Bug 140075 - [Linux] SeccompFilters: cannot open local files if network process is disabled
Summary: [Linux] SeccompFilters: cannot open local files if network process is disabled
Status: RESOLVED FIXED
Alias: None
Product: WebKit
Classification: Unclassified
Component: WebKit2 (show other bugs)
Version: 528+ (Nightly build)
Hardware: PC Linux
: P2 Normal
Assignee: Michael Catanzaro
URL:
Keywords:
Depends on: 151418 151541
Blocks: 140072
  Show dependency treegraph
 
Reported: 2015-01-04 22:20 PST by Michael Catanzaro
Modified: 2015-11-30 11:43 PST (History)
4 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Michael Catanzaro 2015-01-04 22:20:12 PST
If the network process is disabled (e.g. by selecting the shared-secondary-process process model) then the web process will be used to load files from disk when the user accesses a file:// URI (either manually or through a browser's file chooser). But with seccomp filters enabled, the web process has no permission to open the file. We have a few different options:

* Disable the sandbox when the network process is disabled.
* Make the network process mandatory. (This is what Apple wants to do, anyway.)
* Implement runtime sandbox extensions, so the UI process can tell the seccomp broker to allow a trapped process access to additional files. Apple has sandbox extensions already working in the cross-platform code, but it would require significant modifications to the seccomp filters backend (see also bug #140062) so this may not be a short-term project.

Long-term, there is value in implementing sandbox extensions even if the network process is mandatory -- not for the web process, but for the network process, so that we can sandbox the network process as well.
Comment 1 Michael Catanzaro 2015-11-19 18:50:50 PST
Network process is now mandatory.
Comment 2 Michael Catanzaro 2015-11-20 05:52:39 PST
(In reply to comment #1)
> Network process is now mandatory.

It got rolled out.