Source code

Revision control

Copy as Markdown

Other Tools

# This is originally copied from Chromium tools/memory/asan/blacklist_win.txt.↩
# The rules in this file are only applied at compile time. If you can modify the↩
# source in question, consider function attributes to disable instrumentation.↩
# Bug 1200740 - ASan crash due to child process function interceptions↩
# Sandbox executes some of its code before the ASan RTL gets initialized and↩
# maps shadow memory. As a result, instrumented code tries to access unavailable↩
# shadow memory and faults.↩
fun:*TargetNtSetInformationThread*↩
fun:*TargetNtOpenThreadToken*↩
fun:*TargetNtOpenThreadTokenEx*↩
fun:*TargetNtMapViewOfSection*↩
fun:*AutoProtectMemory*sandbox*↩
fun:*EatResolverThunk*sandbox*↩
fun:*InterceptionAgent*sandbox*↩
fun:*ResolverThunk*sandbox*↩
fun:*Target*SandboxFactory*sandbox*↩
fun:*ProcessState*sandbox*↩
src:*pe_image.h↩
src:*pe_image.cc↩
src:*resolver_32.cc↩
src:*resolver_64.cc↩
src:*filesystem_interception.cc↩
src:*process_thread_interception.cc↩
src:*registry_interception.cc↩
src:*sandbox_nt_util.cc↩
src:*sync_interception.cc↩
src:*interceptors_64.cc↩