Closed Bug 1918538 Opened 2 months ago Closed 11 days ago

We probably don't need the MOZ_SANDBOXED env var

Categories

(Core :: Security: Process Sandboxing, task)

task

Tracking

()

RESOLVED FIXED
133 Branch
Tracking Status
firefox133 --- fixed

People

(Reporter: jld, Assigned: gerard-majax)

References

(Regressed 1 open bug)

Details

Attachments

(1 file)

Right now, the MOZ_SANDBOXED env var is used in two places:

  • In SandboxReporterClient, as a safety check around the fixed file descriptor number used to pass the socket to child processes
  • In shared memory, to see if a process should expect to be blocked from accessing /proc / shouldn't expect to create freezeable shared memory

Bug 1440207, as pointed out by Nika in D221375, should fix the issue with SandboxReporter, and for shared memory we could just use XRE_IsParentProcess to mean “can freeze shared memory” instead of checking for sandboxedness. (And if there's ever a non-sandboxed child process type that needs to freeze shared memory we can always add it in. If we need to freeze shared memory in a sandboxed process on Linux… there are ways to deal with that but that's outside the scope of this bug.)

This is now blocking landing because of GPU process getting enabled by default on linux/x11

Assignee: nobody → lissyx+mozillians
Blocks: 1874689
Pushed by alissy@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/9b74bcc1a5a1 Remove usage of MOZ_SANDBOXED r=nika,jld
Status: NEW → RESOLVED
Closed: 11 days ago
Resolution: --- → FIXED
Target Milestone: --- → 133 Branch
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: