mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-10-20 00:35:44 +00:00
cd96536b38
resolver_64.cc should have been on the list all along, because the InternalThunk constructor runs before ASan init. It was probably just accident (maybe inlining?) that we got away with not including it in the past. Differential Revision: https://phabricator.services.mozilla.com/D89669
29 lines
1.1 KiB
Plaintext
29 lines
1.1 KiB
Plaintext
# This is originally copied from Chromium tools/memory/asan/blacklist_win.txt.
|
|
# The rules in this file are only applied at compile time. If you can modify the
|
|
# source in question, consider function attributes to disable instrumentation.
|
|
|
|
# Bug 1200740 - ASan crash due to child process function interceptions
|
|
# Sandbox executes some of its code before the ASan RTL gets initialized and
|
|
# maps shadow memory. As a result, instrumented code tries to access unavailable
|
|
# shadow memory and faults.
|
|
fun:*TargetNtSetInformationThread*
|
|
fun:*TargetNtOpenThreadToken*
|
|
fun:*TargetNtOpenThreadTokenEx*
|
|
fun:*TargetNtMapViewOfSection*
|
|
fun:*AutoProtectMemory*sandbox*
|
|
fun:*EatResolverThunk*sandbox*
|
|
fun:*InterceptionAgent*sandbox*
|
|
fun:*ResolverThunk*sandbox*
|
|
fun:*Target*SandboxFactory*sandbox*
|
|
fun:*ProcessState*sandbox*
|
|
src:*pe_image.h
|
|
src:*pe_image.cc
|
|
src:*resolver_32.cc
|
|
src:*resolver_64.cc
|
|
src:*filesystem_interception.cc
|
|
src:*process_thread_interception.cc
|
|
src:*registry_interception.cc
|
|
src:*sandbox_nt_util.cc
|
|
src:*sync_interception.cc
|
|
src:*interceptors_64.cc
|