| Index: content/public/common/sandbox_init.h
|
| diff --git a/content/public/common/sandbox_init.h b/content/public/common/sandbox_init.h
|
| index 711738ae40464badd5d595e7a45cd86eb357318b..34f366a2450e5dfb5c1a68b1f9521b673cc6682e 100644
|
| --- a/content/public/common/sandbox_init.h
|
| +++ b/content/public/common/sandbox_init.h
|
| @@ -88,11 +88,11 @@ class SandboxInitializerDelegate;
|
|
|
| // Initialize a seccomp-bpf sandbox. |policy| may not be NULL.
|
| // If an existing layer of sandboxing is present that would prevent access to
|
| -// /proc, |proc_task_fd| must be a valid file descriptor to /proc/self/task.
|
| +// /proc, |proc_fd| must be a valid file descriptor to /proc/.
|
| // Returns true if the sandbox has been properly engaged.
|
| CONTENT_EXPORT bool InitializeSandbox(
|
| scoped_ptr<sandbox::bpf_dsl::Policy> policy,
|
| - base::ScopedFD proc_task_fd);
|
| + base::ScopedFD proc_fd);
|
|
|
| // Return a "baseline" policy. This is used by a SandboxInitializerDelegate to
|
| // implement a policy that is derived from the baseline.
|
|
|