Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(404)

Side by Side Diff: tools/memory/asan/blacklist_win.txt

Issue 1398133002: Remove stale comment warning about blacklist updates requiring a clobber build (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « tools/memory/asan/blacklist.txt ('k') | tools/memory/tsan_v2/ignores.txt » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # The rules in this file are only applied at compile time on Windows. 1 # The rules in this file are only applied at compile time. If you can modify the
2 # Because the Chrome buildsystem does not automatically touch the files 2 # source in question, consider function attributes to disable instrumentation.
3 # mentioned here, changing this file requires clobbering all ASan bots.
4 # 3 #
5 # Please think twice before you add or remove these rules. 4 # Please think twice before you add or remove these rules.
6 5
7 ################################################################################ 6 ################################################################################
8 # Sandbox executes some of its code before the ASan RTL gets initialized and 7 # Sandbox executes some of its code before the ASan RTL gets initialized and
9 # maps shadow memory. As a result, instrmented code tries to access unavailable 8 # maps shadow memory. As a result, instrmented code tries to access unavailable
10 # shadow memory and faults. 9 # shadow memory and faults.
11 # Temporarily disable instrumentation of that code until we come up with 10 # Temporarily disable instrumentation of that code until we come up with
12 # a better long-term solution. See http://crbug.com/382867 for details. 11 # a better long-term solution. See http://crbug.com/382867 for details.
13 fun:*TargetNtSetInformationThread@20 12 fun:*TargetNtSetInformationThread@20
14 fun:*TargetNtOpenThreadToken@20 13 fun:*TargetNtOpenThreadToken@20
15 fun:*TargetNtOpenThreadTokenEx@24 14 fun:*TargetNtOpenThreadTokenEx@24
16 fun:*TargetNtMapViewOfSection@44 15 fun:*TargetNtMapViewOfSection@44
17 fun:*AutoProtectMemory*sandbox* 16 fun:*AutoProtectMemory*sandbox*
18 fun:*EatResolverThunk*sandbox* 17 fun:*EatResolverThunk*sandbox*
19 fun:*InterceptionAgent*sandbox* 18 fun:*InterceptionAgent*sandbox*
20 fun:*ResolverThunk*sandbox* 19 fun:*ResolverThunk*sandbox*
21 fun:*Target*SandboxFactory*sandbox* 20 fun:*Target*SandboxFactory*sandbox*
22 fun:*ProcessState*sandbox* 21 fun:*ProcessState*sandbox*
23 src:*pe_image.h 22 src:*pe_image.h
24 src:*pe_image.cc 23 src:*pe_image.cc
25 src:*resolver_32.cc 24 src:*resolver_32.cc
26 src:*filesystem_interception.cc 25 src:*filesystem_interception.cc
27 src:*process_thread_interception.cc 26 src:*process_thread_interception.cc
28 src:*registry_interception.cc 27 src:*registry_interception.cc
29 src:*sandbox_nt_util.cc 28 src:*sandbox_nt_util.cc
30 src:*sync_interception.cc 29 src:*sync_interception.cc
31 ################################################################################ 30 ################################################################################
OLDNEW
« no previous file with comments | « tools/memory/asan/blacklist.txt ('k') | tools/memory/tsan_v2/ignores.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698