Index: content/common/sandbox_seccomp_bpf_linux.cc |
diff --git a/content/common/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_seccomp_bpf_linux.cc |
index 3468413c11d920679b9e059024a2eca2da320ea4..5e694f7a29abb263b2155bcc7df231dc512e2394 100644 |
--- a/content/common/sandbox_seccomp_bpf_linux.cc |
+++ b/content/common/sandbox_seccomp_bpf_linux.cc |
@@ -510,6 +510,15 @@ bool SandboxSeccompBpf::IsSeccompBpfDesired() { |
} |
} |
+bool SandboxSeccompBpf::ShouldEnableSeccompBpf( |
+ const std::string& process_type) { |
+#if defined(SECCOMP_BPF_SANDBOX) |
+ const CommandLine& command_line = *CommandLine::ForCurrentProcess(); |
+ return !ShouldDisableBpfSandbox(command_line, process_type); |
+#endif |
+ return false; |
+} |
+ |
bool SandboxSeccompBpf::SupportsSandbox() { |
#if defined(SECCOMP_BPF_SANDBOX) |
// TODO(jln): pass the saved proc_fd_ from the LinuxSandbox singleton |
@@ -528,7 +537,7 @@ bool SandboxSeccompBpf::StartSandbox(const std::string& process_type) { |
if (IsSeccompBpfDesired() && // Global switches policy. |
// Process-specific policy. |
- !ShouldDisableBpfSandbox(command_line, process_type) && |
+ ShouldEnableSeccompBpf(process_type) && |
SupportsSandbox()) { |
return StartBpfSandbox_x86(command_line, process_type); |
} |