| Index: sandbox/linux/seccomp-bpf/sandbox_bpf.h
|
| diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf.h b/sandbox/linux/seccomp-bpf/sandbox_bpf.h
|
| index 866e7641c32bb6a99561f81a5cf8d6bd958c869c..a7f2d5ff5c52e4739c695037ab113fca9b6267c5 100644
|
| --- a/sandbox/linux/seccomp-bpf/sandbox_bpf.h
|
| +++ b/sandbox/linux/seccomp-bpf/sandbox_bpf.h
|
| @@ -16,7 +16,7 @@
|
| namespace sandbox {
|
| struct arch_seccomp_data;
|
| namespace bpf_dsl {
|
| -class SandboxBPFDSLPolicy;
|
| +class Policy;
|
| }
|
|
|
| class SANDBOX_EXPORT SandboxBPF {
|
| @@ -79,7 +79,7 @@ class SANDBOX_EXPORT SandboxBPF {
|
|
|
| // Set the BPF policy as |policy|. Ownership of |policy| is transfered here
|
| // to the sandbox object.
|
| - void SetSandboxPolicy(bpf_dsl::SandboxBPFDSLPolicy* policy);
|
| + void SetSandboxPolicy(bpf_dsl::Policy* policy);
|
|
|
| // UnsafeTraps require some syscalls to always be allowed.
|
| // This helper function returns true for these calls.
|
| @@ -128,7 +128,7 @@ class SANDBOX_EXPORT SandboxBPF {
|
| // policy. The caller has to make sure that "this" has not yet been
|
| // initialized with any other policies.
|
| bool RunFunctionInPolicy(void (*code_in_sandbox)(),
|
| - scoped_ptr<bpf_dsl::SandboxBPFDSLPolicy> policy);
|
| + scoped_ptr<bpf_dsl::Policy> policy);
|
|
|
| // Performs a couple of sanity checks to verify that the kernel supports the
|
| // features that we need for successful sandboxing.
|
| @@ -150,7 +150,7 @@ class SANDBOX_EXPORT SandboxBPF {
|
| bool quiet_;
|
| int proc_fd_;
|
| bool sandbox_has_started_;
|
| - scoped_ptr<bpf_dsl::SandboxBPFDSLPolicy> policy_;
|
| + scoped_ptr<bpf_dsl::Policy> policy_;
|
|
|
| DISALLOW_COPY_AND_ASSIGN(SandboxBPF);
|
| };
|
|
|