Bug 1822308 - Re-tighten GPU sandbox's filesystem access

Differential Revision: https://phabricator.services.mozilla.com/D172565
This commit is contained in:
Chris Martin 2023-03-15 13:32:42 +00:00
Родитель 23eb98ba93
Коммит 9730f3f5d5
1 изменённых файлов: 8 добавлений и 8 удалений

Просмотреть файл

@ -1211,14 +1211,14 @@ void SandboxBroker::SetSecurityLevelForGPUProcess(int32_t aSandboxLevel) {
sandbox::SBOX_ALL_OK == result, sandbox::SBOX_ALL_OK == result,
"With these static arguments AddRule should never fail, what happened?"); "With these static arguments AddRule should never fail, what happened?");
// TEMPORARY WORKAROUND - Blocking access to the filesystem breaks Raptor // The GPU process needs to write to a shader cache for performance reasons
// tests and any other piece of software that uses screen recording, which if (sProfileDir) {
// may hinder developers that are developing/testing on Firefox AddCachedDirRule(mPolicy, sandbox::TargetPolicy::FILES_ALLOW_DIR_ANY,
result = mPolicy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, sProfileDir, u"\\shader-cache"_ns);
sandbox::TargetPolicy::FILES_ALLOW_ANY, L"*");
MOZ_RELEASE_ASSERT( AddCachedDirRule(mPolicy, sandbox::TargetPolicy::FILES_ALLOW_ANY,
sandbox::SBOX_ALL_OK == result, sProfileDir, u"\\shader-cache\\*"_ns);
"With these static arguments AddRule should never fail, what happened?"); }
// The process needs to be able to duplicate shared memory handles, // The process needs to be able to duplicate shared memory handles,
// which are Section handles, to the broker process and other child processes. // which are Section handles, to the broker process and other child processes.