Closed Bug 1286413 Opened 3 years ago Closed 3 years ago
Seccomp sandbox violation: sys
_fchown32 called in content process of Firefox desktop
Crash reports show that sys_fchown32 is called in the content process: https://crash-stats.mozilla.com/search/?product=Firefox&reason=~SIGSYS&address=0xcf&_sort=-date&_facets=cpu_arch&_facets=address&_columns=date&_columns=signature&_columns=product&_columns=version&_columns=build_id&_columns=platform#crash-reports
We already had sys_fchown whitelisted, this just properly covers the case for all variants on 32 bit as well as 64 bit. Try push for build: https://treeherder.mozilla.org/#/jobs?repo=try&revision=150fcf52afbd
Assignee: nobody → julian.r.hector
Attachment #8770330 - Flags: review?(gpascutto)
Attachment #8770330 - Flags: review?(gpascutto) → review+
Fixed the bug number in the patch. Carry over r+ from :gcp.
Pushed by email@example.com: https://hg.mozilla.org/integration/mozilla-inbound/rev/9e2b738c7966 Add CASES_FOR_fchown and use it. r=gcp
Crash Signature: [@ libc-2.19.so@0xdc4c6 ]
You need to log in before you can comment on or make changes to this bug.