| Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h
|
| diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h
|
| index bf6d15b9013612f3070a9d2451a729e8d3fd7876..1b601c67d4874918789d8bf671c75b4df33b17cb 100644
|
| --- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h
|
| +++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h
|
| @@ -32,9 +32,10 @@ class SandboxSeccompBPF {
|
| static bool IsSeccompBPFDesired();
|
| // Should the sandbox be enabled for process_type ?
|
| static bool ShouldEnableSeccompBPF(const std::string& process_type);
|
| - // Check if the kernel supports this sandbox. It's useful to "prewarm"
|
| - // this, part of the result will be cached.
|
| + // Check if the kernel supports seccomp-bpf.
|
| static bool SupportsSandbox();
|
| + // Check if the kernel supports TSYNC (thread synchronization) with seccomp.
|
| + static bool SupportsSandboxWithTsync();
|
| // Start the sandbox and apply the policy for process_type, depending on
|
| // command line switches.
|
| static bool StartSandbox(const std::string& process_type,
|
|
|