| Index: sandbox/linux/services/credentials.cc
|
| diff --git a/sandbox/linux/services/credentials.cc b/sandbox/linux/services/credentials.cc
|
| index ce5eeda78ed177002b4bb4083d452e4fa6edcf2d..e571ddec59776a58a1810b22bf83ba4c63b8ba58 100644
|
| --- a/sandbox/linux/services/credentials.cc
|
| +++ b/sandbox/linux/services/credentials.cc
|
| @@ -203,13 +203,17 @@ bool Credentials::MoveToNewUserNS() {
|
| return false;
|
| }
|
|
|
| + if (NamespaceUtils::KernelSupportsDenySetgroups()) {
|
| + PCHECK(NamespaceUtils::DenySetgroups());
|
| + }
|
| +
|
| // The current {r,e,s}{u,g}id is now an overflow id (c.f.
|
| // /proc/sys/kernel/overflowuid). Setup the uid and gid maps.
|
| DCHECK(GetRESIds(NULL, NULL));
|
| const char kGidMapFile[] = "/proc/self/gid_map";
|
| const char kUidMapFile[] = "/proc/self/uid_map";
|
| - CHECK(NamespaceUtils::WriteToIdMapFile(kGidMapFile, gid));
|
| - CHECK(NamespaceUtils::WriteToIdMapFile(kUidMapFile, uid));
|
| + PCHECK(NamespaceUtils::WriteToIdMapFile(kGidMapFile, gid));
|
| + PCHECK(NamespaceUtils::WriteToIdMapFile(kUidMapFile, uid));
|
| DCHECK(GetRESIds(NULL, NULL));
|
| return true;
|
| }
|
|
|