Chromium Code Reviews
DescriptionLinux sandbox: change seccomp detection and initialization.
Change how we detect seccomp kernel support and its initialization.
Before, detecting seccomp kernel supports would involve starting probe processes
that would enable seccomp. A crash would mean that seccomp was not supported.
This was necessary with old kernel version and old glibc versions that were
problematic.
Now that these shouldn't exist in the field, we move the checks to unit
tests instead.
Following the refactor in https://chromiumcodereview.appspot.com/733303004/
we can greatly simplify both detection and starting of the sandbox to make the API
more sane.
BUG=434820
TBR=piman
Committed: https://crrev.com/bd576720e621951616af892bcf03ffaac49f1881
Cr-Commit-Position: refs/heads/master@{#305706}
Patch Set 1 #
Total comments: 3
Patch Set 2 : Nits. #Patch Set 3 : Rebase #
Total comments: 2
Patch Set 4 : Fix Android + NonSFI NaCl #
Total comments: 6
Patch Set 5 : Switch SeccompLevel to an enum class. #
Total comments: 3
Patch Set 6 : Appease dumb compilers. #
Total comments: 2
Patch Set 7 : Rebase #Patch Set 8 : Get rid of SeccompLevel::INVALID #Messages
Total messages: 30 (8 generated)
|