| Index: content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h
|
| diff --git a/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h b/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h
|
| index 6d9d83f4fa1f81827085e87df28f05a3fd9184cb..c00484c40931cfd3ef3e7c20896fe3efa8f20d1d 100644
|
| --- a/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h
|
| +++ b/content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h
|
| @@ -19,13 +19,14 @@ namespace content {
|
| // should inherit from it.
|
| // It implements the main SandboxBPFPolicy interface. Due to its nature
|
| // as a "kernel attack surface reduction" layer, it's implementation-defined.
|
| -class SandboxBPFBasePolicy : public sandbox::SandboxBPFPolicy {
|
| +class SandboxBPFBasePolicy : public sandbox::bpf_dsl::SandboxBPFPolicyDSL {
|
| public:
|
| SandboxBPFBasePolicy();
|
| virtual ~SandboxBPFBasePolicy();
|
|
|
| - virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
|
| - int system_call_number) const OVERRIDE;
|
| + using sandbox::bpf_dsl::SandboxBPFPolicyDSL::EvaluateSyscall;
|
| + virtual sandbox::bpf_dsl::ResultExpr EvaluateSyscall(
|
| + int system_call_number) const OVERRIDE;
|
|
|
| // A policy can implement this hook to run code right before the policy
|
| // is passed to the SandboxBPF class and the sandbox is engaged.
|
|
|