| Index: sandbox/linux/seccomp-bpf/syscall.h
|
| diff --git a/sandbox/linux/seccomp-bpf/syscall.h b/sandbox/linux/seccomp-bpf/syscall.h
|
| index f63516ba1c8695faf53bcb28c143da40d8be29d5..0b51380e88b199f0bd9c906e9b390ba23430e194 100644
|
| --- a/sandbox/linux/seccomp-bpf/syscall.h
|
| +++ b/sandbox/linux/seccomp-bpf/syscall.h
|
| @@ -7,7 +7,7 @@
|
|
|
| #include <stdint.h>
|
|
|
| -namespace playground2 {
|
| +namespace sandbox {
|
|
|
| // We have to make sure that we have a single "magic" return address for
|
| // our system calls, which we can check from within a BPF filter. This
|
| @@ -133,6 +133,6 @@ inline intptr_t SandboxSyscall(int nr) {
|
|
|
| #endif // Pre-C++11
|
|
|
| -} // namespace
|
| +} // namespace sandbox
|
|
|
| #endif // SANDBOX_LINUX_SECCOMP_BPF_SYSCALL_H__
|
|
|