| Index: sandbox/linux/seccomp-bpf/demo.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/demo.cc b/sandbox/linux/seccomp-bpf/demo.cc
|
| index d9fd3423eeef5410d38f88137c1ab10ed12a5df8..1cf4511454a4f43e34b8dd68ecdb760b36f8ec4a 100644
|
| --- a/sandbox/linux/seccomp-bpf/demo.cc
|
| +++ b/sandbox/linux/seccomp-bpf/demo.cc
|
| @@ -26,15 +26,12 @@
|
| #include <time.h>
|
| #include <unistd.h>
|
|
|
| -#include "base/macros.h"
|
| #include "base/posix/eintr_wrapper.h"
|
| #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
|
| -#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
|
| #include "sandbox/linux/services/linux_syscalls.h"
|
|
|
| using sandbox::ErrorCode;
|
| using sandbox::SandboxBPF;
|
| -using sandbox::SandboxBPFPolicy;
|
| using sandbox::arch_seccomp_data;
|
|
|
| #define ERR EPERM
|
| @@ -240,17 +237,7 @@
|
| return -ERR;
|
| }
|
|
|
| -class DemoPolicy : public SandboxBPFPolicy {
|
| - public:
|
| - DemoPolicy() {}
|
| - virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox,
|
| - int sysno) const OVERRIDE;
|
| -
|
| - private:
|
| - DISALLOW_COPY_AND_ASSIGN(DemoPolicy);
|
| -};
|
| -
|
| -ErrorCode DemoPolicy::EvaluateSyscall(SandboxBPF* sandbox, int sysno) const {
|
| +ErrorCode Evaluator(SandboxBPF* sandbox, int sysno, void *) {
|
| switch (sysno) {
|
| #if defined(__NR_accept)
|
| case __NR_accept: case __NR_accept4:
|
| @@ -433,7 +420,7 @@
|
| }
|
| SandboxBPF sandbox;
|
| sandbox.set_proc_fd(proc_fd);
|
| - sandbox.SetSandboxPolicy(new DemoPolicy());
|
| + sandbox.SetSandboxPolicyDeprecated(Evaluator, NULL);
|
| if (!sandbox.StartSandbox(SandboxBPF::PROCESS_SINGLE_THREADED)) {
|
| fprintf(stderr, "StartSandbox() failed");
|
| _exit(1);
|
|
|