| Index: sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h
|
| diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h b/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h
|
| index 99d9e1939a3614e8b58e3f5020c7d60ef3e43042..1ac5daba5d976b8bf9e2d933ff1be6ca90206ea9 100644
|
| --- a/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h
|
| +++ b/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h
|
| @@ -7,29 +7,29 @@
|
|
|
| #include "base/basictypes.h"
|
|
|
| -namespace playground2 {
|
| +namespace sandbox {
|
|
|
| class ErrorCode;
|
| -class Sandbox;
|
| +class SandboxBPF;
|
|
|
| // This is the interface to implement to define a BPF sandbox policy.
|
| -class SandboxBpfPolicy {
|
| +class SandboxBPFPolicy {
|
| public:
|
| - SandboxBpfPolicy() {}
|
| - virtual ~SandboxBpfPolicy() {}
|
| + SandboxBPFPolicy() {}
|
| + virtual ~SandboxBPFPolicy() {}
|
|
|
| // The EvaluateSyscall method is called with the system call number. It can
|
| // decide to allow the system call unconditionally by returning ERR_ALLOWED;
|
| // it can deny the system call unconditionally by returning an appropriate
|
| // "errno" value; or it can request inspection of system call argument(s) by
|
| // returning a suitable ErrorCode.
|
| - virtual ErrorCode EvaluateSyscall(Sandbox* sandbox_compiler,
|
| + virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
|
| int system_call_number) const = 0;
|
|
|
| private:
|
| - DISALLOW_COPY_AND_ASSIGN(SandboxBpfPolicy);
|
| + DISALLOW_COPY_AND_ASSIGN(SandboxBPFPolicy);
|
| };
|
|
|
| -} // namespace playground2
|
| +} // namespace sandbox
|
|
|
| #endif // SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_POLICY_H_
|
|
|