]>
Commit | Line | Data |
---|---|---|
1 | # This file declares the list of source files that should be exempt from | |
2 | # AddressSanitizer instrumentation. Usually, this is because a file is used by | |
3 | # the AddressSanitizer runtime itself, or because the code executes before | |
4 | # the runtime has been initialized. | |
5 | ||
6 | [.*] | |
7 | ||
8 | # Blanket ignore non-sanitized functions | |
9 | fun:__nosan_* | |
10 | ||
11 | # Try really hard to avoid panicing while debugging | |
12 | src:./osfmk/kdp/* | |
13 | src:./osfmk/kern/debug.c | |
14 | ||
15 | [address] | |
16 | ||
17 | # Exclude linker sets | |
18 | type:struct linker_set_entry | |
19 | type:linker_set_entry | |
20 | ||
21 | # Exclude KASAN itself | |
22 | src:./san/kasan.c | |
23 | src:./san/kasan-fakestack.c | |
24 | src:./san/kasan-x86_64.c | |
25 | src:./san/kasan-memintrinsics.c | |
26 | src:./san/kasan_dynamic_blacklist.c | |
27 | ||
28 | # Exclude dtrace function that does weird stack manipulations | |
29 | fun:fbt_perfCallback | |
30 | ||
31 | # Exclude leak detection code that reads all memory | |
32 | fun:_ZL18IOTrackingLeakScanPv | |
33 | ||
34 | # Exclude KASAN dependencies | |
35 | # XXX: could this be relaxed since fakestack is reentrant? | |
36 | src:./osfmk/kern/zalloc.c | |
37 | src:./osfmk/kern/zcache.c | |
38 |