| Index: sandbox/linux/seccomp-bpf/demo.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/demo.cc b/sandbox/linux/seccomp-bpf/demo.cc
|
| index 48df073c5bc0e32e39e0dfce744e2af790868df3..14180181a6ef2fc852de4dd8a56426a4785eed76 100644
|
| --- a/sandbox/linux/seccomp-bpf/demo.cc
|
| +++ b/sandbox/linux/seccomp-bpf/demo.cc
|
| @@ -30,9 +30,9 @@
|
| #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
|
| #include "sandbox/linux/services/linux_syscalls.h"
|
|
|
| -using playground2::arch_seccomp_data;
|
| -using playground2::ErrorCode;
|
| -using playground2::Sandbox;
|
| +using sandbox::ErrorCode;
|
| +using sandbox::SandboxBPF;
|
| +using sandbox::arch_seccomp_data;
|
|
|
| #define ERR EPERM
|
|
|
| @@ -237,7 +237,7 @@ intptr_t DefaultHandler(const struct arch_seccomp_data& data, void *) {
|
| return -ERR;
|
| }
|
|
|
| -ErrorCode Evaluator(Sandbox *sandbox, int sysno, void *) {
|
| +ErrorCode Evaluator(SandboxBPF* sandbox, int sysno, void *) {
|
| switch (sysno) {
|
| #if defined(__NR_accept)
|
| case __NR_accept: case __NR_accept4:
|
| @@ -413,12 +413,12 @@ int main(int argc, char *argv[]) {
|
| if (argc) { }
|
| if (argv) { }
|
| int proc_fd = open("/proc", O_RDONLY|O_DIRECTORY);
|
| - if (Sandbox::SupportsSeccompSandbox(proc_fd) !=
|
| - Sandbox::STATUS_AVAILABLE) {
|
| + if (SandboxBPF::SupportsSeccompSandbox(proc_fd) !=
|
| + SandboxBPF::STATUS_AVAILABLE) {
|
| perror("sandbox");
|
| _exit(1);
|
| }
|
| - Sandbox sandbox;
|
| + SandboxBPF sandbox;
|
| sandbox.set_proc_fd(proc_fd);
|
| sandbox.SetSandboxPolicyDeprecated(Evaluator, NULL);
|
| sandbox.StartSandbox();
|
|
|