Index: sandbox/linux/seccomp-bpf-helpers/baseline_policy.h |
diff --git a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h |
index edf4c77b3c667f530732685009c58aa8fe564425..eb3fd0a392353d6aaec56013af92c707edd43f1a 100644 |
--- a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h |
+++ b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.h |
@@ -5,6 +5,7 @@ |
#ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_BASELINE_POLICY_H_ |
#define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_BASELINE_POLICY_H_ |
+#include "sandbox/linux/seccomp-bpf-helpers/bpf_dsl.h" |
#include "sandbox/linux/seccomp-bpf/errorcode.h" |
#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" |
#include "sandbox/sandbox_export.h" |
@@ -25,7 +26,7 @@ class SandboxBPFPolicy; |
// code in a sandboxed environment. |
// A baseline policy is only valid for the process for which this object was |
// instantiated (so do not fork() and use it in a child). |
-class SANDBOX_EXPORT BaselinePolicy : public SandboxBPFPolicy { |
+class SANDBOX_EXPORT BaselinePolicy : public bpf_dsl::SandboxBPFPolicyDSL { |
public: |
BaselinePolicy(); |
// |fs_denied_errno| is the errno returned when a filesystem access system |
@@ -33,8 +34,9 @@ class SANDBOX_EXPORT BaselinePolicy : public SandboxBPFPolicy { |
explicit BaselinePolicy(int fs_denied_errno); |
virtual ~BaselinePolicy(); |
- virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, |
- int system_call_number) const OVERRIDE; |
+ using bpf_dsl::SandboxBPFPolicyDSL::EvaluateSyscall; |
+ virtual bpf_dsl::ResultExpr EvaluateSyscall( |
+ int system_call_number) const OVERRIDE; |
private: |
int fs_denied_errno_; |