Skip to content

GitLab

  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • Adélie Package Tree Adélie Package Tree
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 384
    • Issues 384
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 20
    • Merge requests 20
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Releases
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Adélie Linux
  • Adélie Package TreeAdélie Package Tree
  • Issues
  • #284
Closed
Open
Created May 10, 2020 by Emily@emily🤖

user/firefox-esr seccomp is blocking time64 syscalls

Bugzilla ID 284
Reporter Max Rees (sroracle)
Assignee Max Rees (sroracle)
Reported 2020-05-10 18:51:40 -0500
Modified 2020-06-10 15:37:31 -0500
Status RESOLVED FIXED
Version 1.0-RC1
Hardware Adélie Linux / All
Importance --- / major

Description

On pmmx with firefox-esr=68.4.1-r0, as soon as firefox is started it can be observed that it spams the console with messages like these:

Sandbox: seccomp sandbox violation: pid 5607, tid 5607, syscall 403, args 1 3215982588 3215982588 0 1 3215982488.

On pmmx, syscall 403 is clock_gettime64. I suspect this issue affects all of the time64 syscalls on all of our 32-bit arches. It's hard to tell since it's so slow on the pmmx machine I have, but it seems to prevent loading of any pages.

Assignee
Assign to
Time tracking