Index: content/common/sandbox_bpf_base_policy_linux.cc |
diff --git a/content/common/sandbox_bpf_base_policy_linux.cc b/content/common/sandbox_bpf_base_policy_linux.cc |
index 226c8e597c9c00912c88ed839f12ee3f77870475..4341e921fa97344bc471d50fb7e4ea320932b873 100644 |
--- a/content/common/sandbox_bpf_base_policy_linux.cc |
+++ b/content/common/sandbox_bpf_base_policy_linux.cc |
@@ -18,18 +18,18 @@ static const int kFSDeniedErrno = EPERM; |
} // namespace. |
-SandboxBpfBasePolicy::SandboxBpfBasePolicy() |
+SandboxBPFBasePolicy::SandboxBPFBasePolicy() |
: baseline_policy_(new sandbox::BaselinePolicy(kFSDeniedErrno)) {} |
-SandboxBpfBasePolicy::~SandboxBpfBasePolicy() {} |
+SandboxBPFBasePolicy::~SandboxBPFBasePolicy() {} |
-ErrorCode SandboxBpfBasePolicy::EvaluateSyscall(Sandbox* sandbox_compiler, |
+ErrorCode SandboxBPFBasePolicy::EvaluateSyscall(SandboxBPF* sandbox_compiler, |
int system_call_number) const { |
DCHECK(baseline_policy_); |
return baseline_policy_->EvaluateSyscall(sandbox_compiler, |
system_call_number); |
} |
-int SandboxBpfBasePolicy::GetFSDeniedErrno() { |
+int SandboxBPFBasePolicy::GetFSDeniedErrno() { |
return kFSDeniedErrno; |
} |