Chromium Code Reviews| Index: sandbox/linux/suid/client/setuid_sandbox_client.cc |
| diff --git a/sandbox/linux/suid/client/setuid_sandbox_client.cc b/sandbox/linux/suid/client/setuid_sandbox_client.cc |
| index ca73d46444e12e386fbd9bed5c99fbcad382ed71..107d7c964cc56ff9b7c579d29fe4e8230ee19321 100644 |
| --- a/sandbox/linux/suid/client/setuid_sandbox_client.cc |
| +++ b/sandbox/linux/suid/client/setuid_sandbox_client.cc |
| @@ -22,8 +22,8 @@ |
| namespace { |
| bool IsFileSystemAccessDenied() { |
| - base::ScopedFD root_dir(HANDLE_EINTR(open("/", O_RDONLY))); |
| - return !root_dir.is_valid(); |
| + base::ScopedFD proc_self_exe(HANDLE_EINTR(open("/proc/self/exe", O_RDONLY))); |
|
mdempsky
2017/01/10 22:48:23
Since we decided to not support root+sandbox, can
Tom (Use chromium acct)
2017/01/10 23:32:03
Unfortunately no, since the dialog box gets shown
mdempsky
2017/01/11 22:20:15
That is unfortunate. Can you at least add a commen
|
| + return !proc_self_exe.is_valid(); |
| } |
| int GetHelperApi(base::Environment* env) { |