Index: sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
diff --git a/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc b/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
index 8e7e144bd514113516b7073d13ecd8f7643b040d..e884774146d58738b5cbb4342fc4cb4508081e75 100644 |
--- a/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
+++ b/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
@@ -557,11 +557,11 @@ SANDBOX_TEST(SandboxBPF, EnableUnsafeTrapsInSigSysHandler) { |
Die::SuppressInfoMessages(true); |
unsetenv(kSandboxDebuggingEnv); |
- SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false); |
+ SANDBOX_ASSERT(Trap::Registry()->EnableUnsafeTraps() == false); |
setenv(kSandboxDebuggingEnv, "", 1); |
- SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false); |
+ SANDBOX_ASSERT(Trap::Registry()->EnableUnsafeTraps() == false); |
setenv(kSandboxDebuggingEnv, "t", 1); |
- SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == true); |
+ SANDBOX_ASSERT(Trap::Registry()->EnableUnsafeTraps() == true); |
} |
intptr_t PrctlHandler(const struct arch_seccomp_data& args, void*) { |