| Index: content/public/common/sandbox_init.h
|
| diff --git a/content/public/common/sandbox_init.h b/content/public/common/sandbox_init.h
|
| index 646b083df7b7918bdd8cb7e3f580bcc9836dde9d..b5ff62c8752f80934698768b75b10cd618114d41 100644
|
| --- a/content/public/common/sandbox_init.h
|
| +++ b/content/public/common/sandbox_init.h
|
| @@ -78,19 +78,6 @@ CONTENT_EXPORT base::ProcessHandle StartSandboxedProcess(
|
| CONTENT_EXPORT bool InitializeSandbox(int sandbox_type,
|
| const base::FilePath& allowed_path);
|
|
|
| -#elif defined(OS_LINUX)
|
| -
|
| -// Initialize the sandbox (currently seccomp-legacy or seccomp-bpf, the setuid
|
| -// sandbox works differently and is set-up in the Zygote).
|
| -// The process sandbox type is determined at run time via the command line
|
| -// switches. TODO(jln): switch to a model where the caller chooses a sandbox
|
| -// type.
|
| -// This should be called before any additional thread has been created.
|
| -//
|
| -// Returns true if a sandbox has been initialized successfully, false
|
| -// otherwise.
|
| -CONTENT_EXPORT bool InitializeSandbox();
|
| -
|
| #endif
|
|
|
| } // namespace content
|
|
|