:55 +03:00
|
|
|
# This is originally copied from Chromium tools/memory/asan/blacklist_win.txt.
|
|
|
|
# The rules in this file are only applied at compile time. If you can modify the
|
|
|
|
# source in question, consider function attributes to disable instrumentation.
|
|
|
|
|
|
|
|
# Bug 1200740 - ASan crash due to child process function interceptions
|
|
|
|
# Sandbox executes some of its code before the ASan RTL gets initialized and
|
2016-11-15 01:43:51 +03:00
|
|
|
# maps shadow memory. As a result, instrumented code tries to access unavailable
|
2016-11-10 04:18:55 +03:00
|
|
|
# shadow memory and faults.
|
|
|
|
fun:*TargetNtSetInformationThread@20
|
|
|
|
fun:*TargetNtOpenThreadToken@20
|
|
|
|
fun:*TargetNtOpenThreadTokenEx@24
|
|
|
|
fun:*TargetNtMapViewOfSection@44
|
|
|
|
fun:*AutoProtectMemory*sandbox*
|
|
|
|
fun:*EatResolverThunk*sandbox*
|
|
|
|
fun:*InterceptionAgent*sandbox*
|
|
|
|
fun:*ResolverThunk*sandbox*
|
|
|
|
fun:*Target*SandboxFactory*sandbox*
|
|
|
|
fun:*ProcessState*sandbox*
|
|
|
|
src:*pe_image.h
|
|
|
|
src:*pe_image.cc
|
|
|
|
src:*resolver_32.cc
|
|
|
|
src:*filesystem_interception.cc
|
|
|
|
src:*process_thread_interception.cc
|
|
|
|
src:*registry_interception.cc
|
|
|
|
src:*sandbox_nt_util.cc
|
|
|
|
src:*sync_interception.cc
|
2016-11-15 01:43:51 +03:00
|
|
|
src:*interceptors_64.cc
|