| Index: components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
|
| diff --git a/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc b/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
|
| index 65fc946e36628a802bc8823c3ab62a43ba9e320d..722f4014726b73187f7098aa51ee803e6b157386 100644
|
| --- a/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
|
| +++ b/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
|
| @@ -18,6 +18,7 @@
|
| #include "base/callback.h"
|
| #include "base/command_line.h"
|
| #include "base/compiler_specific.h"
|
| +#include "base/files/scoped_file.h"
|
| #include "base/logging.h"
|
|
|
| #include "components/nacl/common/nacl_switches.h"
|
| @@ -161,10 +162,11 @@ void RunSandboxSanityChecks() {
|
|
|
| #endif // defined(USE_SECCOMP_BPF)
|
|
|
| -bool InitializeBPFSandbox() {
|
| +bool InitializeBPFSandbox(base::ScopedFD proc_task_fd) {
|
| #if defined(USE_SECCOMP_BPF)
|
| bool sandbox_is_initialized = content::InitializeSandbox(
|
| - scoped_ptr<sandbox::bpf_dsl::Policy>(new NaClBPFSandboxPolicy));
|
| + scoped_ptr<sandbox::bpf_dsl::Policy>(new NaClBPFSandboxPolicy),
|
| + proc_task_fd.Pass());
|
| if (sandbox_is_initialized) {
|
| RunSandboxSanityChecks();
|
| return true;
|
|
|