Index: sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
diff --git a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
index c56c81911fa83936e8c2e8b4fd383d5c99080ec9..b3d9126bdb90700698f6c69bc775508f50b73caa 100644 |
--- a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
+++ b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
@@ -759,26 +759,29 @@ class InitializedOpenBroker { |
allowed_files.push_back("/proc/allowed"); |
allowed_files.push_back("/proc/cpuinfo"); |
- broker_process_.reset( |
- new BrokerProcess(EPERM, allowed_files, std::vector<std::string>())); |
+ broker_process_.reset(new syscall_broker::BrokerProcess( |
+ EPERM, allowed_files, std::vector<std::string>())); |
BPF_ASSERT(broker_process() != NULL); |
BPF_ASSERT(broker_process_->Init(base::Bind(&NoOpCallback))); |
initialized_ = true; |
} |
bool initialized() { return initialized_; } |
- class BrokerProcess* broker_process() { return broker_process_.get(); } |
+ class syscall_broker::BrokerProcess* broker_process() { |
+ return broker_process_.get(); |
+ } |
private: |
bool initialized_; |
- scoped_ptr<class BrokerProcess> broker_process_; |
+ scoped_ptr<class syscall_broker::BrokerProcess> broker_process_; |
DISALLOW_COPY_AND_ASSIGN(InitializedOpenBroker); |
}; |
intptr_t BrokerOpenTrapHandler(const struct arch_seccomp_data& args, |
void* aux) { |
BPF_ASSERT(aux); |
- BrokerProcess* broker_process = static_cast<BrokerProcess*>(aux); |
+ syscall_broker::BrokerProcess* broker_process = |
+ static_cast<syscall_broker::BrokerProcess*>(aux); |
switch (args.nr) { |
case __NR_faccessat: // access is a wrapper of faccessat in android |
BPF_ASSERT(static_cast<int>(args.args[0]) == AT_FDCWD); |
@@ -824,7 +827,7 @@ class DenyOpenPolicy : public Policy { |
#endif |
case __NR_openat: |
// We get a InitializedOpenBroker class, but our trap handler wants |
- // the BrokerProcess object. |
+ // the syscall_broker::BrokerProcess object. |
return Trap(BrokerOpenTrapHandler, iob_->broker_process()); |
default: |
return Allow(); |
@@ -844,7 +847,7 @@ BPF_TEST(SandboxBPF, |
DenyOpenPolicy, |
InitializedOpenBroker /* (*BPF_AUX) */) { |
BPF_ASSERT(BPF_AUX->initialized()); |
- BrokerProcess* broker_process = BPF_AUX->broker_process(); |
+ syscall_broker::BrokerProcess* broker_process = BPF_AUX->broker_process(); |
BPF_ASSERT(broker_process != NULL); |
// First, use the broker "manually" |