Index: sandbox/linux/seccomp-bpf-helpers/syscall_sets.h |
diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h b/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h |
index 173d4dbb59c1e392fef9bc86237aa9b240432b21..2cbea4694400bb05ee9de418788d3acfc1538917 100644 |
--- a/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h |
+++ b/sandbox/linux/seccomp-bpf-helpers/syscall_sets.h |
@@ -37,7 +37,7 @@ class SANDBOX_EXPORT SyscallSets { |
// This should be thought through in conjunction with IsFutex(). |
static bool IsAllowedProcessStartOrDeath(int sysno); |
// It's difficult to restrict those, but there is attack surface here. |
- static bool IsFutex(int sysno); |
+ static bool IsAllowedFutex(int sysno); |
static bool IsAllowedEpoll(int sysno); |
static bool IsAllowedGetOrModifySocket(int sysno); |
static bool IsDeniedGetOrModifySocket(int sysno); |