CI: Disable sandboxing in fsanitize=address,undefined job.
commit5e3d890f8862a7d4fbef5e38e11b6c9fbd98f468
authorJia Tan <jiat0218@gmail.com>
Mon, 23 Oct 2023 16:50:08 +0000 (24 00:50 +0800)
committerJia Tan <jiat0218@gmail.com>
Mon, 23 Oct 2023 16:50:08 +0000 (24 00:50 +0800)
tree561269ccece05bc6dea24b6c901eaf7ec7d49b11
parentb1408987ea832e2760e478ae960a636df17a1363
CI: Disable sandboxing in fsanitize=address,undefined job.

The sandboxing on Linux now supports Landlock, which restricts all
supported filesystem actions after xz opens the files it needs. The
sandbox is only enabled when one file is input and we are writing to
standard out. With fsanitize=address,undefined, the instrumentation
needs to read additional files after the sandbox is in place. This
forces all xz based test to fail, so the sandbox must instead be
disabled.
.github/workflows/ci.yml