gecko-dev/security/sandbox/linux
Kris Maglione 74481e8af4 Bug 1479035: Part 1 - Don't create event queues for stub nsThread wrappers. r=froydnj
Most of the times when we automatically create nsThread wrappers for threads
that don't already have them, we don't actually need the event targets, since
those threads don't run XPCOM event loops. Aside from wasting memory, actually
creating these event loops can lead to leaks if a thread tries to dispatch a
runnable to the queue which creates a reference cycle with the thread.

Not creating the event queues for threads that don't actually need them helps
avoid those foot guns, and also makes it easier to figure out which treads
actually run XPCOM event loops.

MozReview-Commit-ID: Arck4VQqdne

--HG--
extra : source : a03a61d6d724503c3b7c5e31fe32ced1f5d1c219
extra : intermediate-source : 5152af6ab3e399216ef6db8f060c257b2ffbd330
extra : histedit_source : ef06000344416e0919f536d5720fa979d2d29c66%2C4671676b613dc3e3ec762edf5d72a2ffbe6fca3f
2018-07-27 15:13:12 -07:00
..
broker Bug 1479035: Part 1 - Don't create event queues for stub nsThread wrappers. r=froydnj 2018-07-27 15:13:12 -07:00
glue Bug 1435483 part 16. Switch to using dom::Exception, not nsIException, in C++ code. r=qdot 2018-02-05 16:34:05 -05:00
gtest Bug 1465585: Switch from mozilla::Move to std::move. r=froydnj 2018-06-01 10:45:27 +02:00
interfaces
launch Bug 1481978 - Change IPC CloseSuperfluousFds to prevent accidentally heap-allocating closures. r=glandium 2018-08-15 19:08:40 -06:00
reporter Bug 1479035: Part 1 - Don't create event queues for stub nsThread wrappers. r=froydnj 2018-07-27 15:13:12 -07:00
LinuxSched.h
moz.build Bug 1457482 Add --enable-lto that turns on LTO r=glandium 2018-04-13 15:55:39 -05:00
Sandbox.cpp Bug 1465585: Switch from mozilla::Move to std::move. r=froydnj 2018-06-01 10:45:27 +02:00
Sandbox.h Bug 1126437 - Reorganize content sandbox params extracted from libxul APIs. r=gcp 2018-01-23 22:35:44 -07:00
SandboxBrokerClient.cpp Bug 1434711 - WebGL causes a crash with the AMDGPU-PRO video driver. r=jld 2018-03-29 14:04:46 +02:00
SandboxBrokerClient.h Bug 1440206 - Allow brokered access to a subset of connect() in the Linux content sandbox. r=gcp 2018-03-09 19:31:23 -07:00
SandboxChrootProto.h Bug 1401062 - Create Linux child processes with clone() for namespace/chroot sandboxing. r=gcp 2017-10-06 17:16:41 -06:00
SandboxFilter.cpp Bug 1489735 - Quietly deny sched_setaffinity in content process sandbox r=gcp 2018-09-17 16:43:52 +00:00
SandboxFilter.h Bug 1126437 - Reorganize content sandbox params extracted from libxul APIs. r=gcp 2018-01-23 22:35:44 -07:00
SandboxFilterUtil.cpp Bug 1425274 - Filter socketpair() in content sandbox on 32-bit x86 with new-enough kernels. r=gcp 2018-01-29 17:36:06 -07:00
SandboxFilterUtil.h Bug 1425274 - Filter socketpair() in content sandbox on 32-bit x86 with new-enough kernels. r=gcp 2018-01-29 17:36:06 -07:00
SandboxHooks.cpp Bug 1438401 - Quietly fail shmget() in sandboxed content processes. r=gcp 2018-02-27 21:30:08 -07:00
SandboxInfo.cpp Bug 1434528 - Adjust sandbox feature detection to deal with Ubuntu guest accounts. r=gcp 2018-02-08 17:46:42 -07:00
SandboxInfo.h
SandboxInternal.h
SandboxLogging.cpp
SandboxLogging.h
SandboxOpenedFiles.cpp Bug 1480554 - Fix missing include in SandboxOpenedFiles.cpp. r=gcp 2018-08-16 09:15:56 -06:00
SandboxOpenedFiles.h Bug 1466168: Remove mozilla::Forward in favor of std::forward. r=froydnj 2018-06-02 09:33:26 +02:00
SandboxReporterClient.cpp Bug 1401062 - Avoid doing sandbox-related things to unsandboxed child processes. r=gcp 2018-01-09 19:54:56 -07:00
SandboxReporterClient.h Bug 1401062 - Avoid doing sandbox-related things to unsandboxed child processes. r=gcp 2018-01-09 19:54:56 -07:00