searching for reviewer(jhector)
f44b0bd3813055b688a8747e908546e2babe1f01: Bug 1353439 - Cc and Ci are not defined in printUtils.js so use Components full names. r=jhector
Frank-Rainer Grahl <frgrahl@gmx.net> - Wed, 05 Apr 2017 03:08:00 -0400 - rev 351492
Push 31611 by cbook@mozilla.com at Thu, 06 Apr 2017 10:51:05 +0000
Bug 1353439 - Cc and Ci are not defined in printUtils.js so use Components full names. r=jhector
eadaa06966fefa5ea284da51a8d58ef2423edf47: Bug 1290761 - Allow running jprof with sandbox enabled. r=jhector
L. David Baron <dbaron@dbaron.org> - Mon, 01 Aug 2016 08:49:48 +0100 - rev 307613
Push 30516 by cbook@mozilla.com at Tue, 02 Aug 2016 15:10:10 +0000
Bug 1290761 - Allow running jprof with sandbox enabled. r=jhector jprof is an in-tree profiling tool that runs on Linux. This fixes the error: Sandbox: seccomp sandbox violation: pid 29698, syscall 38, args 0 140731305513136 0 830 22509600 1. Killing process. Sandbox: crash reporter is disabled (or failed); trying stack trace: Sandbox: frame #01: __GI_setitimer (/build/glibc-GKVZIf/glibc-2.23/time/../sysdeps/unix/syscall-template.S:84) Sandbox: frame #02: startSignalCounter(unsigned long) (.../mozilla-central/mozilla/tools/jprof/stub/libmalloc.cpp:464) which occurs during shutdown when running with jprof enabled via the JPROF_FLAGS environment variable containing JP_DEFER without actually sending the signal to start jprof. It presumably occurs sooner if jprof is actually used either via JP_START or by senging a SIGPROF/SIGALRM. With the patch, these steps run to completion. MozReview-Commit-ID: Fx4tzEyqIj2
8d2a4af272e3a6247241fa5b1634f6c705cd8a82: Bug 1287971 - Disable sandboxing in Linux ASan builds. r=jhector
Jed Davis <jld@mozilla.com> - Fri, 22 Jul 2016 08:50:00 -0400 - rev 306407
Push 30484 by cbook@mozilla.com at Mon, 25 Jul 2016 13:51:04 +0000
Bug 1287971 - Disable sandboxing in Linux ASan builds. r=jhector ASan itself can be accomodated under sandboxing, but LSan can't. Also fixes bug 1287437.
7b3f1cc706bdfc764bc7f4f808afc84c4c873c23: Bug 1286324 - Make fork() non-fatal in Linux content sandbox. r=jhector
Jed Davis <jld@mozilla.com> - Thu, 14 Jul 2016 15:00:00 -0400 - rev 305151
Push 30455 by cbook@mozilla.com at Sun, 17 Jul 2016 08:08:29 +0000
Bug 1286324 - Make fork() non-fatal in Linux content sandbox. r=jhector fork() will now fail with EPERM instead of crashing; see code comment and bug for more info. Tested with GTK3 Oxygen theme and SCIM, which both seem to work. Also verified that GMP child processes still crash on fork().
a22656e76df720def44b182a645f9ba78dc085d6: Bug 1285507 - Whitelist memfd_create (used for Sealed Files IPC). r=jhector
Gian-Carlo Pascutto <gcp@mozilla.com> - Fri, 08 Jul 2016 17:12:30 +0200 - rev 304450
Push 30426 by cbook@mozilla.com at Mon, 11 Jul 2016 14:21:30 +0000
Bug 1285507 - Whitelist memfd_create (used for Sealed Files IPC). r=jhector MozReview-Commit-ID: 7UE6hyDiC6H