Граф коммитов

4 Коммитов

Автор SHA1 Сообщение Дата
Ehsan Akhgari e5e885ae31 Bug 1521000 - Part 2: Adjust our clang-format rules to include spaces after the hash for nested preprocessor directives r=sylvestre
# ignore-this-changeset

--HG--
extra : amend_source : 7221c8d15a765df71171099468e7c7faa648f37c
extra : histedit_source : a0cce6015636202bff09e35a13f72e03257a7695
2019-01-18 10:16:18 +01:00
Sylvestre Ledru 265e672179 Bug 1511181 - Reformat everything to the Google coding style r=ehsan a=clang-format
# ignore-this-changeset

--HG--
extra : amend_source : 4d301d3b0b8711c4692392aa76088ba7fd7d1022
2018-11-30 11:46:48 +01:00
Jed Davis bba4ea8274 Bug 1401062 - Avoid doing sandbox-related things to unsandboxed child processes. r=gcp
This is a small piece of cleanup that turned out to not be strictly
necessary for the rest of this, so I've made it a separate commit.

Sandbox-related launch adjustments (currently, interposing libc
functions and providing a file descriptor for the syscall reporter)
are no longer applied to processes that won't be sandboxed.  The
MOZ_SANDBOXED environment variable communicates this to the child
process, which allows SandboxEarlyInit to be skipped in that case as
well.  The idea is that disabling sandboxing for a process type, as part
of troubleshooting, should disable everything sandbox-related.

As a side-effect, this also skips some very minor but unnecessary
overhead for NPAPI process startup.

MozReview-Commit-ID: D0KxsRIIRN

--HG--
extra : rebase_source : 89836bea80d0a171324a8e3ff15c6b8e2a163ea9
2018-01-09 19:54:56 -07:00
Jed Davis f2fa27edca Bug 1286865 - Step 1: Gather syscall info from SIGSYS handlers into the parent process. r=gcp
MozReview-Commit-ID: 8GfFo4xso65

--HG--
extra : rebase_source : 1596a79d65d30dc72d8b84fc4f1639de377f554a
2017-01-30 18:49:53 -07:00