| Index: sandbox/linux/seccomp-bpf/errorcode.h
|
| diff --git a/sandbox/linux/seccomp-bpf/errorcode.h b/sandbox/linux/seccomp-bpf/errorcode.h
|
| index b20b921aa6aad9c2a8f408e20d184a917d730beb..a32241143d631555bc7a154da691f07dacb76b18 100644
|
| --- a/sandbox/linux/seccomp-bpf/errorcode.h
|
| +++ b/sandbox/linux/seccomp-bpf/errorcode.h
|
| @@ -5,14 +5,11 @@
|
| #ifndef SANDBOX_LINUX_SECCOMP_BPF_ERRORCODE_H__
|
| #define SANDBOX_LINUX_SECCOMP_BPF_ERRORCODE_H__
|
|
|
| -#include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
|
| #include "sandbox/linux/seccomp-bpf/trap.h"
|
| #include "sandbox/sandbox_export.h"
|
|
|
| namespace sandbox {
|
|
|
| -struct arch_seccomp_data;
|
| -
|
| // This class holds all the possible values that can be returned by a sandbox
|
| // policy.
|
| // We can either wrap a symbolic ErrorCode (i.e. ERR_XXX enum values), an
|
| @@ -113,7 +110,7 @@ class SANDBOX_EXPORT ErrorCode {
|
| // when compiling a BPF filter, we deliberately generate an invalid
|
| // program that will get flagged both by our Verifier class and by
|
| // the Linux kernel.
|
| - ErrorCode() : error_type_(ET_INVALID), err_(SECCOMP_RET_INVALID) {}
|
| + ErrorCode();
|
| explicit ErrorCode(int err);
|
|
|
| // For all practical purposes, ErrorCodes are treated as if they were
|
|
|