Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(119)

Unified Diff: sandbox_impl.h

Issue 10399114: I am somewhat reluctantly changing the API so that setProcFD is no longer (Closed) Base URL: http://seccompsandbox.googlecode.com/svn/trunk/
Patch Set: Created 8 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « sandbox.cc ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: sandbox_impl.h
===================================================================
--- sandbox_impl.h (revision 184)
+++ sandbox_impl.h (working copy)
@@ -79,11 +79,10 @@
// The sandbox needs to be able to access "/proc/self/maps". If this file
// is not accessible when "startSandbox()" gets called, the caller can
- // provide an already opened file descriptor by calling "setProcSelf()".
+ // provide an already opened file descriptor by calling "setProcFd()".
// The sandbox becomes the newer owner of this file descriptor and will
- // eventually close it when "startSandbox()" executes. But if the caller
- // never ends up calling startSandbox(), then the caller must close the
- // file descriptor.
+ // eventually close it. After calling setProcFd(), the caller MUST eventually
+ // call startSandbox(), or resources could be leaked.
static void setProcFd(int proc) asm("SeccompSandboxSetProcFd");
// This is the main public entry point. It finds all system calls that
« no previous file with comments | « sandbox.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698