Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(27)

Issue 10535089: Avoid all library calls (including calls to destructors) after enabling the sandbox. (Closed)

Created:
8 years, 6 months ago by Markus (顧孟勤)
Modified:
8 years, 6 months ago
CC:
chromium-reviews, agl, jln+watch_chromium.org
Visibility:
Public.

Description

Avoid all library calls (including calls to destructors) after enabling the sandbox. This ensures that the sandbox doesn't surprisingly fail, if the user instantiated a particularly strick policy. BUG=130662 TEST=make && ./demo32 && ./demo64 Committed: https://src.chromium.org/viewvc/chrome?view=rev&revision=141851

Patch Set 1 #

Total comments: 8

Patch Set 2 : Added comments requested by Julien #

Total comments: 1
Unified diffs Side-by-side diffs Delta from patch set Stats (+38 lines, -17 lines) Patch
M sandbox/linux/seccomp-bpf/sandbox_bpf.h View 1 1 chunk +6 lines, -5 lines 0 comments Download
M sandbox/linux/seccomp-bpf/sandbox_bpf.cc View 1 3 chunks +32 lines, -12 lines 1 comment Download

Messages

Total messages: 5 (0 generated)
Markus (顧孟勤)
I am trying to keep all policy out of the sandbox compiler. But we accidentally ...
8 years, 6 months ago (2012-06-08 21:42:48 UTC) #1
jln (very slow on Chromium)
https://chromiumcodereview.appspot.com/10535089/diff/1/sandbox/linux/seccomp-bpf/sandbox_bpf.cc File sandbox/linux/seccomp-bpf/sandbox_bpf.cc (right): https://chromiumcodereview.appspot.com/10535089/diff/1/sandbox/linux/seccomp-bpf/sandbox_bpf.cc#newcode216 sandbox/linux/seccomp-bpf/sandbox_bpf.cc:216: Program *program = new Program(); I would love if ...
8 years, 6 months ago (2012-06-12 19:16:23 UTC) #2
Markus (顧孟勤)
https://chromiumcodereview.appspot.com/10535089/diff/1/sandbox/linux/seccomp-bpf/sandbox_bpf.cc File sandbox/linux/seccomp-bpf/sandbox_bpf.cc (right): https://chromiumcodereview.appspot.com/10535089/diff/1/sandbox/linux/seccomp-bpf/sandbox_bpf.cc#newcode216 sandbox/linux/seccomp-bpf/sandbox_bpf.cc:216: Program *program = new Program(); On 2012/06/12 19:16:23, Julien ...
8 years, 6 months ago (2012-06-12 19:35:05 UTC) #3
jln (very slow on Chromium)
LGTM (assuming that the review tool is getting really confused because the diff base is ...
8 years, 6 months ago (2012-06-12 20:22:51 UTC) #4
Chris Evans
8 years, 6 months ago (2012-06-12 20:26:25 UTC) #5
LGTM, one minor nit, do what you will with it.
I like the spirit of this CL :)

https://chromiumcodereview.appspot.com/10535089/diff/5001/sandbox/linux/secco...
File sandbox/linux/seccomp-bpf/sandbox_bpf.cc (right):

https://chromiumcodereview.appspot.com/10535089/diff/5001/sandbox/linux/secco...
sandbox/linux/seccomp-bpf/sandbox_bpf.cc:216: if (!program) {
Nit: not sure you need this, the standard c++ runtime should throw upon an
allocation failure?

Powered by Google App Engine
This is Rietveld 408576698