author Jed Davis <jld@mozilla.com>
Wed, 27 Feb 2019 20:14:54 +0000
changeset 519405 493b443954fe15f7b542ba14671f25e5f8531dff
parent 143784 8a53b2daa50e60c1b736af2ca43012cd152f40cb
permissions -rw-r--r--
Bug 1506291 - Add Linux sandboxing for the RDD (media decoder) process. r=gcp,mjf,flod The seccomp-bpf policy is currently just the "common" policy with no additions (but with the fixes in bug 1511560 to enable shared memory creation). The file broker policy allows shared memory creation and nothing else. The namespace setup is the same as for GMP (i.e., as restrictive as we currently can be). The sandbox can be turned off for troubleshooting by setting the environment variable MOZ_DISABLE_RDD_SANDBOX, similarly to the other process types. Tested against https://demo.bitmovin.com/public/firefox/av1/ with the necessary prefs set. Depends on D20895 Differential Revision: https://phabricator.services.mozilla.com/D14525

<!DOCTYPE html>
  <script type="text/javascript">
    function doTest()
      var editor = document.getElementById("editor");
      var editorBody = editor.contentDocument.body;
<p id="text">normal text</p>
<iframe id="editor" onload="doTest();"
  src="data:text/html,<script>document.designMode='on';</script><body>editable text</body>"></iframe>