Comment #5 on issue 348 by [email protected]: asan does not always detect access beyond mmaped page
https://code.google.com/p/address-sanitizer/issues/detail?id=348

tampering with mmap is risky.
If a user mmaps 32K small regions we will create 32K (or 64K?) redzone pages and will exhaust the kernel limit of contiguous mappings.

This can be done under a flag though -- a patch is welcome.

Most of the code we care about does not use mmap directly so this
has never been a priority for us.

(glider, seccomp-bpf is a completely different story, let's not mix it here)

--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to