Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(886)

Unified Diff: sandbox/linux/seccomp-bpf/syscall_iterator.h

Issue 11411254: SECCOMP-BPF: Added supported for inspection system call arguments from BPF filters. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Addressed comments and fixed death tests Created 8 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: sandbox/linux/seccomp-bpf/syscall_iterator.h
diff --git a/sandbox/linux/seccomp-bpf/syscall_iterator.h b/sandbox/linux/seccomp-bpf/syscall_iterator.h
index 39568d8f121897cfbfb2389eb76a5c55e50dd572..e17593d844f94f1eb5a782e1bcb158c94ccbd557 100644
--- a/sandbox/linux/seccomp-bpf/syscall_iterator.h
+++ b/sandbox/linux/seccomp-bpf/syscall_iterator.h
@@ -7,8 +7,6 @@
#include <stdint.h>
-#include <base/logging.h>
-
namespace playground2 {
// Iterates over the entire system call range from 0..0xFFFFFFFFu. This
@@ -49,7 +47,7 @@ class SyscallIterator {
bool done_;
uint32_t num_;
- DISALLOW_COPY_AND_ASSIGN(SyscallIterator);
+ DISALLOW_IMPLICIT_CONSTRUCTORS(SyscallIterator);
};
} // namespace playground2

Powered by Google App Engine
This is Rietveld 408576698