summaryrefslogtreecommitdiff
path: root/build/sanitizers/asan_blacklist_win.txt
blob: 13b505272b48a9a34465ee28cf4deb134a93b3a5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
# This is originally copied from Chromium tools/memory/asan/blacklist_win.txt.
# The rules in this file are only applied at compile time. If you can modify the
# source in question, consider function attributes to disable instrumentation.

# Bug 1200740 - ASan crash due to child process function interceptions
# Sandbox executes some of its code before the ASan RTL gets initialized and
# maps shadow memory.  As a result, instrmented code tries to access unavailable
# shadow memory and faults.
fun:*TargetNtSetInformationThread@20
fun:*TargetNtOpenThreadToken@20
fun:*TargetNtOpenThreadTokenEx@24
fun:*TargetNtMapViewOfSection@44
fun:*AutoProtectMemory*sandbox*
fun:*EatResolverThunk*sandbox*
fun:*InterceptionAgent*sandbox*
fun:*ResolverThunk*sandbox*
fun:*Target*SandboxFactory*sandbox*
fun:*ProcessState*sandbox*
src:*pe_image.h
src:*pe_image.cc
src:*resolver_32.cc
src:*filesystem_interception.cc
src:*process_thread_interception.cc
src:*registry_interception.cc
src:*sandbox_nt_util.cc
src:*sync_interception.cc