Index: content/common/sandbox_bpf_base_policy_linux.cc |
diff --git a/content/common/sandbox_bpf_base_policy_linux.cc b/content/common/sandbox_bpf_base_policy_linux.cc |
deleted file mode 100644 |
index 4341e921fa97344bc471d50fb7e4ea320932b873..0000000000000000000000000000000000000000 |
--- a/content/common/sandbox_bpf_base_policy_linux.cc |
+++ /dev/null |
@@ -1,36 +0,0 @@ |
-// Copyright 2013 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "content/common/sandbox_bpf_base_policy_linux.h" |
- |
-#include <errno.h> |
- |
-#include "base/logging.h" |
-#include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" |
- |
-namespace content { |
- |
-namespace { |
- |
-// The errno used for denied file system access system calls, such as open(2). |
-static const int kFSDeniedErrno = EPERM; |
- |
-} // namespace. |
- |
-SandboxBPFBasePolicy::SandboxBPFBasePolicy() |
- : baseline_policy_(new sandbox::BaselinePolicy(kFSDeniedErrno)) {} |
-SandboxBPFBasePolicy::~SandboxBPFBasePolicy() {} |
- |
-ErrorCode SandboxBPFBasePolicy::EvaluateSyscall(SandboxBPF* sandbox_compiler, |
- int system_call_number) const { |
- DCHECK(baseline_policy_); |
- return baseline_policy_->EvaluateSyscall(sandbox_compiler, |
- system_call_number); |
-} |
- |
-int SandboxBPFBasePolicy::GetFSDeniedErrno() { |
- return kFSDeniedErrno; |
-} |
- |
-} // namespace content. |