xref: /aosp_15_r20/external/cronet/components/nacl/loader/nacl_main_platform_delegate_linux.cc (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1 // Copyright 2013 The Chromium Authors
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "components/nacl/loader/nacl_main_platform_delegate.h"
6 
EnableSandbox(const content::MainFunctionParams & parameters)7 void NaClMainPlatformDelegate::EnableSandbox(
8     const content::MainFunctionParams& parameters) {
9   // The setuid sandbox is started in the zygote process: zygote_main_linux.cc
10   // https://chromium.googlesource.com/chromium/src/+/main/docs/linux/suid_sandbox.md
11   //
12   // The seccomp sandbox is started in the renderer.
13   // http://code.google.com/p/seccompsandbox/
14   // seccomp is currently disabled for nacl.
15   // http://code.google.com/p/chromium/issues/detail?id=59423
16   // See the code in chrome/renderer/renderer_main_platform_delegate_linux.cc
17   // for how to turn seccomp on.
18   //
19   // The seccomp sandbox should not be enabled for Native Client until
20   // all of these issues are fixed:
21   // http://code.google.com/p/nativeclient/issues/list?q=label:Seccomp
22   // At best, NaCl will not work.  At worst, enabling the seccomp sandbox
23   // could create a hole in the NaCl sandbox.
24 }
25