diff options
author | scottmg@chromium.org <scottmg@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-04-05 02:47:06 +0000 |
---|---|---|
committer | scottmg@chromium.org <scottmg@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-04-05 02:47:06 +0000 |
commit | 2fd337ff1d360779d5ef56a144ad570e7a05fb82 (patch) | |
tree | 5a14c79df584afdbcdb2d12b789c5888cdf6332f /content/common | |
parent | aafb94168f43048379600e44a3cf6b9f7f1cb86d (diff) | |
download | chromium_src-2fd337ff1d360779d5ef56a144ad570e7a05fb82.zip chromium_src-2fd337ff1d360779d5ef56a144ad570e7a05fb82.tar.gz chromium_src-2fd337ff1d360779d5ef56a144ad570e7a05fb82.tar.bz2 |
Revert of sandbox: Add support for starting seccomp-bpf with threads. (https://codereview.chromium.org/224403002/)
Reason for revert:
Failed compile on http://build.chromium.org/p/chromium.linux/builders/Linux%20Clang%20%28dbg%29/builds/57969/steps/compile/logs/stdio
Original issue's description:
> sandbox: Add support for starting seccomp-bpf with threads.
>
> This requires an experimental kernel patch that has not yet been accepted
> upstream. However this is a prerequisite for getting running seccomp-bpf under
> Android.
>
> BUG=308763, 308775
>
> Committed: https://src.chromium.org/viewvc/chrome?view=rev&revision=261951
TBR=jln@chromium.org,rsesek@chromium.org
NOTREECHECKS=true
NOTRY=true
BUG=308763, 308775
Review URL: https://codereview.chromium.org/226693004
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@261959 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'content/common')
-rw-r--r-- | content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc index 8a6fa72..6d32be5 100644 --- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc +++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc @@ -159,7 +159,7 @@ void StartSandboxWithPolicy(sandbox::SandboxBPFPolicy* policy) { // doing so does not stop the sandbox. SandboxBPF sandbox; sandbox.SetSandboxPolicy(policy); - CHECK(sandbox.StartSandbox(SandboxBPF::PROCESS_SINGLE_THREADED)); + sandbox.StartSandbox(); } // nacl_helper needs to be tiny and includes only part of content/ |