| Index: content/common/sandbox_linux/bpf_ppapi_policy_linux.cc
|
| diff --git a/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc b/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc
|
| index 4c806228a8e8208df13bc149497156fc137cd5d8..cd7acde718ae920a2175ed0ed81defda5bcfa343 100644
|
| --- a/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc
|
| +++ b/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc
|
| @@ -14,6 +14,7 @@
|
| #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
|
| #include "sandbox/linux/services/linux_syscalls.h"
|
|
|
| +using namespace sandbox::bpf_dsl;
|
| using sandbox::SyscallSets;
|
|
|
| namespace content {
|
| @@ -21,8 +22,7 @@ namespace content {
|
| PpapiProcessPolicy::PpapiProcessPolicy() {}
|
| PpapiProcessPolicy::~PpapiProcessPolicy() {}
|
|
|
| -ErrorCode PpapiProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
|
| - int sysno) const {
|
| +ResultExpr PpapiProcessPolicy::EvaluateSyscall(int sysno) const {
|
| switch (sysno) {
|
| case __NR_pread64:
|
| case __NR_pwrite64:
|
| @@ -33,12 +33,12 @@ ErrorCode PpapiProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
|
| case __NR_sched_getscheduler:
|
| case __NR_sched_setscheduler:
|
| case __NR_times:
|
| - return ErrorCode(ErrorCode::ERR_ALLOWED);
|
| + return Allow();
|
| case __NR_ioctl:
|
| - return ErrorCode(ENOTTY); // Flash Access.
|
| + return Error(ENOTTY); // Flash Access.
|
| default:
|
| // Default on the baseline policy.
|
| - return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno);
|
| + return SandboxBPFBasePolicy::EvaluateSyscall(sysno);
|
| }
|
| }
|
|
|
|
|