--
Justin,
do you know if sched_getaffinity is allowed under the sandbox? If not,
is it a necessary measure?
Thanks for the report. That's not the setuid sandbox, that's the
seccomp sandbox with BPF filters. If you have the crashdump, you can
see that the syscall number should have gotten dereferenced as an
address. [1]
This is a temporary mode to catch reports early on problems that will
arise with the current policy. We'll soon turn it to a different mode
to let it degrade gracefully on syscall denies via errno. In the
meantime (and perhaps even in the future), I don't think it's an issue
to allow this syscall.
Is there anything else you foresee ASAN might need?
Julien
[1] https://src.chromium.org/viewvc/chrome/trunk/src/content/common/sandbox_init_linux.cc?view=markup&pathrev=132266
(SIGSYS_Handler)
On Sat, May 5, 2012 at 9:23 AM, Denis Glotov <glo...@chromium.org> wrote:
Julien, the address being de-referenced was 0x0000020250cc. So the call causing the signal was 0xCC: __NR_sched_getaffinity. This agrees to the stack dump I posted in the initial mail.I locally added EmitAllowSyscall(__NR_sched_getaffinity, program) to the ApplyGPUPolicy(), but things remained the same. Anything else should be done?BTW, we use --disable-seccomp-sandbox, that's why I thought seccomp sandbox is off. Is the flag ignored?
The seccomp sandbox is in transition so for now use--disable-seccomp-filter-sandbox