| Index: mojo/runner/child_process.cc | 
| diff --git a/mojo/runner/child_process.cc b/mojo/runner/child_process.cc | 
| index eda7829a2af093b1e4b26ce79e2f84f5a43905f2..85ce4b31526dca02fdf1dee64b59857513aef3b6 100644 | 
| --- a/mojo/runner/child_process.cc | 
| +++ b/mojo/runner/child_process.cc | 
| @@ -310,7 +310,13 @@ int ChildProcessMain() { | 
| if (sandbox_warm) | 
| sandbox_warm(); | 
|  | 
| +      // TODO(erg,jln): Allowing access to all of /dev/shm/ makes it easy to | 
| +      // spy on other shared memory using processes. This is a temporary hack | 
| +      // so that we have some sandbox until we have proper shared memory | 
| +      // support integrated into mojo. | 
| std::vector<BrokerFilePermission> permissions; | 
| +      permissions.push_back( | 
| +          BrokerFilePermission::ReadWriteCreateUnlinkRecursive("/dev/shm/")); | 
| sandbox.reset(new mandoline::LinuxSandbox(permissions)); | 
| sandbox->Warmup(); | 
| sandbox->EngageNamespaceSandbox(); | 
|  |