Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2067)

Unified Diff: content/common/sandbox_seccomp_bpf_linux.h

Issue 13814027: Linux: make current InitializeSandbox() private. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: content/common/sandbox_seccomp_bpf_linux.h
diff --git a/content/common/sandbox_seccomp_bpf_linux.h b/content/common/sandbox_seccomp_bpf_linux.h
index a04864283b59d6fce87de2bf1a9cb10b2d29187b..99b8f127ec0b81ecdd5502e278fce2dade6ef9f0 100644
--- a/content/common/sandbox_seccomp_bpf_linux.h
+++ b/content/common/sandbox_seccomp_bpf_linux.h
@@ -16,13 +16,14 @@ class SandboxSeccompBpf {
// should be enabled at all.
static bool IsSeccompBpfDesired();
// Should the sandbox be enabled for process_type ?
- static bool ShouldEnableSeccompBpf(const std::string& process_type);
+ static bool ShouldEnableSeccompBpf(
+ LinuxSandbox::SandboxConfig sandbox_config);
// Check if the kernel supports this sandbox. It's useful to "prewarm"
// this, part of the result will be cached.
static bool SupportsSandbox();
// Start the sandbox and apply the policy for process_type, depending on
// command line switches.
- static bool StartSandbox(const std::string& process_type);
+ static bool StartSandbox(LinuxSandbox::SandboxConfig sandbox_config);
private:
DISALLOW_IMPLICIT_CONSTRUCTORS(SandboxSeccompBpf);

Powered by Google App Engine
This is Rietveld 408576698