ramosian-glider / sanitizer-issues

test
0 stars 0 forks source link

ASan does not play well with the seccomp sandbox on Linux #90

Closed ramosian-glider closed 9 years ago

ramosian-glider commented 9 years ago

Originally reported on Google Code with ID 90

Seccomp sandbox (http://code.google.com/p/seccompsandbox/wiki/overview) restricts the
list of syscalls allowed for a certain thread to execute (see e.g. https://src.chromium.org/viewvc/chrome/trunk/src/content/common/sandbox_init_linux.cc?view=markup)

This may become a problem if ASan calls a syscall that's forbidden in the current process,
so it may be a good idea to get rid of the unnecessary syscalls in our runtime. open()
is the first candidate.

Reported by ramosian.glider on 2012-07-18 12:42:22

ramosian-glider commented 9 years ago

Reported by ramosian.glider on 2013-01-14 14:13:36

ramosian-glider commented 9 years ago
Adding Project:AddressSanitizer as part of GitHub migration.

Reported by ramosian.glider on 2015-07-30 09:12:59