Index: content/common/sandbox_linux/sandbox_linux.cc |
diff --git a/content/common/sandbox_linux/sandbox_linux.cc b/content/common/sandbox_linux/sandbox_linux.cc |
index 5eee4e1d6c14d47e785a0ac42e4c8a77a93d6383..773277da2bdc818017d39d435c02e609bea25c1f 100644 |
--- a/content/common/sandbox_linux/sandbox_linux.cc |
+++ b/content/common/sandbox_linux/sandbox_linux.cc |
@@ -4,6 +4,7 @@ |
#include <dirent.h> |
#include <fcntl.h> |
+#include <sys/capability.h> |
#include <sys/resource.h> |
#include <sys/stat.h> |
#include <sys/time.h> |
@@ -186,7 +187,11 @@ void LinuxSandbox::EngageNamespaceSandbox() { |
// Note: this requires SealSandbox() to be called later in this process to be |
// safe, as this class is keeping a file descriptor to /proc/. |
CHECK(sandbox::Credentials::DropFileSystemAccess(proc_fd_)); |
- CHECK(sandbox::Credentials::DropAllCapabilities(proc_fd_)); |
+ |
+ // We do not drop CAP_SYS_ADMIN because we need it to place each child process |
+ // in its own PID namespace later on. |
+ const std::vector<cap_value_t> caps(1, CAP_SYS_ADMIN); |
+ CHECK(sandbox::Credentials::SetCapabilities(proc_fd_, caps)); |
// This needs to happen after moving to a new user NS, since doing so involves |
// writing the UID/GID map. |