Comment #5 on issue 348 by [email protected]: asan does not always
detect access beyond mmaped page
https://code.google.com/p/address-sanitizer/issues/detail?id=348
tampering with mmap is risky.
If a user mmaps 32K small regions we will create 32K (or 64K?) redzone
pages and will exhaust the kernel limit of contiguous mappings.
This can be done under a flag though -- a patch is welcome.
Most of the code we care about does not use mmap directly so this
has never been a priority for us.
(glider, seccomp-bpf is a completely different story, let's not mix it here)
--
You received this message because this project is configured to send all
issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings
--
You received this message because you are subscribed to the Google Groups
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.