Index: sandbox/linux/seccomp-bpf/demo.cc |
diff --git a/sandbox/linux/seccomp-bpf/demo.cc b/sandbox/linux/seccomp-bpf/demo.cc |
index d9fd3423eeef5410d38f88137c1ab10ed12a5df8..1cf4511454a4f43e34b8dd68ecdb760b36f8ec4a 100644 |
--- a/sandbox/linux/seccomp-bpf/demo.cc |
+++ b/sandbox/linux/seccomp-bpf/demo.cc |
@@ -26,15 +26,12 @@ |
#include <time.h> |
#include <unistd.h> |
-#include "base/macros.h" |
#include "base/posix/eintr_wrapper.h" |
#include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" |
-#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" |
#include "sandbox/linux/services/linux_syscalls.h" |
using sandbox::ErrorCode; |
using sandbox::SandboxBPF; |
-using sandbox::SandboxBPFPolicy; |
using sandbox::arch_seccomp_data; |
#define ERR EPERM |
@@ -240,17 +237,7 @@ |
return -ERR; |
} |
-class DemoPolicy : public SandboxBPFPolicy { |
- public: |
- DemoPolicy() {} |
- virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox, |
- int sysno) const OVERRIDE; |
- |
- private: |
- DISALLOW_COPY_AND_ASSIGN(DemoPolicy); |
-}; |
- |
-ErrorCode DemoPolicy::EvaluateSyscall(SandboxBPF* sandbox, int sysno) const { |
+ErrorCode Evaluator(SandboxBPF* sandbox, int sysno, void *) { |
switch (sysno) { |
#if defined(__NR_accept) |
case __NR_accept: case __NR_accept4: |
@@ -433,7 +420,7 @@ |
} |
SandboxBPF sandbox; |
sandbox.set_proc_fd(proc_fd); |
- sandbox.SetSandboxPolicy(new DemoPolicy()); |
+ sandbox.SetSandboxPolicyDeprecated(Evaluator, NULL); |
if (!sandbox.StartSandbox(SandboxBPF::PROCESS_SINGLE_THREADED)) { |
fprintf(stderr, "StartSandbox() failed"); |
_exit(1); |