| Index: content/common/sandbox_bpf_base_policy_linux.cc
|
| diff --git a/content/common/sandbox_bpf_base_policy_linux.cc b/content/common/sandbox_bpf_base_policy_linux.cc
|
| index 226c8e597c9c00912c88ed839f12ee3f77870475..4341e921fa97344bc471d50fb7e4ea320932b873 100644
|
| --- a/content/common/sandbox_bpf_base_policy_linux.cc
|
| +++ b/content/common/sandbox_bpf_base_policy_linux.cc
|
| @@ -18,18 +18,18 @@ static const int kFSDeniedErrno = EPERM;
|
|
|
| } // namespace.
|
|
|
| -SandboxBpfBasePolicy::SandboxBpfBasePolicy()
|
| +SandboxBPFBasePolicy::SandboxBPFBasePolicy()
|
| : baseline_policy_(new sandbox::BaselinePolicy(kFSDeniedErrno)) {}
|
| -SandboxBpfBasePolicy::~SandboxBpfBasePolicy() {}
|
| +SandboxBPFBasePolicy::~SandboxBPFBasePolicy() {}
|
|
|
| -ErrorCode SandboxBpfBasePolicy::EvaluateSyscall(Sandbox* sandbox_compiler,
|
| +ErrorCode SandboxBPFBasePolicy::EvaluateSyscall(SandboxBPF* sandbox_compiler,
|
| int system_call_number) const {
|
| DCHECK(baseline_policy_);
|
| return baseline_policy_->EvaluateSyscall(sandbox_compiler,
|
| system_call_number);
|
| }
|
|
|
| -int SandboxBpfBasePolicy::GetFSDeniedErrno() {
|
| +int SandboxBPFBasePolicy::GetFSDeniedErrno() {
|
| return kFSDeniedErrno;
|
| }
|
|
|
|
|