Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(469)

Unified Diff: components/nacl/loader/nacl_sandbox_linux.cc

Issue 101773003: Linux sandbox: cleanup sandbox-bpf naming. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Address namespace sandbox nits. Created 7 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « components/nacl/loader/nacl_sandbox_linux.h ('k') | content/common/sandbox_bpf_base_policy_linux.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: components/nacl/loader/nacl_sandbox_linux.cc
diff --git a/components/nacl/loader/nacl_sandbox_linux.cc b/components/nacl/loader/nacl_sandbox_linux.cc
index f92cc080fb8d1b4eabe50ebf31f04310705b1ccb..14ba18ff53ebc76ef88f31ac424ab0908bbb9544 100644
--- a/components/nacl/loader/nacl_sandbox_linux.cc
+++ b/components/nacl/loader/nacl_sandbox_linux.cc
@@ -18,9 +18,9 @@
#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
#include "sandbox/linux/services/linux_syscalls.h"
-using playground2::ErrorCode;
-using playground2::Sandbox;
-using playground2::SandboxBpfPolicy;
+using sandbox::ErrorCode;
+using sandbox::SandboxBPF;
+using sandbox::SandboxBPFPolicy;
namespace {
@@ -52,22 +52,22 @@ bool IsSystemVIpc(int sysno) {
}
#endif
-class NaClBpfSandboxPolicy : public SandboxBpfPolicy {
+class NaClBPFSandboxPolicy : public SandboxBPFPolicy {
public:
- NaClBpfSandboxPolicy()
- : baseline_policy_(content::GetBpfSandboxBaselinePolicy()) {}
- virtual ~NaClBpfSandboxPolicy() {}
+ NaClBPFSandboxPolicy()
+ : baseline_policy_(content::GetBPFSandboxBaselinePolicy()) {}
+ virtual ~NaClBPFSandboxPolicy() {}
- virtual ErrorCode EvaluateSyscall(Sandbox* sandbox_compiler,
+ virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
int system_call_number) const OVERRIDE;
private:
- scoped_ptr<SandboxBpfPolicy> baseline_policy_;
- DISALLOW_COPY_AND_ASSIGN(NaClBpfSandboxPolicy);
+ scoped_ptr<SandboxBPFPolicy> baseline_policy_;
+ DISALLOW_COPY_AND_ASSIGN(NaClBPFSandboxPolicy);
};
-ErrorCode NaClBpfSandboxPolicy::EvaluateSyscall(
- playground2::Sandbox* sb, int sysno) const {
+ErrorCode NaClBPFSandboxPolicy::EvaluateSyscall(
+ sandbox::SandboxBPF* sb, int sysno) const {
DCHECK(baseline_policy_);
switch (sysno) {
// TODO(jln): NaCl's GDB debug stub uses the following socket system calls,
@@ -151,9 +151,9 @@ void RunSandboxSanityChecks() {
} // namespace
-bool InitializeBpfSandbox() {
+bool InitializeBPFSandbox() {
bool sandbox_is_initialized = content::InitializeSandbox(
- scoped_ptr<SandboxBpfPolicy>(new NaClBpfSandboxPolicy()));
+ scoped_ptr<SandboxBPFPolicy>(new NaClBPFSandboxPolicy()));
if (sandbox_is_initialized) {
RunSandboxSanityChecks();
return true;
« no previous file with comments | « components/nacl/loader/nacl_sandbox_linux.h ('k') | content/common/sandbox_bpf_base_policy_linux.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698