Index: components/nacl/loader/nacl_sandbox_linux.cc |
diff --git a/components/nacl/loader/nacl_sandbox_linux.cc b/components/nacl/loader/nacl_sandbox_linux.cc |
index f92cc080fb8d1b4eabe50ebf31f04310705b1ccb..bb1eb13e3d48ae8d793c6e03e8ea3feea5042bc0 100644 |
--- a/components/nacl/loader/nacl_sandbox_linux.cc |
+++ b/components/nacl/loader/nacl_sandbox_linux.cc |
@@ -18,9 +18,9 @@ |
#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" |
#include "sandbox/linux/services/linux_syscalls.h" |
-using playground2::ErrorCode; |
-using playground2::Sandbox; |
-using playground2::SandboxBpfPolicy; |
+using sandbox::ErrorCode; |
+using sandbox::SandboxBPF; |
+using sandbox::SandboxBpfPolicy; |
namespace { |
@@ -58,7 +58,7 @@ class NaClBpfSandboxPolicy : public SandboxBpfPolicy { |
: baseline_policy_(content::GetBpfSandboxBaselinePolicy()) {} |
virtual ~NaClBpfSandboxPolicy() {} |
- virtual ErrorCode EvaluateSyscall(Sandbox* sandbox_compiler, |
+ virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, |
int system_call_number) const OVERRIDE; |
private: |
@@ -67,7 +67,7 @@ class NaClBpfSandboxPolicy : public SandboxBpfPolicy { |
}; |
ErrorCode NaClBpfSandboxPolicy::EvaluateSyscall( |
- playground2::Sandbox* sb, int sysno) const { |
+ sandbox::SandboxBPF* sb, int sysno) const { |
DCHECK(baseline_policy_); |
switch (sysno) { |
// TODO(jln): NaCl's GDB debug stub uses the following socket system calls, |