Index: content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc |
diff --git a/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc b/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc |
index d1e5af305631a671f85c7e837a279c842ab151cf..628620744f6529763c685d2e91553f0462b241da 100644 |
--- a/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc |
+++ b/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.cc |
@@ -8,6 +8,7 @@ |
#include "base/logging.h" |
#include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" |
+#include "sandbox/linux/seccomp-bpf-helpers/bpf_dsl.h" |
namespace content { |
@@ -22,11 +23,10 @@ SandboxBPFBasePolicy::SandboxBPFBasePolicy() |
: baseline_policy_(new sandbox::BaselinePolicy(kFSDeniedErrno)) {} |
SandboxBPFBasePolicy::~SandboxBPFBasePolicy() {} |
-ErrorCode SandboxBPFBasePolicy::EvaluateSyscall(SandboxBPF* sandbox_compiler, |
- int system_call_number) const { |
+sandbox::bpf_dsl::ResultExpr SandboxBPFBasePolicy::EvaluateSyscall( |
+ int system_call_number) const { |
DCHECK(baseline_policy_); |
- return baseline_policy_->EvaluateSyscall(sandbox_compiler, |
- system_call_number); |
+ return baseline_policy_->EvaluateSyscall(system_call_number); |
} |
bool SandboxBPFBasePolicy::PreSandboxHook() { |