build/sanitizers/asan_blacklist_win.txt
author Emilio Cobos Álvarez <emilio@crisal.io>
Fri, 16 Feb 2018 20:34:46 +0100
changeset 404634 a43a60bb3a90032950ff76cd6fb153562930c246
parent 393193 0d35ca30f78dec1a5a506175aa307bb768cc3084
permissions -rw-r--r--
Bug 1439027: Simplify PresShell::Initialize. r=bz Most of the callers pass the already-existing pres-context visible area. The few that don't can set it themselves. MozReview-Commit-ID: KRi4ShrgOrE

# This is originally copied from Chromium tools/memory/asan/blacklist_win.txt.
# The rules in this file are only applied at compile time. If you can modify the
# source in question, consider function attributes to disable instrumentation.

# Bug 1200740 - ASan crash due to child process function interceptions
# Sandbox executes some of its code before the ASan RTL gets initialized and
# maps shadow memory.  As a result, instrumented code tries to access unavailable
# shadow memory and faults.
fun:*TargetNtSetInformationThread*
fun:*TargetNtOpenThreadToken*
fun:*TargetNtOpenThreadTokenEx*
fun:*TargetNtMapViewOfSection*
fun:*AutoProtectMemory*sandbox*
fun:*EatResolverThunk*sandbox*
fun:*InterceptionAgent*sandbox*
fun:*ResolverThunk*sandbox*
fun:*Target*SandboxFactory*sandbox*
fun:*ProcessState*sandbox*
src:*pe_image.h
src:*pe_image.cc
src:*resolver_32.cc
src:*filesystem_interception.cc
src:*process_thread_interception.cc
src:*registry_interception.cc
src:*sandbox_nt_util.cc
src:*sync_interception.cc
src:*interceptors_64.cc