asan_blacklist_win.txt (1085B)
1 # This is originally copied from Chromium tools/memory/asan/blacklist_win.txt. 2 # The rules in this file are only applied at compile time. If you can modify the 3 # source in question, consider function attributes to disable instrumentation. 4 5 # Bug 1200740 - ASan crash due to child process function interceptions 6 # Sandbox executes some of its code before the ASan RTL gets initialized and 7 # maps shadow memory. As a result, instrumented code tries to access unavailable 8 # shadow memory and faults. 9 fun:*TargetNtSetInformationThread* 10 fun:*TargetNtOpenThreadToken* 11 fun:*TargetNtOpenThreadTokenEx* 12 fun:*TargetNtMapViewOfSection* 13 fun:*AutoProtectMemory*sandbox* 14 fun:*EatResolverThunk*sandbox* 15 fun:*InterceptionAgent*sandbox* 16 fun:*ResolverThunk*sandbox* 17 fun:*Target*SandboxFactory*sandbox* 18 fun:*ProcessState*sandbox* 19 src:*pe_image.h 20 src:*pe_image.cc 21 src:*resolver_32.cc 22 src:*resolver_64.cc 23 src:*filesystem_interception.cc 24 src:*process_thread_interception.cc 25 src:*registry_interception.cc 26 src:*sandbox_nt_util.cc 27 src:*sync_interception.cc 28 src:*interceptors_64.cc