Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h |
diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h |
index bf6d15b9013612f3070a9d2451a729e8d3fd7876..1b601c67d4874918789d8bf671c75b4df33b17cb 100644 |
--- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h |
+++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h |
@@ -32,9 +32,10 @@ class SandboxSeccompBPF { |
static bool IsSeccompBPFDesired(); |
// Should the sandbox be enabled for process_type ? |
static bool ShouldEnableSeccompBPF(const std::string& process_type); |
- // Check if the kernel supports this sandbox. It's useful to "prewarm" |
- // this, part of the result will be cached. |
+ // Check if the kernel supports seccomp-bpf. |
static bool SupportsSandbox(); |
+ // Check if the kernel supports TSYNC (thread synchronization) with seccomp. |
+ static bool SupportsSandboxWithTsync(); |
// Start the sandbox and apply the policy for process_type, depending on |
// command line switches. |
static bool StartSandbox(const std::string& process_type, |