| Index: sandbox/linux/seccomp-bpf/verifier.h
|
| diff --git a/sandbox/linux/seccomp-bpf/verifier.h b/sandbox/linux/seccomp-bpf/verifier.h
|
| index 02a9d374c0fa86126589a63a13377828d606248f..fff5b6339ea7e758b8b0bc80e85cc8125d333d21 100644
|
| --- a/sandbox/linux/seccomp-bpf/verifier.h
|
| +++ b/sandbox/linux/seccomp-bpf/verifier.h
|
| @@ -10,7 +10,6 @@
|
| #include <utility>
|
| #include <vector>
|
|
|
| -
|
| namespace playground2 {
|
|
|
| class SandboxBpfPolicy;
|
| @@ -24,10 +23,10 @@ class Verifier {
|
| // set by the "evaluators".
|
| // Upon success, "err" is set to NULL. Upon failure, it contains a static
|
| // error message that does not need to be free()'d.
|
| - static bool VerifyBPF(Sandbox *sandbox,
|
| + static bool VerifyBPF(Sandbox* sandbox,
|
| const std::vector<struct sock_filter>& program,
|
| const SandboxBpfPolicy& policy,
|
| - const char **err);
|
| + const char** err);
|
|
|
| // Evaluate a given BPF program for a particular set of system call
|
| // parameters. If evaluation failed for any reason, "err" will be set to
|
| @@ -39,7 +38,7 @@ class Verifier {
|
| // BPF compiler, we might have to extend this BPF interpreter.
|
| static uint32_t EvaluateBPF(const std::vector<struct sock_filter>& program,
|
| const struct arch_seccomp_data& data,
|
| - const char **err);
|
| + const char** err);
|
|
|
| private:
|
| DISALLOW_IMPLICIT_CONSTRUCTORS(Verifier);
|
|
|