Closed Bug 1038486 Opened 10 years ago Closed 10 years ago

Fix Linux desktop sandbox build on 32-bit x86

Categories

(Core :: Security, defect)

x86
Linux
defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla33

People

(Reporter: jld, Assigned: jld)

References

Details

Attachments

(1 file)

We have some macros to used by the B2G whitelist to deal with architecture-dependent system calls (history of off_t size, etc.), but the first-draft desktop whitelist doesn't use them.  Unsurprisingly, it doesn't even build on 32-bit x86 (or ARM) at the moment, but this is fixable.
It would be nice if we could just remove the SysV IPC calls instead of dealing with whitelisting them, but that can be a followup.

Try run: https://tbpl.mozilla.org/?tree=Try&rev=ce4562e547e2 (ignore the Fennec x86 red; it shouldn't be using the desktop policy in the first place, but that's also a separate bug).
Attachment #8455843 - Flags: review?(gdestuynder)
Comment on attachment 8455843 [details] [diff] [review]
bug1038486-sandbox-desktop-arch-hg0.diff

Review of attachment 8455843 [details] [diff] [review]:
-----------------------------------------------------------------

Right - first we need this working at all :)
Looks good.
Attachment #8455843 - Flags: review?(gdestuynder) → review+
https://hg.mozilla.org/mozilla-central/rev/3ea86a380019
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla33
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: