Index: tools/memory/asan/blacklist_win.txt |
diff --git a/tools/memory/asan/blacklist_win.txt b/tools/memory/asan/blacklist_win.txt |
new file mode 100644 |
index 0000000000000000000000000000000000000000..97fed5590b19246a829ad96ed48199bd0e1b95a1 |
--- /dev/null |
+++ b/tools/memory/asan/blacklist_win.txt |
@@ -0,0 +1,26 @@ |
+# The rules in this file are only applied at compile time on Windows. |
+# Because the Chrome buildsystem does not automatically touch the files |
+# mentioned here, changing this file requires clobbering all ASan bots. |
+# |
+# Please think twice before you add or remove these rules. |
+ |
+################################################################################ |
+# Sandbox executes some of its code before the ASan RTL gets initialized and |
+# maps shadow memory. As a result, instrmented code tries to access unavailable |
+# shadow memory and faults. |
+# Temporarily disable instrumentation of that code until we come up with |
+# a better long-term solution. See http://crbug.com/382867 for details. |
+fun:*TargetNtSetInformationThread@20 |
+fun:*TargetNtOpenThreadToken@20 |
+fun:*TargetNtOpenThreadTokenEx@24 |
+fun:*TargetNtMapViewOfSection@44 |
+fun:*AutoProtectMemory*sandbox* |
+fun:*EatResolverThunk*sandbox* |
+fun:*InterceptionAgent*sandbox* |
+fun:*PolicyBase*sandbox* |
+fun:*ResolverThunk*sandbox* |
+fun:*Target*SandboxFactory*sandbox* |
+src:*pe_image.h |
+src:*pe_image.cc |
+src:*resolver_32.cc |
+################################################################################ |