Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(3726)

Unified Diff: chrome/renderer/renderer_main_platform_delegate_linux.cc

Issue 371047: Allow the seccomp sandbox to be enabled, even if the suid sandbox has... (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: '' Created 11 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « chrome/browser/zygote_main_linux.cc ('k') | sandbox/linux/seccomp/access.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/renderer/renderer_main_platform_delegate_linux.cc
===================================================================
--- chrome/renderer/renderer_main_platform_delegate_linux.cc (revision 31339)
+++ chrome/renderer/renderer_main_platform_delegate_linux.cc (working copy)
@@ -37,9 +37,12 @@
// The seccomp sandbox is started in the renderer.
// http://code.google.com/p/seccompsandbox/
#if defined(ARCH_CPU_X86_FAMILY) && !defined(CHROMIUM_SELINUX)
+ // N.b. SupportsSeccompSandbox() returns a cached result, as we already
+ // called it earlier in the zygote. Thus, it is OK for us to not pass in
+ // a file descriptor for "/proc".
if (CommandLine::ForCurrentProcess()->HasSwitch(
switches::kEnableSeccompSandbox) &&
- SupportsSeccompSandbox()) {
+ SupportsSeccompSandbox(-1)) {
StartSeccompSandbox();
}
#endif
« no previous file with comments | « chrome/browser/zygote_main_linux.cc ('k') | sandbox/linux/seccomp/access.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698