Closed GoogleCodeExporter closed 9 years ago
Alex is playing with running asan under various sanboxes, so he may have some
ideas.
But we do need /proc for various reasons.
We can not stop using it completely because it will cripple the tool.
We don't want to have two code paths (one when /proc exists and one when not)
because it will complicate the tool, which is already too complex for my taste.
We are open for suggestions. :)
Original comment by konstant...@gmail.com
on 31 Oct 2013 at 9:19
Perhaps AS could, as an option, automatically
mount -o bind /proc/<pid> /chroot/proc/<pid>
on detecting the 'chroot' call. Or maybe
just open the /proc/<pid> directory
via the /proc/self auto-symlink at that
time, though this has the potential to
open a door to jail escape. My thought
is to minimize how much of /proc is
exposed to a potential attacker.
In that same vein I find the new
kernel 'seccomp' BPF capability
enticing. It's all about minimizing
attack surface.
Original comment by starligh...@gmail.com
on 31 Oct 2013 at 10:00
Because /proc is unavailable in Chrome's sandboxes, we cache the contents of
/proc/self/maps (which generally don't change because no libraries are loaded
once the sandbox is enabled).
Will that work for you?
The client program just needs to call __sanitizer_sandbox_on_notify(NULL)
before chrooting to make ASan save the contents of /proc/self/maps
Original comment by ramosian.glider@gmail.com
on 26 Dec 2013 at 3:22
Excellent! That works perfect. Thank you very much! Sorry for slow reply.
Original comment by starligh...@gmail.com
on 3 Jan 2014 at 4:22
Looks like there's no action needed on our side here.
Original comment by samso...@google.com
on 16 Jan 2014 at 6:59
Original issue reported on code.google.com by
starligh...@gmail.com
on 31 Oct 2013 at 9:01