Chromium Code Reviews| Index: content/renderer/renderer_main_platform_delegate_linux.cc |
| diff --git a/content/renderer/renderer_main_platform_delegate_linux.cc b/content/renderer/renderer_main_platform_delegate_linux.cc |
| index bc9deec23a811a3dc69091fc6390cb473b202271..637aec233d19e3b7c3b9a548c984137766f5bee1 100644 |
| --- a/content/renderer/renderer_main_platform_delegate_linux.cc |
| +++ b/content/renderer/renderer_main_platform_delegate_linux.cc |
| @@ -39,12 +39,6 @@ void RendererMainPlatformDelegate::PlatformInitialize() { |
| void RendererMainPlatformDelegate::PlatformUninitialize() { |
| } |
| -bool RendererMainPlatformDelegate::InitSandboxTests(bool no_sandbox) { |
| - // The sandbox is started in the zygote process: zygote_main_linux.cc |
| - // http://code.google.com/p/chromium/wiki/LinuxSUIDSandbox |
| - return true; |
| -} |
| - |
| bool RendererMainPlatformDelegate::EnableSandbox() { |
| // The setuid sandbox is started in the zygote process: zygote_main_linux.cc |
| // http://code.google.com/p/chromium/wiki/LinuxSUIDSandbox |
| @@ -54,41 +48,4 @@ bool RendererMainPlatformDelegate::EnableSandbox() { |
| return true; |
| } |
| -void RendererMainPlatformDelegate::RunSandboxTests(bool no_sandbox) { |
|
jln (very slow on Chromium)
2014/05/20 02:29:11
I really would like to keep this sanity check that
luken
2014/05/28 19:19:39
Done.
|
| - // The LinuxSandbox class requires going through initialization before |
| - // GetStatus() and others can be used. When we are not launched through the |
| - // Zygote, this initialization will only happen in the renderer process if |
| - // EnableSandbox() above is called, which it won't necesserily be. |
| - // This only happens with flags such as --renderer-cmd-prefix which are |
| - // for debugging. |
| - if (no_sandbox) |
| - return; |
| - |
| - // about:sandbox uses a value returned from LinuxSandbox::GetStatus() before |
| - // any renderer has been started. |
| - // Here, we test that the status of SeccompBpf in the renderer is consistent |
| - // with what LinuxSandbox::GetStatus() said we would do. |
| - class LinuxSandbox* linux_sandbox = LinuxSandbox::GetInstance(); |
| - if (linux_sandbox->GetStatus() & kSandboxLinuxSeccompBPF) { |
| - CHECK(linux_sandbox->seccomp_bpf_started()); |
| - } |
| - |
| - // Under the setuid sandbox, we should not be able to open any file via the |
| - // filesystem. |
| - if (linux_sandbox->GetStatus() & kSandboxLinuxSUID) { |
| - CHECK(!base::PathExists(base::FilePath("/proc/cpuinfo"))); |
| - } |
| - |
| -#if defined(__x86_64__) |
| - // Limit this test to architectures where seccomp BPF is active in renderers. |
| - if (linux_sandbox->seccomp_bpf_started()) { |
| - errno = 0; |
| - // This should normally return EBADF since the first argument is bogus, |
| - // but we know that under the seccomp-bpf sandbox, this should return EPERM. |
| - CHECK_EQ(fchmod(-1, 07777), -1); |
| - CHECK_EQ(errno, EPERM); |
| - } |
| -#endif // __x86_64__ |
| -} |
| - |
| } // namespace content |