blob: 90b7852c2028aee2893b22002346c55d21c77584 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
|
--- content/zygote/zygote_main_linux.cc.orig 2020-09-16 15:49:35 UTC
+++ content/zygote/zygote_main_linux.cc
@@ -11,7 +11,9 @@
#include <stddef.h>
#include <stdint.h>
#include <string.h>
+#if !defined(OS_BSD)
#include <sys/prctl.h>
+#endif
#include <sys/socket.h>
#include <sys/types.h>
#include <unistd.h>
@@ -100,6 +102,7 @@ static bool CreateInitProcessReaper(
// created through the setuid sandbox.
static bool EnterSuidSandbox(sandbox::SetuidSandboxClient* setuid_sandbox,
base::OnceClosure post_fork_parent_callback) {
+#if !defined(OS_BSD)
DCHECK(setuid_sandbox);
DCHECK(setuid_sandbox->IsSuidSandboxChild());
@@ -132,6 +135,9 @@ static bool EnterSuidSandbox(sandbox::SetuidSandboxCli
CHECK(service_manager::SandboxDebugHandling::SetDumpableStatusAndHandlers());
return true;
+#else
+ return false;
+#endif // !defined(OS_BSD)
}
static void DropAllCapabilities(int proc_fd) {
@@ -177,6 +183,7 @@ static void EnterLayerOneSandbox(service_manager::Sand
bool ZygoteMain(
std::vector<std::unique_ptr<ZygoteForkDelegate>> fork_delegates) {
+#if !defined(OS_BSD)
sandbox::SetAmZygoteOrRenderer(true, GetSandboxFD());
auto* linux_sandbox = service_manager::SandboxLinux::GetInstance();
@@ -242,6 +249,9 @@ bool ZygoteMain(
// This function call can return multiple times, once per fork().
return zygote.ProcessRequests();
+#else
+ return false;
+#endif // !defined(OS_BSD)
}
} // namespace content
|