Index: sandbox/linux/suid/client/setuid_sandbox_client.cc |
=================================================================== |
--- sandbox/linux/suid/client/setuid_sandbox_client.cc (revision 149703) |
+++ sandbox/linux/suid/client/setuid_sandbox_client.cc (working copy) |
@@ -103,9 +103,8 @@ |
return sandbox_client; |
} |
-SetuidSandboxClient::SetuidSandboxClient() |
- : env_(NULL), |
- sandboxed_(false) { |
+SetuidSandboxClient::SetuidSandboxClient() { |
+ env_ = NULL; |
} |
SetuidSandboxClient::~SetuidSandboxClient() { |
@@ -143,10 +142,6 @@ |
LOG(ERROR) << "Error code reply from chroot helper"; |
return false; |
} |
- |
- // We now consider ourselves "fully sandboxed" as far as the |
- // setuid sandbox is concerned. |
- sandboxed_ = true; |
return true; |
} |
@@ -166,10 +161,6 @@ |
return env_->HasVar(kSandboxNETNSEnvironmentVarName); |
} |
-bool SetuidSandboxClient::IsSandboxed() const { |
- return sandboxed_; |
-} |
- |
void SetuidSandboxClient::SetupLaunchEnvironment() { |
SaveSUIDUnsafeEnvironmentVariables(env_); |
SetSandboxAPIEnvironmentVariable(env_); |