Closed Bug 1290761 Opened 9 years ago Closed 9 years ago

Allow running jprof with sandbox enabled

Categories

(Core :: Security: Process Sandboxing, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla51
Tracking Status
firefox51 --- fixed

People

(Reporter: dbaron, Assigned: dbaron)

References

Details

Attachments

(1 file)

jprof is an in-tree profiling tool that runs on Linux. This fixes the error: Sandbox: seccomp sandbox violation: pid 29698, syscall 38, args 0 140731305513136 0 830 22509600 1. Killing process. Sandbox: crash reporter is disabled (or failed); trying stack trace: Sandbox: frame #01: __GI_setitimer (/build/glibc-GKVZIf/glibc-2.23/time/../sysdeps/unix/syscall-template.S:84) Sandbox: frame #02: startSignalCounter(unsigned long) (.../mozilla-central/mozilla/tools/jprof/stub/libmalloc.cpp:464) which occurs during shutdown when running with jprof enabled via the JPROF_FLAGS environment variable containing JP_DEFER without actually sending the signal to start jprof. It presumably occurs sooner if jprof is actually used either via JP_START or by senging a SIGPROF/SIGALRM. With the patch, these steps run to completion. MozReview-Commit-ID: Fx4tzEyqIj2
Comment on attachment 8776417 [details] [diff] [review] Allow running jprof with sandbox enabled Review of attachment 8776417 [details] [diff] [review]: ----------------------------------------------------------------- The system call in question: sys_setitimer() seem to be harmless and it is only whitelisted for JPROF. lgtm.
Attachment #8776417 - Flags: review?(julian.r.hector) → review+
Status: ASSIGNED → RESOLVED
Closed: 9 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla51
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: