Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2258)

Unified Diff: content/common/sandbox_init_linux.cc

Issue 13814027: Linux: make current InitializeSandbox() private. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Remove sandbox_init_linux.cc Created 7 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | content/common/sandbox_linux.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: content/common/sandbox_init_linux.cc
diff --git a/content/common/sandbox_init_linux.cc b/content/common/sandbox_init_linux.cc
deleted file mode 100644
index 25cbf954fc15a961defab1f912db9a1d7c41d692..0000000000000000000000000000000000000000
--- a/content/common/sandbox_init_linux.cc
+++ /dev/null
@@ -1,50 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include <string>
-
-#include "base/command_line.h"
-#include "base/logging.h"
-#include "content/common/sandbox_linux.h"
-#include "content/public/common/content_switches.h"
-#include "content/public/common/sandbox_init.h"
-
-namespace content {
-
-// TODO(jln): have call sites provide a process / policy type to
-// InitializeSandbox().
-bool InitializeSandbox() {
- bool seccomp_legacy_started = false;
- bool seccomp_bpf_started = false;
- LinuxSandbox* linux_sandbox = LinuxSandbox::GetInstance();
- const std::string process_type =
- CommandLine::ForCurrentProcess()->GetSwitchValueASCII(
- switches::kProcessType);
-
- // No matter what, it's always an error to call InitializeSandbox() after
- // threads have been created.
- if (!linux_sandbox->IsSingleThreaded()) {
- std::string error_message = "InitializeSandbox() called with multiple "
- "threads in process " + process_type;
- // TODO(jln): change this into a CHECK() once we are more comfortable it
- // does not trigger.
- LOG(ERROR) << error_message;
- return false;
- }
-
- // Attempt to limit the future size of the address space of the process.
- linux_sandbox->LimitAddressSpace(process_type);
-
- // First, try to enable seccomp-bpf.
- seccomp_bpf_started = linux_sandbox->StartSeccompBpf(process_type);
-
- // If that fails, try to enable seccomp-legacy.
- if (!seccomp_bpf_started) {
- seccomp_legacy_started = linux_sandbox->StartSeccompLegacy(process_type);
- }
-
- return seccomp_legacy_started || seccomp_bpf_started;
-}
-
-} // namespace content
« no previous file with comments | « no previous file | content/common/sandbox_linux.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698