| Index: content/common/sandbox_seccomp_bpf_linux.h
|
| diff --git a/content/common/sandbox_seccomp_bpf_linux.h b/content/common/sandbox_seccomp_bpf_linux.h
|
| index a04864283b59d6fce87de2bf1a9cb10b2d29187b..99b8f127ec0b81ecdd5502e278fce2dade6ef9f0 100644
|
| --- a/content/common/sandbox_seccomp_bpf_linux.h
|
| +++ b/content/common/sandbox_seccomp_bpf_linux.h
|
| @@ -16,13 +16,14 @@ class SandboxSeccompBpf {
|
| // should be enabled at all.
|
| static bool IsSeccompBpfDesired();
|
| // Should the sandbox be enabled for process_type ?
|
| - static bool ShouldEnableSeccompBpf(const std::string& process_type);
|
| + static bool ShouldEnableSeccompBpf(
|
| + LinuxSandbox::SandboxConfig sandbox_config);
|
| // Check if the kernel supports this sandbox. It's useful to "prewarm"
|
| // this, part of the result will be cached.
|
| static bool SupportsSandbox();
|
| // Start the sandbox and apply the policy for process_type, depending on
|
| // command line switches.
|
| - static bool StartSandbox(const std::string& process_type);
|
| + static bool StartSandbox(LinuxSandbox::SandboxConfig sandbox_config);
|
|
|
| private:
|
| DISALLOW_IMPLICIT_CONSTRUCTORS(SandboxSeccompBpf);
|
|
|