• Samuel Groß's avatar
    [sandbox] Implement sandbox crash filter · 059903de
    Samuel Groß authored
    If enabled, a signal handler is installed which intercepts memory access
    violations (e.g. SIGSEGV) and checks whether they occurred inside the
    sandbox address space, in which case the process is terminated cleanly
    as this does not represent a (security) issue with the sandbox. However,
    if the access violation occurred outside the sandbox, the access
    violation is forwarded to the original signal handler.
    
    The filter can be enabled in d8 by specifying
    --enable-sandbox-crash-filter.
    
    Bug: v8:12878
    Change-Id: If9d76267e90ee79ee81ab793d7774afed6226b7c
    Cq-Include-Trybots: luci.v8.try:v8_linux64_heap_sandbox_dbg_ng,v8_linux_arm64_sim_heap_sandbox_dbg_ng
    Reviewed-on: https://chromium-review.googlesource.com/c/v8/v8/+/3688408Reviewed-by: 's avatarCamillo Bruni <cbruni@chromium.org>
    Commit-Queue: Samuel Groß <saelo@chromium.org>
    Reviewed-by: 's avatarIgor Sheludko <ishell@chromium.org>
    Cr-Commit-Position: refs/heads/main@{#80999}
    059903de
bootstrapper.cc 291 KB