| Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| index 6646e8235c21c545dfe4372b6aba94bf64553093..f9d24a29200ed667f290b564621b55573dd6ede5 100644
|
| --- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| +++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| @@ -158,7 +158,7 @@ void StartSandboxWithPolicy(sandbox::bpf_dsl::Policy* policy,
|
| sandbox.SetSandboxPolicy(policy);
|
|
|
| sandbox.set_proc_task_fd(proc_task_fd.release());
|
| - CHECK(sandbox.StartSandbox(SandboxBPF::PROCESS_SINGLE_THREADED));
|
| + CHECK(sandbox.StartSandbox(SandboxBPF::SECCOMP_SINGLE_THREADED));
|
| }
|
|
|
| // nacl_helper needs to be tiny and includes only part of content/
|
| @@ -253,9 +253,8 @@ bool SandboxSeccompBPF::ShouldEnableSeccompBPF(
|
|
|
| bool SandboxSeccompBPF::SupportsSandbox() {
|
| #if defined(USE_SECCOMP_BPF)
|
| - SandboxBPF::SandboxStatus bpf_sandbox_status =
|
| - SandboxBPF::SupportsSeccompSandbox();
|
| - if (bpf_sandbox_status == SandboxBPF::STATUS_AVAILABLE) {
|
| + int bpf_sandbox_status = SandboxBPF::SupportsSeccompSandbox();
|
| + if (bpf_sandbox_status & SandboxBPF::SECCOMP_SINGLE_THREADED) {
|
| return true;
|
| }
|
| #endif
|
|
|