Index: sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h |
diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h b/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h |
index 99d9e1939a3614e8b58e3f5020c7d60ef3e43042..1ac5daba5d976b8bf9e2d933ff1be6ca90206ea9 100644 |
--- a/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h |
+++ b/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h |
@@ -7,29 +7,29 @@ |
#include "base/basictypes.h" |
-namespace playground2 { |
+namespace sandbox { |
class ErrorCode; |
-class Sandbox; |
+class SandboxBPF; |
// This is the interface to implement to define a BPF sandbox policy. |
-class SandboxBpfPolicy { |
+class SandboxBPFPolicy { |
public: |
- SandboxBpfPolicy() {} |
- virtual ~SandboxBpfPolicy() {} |
+ SandboxBPFPolicy() {} |
+ virtual ~SandboxBPFPolicy() {} |
// The EvaluateSyscall method is called with the system call number. It can |
// decide to allow the system call unconditionally by returning ERR_ALLOWED; |
// it can deny the system call unconditionally by returning an appropriate |
// "errno" value; or it can request inspection of system call argument(s) by |
// returning a suitable ErrorCode. |
- virtual ErrorCode EvaluateSyscall(Sandbox* sandbox_compiler, |
+ virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, |
int system_call_number) const = 0; |
private: |
- DISALLOW_COPY_AND_ASSIGN(SandboxBpfPolicy); |
+ DISALLOW_COPY_AND_ASSIGN(SandboxBPFPolicy); |
}; |
-} // namespace playground2 |
+} // namespace sandbox |
#endif // SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_POLICY_H_ |