| Index: components/nacl/loader/nacl_sandbox_linux.cc
|
| diff --git a/components/nacl/loader/nacl_sandbox_linux.cc b/components/nacl/loader/nacl_sandbox_linux.cc
|
| index f92cc080fb8d1b4eabe50ebf31f04310705b1ccb..14ba18ff53ebc76ef88f31ac424ab0908bbb9544 100644
|
| --- a/components/nacl/loader/nacl_sandbox_linux.cc
|
| +++ b/components/nacl/loader/nacl_sandbox_linux.cc
|
| @@ -18,9 +18,9 @@
|
| #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
|
| #include "sandbox/linux/services/linux_syscalls.h"
|
|
|
| -using playground2::ErrorCode;
|
| -using playground2::Sandbox;
|
| -using playground2::SandboxBpfPolicy;
|
| +using sandbox::ErrorCode;
|
| +using sandbox::SandboxBPF;
|
| +using sandbox::SandboxBPFPolicy;
|
|
|
| namespace {
|
|
|
| @@ -52,22 +52,22 @@ bool IsSystemVIpc(int sysno) {
|
| }
|
| #endif
|
|
|
| -class NaClBpfSandboxPolicy : public SandboxBpfPolicy {
|
| +class NaClBPFSandboxPolicy : public SandboxBPFPolicy {
|
| public:
|
| - NaClBpfSandboxPolicy()
|
| - : baseline_policy_(content::GetBpfSandboxBaselinePolicy()) {}
|
| - virtual ~NaClBpfSandboxPolicy() {}
|
| + NaClBPFSandboxPolicy()
|
| + : baseline_policy_(content::GetBPFSandboxBaselinePolicy()) {}
|
| + virtual ~NaClBPFSandboxPolicy() {}
|
|
|
| - virtual ErrorCode EvaluateSyscall(Sandbox* sandbox_compiler,
|
| + virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
|
| int system_call_number) const OVERRIDE;
|
|
|
| private:
|
| - scoped_ptr<SandboxBpfPolicy> baseline_policy_;
|
| - DISALLOW_COPY_AND_ASSIGN(NaClBpfSandboxPolicy);
|
| + scoped_ptr<SandboxBPFPolicy> baseline_policy_;
|
| + DISALLOW_COPY_AND_ASSIGN(NaClBPFSandboxPolicy);
|
| };
|
|
|
| -ErrorCode NaClBpfSandboxPolicy::EvaluateSyscall(
|
| - playground2::Sandbox* sb, int sysno) const {
|
| +ErrorCode NaClBPFSandboxPolicy::EvaluateSyscall(
|
| + sandbox::SandboxBPF* sb, int sysno) const {
|
| DCHECK(baseline_policy_);
|
| switch (sysno) {
|
| // TODO(jln): NaCl's GDB debug stub uses the following socket system calls,
|
| @@ -151,9 +151,9 @@ void RunSandboxSanityChecks() {
|
|
|
| } // namespace
|
|
|
| -bool InitializeBpfSandbox() {
|
| +bool InitializeBPFSandbox() {
|
| bool sandbox_is_initialized = content::InitializeSandbox(
|
| - scoped_ptr<SandboxBpfPolicy>(new NaClBpfSandboxPolicy()));
|
| + scoped_ptr<SandboxBPFPolicy>(new NaClBPFSandboxPolicy()));
|
| if (sandbox_is_initialized) {
|
| RunSandboxSanityChecks();
|
| return true;
|
|
|