Index: chrome/test/security_tests/sandbox_browsertest_linux.cc |
diff --git a/chrome/test/security_tests/sandbox_browsertest_linux.cc b/chrome/test/security_tests/sandbox_browsertest_linux.cc |
deleted file mode 100644 |
index f51db555bfcc6401e3888796f4d1cb2f9f8e3a4a..0000000000000000000000000000000000000000 |
--- a/chrome/test/security_tests/sandbox_browsertest_linux.cc |
+++ /dev/null |
@@ -1,34 +0,0 @@ |
-// Copyright 2013 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/test/base/in_process_browser_test.h" |
-#include "content/public/browser/zygote_host_linux.h" |
-#include "content/public/common/sandbox_linux.h" |
- |
-typedef InProcessBrowserTest SandboxLinuxTest; |
- |
-// Both the SUID sandbox (http://crbug.com/137653) and the Seccomp-BPF sandbox |
-// are currently incompatible with ASan. |
-#if defined(OS_LINUX) && !defined(ADDRESS_SANITIZER) |
-#define MAYBE_SandboxStatus \ |
- SandboxStatus |
-#else |
-#define MAYBE_SandboxStatus \ |
- DISABLED_SandboxStatus |
-#endif |
- |
-IN_PROC_BROWSER_TEST_F(SandboxLinuxTest, MAYBE_SandboxStatus) { |
jln (very slow on Chromium)
2014/05/22 21:04:54
Let's keep this around please.
luken
2014/05/28 19:19:39
Can we move it to somewhere other than security_te
|
- // Get expected sandboxing status of renderers. |
- const int status = content::ZygoteHost::GetInstance()->GetSandboxStatus(); |
- |
- // The setuid sandbox is required as our first-layer sandbox. |
- bool good_layer1 = status & content::kSandboxLinuxSUID && |
- status & content::kSandboxLinuxPIDNS && |
- status & content::kSandboxLinuxNetNS; |
- // A second-layer sandbox is also required to be adequately sandboxed. |
- bool good_layer2 = status & content::kSandboxLinuxSeccompBPF; |
- |
- EXPECT_TRUE(good_layer1); |
- EXPECT_TRUE(good_layer2); |
-} |