summaryrefslogtreecommitdiff
path: root/user/firefox-esr/seccomp-musl.patch
diff options
context:
space:
mode:
authorA. Wilcox <awilcox@wilcox-tech.com>2020-06-04 01:08:19 +0000
committerA. Wilcox <awilcox@wilcox-tech.com>2020-06-04 01:08:19 +0000
commit925fabf5441a16a7d347fed2b3bd36ef46fc1f62 (patch)
treeb94adbbf7965292c0a94e6ab8719bacbc73efa7e /user/firefox-esr/seccomp-musl.patch
parent62d1b55bc2450280702234aa414761df0865332b (diff)
parent98a725069b0538ef835c6aed5895425b52db7e0e (diff)
downloadpackages-925fabf5441a16a7d347fed2b3bd36ef46fc1f62.tar.gz
packages-925fabf5441a16a7d347fed2b3bd36ef46fc1f62.tar.bz2
packages-925fabf5441a16a7d347fed2b3bd36ef46fc1f62.tar.xz
packages-925fabf5441a16a7d347fed2b3bd36ef46fc1f62.zip
Merge branch 'sec/2020.05.10' into 'master'
Security updates for 2020.05.10 See merge request adelie/packages!448
Diffstat (limited to 'user/firefox-esr/seccomp-musl.patch')
-rw-r--r--user/firefox-esr/seccomp-musl.patch49
1 files changed, 49 insertions, 0 deletions
diff --git a/user/firefox-esr/seccomp-musl.patch b/user/firefox-esr/seccomp-musl.patch
new file mode 100644
index 000000000..edd4a3024
--- /dev/null
+++ b/user/firefox-esr/seccomp-musl.patch
@@ -0,0 +1,49 @@
+Backport of https://hg.mozilla.org/mozilla-central/rev/a0be746532f437055e4190cc8db802ad1239405e
+
+diff --git a/security/sandbox/linux/SandboxFilter.cpp b/security/sandbox/linux/SandboxFilter.cpp
+--- a/security/sandbox/linux/SandboxFilter.cpp
++++ b/security/sandbox/linux/SandboxFilter.cpp
+@@ -419,16 +419,20 @@ class SandboxPolicyCommon : public Sandb
+ case __NR_faccessat:
+ return Trap(AccessAtTrap, mBroker);
+ CASES_FOR_stat:
+ return Trap(StatTrap, mBroker);
+ CASES_FOR_lstat:
+ return Trap(LStatTrap, mBroker);
+ CASES_FOR_fstatat:
+ return Trap(StatAtTrap, mBroker);
++ // Used by new libc and Rust's stdlib, if available.
++ // We don't have broker support yet so claim it does not exist.
++ case __NR_statx:
++ return Error(ENOSYS);
+ case __NR_chmod:
+ return Trap(ChmodTrap, mBroker);
+ case __NR_link:
+ return Trap(LinkTrap, mBroker);
+ case __NR_mkdir:
+ return Trap(MkdirTrap, mBroker);
+ case __NR_symlink:
+ return Trap(SymlinkTrap, mBroker);
+@@ -538,16 +542,20 @@ class SandboxPolicyCommon : public Sandb
+ .ElseIf(advice == MADV_HUGEPAGE, Allow())
+ .ElseIf(advice == MADV_NOHUGEPAGE, Allow())
+ #ifdef MOZ_ASAN
+ .ElseIf(advice == MADV_DONTDUMP, Allow())
+ #endif
+ .Else(InvalidSyscall());
+ }
+
++ // musl libc will set this up in pthreads support.
++ case __NR_membarrier:
++ return Allow();
++
+ // Signal handling
+ #if defined(ANDROID) || defined(MOZ_ASAN)
+ case __NR_sigaltstack:
+ #endif
+ CASES_FOR_sigreturn:
+ CASES_FOR_sigprocmask:
+ CASES_FOR_sigaction:
+ return Allow();
+
+