X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=src%2Fsandbox%2Flinux%2Fseccomp-bpf%2Ferrorcode.h;h=fb86fe802881004772c7e6ef7ddb574fb311eb18;hb=1afa4dd80ef85af7c90efaea6959db1d92330844;hp=a32241143d631555bc7a154da691f07dacb76b18;hpb=90762837333c13ccf56f2ad88e4481fc71e8d281;p=platform%2Fframework%2Fweb%2Fcrosswalk.git diff --git a/src/sandbox/linux/seccomp-bpf/errorcode.h b/src/sandbox/linux/seccomp-bpf/errorcode.h index a322411..fb86fe8 100644 --- a/src/sandbox/linux/seccomp-bpf/errorcode.h +++ b/src/sandbox/linux/seccomp-bpf/errorcode.h @@ -9,6 +9,9 @@ #include "sandbox/sandbox_export.h" namespace sandbox { +namespace bpf_dsl { +class PolicyCompiler; +} // This class holds all the possible values that can be returned by a sandbox // policy. @@ -145,6 +148,7 @@ class SANDBOX_EXPORT ErrorCode { }; private: + friend bpf_dsl::PolicyCompiler; friend class CodeGen; friend class SandboxBPF; friend class Trap; @@ -152,7 +156,7 @@ class SANDBOX_EXPORT ErrorCode { // If we are wrapping a callback, we must assign a unique id. This id is // how the kernel tells us which one of our different SECCOMP_RET_TRAP // cases has been triggered. - ErrorCode(Trap::TrapFnc fnc, const void* aux, bool safe); + ErrorCode(uint16_t trap_id, Trap::TrapFnc fnc, const void* aux, bool safe); // Some system calls require inspection of arguments. This constructor // allows us to specify additional constraints.