[tor-bugs] #20063 [Core Tor/Tor]: Permit sched_yield in sandbox
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue Sep 13 13:53:26 UTC 2016
#20063: Permit sched_yield in sandbox
----------------------------+------------------------------------
Reporter: nickm | Owner: nickm
Type: defect | Status: needs_review
Priority: Medium | Milestone: Tor: 0.2.9.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: review-group-8 | Actual Points: 0
Parent ID: | Points: 0
Reviewer: | Sponsor:
----------------------------+------------------------------------
Comment (by nickm):
> Hmm, is there a way to reproduce this problem, so that we can test the
fix?
That's going to depend on your exact asan implementation; GCC and Clang
are different a lot, and different versions of each will differ from one
another. I think I ran into this problem with the asan from GCC 6.1.1.
> Should we only whitelist those syscalls if and only if ASAN is enabled?
Because IIUC, now they are whitelisted for all builds.
I think the calls are harmless, and we can just whitelist them generally,
but I wouldn't mind if somebody had a look.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20063#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list