| Index: sandbox/linux/seccomp-bpf/syscall_iterator.h
|
| diff --git a/sandbox/linux/seccomp-bpf/syscall_iterator.h b/sandbox/linux/seccomp-bpf/syscall_iterator.h
|
| index 3d7f66db3a5edc4d21fbdf35b2992c108ce427ee..3b56ea3144d5b8b87d687763ae054f4b03f03219 100644
|
| --- a/sandbox/linux/seccomp-bpf/syscall_iterator.h
|
| +++ b/sandbox/linux/seccomp-bpf/syscall_iterator.h
|
| @@ -9,7 +9,7 @@
|
|
|
| #include "base/basictypes.h"
|
|
|
| -namespace playground2 {
|
| +namespace sandbox {
|
|
|
| // Iterates over the entire system call range from 0..0xFFFFFFFFu. This
|
| // iterator is aware of how system calls look like and will skip quickly
|
| @@ -50,6 +50,6 @@ class SyscallIterator {
|
| DISALLOW_IMPLICIT_CONSTRUCTORS(SyscallIterator);
|
| };
|
|
|
| -} // namespace playground2
|
| +} // namespace sandbox
|
|
|
| #endif // SANDBOX_LINUX_SECCOMP_BPF_SYSCALL_ITERATOR_H__
|
|
|