1285525 - Add sys_semget to seccomp-bpf whitelist. r?tedd draft
authorGian-Carlo Pascutto <gcp@mozilla.com>
Mon, 11 Jul 2016 10:15:31 +0200
changeset 386112 4814165439e088a684bae46fc4ae5817ed8890f5
parent 386111 a22656e76df720def44b182a645f9ba78dc085d6
child 386161 711b93e9708ac366fd3a916518c558f1ddee4a7e
push id22625
push usergpascutto@mozilla.com
push dateMon, 11 Jul 2016 08:16:31 +0000
reviewerstedd
bugs1285525
milestone50.0a1
1285525 - Add sys_semget to seccomp-bpf whitelist. r?tedd MozReview-Commit-ID: 1yV0uqiMSru
security/sandbox/linux/SandboxFilter.cpp
--- a/security/sandbox/linux/SandboxFilter.cpp
+++ b/security/sandbox/linux/SandboxFilter.cpp
@@ -633,16 +633,21 @@ public:
       // Only allow to send signals within the process.
     case __NR_rt_tgsigqueueinfo: {
       Arg<pid_t> tgid(0);
       return If(tgid == getpid(), Allow())
         .Else(InvalidSyscall());
     }
 #endif
 
+#ifdef __NR_semget
+    case __NR_semget:
+      return Allow();
+#endif
+
 #endif // DESKTOP
 
 #ifdef __NR_getrandom
     case __NR_getrandom:
       return Allow();
 #endif
 
       // nsSystemInfo uses uname (and we cache an instance, so