Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1522)

Unified Diff: sandbox/linux/seccomp-bpf/sandbox_bpf.h

Issue 681713002: Update from chromium https://crrev.com/301315 (Closed) Base URL: https://github.com/domokit/mojo.git@master
Patch Set: Created 6 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « sandbox/linux/seccomp-bpf/errorcode_unittest.cc ('k') | sandbox/linux/seccomp-bpf/sandbox_bpf.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: sandbox/linux/seccomp-bpf/sandbox_bpf.h
diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf.h b/sandbox/linux/seccomp-bpf/sandbox_bpf.h
index 866e7641c32bb6a99561f81a5cf8d6bd958c869c..a7f2d5ff5c52e4739c695037ab113fca9b6267c5 100644
--- a/sandbox/linux/seccomp-bpf/sandbox_bpf.h
+++ b/sandbox/linux/seccomp-bpf/sandbox_bpf.h
@@ -16,7 +16,7 @@
namespace sandbox {
struct arch_seccomp_data;
namespace bpf_dsl {
-class SandboxBPFDSLPolicy;
+class Policy;
}
class SANDBOX_EXPORT SandboxBPF {
@@ -79,7 +79,7 @@ class SANDBOX_EXPORT SandboxBPF {
// Set the BPF policy as |policy|. Ownership of |policy| is transfered here
// to the sandbox object.
- void SetSandboxPolicy(bpf_dsl::SandboxBPFDSLPolicy* policy);
+ void SetSandboxPolicy(bpf_dsl::Policy* policy);
// UnsafeTraps require some syscalls to always be allowed.
// This helper function returns true for these calls.
@@ -128,7 +128,7 @@ class SANDBOX_EXPORT SandboxBPF {
// policy. The caller has to make sure that "this" has not yet been
// initialized with any other policies.
bool RunFunctionInPolicy(void (*code_in_sandbox)(),
- scoped_ptr<bpf_dsl::SandboxBPFDSLPolicy> policy);
+ scoped_ptr<bpf_dsl::Policy> policy);
// Performs a couple of sanity checks to verify that the kernel supports the
// features that we need for successful sandboxing.
@@ -150,7 +150,7 @@ class SANDBOX_EXPORT SandboxBPF {
bool quiet_;
int proc_fd_;
bool sandbox_has_started_;
- scoped_ptr<bpf_dsl::SandboxBPFDSLPolicy> policy_;
+ scoped_ptr<bpf_dsl::Policy> policy_;
DISALLOW_COPY_AND_ASSIGN(SandboxBPF);
};
« no previous file with comments | « sandbox/linux/seccomp-bpf/errorcode_unittest.cc ('k') | sandbox/linux/seccomp-bpf/sandbox_bpf.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698