Index: sandbox/linux/seccomp-bpf/sandbox_bpf.h |
diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf.h b/sandbox/linux/seccomp-bpf/sandbox_bpf.h |
index 32fe2a7d7480ca960021f9bff24b6c6c5e956a90..51f2f2469fffe4530fbdf5a9213fc34ad882eeb2 100644 |
--- a/sandbox/linux/seccomp-bpf/sandbox_bpf.h |
+++ b/sandbox/linux/seccomp-bpf/sandbox_bpf.h |
@@ -95,6 +95,10 @@ class SANDBOX_EXPORT SandboxBPF { |
// provided by the caller. |
static SandboxStatus SupportsSeccompSandbox(int proc_fd); |
+ // Determines if the kernel has support for the seccomp() system call to |
+ // synchronize BPF filters across a thread group. |
+ static SandboxStatus SupportsSeccompThreadFilterSynchronization(); |
+ |
// The sandbox needs to be able to access files in "/proc/self". If this |
// directory is not accessible when "startSandbox()" gets called, the caller |
// can provide an already opened file descriptor by calling "set_proc_fd()". |
@@ -221,7 +225,7 @@ class SANDBOX_EXPORT SandboxBPF { |
// Assembles and installs a filter based on the policy that has previously |
// been configured with SetSandboxPolicy(). |
- void InstallFilter(SandboxThreadState thread_state); |
+ void InstallFilter(bool must_sync_threads); |
// Verify the correctness of a compiled program by comparing it against the |
// current policy. This function should only ever be called by unit tests and |