Commit b38758c9 authored by evan@chromium.org's avatar evan@chromium.org

linux: warn if we're not running with the SUID sandbox

This should help reduce confusion on when/whether a sandbox is running.

Review URL: http://codereview.chromium.org/7528013

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@95912 0039d316-1c4b-4281-b951-d872f2087c98
parent ea8d495e
......@@ -118,10 +118,11 @@ void ZygoteHost::Init(const std::string& sandbox_cmd) {
&cmd_line, -1);
sandbox_binary_ = sandbox_cmd.c_str();
struct stat st;
if (!sandbox_cmd.empty() && stat(sandbox_binary_.c_str(), &st) == 0) {
if (access(sandbox_binary_.c_str(), X_OK) == 0 &&
if (!sandbox_cmd.empty()) {
struct stat st;
if (stat(sandbox_binary_.c_str(), &st) == 0 &&
access(sandbox_binary_.c_str(), X_OK) == 0 &&
(st.st_uid == 0) &&
(st.st_mode & S_ISUID) &&
(st.st_mode & S_IXOTH)) {
......@@ -135,6 +136,10 @@ void ZygoteHost::Init(const std::string& sandbox_cmd) {
"I'm aborting now. You need to make sure that "
<< sandbox_binary_ << " is mode 4755 and owned by root.";
}
} else {
LOG(WARNING) << "Running without the SUID sandbox! See "
"http://code.google.com/p/chromium/wiki/LinuxSUIDSandboxDevelopment "
"for more information on developing with the sandbox on.";
}
// Start up the sandbox host process and get the file descriptor for the
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment