mirror of
https://chromium.googlesource.com/libyuv/libyuv
synced 2025-12-08 01:36:47 +08:00
UBsan goes into an infinite recursion when __dynamic_cast instrumented with "vptr". See crbug.com/609786. Similar WebRTC change: https://codereview.webrtc.org/2983583002 BUG=None TBR=fbarchard@chromium.org Change-Id: Ia37635e639550d60f9a79df927447c7cfaacdc93 Reviewed-on: https://chromium-review.googlesource.com/671367 Commit-Queue: Henrik Kjellander <kjellander@chromium.org> Reviewed-by: Henrik Kjellander <kjellander@chromium.org>
26 lines
1.1 KiB
Plaintext
26 lines
1.1 KiB
Plaintext
#############################################################################
|
|
# UBSan vptr blacklist.
|
|
# Function and type based blacklisting use a mangled name, and it is especially
|
|
# tricky to represent C++ types. For now, any possible changes by name manglings
|
|
# are simply represented as wildcard expressions of regexp, and thus it might be
|
|
# over-blacklisted.
|
|
#
|
|
# Please think twice before you add or remove these rules.
|
|
#
|
|
# This is a stripped down copy of Chromium's vptr_blacklist.txt, to enable
|
|
# adding libyuv-specific blacklist entries.
|
|
|
|
#############################################################################
|
|
# Using raw pointer values.
|
|
#
|
|
# A raw pointer value (16) is used to infer the field offset by
|
|
# GOOGLE_PROTOBUF_GENERATED_MESSAGE_FIELD_OFFSET.
|
|
|
|
# Example:
|
|
# src:*/third_party/protobuf/src/google/protobuf/compiler/plugin.pb.cc
|
|
|
|
#############################################################################
|
|
# UBsan goes into an infinite recursion when __dynamic_cast instrumented with
|
|
# "vptr". See crbug.com/609786.
|
|
src:*/third_party/libc\+\+abi/trunk/src/private_typeinfo.cpp
|