| Index: sandbox/linux/services/credentials.cc
|
| diff --git a/sandbox/linux/services/credentials.cc b/sandbox/linux/services/credentials.cc
|
| index 50a109e2f456b320a530c7d9baa55347bbfbc1a9..2cc60967995188dc1a6501758b757ecb1a609511 100644
|
| --- a/sandbox/linux/services/credentials.cc
|
| +++ b/sandbox/linux/services/credentials.cc
|
| @@ -132,9 +132,10 @@ bool ChrootToSafeEmptyDir() {
|
| void CheckCloneNewUserErrno(int error) {
|
| // EPERM can happen if already in a chroot. EUSERS if too many nested
|
| // namespaces are used. EINVAL for kernels that don't support the feature.
|
| - // Valgrind will ENOSYS unshare().
|
| + // Valgrind will ENOSYS unshare(). ENOSPC can occur when the system has
|
| + // reached its maximum configured number of user namespaces.
|
| PCHECK(error == EPERM || error == EUSERS || error == EINVAL ||
|
| - error == ENOSYS);
|
| + error == ENOSYS || error == ENOSPC);
|
| }
|
|
|
| // Converts a Capability to the corresponding Linux CAP_XXX value.
|
|
|