| Index: content/common/sandbox_init_linux.cc
|
| diff --git a/content/common/sandbox_init_linux.cc b/content/common/sandbox_init_linux.cc
|
| deleted file mode 100644
|
| index 25cbf954fc15a961defab1f912db9a1d7c41d692..0000000000000000000000000000000000000000
|
| --- a/content/common/sandbox_init_linux.cc
|
| +++ /dev/null
|
| @@ -1,50 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include <string>
|
| -
|
| -#include "base/command_line.h"
|
| -#include "base/logging.h"
|
| -#include "content/common/sandbox_linux.h"
|
| -#include "content/public/common/content_switches.h"
|
| -#include "content/public/common/sandbox_init.h"
|
| -
|
| -namespace content {
|
| -
|
| -// TODO(jln): have call sites provide a process / policy type to
|
| -// InitializeSandbox().
|
| -bool InitializeSandbox() {
|
| - bool seccomp_legacy_started = false;
|
| - bool seccomp_bpf_started = false;
|
| - LinuxSandbox* linux_sandbox = LinuxSandbox::GetInstance();
|
| - const std::string process_type =
|
| - CommandLine::ForCurrentProcess()->GetSwitchValueASCII(
|
| - switches::kProcessType);
|
| -
|
| - // No matter what, it's always an error to call InitializeSandbox() after
|
| - // threads have been created.
|
| - if (!linux_sandbox->IsSingleThreaded()) {
|
| - std::string error_message = "InitializeSandbox() called with multiple "
|
| - "threads in process " + process_type;
|
| - // TODO(jln): change this into a CHECK() once we are more comfortable it
|
| - // does not trigger.
|
| - LOG(ERROR) << error_message;
|
| - return false;
|
| - }
|
| -
|
| - // Attempt to limit the future size of the address space of the process.
|
| - linux_sandbox->LimitAddressSpace(process_type);
|
| -
|
| - // First, try to enable seccomp-bpf.
|
| - seccomp_bpf_started = linux_sandbox->StartSeccompBpf(process_type);
|
| -
|
| - // If that fails, try to enable seccomp-legacy.
|
| - if (!seccomp_bpf_started) {
|
| - seccomp_legacy_started = linux_sandbox->StartSeccompLegacy(process_type);
|
| - }
|
| -
|
| - return seccomp_legacy_started || seccomp_bpf_started;
|
| -}
|
| -
|
| -} // namespace content
|
|
|