diff options
author | Steve Harter <sharter@microsoft.com> | 2015-12-16 14:27:26 -0600 |
---|---|---|
committer | Steve Harter <sharter@microsoft.com> | 2016-01-21 15:23:16 -0600 |
commit | 00ac45086dd1f773431990f88336e44795c1fbe9 (patch) | |
tree | b2706ff87c19aef732aa10c37d08b51ce38006de /sanitizerblacklist.txt | |
parent | 2d2e591da6dac49bc762344430bf6c23257fcc79 (diff) | |
download | coreclr-00ac45086dd1f773431990f88336e44795c1fbe9.tar.gz coreclr-00ac45086dd1f773431990f88336e44795c1fbe9.tar.bz2 coreclr-00ac45086dd1f773431990f88336e44795c1fbe9.zip |
Reduce clr startup noise when using Clang sanitizers
Diffstat (limited to 'sanitizerblacklist.txt')
-rw-r--r-- | sanitizerblacklist.txt | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/sanitizerblacklist.txt b/sanitizerblacklist.txt new file mode 100644 index 0000000000..ec3313973b --- /dev/null +++ b/sanitizerblacklist.txt @@ -0,0 +1,14 @@ +# This file has exclusions to the Clang address sanitizer to suppress error reports +# When Clang 3.8 is available, convert these to suppression list instead as that is preferred for internal code + +# CMiniMdBase::UsesAllocatedMemory - suppress stack-buffer-underflow (code backs up pointer by -1 to check allocation ownership) +fun:_ZN11CMiniMdBase19UsesAllocatedMemoryEP11CMiniColDef + +# JIT_InitPInvokeFrame - suppress unknown sanitizer issue causing SEGV on unknown address 0x000000000000 +# 0 0x4e8a0c in __ubsan::checkDynamicType(void*, void*, unsigned long) +# 1 0x4e807f in HandleDynamicTypeCacheMiss(__ubsan::DynamicTypeCacheMissData*, unsigned long, unsigned long, __ubsan::ReportOptions) +# 2 0x4e8051 in __ubsan_handle_dynamic_type_cache_miss +# 3 0x7f02ce676cd8 in JIT_InitPInvokeFrame(InlinedCallFrame*, void*) /home/steveharter/git/dotnet_coreclr/src/vm/jithelpers.cpp:6491:9 +# 4 0x7f0252bbceb2 (<unknown module>) +fun:_Z20JIT_InitPInvokeFrameP16InlinedCallFramePv + |