Index: sandbox/linux/seccomp-bpf-helpers/baseline_policy.h |
diff --git a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h |
index 1dfd137fa3d749f3db585ccf9f80d007b79a3197..f1e4bb96c199e155ee0c9eafdeaed55e597d5388 100644 |
--- a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h |
+++ b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h |
@@ -5,6 +5,7 @@ |
#ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_BASELINE_POLICY_H_ |
#define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_BASELINE_POLICY_H_ |
+#include "sandbox/linux/sandbox_export.h" |
#include "sandbox/linux/seccomp-bpf/errorcode.h" |
#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" |
@@ -22,7 +23,7 @@ class SandboxBPFPolicy; |
// The "baseline" policy is somewhat arbitrary. All Chromium policies are an |
// alteration of it, and it represents a reasonable common ground to run most |
// code in a sandboxed environment. |
-class BaselinePolicy : public SandboxBPFPolicy { |
+class SANDBOX_EXPORT BaselinePolicy : public SandboxBPFPolicy { |
public: |
BaselinePolicy(); |
// |fs_denied_errno| is the errno returned when a filesystem access system |