| Index: content/common/sandbox_linux/bpf_ppapi_policy_linux.cc
 | 
| diff --git a/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc b/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc
 | 
| index 4c806228a8e8208df13bc149497156fc137cd5d8..cd7acde718ae920a2175ed0ed81defda5bcfa343 100644
 | 
| --- a/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc
 | 
| +++ b/content/common/sandbox_linux/bpf_ppapi_policy_linux.cc
 | 
| @@ -14,6 +14,7 @@
 | 
|  #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
 | 
|  #include "sandbox/linux/services/linux_syscalls.h"
 | 
|  
 | 
| +using namespace sandbox::bpf_dsl;
 | 
|  using sandbox::SyscallSets;
 | 
|  
 | 
|  namespace content {
 | 
| @@ -21,8 +22,7 @@ namespace content {
 | 
|  PpapiProcessPolicy::PpapiProcessPolicy() {}
 | 
|  PpapiProcessPolicy::~PpapiProcessPolicy() {}
 | 
|  
 | 
| -ErrorCode PpapiProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
 | 
| -                                              int sysno) const {
 | 
| +ResultExpr PpapiProcessPolicy::EvaluateSyscall(int sysno) const {
 | 
|    switch (sysno) {
 | 
|      case __NR_pread64:
 | 
|      case __NR_pwrite64:
 | 
| @@ -33,12 +33,12 @@ ErrorCode PpapiProcessPolicy::EvaluateSyscall(SandboxBPF* sandbox,
 | 
|      case __NR_sched_getscheduler:
 | 
|      case __NR_sched_setscheduler:
 | 
|      case __NR_times:
 | 
| -      return ErrorCode(ErrorCode::ERR_ALLOWED);
 | 
| +      return Allow();
 | 
|      case __NR_ioctl:
 | 
| -      return ErrorCode(ENOTTY);  // Flash Access.
 | 
| +      return Error(ENOTTY);  // Flash Access.
 | 
|      default:
 | 
|        // Default on the baseline policy.
 | 
| -      return SandboxBPFBasePolicy::EvaluateSyscall(sandbox, sysno);
 | 
| +      return SandboxBPFBasePolicy::EvaluateSyscall(sysno);
 | 
|    }
 | 
|  }
 | 
|  
 | 
| 
 |