By the way, more information is available here:

https://wiki.mozilla.org/Security/Sandbox/Seccomp 
<https://wiki.mozilla.org/Security/Sandbox/Seccomp>
https://wiki.mozilla.org/Security/Sandbox 
<https://wiki.mozilla.org/Security/Sandbox> 

Note especially [1] as that will tell you if you hit any issues with seccomp 
enabled.

[1] https://wiki.mozilla.org/Security/Sandbox/Seccomp#Seccomp_reporter


> On 2 Nov 2015, at 9:32 am, Michael Wu <[email protected]> wrote:
> 
> Enable it in the kernel. It's a required part of the platform. It lets us 
> specify what syscalls are allowed to be called in child processes. Backports 
> are available. https://bug790923.bmoattachments.org/attachment.cgi?id=8421852 
> <https://bug790923.bmoattachments.org/attachment.cgi?id=8421852>
> 
> -Michael Wu
> 
> On Sun, Nov 1, 2015 at 3:06 AM, Adam Farden <[email protected] 
> <mailto:[email protected]>> wrote:
> Hi,
> 
> I recently ported LG G3 to fxos using CyanogenMod repos. When enabling 
> SECCOMP in the kernel I found that SECCOMP_FILTER is not present in this 
> device's kernel.
> 
> I quickly worked around this by compiling gecko with:
> 
> ac_add_options --disable-content-sandbox
> ac_add_options --disable-sandbox
> 
> but what are the consequences of this? The OS appears to run correctly under 
> the limited testing I did.
> 
> Adam
> 
> _______________________________________________
> dev-fxos mailing list
> [email protected] <mailto:[email protected]>
> https://lists.mozilla.org/listinfo/dev-fxos 
> <https://lists.mozilla.org/listinfo/dev-fxos>
> 
> 
> _______________________________________________
> dev-fxos mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-fxos

_______________________________________________
dev-fxos mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-fxos

Reply via email to