Index: content/common/sandbox_linux/sandbox_linux.h |
diff --git a/content/common/sandbox_linux/sandbox_linux.h b/content/common/sandbox_linux/sandbox_linux.h |
index 0ad0ed4476219aba3af13741de4d308e4bd82f60..b3a0d6df94675e00a61f400db5d74e0e3472cf89 100644 |
--- a/content/common/sandbox_linux/sandbox_linux.h |
+++ b/content/common/sandbox_linux/sandbox_linux.h |
@@ -117,8 +117,9 @@ class LinuxSandbox { |
// are the non-static implementations. |
bool InitializeSandboxImpl(); |
void StopThreadImpl(base::Thread* thread); |
- // We must have been pre_initialized_ before using this. |
+ // We must have been pre_initialized_ before using these. |
bool seccomp_bpf_supported() const; |
+ bool seccomp_bpf_with_tsync_supported() const; |
// Returns true if it can be determined that the current process has open |
// directories that are not managed by the LinuxSandbox class. This would |
// be a vulnerability as it would allow to bypass the setuid sandbox. |
@@ -143,6 +144,7 @@ class LinuxSandbox { |
// Did PreinitializeSandbox() run? |
bool pre_initialized_; |
bool seccomp_bpf_supported_; // Accurate if pre_initialized_. |
+ bool seccomp_bpf_with_tsync_supported_; // Accurate if pre_initialized_. |
bool yama_is_enforcing_; // Accurate if pre_initialized_. |
bool initialize_sandbox_ran_; // InitializeSandbox() was called. |
scoped_ptr<sandbox::SetuidSandboxClient> setuid_sandbox_client_; |