Closed Bug 1285946 Opened 9 years ago Closed 9 years ago

Seccomp sandbox violation: sys_readv called in content process of Firefox desktop

Categories

(Core :: Security: Process Sandboxing, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla50
Tracking Status
firefox50 --- fixed

People

(Reporter: tedd, Assigned: tedd)

References

Details

Crash Data

Attachments

(1 file)

Crash reports show that sys_readv is called in the content process: https://crash-stats.mozilla.com/search/?product=Firefox&reason=~SIGSYS&address=0x13&_sort=-date&_facets=cpu_arch&_facets=address&_columns=date&_columns=signature&_columns=product&_columns=version&_columns=build_id&_columns=platform#crash-reports According to the man page, readv(2) is similar to read(2) except that it fills multiple buffers, so there shouldn't be a reason not to whitelist it.
Assignee: nobody → julian.r.hector
Attachment #8769750 - Flags: review?(gpascutto)
Comment on attachment 8769750 [details] [diff] [review] Add sys_readv to seccomp whitelist. r=gcp Review of attachment 8769750 [details] [diff] [review]: ----------------------------------------------------------------- Underlying caller is ALSA as well.
Attachment #8769750 - Flags: review?(gpascutto) → review+
Keywords: checkin-needed
Keywords: checkin-needed
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla50
Crash Signature: [@ libc-2.21.so@0xe139d ]
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: