| Index: content/common/sandbox_linux/bpf_gpu_policy_linux.cc | 
| diff --git a/content/common/sandbox_linux/bpf_gpu_policy_linux.cc b/content/common/sandbox_linux/bpf_gpu_policy_linux.cc | 
| index a05b66476c597ff8204ebe1f4615019ade92de30..e52f433c9719339fa45af716f23a1ca9d4cff64d 100644 | 
| --- a/content/common/sandbox_linux/bpf_gpu_policy_linux.cc | 
| +++ b/content/common/sandbox_linux/bpf_gpu_policy_linux.cc | 
| @@ -25,6 +25,7 @@ | 
| #include "content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h" | 
| #include "content/common/set_process_title.h" | 
| #include "content/public/common/content_switches.h" | 
| +#include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" | 
| #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" | 
| #include "sandbox/linux/seccomp-bpf/trap.h" | 
| #include "sandbox/linux/services/broker_process.h" | 
| @@ -186,15 +187,17 @@ ResultExpr GpuProcessPolicy::EvaluateSyscall(int sysno) const { | 
| case __NR_mprotect: | 
| // TODO(jln): restrict prctl. | 
| case __NR_prctl: | 
| -    case __NR_sched_getaffinity: | 
| -    case __NR_sched_setaffinity: | 
| -    case __NR_setpriority: | 
| return Allow(); | 
| case __NR_access: | 
| case __NR_open: | 
| case __NR_openat: | 
| DCHECK(broker_process_); | 
| return Trap(GpuSIGSYS_Handler, broker_process_); | 
| +    case __NR_setpriority: | 
| +      return sandbox::RestrictGetSetpriority(GetPolicyPid()); | 
| +    case __NR_sched_getaffinity: | 
| +    case __NR_sched_setaffinity: | 
| +      return sandbox::RestrictSchedTarget(GetPolicyPid(), sysno); | 
| default: | 
| if (SyscallSets::IsEventFd(sysno)) | 
| return Allow(); | 
|  |