| Index: sandbox/linux/seccomp-bpf/errorcode.h
|
| diff --git a/sandbox/linux/seccomp-bpf/errorcode.h b/sandbox/linux/seccomp-bpf/errorcode.h
|
| index 182fadb4dcbf5253d3900244019e8fb0be119821..ba7c3cd56982b3d45feb3db243547fe751e54d58 100644
|
| --- a/sandbox/linux/seccomp-bpf/errorcode.h
|
| +++ b/sandbox/linux/seccomp-bpf/errorcode.h
|
| @@ -8,7 +8,7 @@
|
| #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
|
| #include "sandbox/linux/seccomp-bpf/trap.h"
|
|
|
| -namespace playground2 {
|
| +namespace sandbox {
|
|
|
| struct arch_seccomp_data;
|
|
|
| @@ -46,7 +46,7 @@ class ErrorCode {
|
| // access 64bit quantities. But policies are still advised to specify whether
|
| // a system call expects a 32bit or a 64bit quantity.
|
| enum ArgType {
|
| - // When passed as an argument to Sandbox::Cond(), TP_32BIT requests that
|
| + // When passed as an argument to SandboxBPF::Cond(), TP_32BIT requests that
|
| // the conditional test should operate on the 32bit part of the system call
|
| // argument.
|
| // On 64bit architectures, this verifies that user space did not pass
|
| @@ -64,7 +64,7 @@ class ErrorCode {
|
| // having been sign extended.
|
| TP_32BIT,
|
|
|
| - // When passed as an argument to Sandbox::Cond(), TP_64BIT requests that
|
| + // When passed as an argument to SandboxBPF::Cond(), TP_64BIT requests that
|
| // the conditional test should operate on the full 64bit argument. It is
|
| // generally harmless to perform a 64bit test on 32bit systems, as the
|
| // kernel will always see the top 32 bits of all arguments as zero'd out.
|
| @@ -148,7 +148,7 @@ class ErrorCode {
|
|
|
| private:
|
| friend class CodeGen;
|
| - friend class Sandbox;
|
| + friend class SandboxBPF;
|
| friend class Trap;
|
|
|
| // If we are wrapping a callback, we must assign a unique id. This id is
|
|
|