DescriptionContext: we're using seccomp-bpf for multiprocess Gecko, and in particular we're using SECCOMP_RET_TRAP on developer builds to raise SIGSYS, to allow debugging the sandbox violation. This patch causes breakpad to catch the SIGSYS and handle it like other types of crash, so we can do something useful when sandbox violations are discovered by our automated tests. However, we can't just return from the SIGSYS handler to reraise it (as with SIGSEGV), because the signal context's PC is the next instruction after the system call instruction that caused it, so it has to be special-cased. Note: this patch is based on the patch from issue 984002. Patch Set 1 #
MessagesTotal messages: 10
|