All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v2 1/2] qtbase-conf: disable the seccomp filter sandbox
@ 2021-10-07 17:57 Vivien Didelot
  2021-10-07 17:57 ` [PATCH v2 2/2] qtwebengine: remove seccomp filter sandbox hack Vivien Didelot
  2021-10-07 18:12 ` [PATCH v2 1/2] qtbase-conf: disable the seccomp filter sandbox Denys Dmytriyenko
  0 siblings, 2 replies; 6+ messages in thread
From: Vivien Didelot @ 2021-10-07 17:57 UTC (permalink / raw)
  To: meta-arago; +Cc: Denys Dmytriyenko

SECCOMP-BPF Sandbox is known to cause runtime issues so set the
QTWEBENGINE_CHROMIUM_FLAGS environment variable to disable this
feature temporarily until those issues are resolved.

Signed-off-by: Vivien Didelot <vdidelot@pbsc.com>
---
 meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh       | 5 +++++
 meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh | 5 +++++
 2 files changed, 10 insertions(+)

diff --git a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
index 146ee07e..928e2cc7 100644
--- a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
+++ b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
@@ -6,3 +6,8 @@ export QT_QPA_EGLFS_KMS_CONFIG=/etc/qt5/eglfs_kms_cfg.json
 export QT_QPA_EGLFS_INTEGRATION=eglfs_kms
 export QT_QPA_EGLFS_ALWAYS_SET_MODE=1
 export QT_WAYLAND_SHELL_INTEGRATION=wl-shell
+
+# SECCOMP-BPF Sandbox does not work due to unexpected FUTEX_UNLOCK_PI call
+# from the pthread implementation. Disable this feature temporarily until
+# those issues are resolved.
+export QTWEBENGINE_CHROMIUM_FLAGS="--disable-seccomp-filter-sandbox"
diff --git a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
index 29fa2969..96526393 100644
--- a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
+++ b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
@@ -7,3 +7,8 @@ export QT_QPA_EGLFS_KMS_CONFIG=/etc/qt5/eglfs_kms_cfg.json
 export QT_QPA_EGLFS_INTEGRATION=eglfs_kms
 export QT_QPA_EGLFS_ALWAYS_SET_MODE=1
 export QT_WAYLAND_SHELL_INTEGRATION=wl-shell
+
+# SECCOMP-BPF Sandbox does not work due to unexpected FUTEX_UNLOCK_PI call
+# from the pthread implementation. Disable this feature temporarily until
+# those issues are resolved.
+export QTWEBENGINE_CHROMIUM_FLAGS="--disable-seccomp-filter-sandbox"
-- 
2.33.0



^ permalink raw reply related	[flat|nested] 6+ messages in thread

* [PATCH v2 2/2] qtwebengine: remove seccomp filter sandbox hack
  2021-10-07 17:57 [PATCH v2 1/2] qtbase-conf: disable the seccomp filter sandbox Vivien Didelot
@ 2021-10-07 17:57 ` Vivien Didelot
  2021-10-07 18:12   ` Denys Dmytriyenko
  2021-10-07 18:12 ` [PATCH v2 1/2] qtbase-conf: disable the seccomp filter sandbox Denys Dmytriyenko
  1 sibling, 1 reply; 6+ messages in thread
From: Vivien Didelot @ 2021-10-07 17:57 UTC (permalink / raw)
  To: meta-arago; +Cc: Denys Dmytriyenko

Now that qtbase-conf disables the seccomp filter sandbox via an
environment variable, the hack patch against qtwebengine can be
dropped.

Signed-off-by: Vivien Didelot <vdidelot@pbsc.com>
---
 ...-disable-SECCOMP-BPF-Sandbox-at-star.patch | 32 -------------------
 .../recipes-qt/qt5/qtwebengine_git.bbappend   |  4 ---
 2 files changed, 36 deletions(-)
 delete mode 100644 meta-arago-distro/recipes-qt/qt5/qtwebengine/0003-qtwebengine-HACK-disable-SECCOMP-BPF-Sandbox-at-star.patch

diff --git a/meta-arago-distro/recipes-qt/qt5/qtwebengine/0003-qtwebengine-HACK-disable-SECCOMP-BPF-Sandbox-at-star.patch b/meta-arago-distro/recipes-qt/qt5/qtwebengine/0003-qtwebengine-HACK-disable-SECCOMP-BPF-Sandbox-at-star.patch
deleted file mode 100644
index 09f1870d..00000000
--- a/meta-arago-distro/recipes-qt/qt5/qtwebengine/0003-qtwebengine-HACK-disable-SECCOMP-BPF-Sandbox-at-star.patch
+++ /dev/null
@@ -1,32 +0,0 @@
-From 77fc6e4391562a1f84d82b58319a73de08242797 Mon Sep 17 00:00:00 2001
-From: Eric Ruei <e-ruei1@ti.com>
-Date: Fri, 8 Mar 2019 18:17:06 -0500
-Subject: [PATCH 3/3] qtwebengine: HACK: disable SECCOMP-BPF Sandbox at startup
-
-SECCOMP-BPF Sandbox does not work due to unexpected FUTEX_UNLOCK_PI call
-from the pthread implementation
-Disable this feature temporarily until those issues are resolved.
-
-Upstream-Status: Inappropriate [HACK]
-
-Signed-off-by: Eric Ruei <e-ruei1@ti.com>
----
- src/core/web_engine_context.cpp | 2 ++
- 1 file changed, 2 insertions(+)
-
-diff --git a/src/core/web_engine_context.cpp b/src/core/web_engine_context.cpp
-index 48e5bc4..9ba3fa4 100644
---- a/src/core/web_engine_context.cpp
-+++ b/src/core/web_engine_context.cpp
-@@ -347,6 +347,8 @@ WebEngineContext::WebEngineContext()
-         parsedCommandLine->AppendSwitch(switches::kNoSandbox);
- #elif defined(Q_OS_LINUX)
-         parsedCommandLine->AppendSwitch(service_manager::switches::kDisableSetuidSandbox);
-+        // HACK: disable seccomp filter sandbox for now because it does not work
-+        parsedCommandLine->AppendSwitch(service_manager::switches::kDisableSeccompFilterSandbox);
- #endif
-     } else {
-         parsedCommandLine->AppendSwitch(switches::kNoSandbox);
--- 
-1.9.1
-
diff --git a/meta-arago-distro/recipes-qt/qt5/qtwebengine_git.bbappend b/meta-arago-distro/recipes-qt/qt5/qtwebengine_git.bbappend
index c50b020f..6459bbf7 100644
--- a/meta-arago-distro/recipes-qt/qt5/qtwebengine_git.bbappend
+++ b/meta-arago-distro/recipes-qt/qt5/qtwebengine_git.bbappend
@@ -1,8 +1,4 @@
 FILESEXTRAPATHS_prepend := "${THISDIR}/${PN}:"
 PR_append = ".arago1"
 
-SRC_URI += " \
-    file://0003-qtwebengine-HACK-disable-SECCOMP-BPF-Sandbox-at-star.patch \
-"
-
 DEPENDS += "bison-native"
-- 
2.33.0



^ permalink raw reply related	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 1/2] qtbase-conf: disable the seccomp filter sandbox
  2021-10-07 17:57 [PATCH v2 1/2] qtbase-conf: disable the seccomp filter sandbox Vivien Didelot
  2021-10-07 17:57 ` [PATCH v2 2/2] qtwebengine: remove seccomp filter sandbox hack Vivien Didelot
@ 2021-10-07 18:12 ` Denys Dmytriyenko
  2021-10-18 16:01   ` [meta-arago] " Yogesh Siraswar
  1 sibling, 1 reply; 6+ messages in thread
From: Denys Dmytriyenko @ 2021-10-07 18:12 UTC (permalink / raw)
  To: Vivien Didelot; +Cc: meta-arago, Denys Dmytriyenko

On Thu, Oct 07, 2021 at 01:57:29PM -0400, Vivien Didelot wrote:
> SECCOMP-BPF Sandbox is known to cause runtime issues so set the
> QTWEBENGINE_CHROMIUM_FLAGS environment variable to disable this
> feature temporarily until those issues are resolved.
> 
> Signed-off-by: Vivien Didelot <vdidelot@pbsc.com>

Acked-by: Denys Dmytriyenko <denys@konsulko.com>


> ---
>  meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh       | 5 +++++
>  meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh | 5 +++++
>  2 files changed, 10 insertions(+)
> 
> diff --git a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
> index 146ee07e..928e2cc7 100644
> --- a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
> +++ b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
> @@ -6,3 +6,8 @@ export QT_QPA_EGLFS_KMS_CONFIG=/etc/qt5/eglfs_kms_cfg.json
>  export QT_QPA_EGLFS_INTEGRATION=eglfs_kms
>  export QT_QPA_EGLFS_ALWAYS_SET_MODE=1
>  export QT_WAYLAND_SHELL_INTEGRATION=wl-shell
> +
> +# SECCOMP-BPF Sandbox does not work due to unexpected FUTEX_UNLOCK_PI call
> +# from the pthread implementation. Disable this feature temporarily until
> +# those issues are resolved.
> +export QTWEBENGINE_CHROMIUM_FLAGS="--disable-seccomp-filter-sandbox"
> diff --git a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
> index 29fa2969..96526393 100644
> --- a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
> +++ b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
> @@ -7,3 +7,8 @@ export QT_QPA_EGLFS_KMS_CONFIG=/etc/qt5/eglfs_kms_cfg.json
>  export QT_QPA_EGLFS_INTEGRATION=eglfs_kms
>  export QT_QPA_EGLFS_ALWAYS_SET_MODE=1
>  export QT_WAYLAND_SHELL_INTEGRATION=wl-shell
> +
> +# SECCOMP-BPF Sandbox does not work due to unexpected FUTEX_UNLOCK_PI call
> +# from the pthread implementation. Disable this feature temporarily until
> +# those issues are resolved.
> +export QTWEBENGINE_CHROMIUM_FLAGS="--disable-seccomp-filter-sandbox"
> -- 
> 2.33.0


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 2/2] qtwebengine: remove seccomp filter sandbox hack
  2021-10-07 17:57 ` [PATCH v2 2/2] qtwebengine: remove seccomp filter sandbox hack Vivien Didelot
@ 2021-10-07 18:12   ` Denys Dmytriyenko
  0 siblings, 0 replies; 6+ messages in thread
From: Denys Dmytriyenko @ 2021-10-07 18:12 UTC (permalink / raw)
  To: Vivien Didelot; +Cc: meta-arago, Denys Dmytriyenko

On Thu, Oct 07, 2021 at 01:57:30PM -0400, Vivien Didelot wrote:
> Now that qtbase-conf disables the seccomp filter sandbox via an
> environment variable, the hack patch against qtwebengine can be
> dropped.
> 
> Signed-off-by: Vivien Didelot <vdidelot@pbsc.com>

Acked-by: Denys Dmytriyenko <denys@konsulko.com>


> ---
>  ...-disable-SECCOMP-BPF-Sandbox-at-star.patch | 32 -------------------
>  .../recipes-qt/qt5/qtwebengine_git.bbappend   |  4 ---
>  2 files changed, 36 deletions(-)
>  delete mode 100644 meta-arago-distro/recipes-qt/qt5/qtwebengine/0003-qtwebengine-HACK-disable-SECCOMP-BPF-Sandbox-at-star.patch
> 
> diff --git a/meta-arago-distro/recipes-qt/qt5/qtwebengine/0003-qtwebengine-HACK-disable-SECCOMP-BPF-Sandbox-at-star.patch b/meta-arago-distro/recipes-qt/qt5/qtwebengine/0003-qtwebengine-HACK-disable-SECCOMP-BPF-Sandbox-at-star.patch
> deleted file mode 100644
> index 09f1870d..00000000
> --- a/meta-arago-distro/recipes-qt/qt5/qtwebengine/0003-qtwebengine-HACK-disable-SECCOMP-BPF-Sandbox-at-star.patch
> +++ /dev/null
> @@ -1,32 +0,0 @@
> -From 77fc6e4391562a1f84d82b58319a73de08242797 Mon Sep 17 00:00:00 2001
> -From: Eric Ruei <e-ruei1@ti.com>
> -Date: Fri, 8 Mar 2019 18:17:06 -0500
> -Subject: [PATCH 3/3] qtwebengine: HACK: disable SECCOMP-BPF Sandbox at startup
> -
> -SECCOMP-BPF Sandbox does not work due to unexpected FUTEX_UNLOCK_PI call
> -from the pthread implementation
> -Disable this feature temporarily until those issues are resolved.
> -
> -Upstream-Status: Inappropriate [HACK]
> -
> -Signed-off-by: Eric Ruei <e-ruei1@ti.com>
> ----
> - src/core/web_engine_context.cpp | 2 ++
> - 1 file changed, 2 insertions(+)
> -
> -diff --git a/src/core/web_engine_context.cpp b/src/core/web_engine_context.cpp
> -index 48e5bc4..9ba3fa4 100644
> ---- a/src/core/web_engine_context.cpp
> -+++ b/src/core/web_engine_context.cpp
> -@@ -347,6 +347,8 @@ WebEngineContext::WebEngineContext()
> -         parsedCommandLine->AppendSwitch(switches::kNoSandbox);
> - #elif defined(Q_OS_LINUX)
> -         parsedCommandLine->AppendSwitch(service_manager::switches::kDisableSetuidSandbox);
> -+        // HACK: disable seccomp filter sandbox for now because it does not work
> -+        parsedCommandLine->AppendSwitch(service_manager::switches::kDisableSeccompFilterSandbox);
> - #endif
> -     } else {
> -         parsedCommandLine->AppendSwitch(switches::kNoSandbox);
> --- 
> -1.9.1
> -
> diff --git a/meta-arago-distro/recipes-qt/qt5/qtwebengine_git.bbappend b/meta-arago-distro/recipes-qt/qt5/qtwebengine_git.bbappend
> index c50b020f..6459bbf7 100644
> --- a/meta-arago-distro/recipes-qt/qt5/qtwebengine_git.bbappend
> +++ b/meta-arago-distro/recipes-qt/qt5/qtwebengine_git.bbappend
> @@ -1,8 +1,4 @@
>  FILESEXTRAPATHS_prepend := "${THISDIR}/${PN}:"
>  PR_append = ".arago1"
>  
> -SRC_URI += " \
> -    file://0003-qtwebengine-HACK-disable-SECCOMP-BPF-Sandbox-at-star.patch \
> -"
> -
>  DEPENDS += "bison-native"
> -- 
> 2.33.0


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [meta-arago] [PATCH v2 1/2] qtbase-conf: disable the seccomp filter sandbox
  2021-10-07 18:12 ` [PATCH v2 1/2] qtbase-conf: disable the seccomp filter sandbox Denys Dmytriyenko
@ 2021-10-18 16:01   ` Yogesh Siraswar
  2021-10-18 21:43     ` Denys Dmytriyenko
  0 siblings, 1 reply; 6+ messages in thread
From: Yogesh Siraswar @ 2021-10-18 16:01 UTC (permalink / raw)
  To: Denys Dmytriyenko, Vivien Didelot; +Cc: Denys Dmytriyenko, meta-arago

Is this for master or dunfell or both.

On 10/7/21 1:12 PM, Denys Dmytriyenko wrote:
> On Thu, Oct 07, 2021 at 01:57:29PM -0400, Vivien Didelot wrote:
>> SECCOMP-BPF Sandbox is known to cause runtime issues so set the
>> QTWEBENGINE_CHROMIUM_FLAGS environment variable to disable this
>> feature temporarily until those issues are resolved.
>>
>> Signed-off-by: Vivien Didelot <vdidelot@pbsc.com>
> 
> Acked-by: Denys Dmytriyenko <denys@konsulko.com>
> 
> 
>> ---
>>   meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh       | 5 +++++
>>   meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh | 5 +++++
>>   2 files changed, 10 insertions(+)
>>
>> diff --git a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
>> index 146ee07e..928e2cc7 100644
>> --- a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
>> +++ b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
>> @@ -6,3 +6,8 @@ export QT_QPA_EGLFS_KMS_CONFIG=/etc/qt5/eglfs_kms_cfg.json
>>   export QT_QPA_EGLFS_INTEGRATION=eglfs_kms
>>   export QT_QPA_EGLFS_ALWAYS_SET_MODE=1
>>   export QT_WAYLAND_SHELL_INTEGRATION=wl-shell
>> +
>> +# SECCOMP-BPF Sandbox does not work due to unexpected FUTEX_UNLOCK_PI call
>> +# from the pthread implementation. Disable this feature temporarily until
>> +# those issues are resolved.
>> +export QTWEBENGINE_CHROMIUM_FLAGS="--disable-seccomp-filter-sandbox"
>> diff --git a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
>> index 29fa2969..96526393 100644
>> --- a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
>> +++ b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
>> @@ -7,3 +7,8 @@ export QT_QPA_EGLFS_KMS_CONFIG=/etc/qt5/eglfs_kms_cfg.json
>>   export QT_QPA_EGLFS_INTEGRATION=eglfs_kms
>>   export QT_QPA_EGLFS_ALWAYS_SET_MODE=1
>>   export QT_WAYLAND_SHELL_INTEGRATION=wl-shell
>> +
>> +# SECCOMP-BPF Sandbox does not work due to unexpected FUTEX_UNLOCK_PI call
>> +# from the pthread implementation. Disable this feature temporarily until
>> +# those issues are resolved.
>> +export QTWEBENGINE_CHROMIUM_FLAGS="--disable-seccomp-filter-sandbox"
>> -- 
>> 2.33.0
> _______________________________________________
> meta-arago mailing list
> meta-arago@arago-project.org
> http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago
> 

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [meta-arago] [PATCH v2 1/2] qtbase-conf: disable the seccomp filter sandbox
  2021-10-18 16:01   ` [meta-arago] " Yogesh Siraswar
@ 2021-10-18 21:43     ` Denys Dmytriyenko
  0 siblings, 0 replies; 6+ messages in thread
From: Denys Dmytriyenko @ 2021-10-18 21:43 UTC (permalink / raw)
  To: Yogesh Siraswar; +Cc: Vivien Didelot, meta-arago

On Mon, Oct 18, 2021 at 11:01:13AM -0500, Yogesh Siraswar wrote:
> Is this for master or dunfell or both.

Probably both.


> On 10/7/21 1:12 PM, Denys Dmytriyenko wrote:
> >On Thu, Oct 07, 2021 at 01:57:29PM -0400, Vivien Didelot wrote:
> >>SECCOMP-BPF Sandbox is known to cause runtime issues so set the
> >>QTWEBENGINE_CHROMIUM_FLAGS environment variable to disable this
> >>feature temporarily until those issues are resolved.
> >>
> >>Signed-off-by: Vivien Didelot <vdidelot@pbsc.com>
> >
> >Acked-by: Denys Dmytriyenko <denys@konsulko.com>
> >
> >
> >>---
> >>  meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh       | 5 +++++
> >>  meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh | 5 +++++
> >>  2 files changed, 10 insertions(+)
> >>
> >>diff --git a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
> >>index 146ee07e..928e2cc7 100644
> >>--- a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
> >>+++ b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/qt_env.sh
> >>@@ -6,3 +6,8 @@ export QT_QPA_EGLFS_KMS_CONFIG=/etc/qt5/eglfs_kms_cfg.json
> >>  export QT_QPA_EGLFS_INTEGRATION=eglfs_kms
> >>  export QT_QPA_EGLFS_ALWAYS_SET_MODE=1
> >>  export QT_WAYLAND_SHELL_INTEGRATION=wl-shell
> >>+
> >>+# SECCOMP-BPF Sandbox does not work due to unexpected FUTEX_UNLOCK_PI call
> >>+# from the pthread implementation. Disable this feature temporarily until
> >>+# those issues are resolved.
> >>+export QTWEBENGINE_CHROMIUM_FLAGS="--disable-seccomp-filter-sandbox"
> >>diff --git a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
> >>index 29fa2969..96526393 100644
> >>--- a/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
> >>+++ b/meta-arago-distro/recipes-qt/qt5/qtbase-conf/ti33x/qt_env.sh
> >>@@ -7,3 +7,8 @@ export QT_QPA_EGLFS_KMS_CONFIG=/etc/qt5/eglfs_kms_cfg.json
> >>  export QT_QPA_EGLFS_INTEGRATION=eglfs_kms
> >>  export QT_QPA_EGLFS_ALWAYS_SET_MODE=1
> >>  export QT_WAYLAND_SHELL_INTEGRATION=wl-shell
> >>+
> >>+# SECCOMP-BPF Sandbox does not work due to unexpected FUTEX_UNLOCK_PI call
> >>+# from the pthread implementation. Disable this feature temporarily until
> >>+# those issues are resolved.
> >>+export QTWEBENGINE_CHROMIUM_FLAGS="--disable-seccomp-filter-sandbox"
> >>-- 
> >>2.33.0

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2021-10-18 21:43 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-10-07 17:57 [PATCH v2 1/2] qtbase-conf: disable the seccomp filter sandbox Vivien Didelot
2021-10-07 17:57 ` [PATCH v2 2/2] qtwebengine: remove seccomp filter sandbox hack Vivien Didelot
2021-10-07 18:12   ` Denys Dmytriyenko
2021-10-07 18:12 ` [PATCH v2 1/2] qtbase-conf: disable the seccomp filter sandbox Denys Dmytriyenko
2021-10-18 16:01   ` [meta-arago] " Yogesh Siraswar
2021-10-18 21:43     ` Denys Dmytriyenko

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.