| Index: sandbox/linux/seccomp-bpf-helpers/baseline_policy.h
|
| diff --git a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h
|
| index edf4c77b3c667f530732685009c58aa8fe564425..eb3fd0a392353d6aaec56013af92c707edd43f1a 100644
|
| --- a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h
|
| +++ b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h
|
| @@ -5,6 +5,7 @@
|
| #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_BASELINE_POLICY_H_
|
| #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_BASELINE_POLICY_H_
|
|
|
| +#include "sandbox/linux/seccomp-bpf-helpers/bpf_dsl.h"
|
| #include "sandbox/linux/seccomp-bpf/errorcode.h"
|
| #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
|
| #include "sandbox/sandbox_export.h"
|
| @@ -25,7 +26,7 @@ class SandboxBPFPolicy;
|
| // code in a sandboxed environment.
|
| // A baseline policy is only valid for the process for which this object was
|
| // instantiated (so do not fork() and use it in a child).
|
| -class SANDBOX_EXPORT BaselinePolicy : public SandboxBPFPolicy {
|
| +class SANDBOX_EXPORT BaselinePolicy : public bpf_dsl::SandboxBPFPolicyDSL {
|
| public:
|
| BaselinePolicy();
|
| // |fs_denied_errno| is the errno returned when a filesystem access system
|
| @@ -33,8 +34,9 @@ class SANDBOX_EXPORT BaselinePolicy : public SandboxBPFPolicy {
|
| explicit BaselinePolicy(int fs_denied_errno);
|
| virtual ~BaselinePolicy();
|
|
|
| - virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
|
| - int system_call_number) const OVERRIDE;
|
| + using bpf_dsl::SandboxBPFPolicyDSL::EvaluateSyscall;
|
| + virtual bpf_dsl::ResultExpr EvaluateSyscall(
|
| + int system_call_number) const OVERRIDE;
|
|
|
| private:
|
| int fs_denied_errno_;
|
|
|