chromium/tools/memory/asan/blocklist_win.txt

# The rules in this file are only applied at compile time. If you can modify the
# source in question, consider function attributes to disable instrumentation.
#
# Please think twice before you add or remove these rules.

[address]

################################################################################
# Sandbox executes some of its code before the ASan RTL gets initialized and
# maps shadow memory.  As a result, instrmented code tries to access unavailable
# shadow memory and faults.
# Temporarily disable instrumentation of that code until we come up with
# a better long-term solution.  See http://crbug.com/382867 for details.
fun:*TargetNtSetInformationThread@20
fun:*TargetNtOpenThreadToken@20
fun:*TargetNtOpenThreadTokenEx@24
fun:*TargetNtMapViewOfSection@44
fun:*AutoProtectMemory*sandbox*
fun:*EatResolverThunk*sandbox*
fun:*InterceptionAgent*sandbox*
fun:*ResolverThunk*sandbox*
fun:*Target*SandboxFactory*sandbox*
fun:*ProcessState*sandbox*

# These functions run pre-binding in the 64 bit build, when the shadow is not
# available, and thus can't be instrumented.
fun:*InternalThunk*
fun:*TargetNtCreateFile64
fun:*TargetNtMapViewOfSection*
fun:*TargetNtOpenFile64
fun:*TargetNtOpenProcessToken64
fun:*TargetNtOpenThreadToken*
fun:*TargetNtQueryAttributesFile64
fun:*TargetNtSetInformationThread
fun:*TargetNtSetInformationThread64
fun:*TargetNtUnmapViewOfSection64

src:*filesystem_interception.cc
src:*interceptors_64.cc
src:*pe_image.cc
src:*pe_image.h
src:*process_thread_interception.cc
src:*registry_interception.cc
src:*resolver_32.cc
src:*sandbox_nt_util.cc
src:*signed_interception.cc
src:*sync_interception.cc
################################################################################