Skip to content

Commit d86760b

Browse files
committed
doc: mention Firefox 58 sandbox violation on ioctl() calls
1 parent d7177c9 commit d86760b

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

README.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,16 @@ default. Fortunately, it's possible to add those path by hand. Add "/dev/snd/"
161161
to "security.sandbox.content.write_path_whitelist" parameter in
162162
`about:config`. Note that trailing slash in "/dev/snd/" is required.
163163

164+
Firefox 58 tabs crashing when trying to play audio
165+
--------------------------------------------------
166+
167+
Firefox 58 (Nightly) tightened its sandbox a bit more. Now `ioctl()` calls are
168+
forbidden too, but are used by ALSA libraries. That causes sandbox violation
169+
with subsequent process termination. Exception can be added by setting parameter
170+
`security.sandbox.content.syscall_whitelist` in `about:config`. That field
171+
accepts a comma separated list of system call numbers. Add there `16` for
172+
x86-64, or `54` for x86 or ARM.
173+
164174
License
165175
=======
166176

0 commit comments

Comments
 (0)