From 36d22d82aa202bb199967e9512281e9a53db42c9 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 21:33:14 +0200 Subject: Adding upstream version 115.7.0esr. Signed-off-by: Daniel Baumann --- build/sanitizers/asan_blacklist_win.txt | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 build/sanitizers/asan_blacklist_win.txt (limited to 'build/sanitizers/asan_blacklist_win.txt') diff --git a/build/sanitizers/asan_blacklist_win.txt b/build/sanitizers/asan_blacklist_win.txt new file mode 100644 index 0000000000..3bc19ba437 --- /dev/null +++ b/build/sanitizers/asan_blacklist_win.txt @@ -0,0 +1,28 @@ +# This is originally copied from Chromium tools/memory/asan/blacklist_win.txt. +# The rules in this file are only applied at compile time. If you can modify the +# source in question, consider function attributes to disable instrumentation. + +# Bug 1200740 - ASan crash due to child process function interceptions +# Sandbox executes some of its code before the ASan RTL gets initialized and +# maps shadow memory. As a result, instrumented code tries to access unavailable +# shadow memory and faults. +fun:*TargetNtSetInformationThread* +fun:*TargetNtOpenThreadToken* +fun:*TargetNtOpenThreadTokenEx* +fun:*TargetNtMapViewOfSection* +fun:*AutoProtectMemory*sandbox* +fun:*EatResolverThunk*sandbox* +fun:*InterceptionAgent*sandbox* +fun:*ResolverThunk*sandbox* +fun:*Target*SandboxFactory*sandbox* +fun:*ProcessState*sandbox* +src:*pe_image.h +src:*pe_image.cc +src:*resolver_32.cc +src:*resolver_64.cc +src:*filesystem_interception.cc +src:*process_thread_interception.cc +src:*registry_interception.cc +src:*sandbox_nt_util.cc +src:*sync_interception.cc +src:*interceptors_64.cc -- cgit v1.2.3