Bug 1778559
Summary: | [abrt] firefox: __open64_nocancel(): firefox killed by SIGSYS | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Ritesh Khadgaray <khadgaray> | ||||||||||||||||||||
Component: | firefox | Assignee: | Gecko Maintainer <gecko-bugs-nobody> | ||||||||||||||||||||
Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||||||||||||||||
Severity: | unspecified | Docs Contact: | |||||||||||||||||||||
Priority: | unspecified | ||||||||||||||||||||||
Version: | rawhide | CC: | 0xalen+redhat, anto.trande, awilliam, gecko-bugs-nobody, jhorak, jld, john.j5live, kengert, pjasicek, rhughes, robatino, rstrode, sandmann | ||||||||||||||||||||
Target Milestone: | --- | ||||||||||||||||||||||
Target Release: | --- | ||||||||||||||||||||||
Hardware: | x86_64 | ||||||||||||||||||||||
OS: | Unspecified | ||||||||||||||||||||||
URL: | https://retrace.fedoraproject.org/faf/reports/bthash/9b3bf00e201c9622ae69e5ed5f70d5223f24c174 | ||||||||||||||||||||||
Whiteboard: | abrt_hash:27480b90a3580e26dee0eb3658249e1458bec3d2;VARIANT_ID=workstation; openqa | ||||||||||||||||||||||
Fixed In Version: | Doc Type: | If docs needed, set a value | |||||||||||||||||||||
Doc Text: | Story Points: | --- | |||||||||||||||||||||
Clone Of: | Environment: | ||||||||||||||||||||||
Last Closed: | 2019-12-02 18:11:50 UTC | Type: | --- | ||||||||||||||||||||
Regression: | --- | Mount Type: | --- | ||||||||||||||||||||
Documentation: | --- | CRM: | |||||||||||||||||||||
Verified Versions: | Category: | --- | |||||||||||||||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||||||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||||||||||||||
Embargoed: | |||||||||||||||||||||||
Bug Depends On: | |||||||||||||||||||||||
Bug Blocks: | 1705303 | ||||||||||||||||||||||
Attachments: |
|
Description
Ritesh Khadgaray
2019-12-02 03:06:04 UTC
Created attachment 1641249 [details]
File: backtrace
Created attachment 1641250 [details]
File: core_backtrace
Created attachment 1641251 [details]
File: cpuinfo
Created attachment 1641252 [details]
File: dso_list
Created attachment 1641253 [details]
File: environ
Created attachment 1641254 [details]
File: limits
Created attachment 1641255 [details]
File: maps
Created attachment 1641256 [details]
File: open_fds
Created attachment 1641257 [details]
File: proc_pid_status
Disabling sandbox works around this - https://wiki.mozilla.org/Security/Sandbox/Seccomp . From firefox run ``` [New Thread 0x7fffd157d700 (LWP 98140)] [New Thread 0x7fffd19bf700 (LWP 98157)] [Parent 97968, Gecko_IOThread] WARNING: pipe error (76): Connection reset by peer: file /builddir/build/BUILD/firefox-71.0/ipc/chromium/src/chrome/common/ipc_channel_posix.cc, line 358 [Parent 97968, Gecko_IOThread] WARNING: pipe error (107): Connection reset by peer: file /builddir/build/BUILD/firefox-71.0/ipc/chromium/src/chrome/common/ipc_channel_posix.cc, line 358 ###!!! [Parent][MessageChannel] Error: (msgtype=0x59001A,name=PHttpChannel::Msg_DeleteSelf) Channel error: cannot send/recv [Parent 97968, Gecko_IOThread] WARNING: pipe error (116): Connection reset by peer: file /builddir/build/BUILD/firefox-71.0/ipc/chromium/src/chrome/common/ipc_channel_posix.cc, line 358 ###!!! [Parent][MessageChannel] Error: (msgtype=0x59001A,name=PHttpChannel::Msg_DeleteSelf) Channel error: cannot send/recv [Thread 0x7fffd4dbe700 (LWP 98053) exited] [New Thread 0x7fffd4dbe700 (LWP 98181)] [New Thread 0x7fffd1386700 (LWP 98183)] ``` For chrome : **CRASHING**:seccomp-bpf failure in syscall 0230 See also https://bugzilla.redhat.com/show_bug.cgi?id=1778555 - not sure if it's the same, though. openQA is running into this too by the looks of it, e.g. https://openqa.fedoraproject.org/tests/491837# . Proposing as an F32 Beta blocker per Basic criterion "It must be possible to run the default web browser and a terminal application from all release-blocking desktop environments...The web browser must be able to download files, load extensions (if applicable), and log into FAS." *** This bug has been marked as a duplicate of bug 1778366 *** The Chrome failure mentioned in comment #10 is probably unrelated: amd64 syscall 230 is clock_nanosleep, and Chromium has a bug about it: https://crbug.com/1025739 (see also https://bugzilla.mozilla.org/show_bug.cgi?id=1597792 for the Firefox equivalent) In general, if the crashing process is able to print a log message, then it's not a problem with getting SECCOMP_RET_TRAP while blocking SIGSYS: in that case the kernel removes the signal handler and immediately kills the process itself. As for bug 1778555, that looks like heap corruption and not anything sandbox-related. |