| Index: content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc
|
| diff --git a/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc b/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc
|
| index d1e5af305631a671f85c7e837a279c842ab151cf..628620744f6529763c685d2e91553f0462b241da 100644
|
| --- a/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc
|
| +++ b/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc
|
| @@ -8,6 +8,7 @@
|
|
|
| #include "base/logging.h"
|
| #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
|
| +#include "sandbox/linux/seccomp-bpf-helpers/bpf_dsl.h"
|
|
|
| namespace content {
|
|
|
| @@ -22,11 +23,10 @@ SandboxBPFBasePolicy::SandboxBPFBasePolicy()
|
| : baseline_policy_(new sandbox::BaselinePolicy(kFSDeniedErrno)) {}
|
| SandboxBPFBasePolicy::~SandboxBPFBasePolicy() {}
|
|
|
| -ErrorCode SandboxBPFBasePolicy::EvaluateSyscall(SandboxBPF* sandbox_compiler,
|
| - int system_call_number) const {
|
| +sandbox::bpf_dsl::ResultExpr SandboxBPFBasePolicy::EvaluateSyscall(
|
| + int system_call_number) const {
|
| DCHECK(baseline_policy_);
|
| - return baseline_policy_->EvaluateSyscall(sandbox_compiler,
|
| - system_call_number);
|
| + return baseline_policy_->EvaluateSyscall(system_call_number);
|
| }
|
|
|
| bool SandboxBPFBasePolicy::PreSandboxHook() {
|
|
|