Index: sandbox/linux/seccomp-bpf/errorcode.h |
diff --git a/sandbox/linux/seccomp-bpf/errorcode.h b/sandbox/linux/seccomp-bpf/errorcode.h |
index 182fadb4dcbf5253d3900244019e8fb0be119821..625d123513ff288f4eb126edee14df840eb7b70a 100644 |
--- a/sandbox/linux/seccomp-bpf/errorcode.h |
+++ b/sandbox/linux/seccomp-bpf/errorcode.h |
@@ -8,7 +8,7 @@ |
#include "sandbox/linux/seccomp-bpf/linux_seccomp.h" |
#include "sandbox/linux/seccomp-bpf/trap.h" |
-namespace playground2 { |
+namespace sandbox { |
struct arch_seccomp_data; |
@@ -46,7 +46,7 @@ class ErrorCode { |
// access 64bit quantities. But policies are still advised to specify whether |
// a system call expects a 32bit or a 64bit quantity. |
enum ArgType { |
- // When passed as an argument to Sandbox::Cond(), TP_32BIT requests that |
+ // When passed as an argument to SandboxBPF::Cond(), TP_32BIT requests that |
// the conditional test should operate on the 32bit part of the system call |
// argument. |
// On 64bit architectures, this verifies that user space did not pass |
@@ -64,7 +64,7 @@ class ErrorCode { |
// having been sign extended. |
TP_32BIT, |
- // When passed as an argument to Sandbox::Cond(), TP_64BIT requests that |
+ // When passed as an argument to SandboxBPF::Cond(), TP_64BIT requests that |
// the conditional test should operate on the full 64bit argument. It is |
// generally harmless to perform a 64bit test on 32bit systems, as the |
// kernel will always see the top 32 bits of all arguments as zero'd out. |
@@ -148,7 +148,7 @@ class ErrorCode { |
private: |
friend class CodeGen; |
- friend class Sandbox; |
+ friend class SandboxBPF; |
friend class Trap; |
// If we are wrapping a callback, we must assign a unique id. This id is |
@@ -192,6 +192,6 @@ class ErrorCode { |
uint32_t err_; |
}; |
-} // namespace |
+} // namespace sandbox |
#endif // SANDBOX_LINUX_SECCOMP_BPF_ERRORCODE_H__ |