| Index: sandbox/linux/bpf_dsl/policy_compiler.cc
|
| diff --git a/sandbox/linux/bpf_dsl/policy_compiler.cc b/sandbox/linux/bpf_dsl/policy_compiler.cc
|
| index 0eb85ca6736bb3662dbf520b13d7723e7c2cc3d8..514b430c0d17052d60d695873b35e925b3a09f85 100644
|
| --- a/sandbox/linux/bpf_dsl/policy_compiler.cc
|
| +++ b/sandbox/linux/bpf_dsl/policy_compiler.cc
|
| @@ -14,6 +14,7 @@
|
| #include "base/macros.h"
|
| #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
|
| #include "sandbox/linux/bpf_dsl/bpf_dsl_impl.h"
|
| +#include "sandbox/linux/bpf_dsl/policy.h"
|
| #include "sandbox/linux/seccomp-bpf/codegen.h"
|
| #include "sandbox/linux/seccomp-bpf/die.h"
|
| #include "sandbox/linux/seccomp-bpf/errorcode.h"
|
| @@ -75,7 +76,7 @@ intptr_t BPFFailure(const struct arch_seccomp_data&, void* aux) {
|
| SANDBOX_DIE(static_cast<char*>(aux));
|
| }
|
|
|
| -bool HasUnsafeTraps(const SandboxBPFDSLPolicy* policy) {
|
| +bool HasUnsafeTraps(const Policy* policy) {
|
| for (uint32_t sysnum : SyscallSet::All()) {
|
| if (SyscallSet::IsValid(sysnum) &&
|
| policy->EvaluateSyscall(sysnum)->HasUnsafeTraps()) {
|
| @@ -93,8 +94,7 @@ struct PolicyCompiler::Range {
|
| ErrorCode err;
|
| };
|
|
|
| -PolicyCompiler::PolicyCompiler(const SandboxBPFDSLPolicy* policy,
|
| - TrapRegistry* registry)
|
| +PolicyCompiler::PolicyCompiler(const Policy* policy, TrapRegistry* registry)
|
| : policy_(policy),
|
| registry_(registry),
|
| conds_(),
|
|
|