| Index: sandbox/linux/seccomp-bpf/syscall_unittest.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/syscall_unittest.cc b/sandbox/linux/seccomp-bpf/syscall_unittest.cc
|
| index 0472448298e31a9e1896b2b5702cf921f6180545..261453bf291f8798e29becba92efa6a036fd1035 100644
|
| --- a/sandbox/linux/seccomp-bpf/syscall_unittest.cc
|
| +++ b/sandbox/linux/seccomp-bpf/syscall_unittest.cc
|
| @@ -64,7 +64,7 @@ TEST(Syscall, TrivialSyscallOneArg) {
|
| int new_fd;
|
| // Duplicate standard error and close it.
|
| ASSERT_GE(new_fd = SandboxSyscall(__NR_dup, 2), 0);
|
| - int close_return_value = HANDLE_EINTR(SandboxSyscall(__NR_close, new_fd));
|
| + int close_return_value = IGNORE_EINTR(SandboxSyscall(__NR_close, new_fd));
|
| ASSERT_EQ(close_return_value, 0);
|
| }
|
|
|
| @@ -160,7 +160,7 @@ TEST(Syscall, ComplexSyscallSixArgs) {
|
|
|
| // Clean up
|
| EXPECT_EQ(0, SandboxSyscall(__NR_munmap, addr1, 4096L));
|
| - EXPECT_EQ(0, HANDLE_EINTR(SandboxSyscall(__NR_close, fd)));
|
| + EXPECT_EQ(0, IGNORE_EINTR(SandboxSyscall(__NR_close, fd)));
|
|
|
| // Check that the offset argument (i.e. the sixth argument) is processed
|
| // correctly.
|
| @@ -193,7 +193,7 @@ TEST(Syscall, ComplexSyscallSixArgs) {
|
| // Clean up
|
| EXPECT_EQ(0, SandboxSyscall(__NR_munmap, addr2, 8192L));
|
| EXPECT_EQ(0, SandboxSyscall(__NR_munmap, addr3, 4096L));
|
| - EXPECT_EQ(0, HANDLE_EINTR(SandboxSyscall(__NR_close, fd)));
|
| + EXPECT_EQ(0, IGNORE_EINTR(SandboxSyscall(__NR_close, fd)));
|
| }
|
|
|
| } // namespace
|
|
|