Index: sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc |
diff --git a/sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc b/sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc |
index 26f11ce5e342def2598aa111e8593d905e22e528..61e95d7091175b2042dc4d081f7ce0a0eb160556 100644 |
--- a/sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc |
+++ b/sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc |
@@ -12,7 +12,7 @@ namespace { |
SANDBOX_TEST(SyscallIterator, Monotonous) { |
for (int i = 0; i < 2; ++i) { |
- bool invalid_only = !i; // Testing both |invalid_only| cases. |
+ bool invalid_only = !i; // Testing both |invalid_only| cases. |
SyscallIterator iter(invalid_only); |
uint32_t next = iter.Next(); |
@@ -79,7 +79,7 @@ SANDBOX_TEST(SyscallIterator, ARMHiddenSyscallRange) { |
SANDBOX_TEST(SyscallIterator, Invalid) { |
for (int i = 0; i < 2; ++i) { |
- bool invalid_only = !i; // Testing both |invalid_only| cases. |
+ bool invalid_only = !i; // Testing both |invalid_only| cases. |
SyscallIterator iter(invalid_only); |
uint32_t next = iter.Next(); |
@@ -132,4 +132,3 @@ SANDBOX_TEST(SyscallIterator, InvalidOnly) { |
} |
} // namespace |
- |