Index: sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
index 0ec396d534fe0083c665179e1b40200bc06f8067..9eb35d10e02e2182cbbab1a08b195312356a7d1d 100644 |
--- a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
+++ b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
@@ -92,7 +92,7 @@ SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictGetrusage(); |
// access to arbitrary per-{process,thread} CPU-time clock IDs (such as those |
// returned by {clock,pthread}_getcpuclockid), which can leak information |
// about the state of the host OS. |
-// On Chrome OS, base::TimeTicks::kClockSystemTrace is also allowed. |
+// On Chrome OS, base::TraceTicks::kClockSystemTrace is also allowed. |
SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictClockID(); |
} // namespace sandbox. |