-
Notifications
You must be signed in to change notification settings - Fork 641
Open
Description
When we randomize mmaps during chaos mode, we try to avoid the ranges used by ASAN (e.g.
Line 2302 in 80981f6
| sanitizer_exclude_memory_ranges.push_back(asan_allocator_reserved2); |
Tyson has a trace where we randomize librrpreload.so to be at exactly the address we believe an ASAN range ends. However, because of the AdditionalSize(), the first two pages of librrpreload.so get wiped out by ASAN and we blow up. In Tyson's trace AdditionalSize() is 2 * PAGE_SIZE, but I don't know if it can be bigger on any other platform we care about.
Metadata
Metadata
Assignees
Labels
No labels