| Index: sandbox/linux/seccomp-bpf-helpers/syscall_sets.h
|
| diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h b/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h
|
| index 173d4dbb59c1e392fef9bc86237aa9b240432b21..2cbea4694400bb05ee9de418788d3acfc1538917 100644
|
| --- a/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h
|
| +++ b/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h
|
| @@ -37,7 +37,7 @@ class SANDBOX_EXPORT SyscallSets {
|
| // This should be thought through in conjunction with IsFutex().
|
| static bool IsAllowedProcessStartOrDeath(int sysno);
|
| // It's difficult to restrict those, but there is attack surface here.
|
| - static bool IsFutex(int sysno);
|
| + static bool IsAllowedFutex(int sysno);
|
| static bool IsAllowedEpoll(int sysno);
|
| static bool IsAllowedGetOrModifySocket(int sysno);
|
| static bool IsDeniedGetOrModifySocket(int sysno);
|
|
|