1 # This is originally copied from Chromium tools/memory/asan/blacklist_win.txt.
\r
2 # The rules in this file are only applied at compile time. If you can modify the
\r
3 # source in question, consider function attributes to disable instrumentation.
\r
5 # Bug 1200740 - ASan crash due to child process function interceptions
\r
6 # Sandbox executes some of its code before the ASan RTL gets initialized and
\r
7 # maps shadow memory. As a result, instrumented code tries to access unavailable
\r
8 # shadow memory and faults.
\r
9 fun:*TargetNtSetInformationThread*
\r
10 fun:*TargetNtOpenThreadToken*
\r
11 fun:*TargetNtOpenThreadTokenEx*
\r
12 fun:*TargetNtMapViewOfSection*
\r
13 fun:*AutoProtectMemory*sandbox*
\r
14 fun:*EatResolverThunk*sandbox*
\r
15 fun:*InterceptionAgent*sandbox*
\r
16 fun:*ResolverThunk*sandbox*
\r
17 fun:*Target*SandboxFactory*sandbox*
\r
18 fun:*ProcessState*sandbox*
\r
22 src:*filesystem_interception.cc
\r
23 src:*process_thread_interception.cc
\r
24 src:*registry_interception.cc
\r
25 src:*sandbox_nt_util.cc
\r
26 src:*sync_interception.cc
\r
27 src:*interceptors_64.cc
\r