Index: sandbox/linux/bpf_dsl/policy_compiler.cc |
diff --git a/sandbox/linux/bpf_dsl/policy_compiler.cc b/sandbox/linux/bpf_dsl/policy_compiler.cc |
index 0eb85ca6736bb3662dbf520b13d7723e7c2cc3d8..514b430c0d17052d60d695873b35e925b3a09f85 100644 |
--- a/sandbox/linux/bpf_dsl/policy_compiler.cc |
+++ b/sandbox/linux/bpf_dsl/policy_compiler.cc |
@@ -14,6 +14,7 @@ |
#include "base/macros.h" |
#include "sandbox/linux/bpf_dsl/bpf_dsl.h" |
#include "sandbox/linux/bpf_dsl/bpf_dsl_impl.h" |
+#include "sandbox/linux/bpf_dsl/policy.h" |
#include "sandbox/linux/seccomp-bpf/codegen.h" |
#include "sandbox/linux/seccomp-bpf/die.h" |
#include "sandbox/linux/seccomp-bpf/errorcode.h" |
@@ -75,7 +76,7 @@ intptr_t BPFFailure(const struct arch_seccomp_data&, void* aux) { |
SANDBOX_DIE(static_cast<char*>(aux)); |
} |
-bool HasUnsafeTraps(const SandboxBPFDSLPolicy* policy) { |
+bool HasUnsafeTraps(const Policy* policy) { |
for (uint32_t sysnum : SyscallSet::All()) { |
if (SyscallSet::IsValid(sysnum) && |
policy->EvaluateSyscall(sysnum)->HasUnsafeTraps()) { |
@@ -93,8 +94,7 @@ struct PolicyCompiler::Range { |
ErrorCode err; |
}; |
-PolicyCompiler::PolicyCompiler(const SandboxBPFDSLPolicy* policy, |
- TrapRegistry* registry) |
+PolicyCompiler::PolicyCompiler(const Policy* policy, TrapRegistry* registry) |
: policy_(policy), |
registry_(registry), |
conds_(), |