Default to sandboxed zygote in SandboxedProcessLauncherDelegate.
Now that all processes which can launch from the zygote are doing so, we should ensure future launchers are safe by default and that exceptions are intentional. Additionally adds file://sandbox/OWNERS for relevant files. Fixed: 22703 Test: All existing tests pass. Change-Id: I188f4314fbf5cf4659bf555b14b572f657a8720c Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2067541 Auto-Submit: Dale Curtis <dalecurtis@chromium.org> Reviewed-by:Robert Sesek <rsesek@chromium.org> Reviewed-by:
John Abd-El-Malek <jam@chromium.org> Commit-Queue: John Abd-El-Malek <jam@chromium.org> Cr-Commit-Position: refs/heads/master@{#744049}
Showing
Please register or sign in to comment