| Index: sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc b/sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc
|
| index 26f11ce5e342def2598aa111e8593d905e22e528..61e95d7091175b2042dc4d081f7ce0a0eb160556 100644
|
| --- a/sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc
|
| +++ b/sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc
|
| @@ -12,7 +12,7 @@ namespace {
|
|
|
| SANDBOX_TEST(SyscallIterator, Monotonous) {
|
| for (int i = 0; i < 2; ++i) {
|
| - bool invalid_only = !i; // Testing both |invalid_only| cases.
|
| + bool invalid_only = !i; // Testing both |invalid_only| cases.
|
| SyscallIterator iter(invalid_only);
|
| uint32_t next = iter.Next();
|
|
|
| @@ -79,7 +79,7 @@ SANDBOX_TEST(SyscallIterator, ARMHiddenSyscallRange) {
|
|
|
| SANDBOX_TEST(SyscallIterator, Invalid) {
|
| for (int i = 0; i < 2; ++i) {
|
| - bool invalid_only = !i; // Testing both |invalid_only| cases.
|
| + bool invalid_only = !i; // Testing both |invalid_only| cases.
|
| SyscallIterator iter(invalid_only);
|
| uint32_t next = iter.Next();
|
|
|
| @@ -132,4 +132,3 @@ SANDBOX_TEST(SyscallIterator, InvalidOnly) {
|
| }
|
|
|
| } // namespace
|
| -
|
|
|