Seccomp sandbox (http://code.google.com/p/seccompsandbox/wiki/overview) restricts the
list of syscalls allowed for a certain thread to execute (see e.g. https://src.chromium.org/viewvc/chrome/trunk/src/content/common/sandbox_init_linux.cc?view=markup)
This may become a problem if ASan calls a syscall that's forbidden in the current process,
so it may be a good idea to get rid of the unnecessary syscalls in our runtime. open()
is the first candidate.
Reported by ramosian.glider on 2012-07-18 12:42:22
Originally reported on Google Code with ID 90
Reported by
ramosian.glider
on 2012-07-18 12:42:22