Closed
Bug 1038486
Opened 11 years ago
Closed 11 years ago
Fix Linux desktop sandbox build on 32-bit x86
Categories
(Core :: Security, defect)
Tracking
()
RESOLVED
FIXED
mozilla33
People
(Reporter: jld, Assigned: jld)
References
Details
Attachments
(1 file)
4.53 KB,
patch
|
kang
:
review+
|
Details | Diff | Splinter Review |
We have some macros to used by the B2G whitelist to deal with architecture-dependent system calls (history of off_t size, etc.), but the first-draft desktop whitelist doesn't use them. Unsurprisingly, it doesn't even build on 32-bit x86 (or ARM) at the moment, but this is fixable.
Assignee | ||
Comment 1•11 years ago
|
||
It would be nice if we could just remove the SysV IPC calls instead of dealing with whitelisting them, but that can be a followup.
Try run: https://tbpl.mozilla.org/?tree=Try&rev=ce4562e547e2 (ignore the Fennec x86 red; it shouldn't be using the desktop policy in the first place, but that's also a separate bug).
Attachment #8455843 -
Flags: review?(gdestuynder)
Comment on attachment 8455843 [details] [diff] [review]
bug1038486-sandbox-desktop-arch-hg0.diff
Review of attachment 8455843 [details] [diff] [review]:
-----------------------------------------------------------------
Right - first we need this working at all :)
Looks good.
Attachment #8455843 -
Flags: review?(gdestuynder) → review+
Assignee | ||
Comment 4•11 years ago
|
||
Comment 5•11 years ago
|
||
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla33
You need to log in
before you can comment on or make changes to this bug.
Description
•