Index: sandbox/linux/seccomp-bpf/verifier.h |
diff --git a/sandbox/linux/seccomp-bpf/verifier.h b/sandbox/linux/seccomp-bpf/verifier.h |
index 02a9d374c0fa86126589a63a13377828d606248f..fff5b6339ea7e758b8b0bc80e85cc8125d333d21 100644 |
--- a/sandbox/linux/seccomp-bpf/verifier.h |
+++ b/sandbox/linux/seccomp-bpf/verifier.h |
@@ -10,7 +10,6 @@ |
#include <utility> |
#include <vector> |
- |
namespace playground2 { |
class SandboxBpfPolicy; |
@@ -24,10 +23,10 @@ class Verifier { |
// set by the "evaluators". |
// Upon success, "err" is set to NULL. Upon failure, it contains a static |
// error message that does not need to be free()'d. |
- static bool VerifyBPF(Sandbox *sandbox, |
+ static bool VerifyBPF(Sandbox* sandbox, |
const std::vector<struct sock_filter>& program, |
const SandboxBpfPolicy& policy, |
- const char **err); |
+ const char** err); |
// Evaluate a given BPF program for a particular set of system call |
// parameters. If evaluation failed for any reason, "err" will be set to |
@@ -39,7 +38,7 @@ class Verifier { |
// BPF compiler, we might have to extend this BPF interpreter. |
static uint32_t EvaluateBPF(const std::vector<struct sock_filter>& program, |
const struct arch_seccomp_data& data, |
- const char **err); |
+ const char** err); |
private: |
DISALLOW_IMPLICIT_CONSTRUCTORS(Verifier); |