Bug 1046525 - Allow get{e,}gid and sched_{g,s}etparam in sandboxed content processes. r=kang

Some of these were already in the desktop whitelist; those duplicates
are removed.

--HG--
extra : amend_source : 3ab4b50e3f1980b4d7b93cc17f34b926e2aa2396
This commit is contained in:
Jed Davis 2014-08-01 15:05:44 -07:00
Родитель ed9911b694
Коммит 9b70e225e5
1 изменённых файлов: 6 добавлений и 2 удалений

Просмотреть файл

@ -173,9 +173,13 @@ SandboxFilterImpl::Build() {
#if SYSCALL_EXISTS(getuid32)
Allow(SYSCALL(getuid32));
Allow(SYSCALL(geteuid32));
Allow(SYSCALL(getgid32));
Allow(SYSCALL(getegid32));
#else
Allow(SYSCALL(getuid));
Allow(SYSCALL(geteuid));
Allow(SYSCALL(getgid));
Allow(SYSCALL(getegid));
#endif
// Some newer archs (e.g., x64 and x32) have only rt_sigreturn, but
// ARM has and uses both syscalls -- rt_sigreturn for SA_SIGINFO
@ -225,6 +229,8 @@ SandboxFilterImpl::Build() {
Allow(SYSCALL(sched_yield));
Allow(SYSCALL(sched_getscheduler));
Allow(SYSCALL(sched_setscheduler));
Allow(SYSCALL(sched_getparam));
Allow(SYSCALL(sched_setparam));
Allow(SYSCALL(sigaltstack));
/* Always last and always OK calls */
@ -282,7 +288,6 @@ SandboxFilterImpl::Build() {
Allow(SYSCALL(umask));
Allow(SYSCALL(getresgid));
Allow(SYSCALL(poll));
Allow(SYSCALL(getegid));
Allow(SYSCALL(inotify_init1));
Allow(SYSCALL(wait4));
Allow(SYSVIPCCALL(shmctl, SHMCTL));
@ -297,7 +302,6 @@ SandboxFilterImpl::Build() {
Allow(SYSCALL(inotify_add_watch));
Allow(SYSCALL(rt_sigprocmask));
Allow(SYSVIPCCALL(shmget, SHMGET));
Allow(SYSCALL(getgid));
#if SYSCALL_EXISTS(utimes)
Allow(SYSCALL(utimes));
#else