Bug 1146192 - Whitelist sched_yield syscall in GMP sandbox on Linux DONTBUILD CLOSED TREE - r=jld
authorEdwin Flores <eflores@mozilla.com>
Tue, 24 Mar 2015 10:56:49 +1300
changeset 235135 906d30061f7652f451f79a823e3c1cc29f721778
parent 235134 84b52c0b3bd16213a0a634b1d1037ccaeeadf367
child 235136 17a3ab95bb74fe8bedb59d39ff7de654e8f7b5d8
push id57350
push usereflores@mozilla.com
push dateMon, 23 Mar 2015 21:59:01 +0000
treeherdermozilla-inbound@906d30061f76 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersjld
bugs1146192
milestone39.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Bug 1146192 - Whitelist sched_yield syscall in GMP sandbox on Linux DONTBUILD CLOSED TREE - r=jld
security/sandbox/linux/SandboxFilter.cpp
--- a/security/sandbox/linux/SandboxFilter.cpp
+++ b/security/sandbox/linux/SandboxFilter.cpp
@@ -364,16 +364,17 @@ void SandboxFilterImplGMP::Build() {
   Allow(SYSCALL(poll));
   Allow(SYSCALL(write));
   Allow(SYSCALL(read));
   Allow(SYSCALL(epoll_wait));
   Allow(SYSCALL(epoll_pwait));
   Allow(SOCKETCALL(recvmsg, RECVMSG));
   Allow(SOCKETCALL(sendmsg, SENDMSG));
   Allow(SYSCALL(time));
+  Allow(SYSCALL(sched_yield));
 
   // Nothing after this line is performance-critical.
 
 #if SYSCALL_EXISTS(mmap2)
   Allow(SYSCALL(mmap2));
 #else
   Allow(SYSCALL(mmap));
 #endif