Fix misuse of MOZ_WIDGET_GONK in Linux content process sandbox policy

RESOLVED FIXED in mozilla33

Status

()

defect
RESOLVED FIXED
5 years ago
5 years ago

People

(Reporter: jld, Assigned: jld)

Tracking

unspecified
mozilla33
All
Linux
Points:
---

Firefox Tracking Flags

(Not tracked)

Details

Attachments

(1 attachment)

The seccomp-bpf sandbox policy for content processes has some "B2G specific" parts that actually aren't, and currently this is very broken.

Additionally, the large "desktop" block currently also applies to Fennec builds with --enable-content-sandbox, which is wrong.
Trying: https://tbpl.mozilla.org/?tree=Try&rev=341cb53aef96

Confirmed with local testing that sandboxing still works as expected on B2G.

Depends on patch from bug 1038486.
Attachment #8455855 - Flags: review?(gdestuynder)
https://hg.mozilla.org/mozilla-central/rev/39ee921a5b2f
Status: NEW → RESOLVED
Last Resolved: 5 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla33
You need to log in before you can comment on or make changes to this bug.