| Index: tools/memory/asan/blacklist_win.txt
|
| diff --git a/tools/memory/asan/blacklist_win.txt b/tools/memory/asan/blacklist_win.txt
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..97fed5590b19246a829ad96ed48199bd0e1b95a1
|
| --- /dev/null
|
| +++ b/tools/memory/asan/blacklist_win.txt
|
| @@ -0,0 +1,26 @@
|
| +# The rules in this file are only applied at compile time on Windows.
|
| +# Because the Chrome buildsystem does not automatically touch the files
|
| +# mentioned here, changing this file requires clobbering all ASan bots.
|
| +#
|
| +# Please think twice before you add or remove these rules.
|
| +
|
| +################################################################################
|
| +# Sandbox executes some of its code before the ASan RTL gets initialized and
|
| +# maps shadow memory. As a result, instrmented code tries to access unavailable
|
| +# shadow memory and faults.
|
| +# Temporarily disable instrumentation of that code until we come up with
|
| +# a better long-term solution. See http://crbug.com/382867 for details.
|
| +fun:*TargetNtSetInformationThread@20
|
| +fun:*TargetNtOpenThreadToken@20
|
| +fun:*TargetNtOpenThreadTokenEx@24
|
| +fun:*TargetNtMapViewOfSection@44
|
| +fun:*AutoProtectMemory*sandbox*
|
| +fun:*EatResolverThunk*sandbox*
|
| +fun:*InterceptionAgent*sandbox*
|
| +fun:*PolicyBase*sandbox*
|
| +fun:*ResolverThunk*sandbox*
|
| +fun:*Target*SandboxFactory*sandbox*
|
| +src:*pe_image.h
|
| +src:*pe_image.cc
|
| +src:*resolver_32.cc
|
| +################################################################################
|
|
|