| Index: sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc
|
| diff --git a/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc b/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc
|
| index 8e7e144bd514113516b7073d13ecd8f7643b040d..e884774146d58738b5cbb4342fc4cb4508081e75 100644
|
| --- a/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc
|
| +++ b/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc
|
| @@ -557,11 +557,11 @@ SANDBOX_TEST(SandboxBPF, EnableUnsafeTrapsInSigSysHandler) {
|
| Die::SuppressInfoMessages(true);
|
|
|
| unsetenv(kSandboxDebuggingEnv);
|
| - SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false);
|
| + SANDBOX_ASSERT(Trap::Registry()->EnableUnsafeTraps() == false);
|
| setenv(kSandboxDebuggingEnv, "", 1);
|
| - SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false);
|
| + SANDBOX_ASSERT(Trap::Registry()->EnableUnsafeTraps() == false);
|
| setenv(kSandboxDebuggingEnv, "t", 1);
|
| - SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == true);
|
| + SANDBOX_ASSERT(Trap::Registry()->EnableUnsafeTraps() == true);
|
| }
|
|
|
| intptr_t PrctlHandler(const struct arch_seccomp_data& args, void*) {
|
|
|