Closed
Bug 1102209
Opened 10 years ago
Closed 10 years ago
Remove use of CodeGen::JoinInstructions in the Linux sandboxing code.
Categories
(Core :: Security, defect)
Core
Security
Tracking
()
RESOLVED
FIXED
mozilla37
People
(Reporter: bobowen, Assigned: jld)
References
Details
Attachments
(1 file)
(deleted),
patch
|
kang
:
review+
|
Details | Diff | Splinter Review |
In Chromium commit 91577b8fe31f32ad6a5fcbf30632e30d80278854 they removed the function CodeGen::JoinInstructions from sandbox/linux/seccomp-bpf/codegen.h and we currently use it in security/sandbox/linux/SandboxAssembler.cpp
This currently prevents us from updating past this commit.
Assignee | ||
Comment 1•10 years ago
|
||
I can get rid of the Deny() items in SandboxFilter.cpp by moving them into code in the SIGSYS handler, since at least some of that already needs to happen for bug 1088387 (and fake syscall failure isn't performance-critical), and then this is a simple matter of accumulating the SandboxAssembler::Condition objects corresponding to what's allowed and iterating them in reverse.
Assignee: nobody → jld
Assignee | ||
Comment 2•10 years ago
|
||
(In reply to Jed Davis [:jld] from comment #1)
> I can get rid of the Deny() items in SandboxFilter.cpp by moving them into
> code in the SIGSYS handler
On second thought, this can and should wait until after the Chromium sandbox compiler is in use, so that the sandbox policy can stay in one place instead of being divided between SandboxFilter.cpp and Sandbox.cpp (more so than it already is).
Assignee | ||
Comment 3•10 years ago
|
||
See commit message for more explanation.
Try: https://treeherder.mozilla.org/ui/#/jobs?repo=try&revision=a10b997475eb
Attachment #8531922 -
Flags: review?(gdestuynder)
Comment on attachment 8531922 [details] [diff] [review]
bug1102209-sandbox-assemble-order-hg0.diff
Review of attachment 8531922 [details] [diff] [review]:
-----------------------------------------------------------------
s/progrem/program :) (commit msg)
Do you know if we have a better performance test for similar changes? In the past, it was mostly checking the average ms to return from syscalls, manually verified. I don't think there's a measurable difference in this case, but it would be nice to run a regular check I guess.
Attachment #8531922 -
Flags: review?(gdestuynder) → review+
Assignee | ||
Comment 5•10 years ago
|
||
(In reply to Guillaume Destuynder [:kang] from comment #4)
> s/progrem/program :) (commit msg)
Thanks.
> Do you know if we have a better performance test for similar changes? In the
> past, it was mostly checking the average ms to return from syscalls,
> manually verified. I don't think there's a measurable difference in this
> case, but it would be nice to run a regular check I guess.
We don't need to care about this yet, because this doesn't change the filter program. I've verified this by running with MOZ_SANDBOX_VERBOSE set and diffing the BPF disassembly; the only change is to the getpid() value used for tgkill.
Assignee | ||
Comment 6•10 years ago
|
||
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla37
You need to log in
before you can comment on or make changes to this bug.
Description
•