Index: sandbox/linux/seccomp-bpf/syscall_iterator.h |
diff --git a/sandbox/linux/seccomp-bpf/syscall_iterator.h b/sandbox/linux/seccomp-bpf/syscall_iterator.h |
index 3d7f66db3a5edc4d21fbdf35b2992c108ce427ee..3b56ea3144d5b8b87d687763ae054f4b03f03219 100644 |
--- a/sandbox/linux/seccomp-bpf/syscall_iterator.h |
+++ b/sandbox/linux/seccomp-bpf/syscall_iterator.h |
@@ -9,7 +9,7 @@ |
#include "base/basictypes.h" |
-namespace playground2 { |
+namespace sandbox { |
// Iterates over the entire system call range from 0..0xFFFFFFFFu. This |
// iterator is aware of how system calls look like and will skip quickly |
@@ -50,6 +50,6 @@ class SyscallIterator { |
DISALLOW_IMPLICIT_CONSTRUCTORS(SyscallIterator); |
}; |
-} // namespace playground2 |
+} // namespace sandbox |
#endif // SANDBOX_LINUX_SECCOMP_BPF_SYSCALL_ITERATOR_H__ |