Index: sandbox/linux/seccomp-bpf/syscall_unittest.cc |
diff --git a/sandbox/linux/seccomp-bpf/syscall_unittest.cc b/sandbox/linux/seccomp-bpf/syscall_unittest.cc |
index 261453bf291f8798e29becba92efa6a036fd1035..03ddcdec1a65ac1ca821f404f42ca2f67b741b67 100644 |
--- a/sandbox/linux/seccomp-bpf/syscall_unittest.cc |
+++ b/sandbox/linux/seccomp-bpf/syscall_unittest.cc |
@@ -18,7 +18,7 @@ |
#include "sandbox/linux/tests/unit_tests.h" |
#include "testing/gtest/include/gtest/gtest.h" |
-using namespace playground2; |
+namespace sandbox { |
namespace { |
@@ -78,8 +78,8 @@ intptr_t CopySyscallArgsToAux(const struct arch_seccomp_data& args, void* aux) { |
return -ENOMEM; |
} |
-ErrorCode CopyAllArgsOnUnamePolicy(Sandbox* sandbox, int sysno, void* aux) { |
- if (!Sandbox::IsValidSyscallNumber(sysno)) { |
+ErrorCode CopyAllArgsOnUnamePolicy(SandboxBPF* sandbox, int sysno, void* aux) { |
+ if (!SandboxBPF::IsValidSyscallNumber(sysno)) { |
return ErrorCode(ENOSYS); |
} |
if (sysno == __NR_uname) { |
@@ -196,4 +196,6 @@ TEST(Syscall, ComplexSyscallSixArgs) { |
EXPECT_EQ(0, IGNORE_EINTR(SandboxSyscall(__NR_close, fd))); |
} |
-} // namespace |
+} // namespace. |
Robert Sesek
2013/12/10 15:07:46
nit: no period
jln (very slow on Chromium)
2013/12/10 18:43:47
Done.
|
+ |
+} // namespace sandbox. |