Open Bug 1198515 Opened 7 years ago Updated 5 years ago

Profiler opens files for every loaded object in sandboxed content processes


(Core :: Security: Process Sandboxing, defect, P3)




Tracking Status
firefox43 --- affected


(Reporter: jld, Unassigned)



(Whiteboard: sb+)

See `getId` at the top of tools/profiler/core/; the “file identifier” stuff finds and opens and reads the file in question, even if everything it needs is in the process's extant memory mappings.  This is applied to every object loaded into the address space — all libraries, the executable, and the dynamic linker.  It even tries to open non-files like "[vdso]", but that can be ignored here.

So I'll need to whitelist all of that for bug 930258 (on top of having to whitelist library directories for dynamic loading, which is bug 1026356), but there might be a better way to handle this.
See Also: → 1198550
Whiteboard: sb+
Priority: -- → P3
You need to log in before you can comment on or make changes to this bug.