Index: content/common/sandbox_seccomp_bpf_linux.h |
diff --git a/content/common/sandbox_seccomp_bpf_linux.h b/content/common/sandbox_seccomp_bpf_linux.h |
index a04864283b59d6fce87de2bf1a9cb10b2d29187b..99b8f127ec0b81ecdd5502e278fce2dade6ef9f0 100644 |
--- a/content/common/sandbox_seccomp_bpf_linux.h |
+++ b/content/common/sandbox_seccomp_bpf_linux.h |
@@ -16,13 +16,14 @@ class SandboxSeccompBpf { |
// should be enabled at all. |
static bool IsSeccompBpfDesired(); |
// Should the sandbox be enabled for process_type ? |
- static bool ShouldEnableSeccompBpf(const std::string& process_type); |
+ static bool ShouldEnableSeccompBpf( |
+ LinuxSandbox::SandboxConfig sandbox_config); |
// Check if the kernel supports this sandbox. It's useful to "prewarm" |
// this, part of the result will be cached. |
static bool SupportsSandbox(); |
// Start the sandbox and apply the policy for process_type, depending on |
// command line switches. |
- static bool StartSandbox(const std::string& process_type); |
+ static bool StartSandbox(LinuxSandbox::SandboxConfig sandbox_config); |
private: |
DISALLOW_IMPLICIT_CONSTRUCTORS(SandboxSeccompBpf); |