Index: sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h |
diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h b/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h |
index 99d9e1939a3614e8b58e3f5020c7d60ef3e43042..69452488fa879f38165a7822636f7bd90af729df 100644 |
--- a/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h |
+++ b/sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h |
@@ -7,10 +7,10 @@ |
#include "base/basictypes.h" |
-namespace playground2 { |
+namespace sandbox { |
class ErrorCode; |
-class Sandbox; |
+class SandboxBPF; |
// This is the interface to implement to define a BPF sandbox policy. |
class SandboxBpfPolicy { |
@@ -23,13 +23,13 @@ class SandboxBpfPolicy { |
// it can deny the system call unconditionally by returning an appropriate |
// "errno" value; or it can request inspection of system call argument(s) by |
// returning a suitable ErrorCode. |
- virtual ErrorCode EvaluateSyscall(Sandbox* sandbox_compiler, |
+ virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler, |
int system_call_number) const = 0; |
private: |
DISALLOW_COPY_AND_ASSIGN(SandboxBpfPolicy); |
}; |
-} // namespace playground2 |
+} // namespace sandbox |
#endif // SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_POLICY_H_ |