Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(172)

Unified Diff: components/nacl/loader/sandbox_linux/nacl_sandbox_linux.h

Issue 919203002: Linux Sandbox: add resource limits to NaCl (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Disable on sanitizers. Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: components/nacl/loader/sandbox_linux/nacl_sandbox_linux.h
diff --git a/components/nacl/loader/sandbox_linux/nacl_sandbox_linux.h b/components/nacl/loader/sandbox_linux/nacl_sandbox_linux.h
index 333f8405c8636e5ce1092170c5ca07935d0518bf..8c91d4367e9ecbe75ccf4ff280e832754bb11507 100644
--- a/components/nacl/loader/sandbox_linux/nacl_sandbox_linux.h
+++ b/components/nacl/loader/sandbox_linux/nacl_sandbox_linux.h
@@ -50,11 +50,13 @@ class NaClSandbox {
bool HasOpenDirectory();
// Will attempt to initialize the layer-1 sandbox, depending on flags and the
// environment. It can only succeed if the current process is a child of the
- // setuid sandbox.
+ // setuid sandbox or was started by the namespace sandbox.
void InitializeLayerOneSandbox();
// Will attempt to initialize the layer-2 sandbox, depending on flags and the
// environment. |uses_nonsfi_mode| describes which seccomp-bpf policy is
// appropriate.
+ // This layer will also add a limit to how much of the address space can be
+ // used.
void InitializeLayerTwoSandbox(bool uses_nonsfi_mode);
// Seal the layer-1 sandbox, making it enforcing.
void SealLayerOneSandbox();

Powered by Google App Engine
This is Rietveld 408576698