| Index: sandbox/linux/services/yama_unittests.cc
|
| diff --git a/sandbox/linux/services/yama_unittests.cc b/sandbox/linux/services/yama_unittests.cc
|
| index 204cfd6a4448c0d9955c924f08a1a6d3914f2193..398eafecf2ad2ffba82e84ea9707b92b1952423c 100644
|
| --- a/sandbox/linux/services/yama_unittests.cc
|
| +++ b/sandbox/linux/services/yama_unittests.cc
|
| @@ -10,6 +10,7 @@
|
| #include <unistd.h>
|
|
|
| #include "base/bind.h"
|
| +#include "base/bind_helpers.h"
|
| #include "base/compiler_specific.h"
|
| #include "base/posix/eintr_wrapper.h"
|
| #include "base/strings/string_util.h"
|
| @@ -151,14 +152,12 @@ TEST(Yama, RestrictPtraceWorks) {
|
| }
|
| }
|
|
|
| -void DoNothing() {}
|
| -
|
| SANDBOX_TEST(Yama, RestrictPtraceIsDefault) {
|
| if (!Yama::IsPresent() || HasLinux32Bug())
|
| return;
|
|
|
| CHECK(Yama::DisableYamaRestrictions());
|
| - ScopedProcess process1(base::Bind(&DoNothing));
|
| + ScopedProcess process1(base::Bind(&base::DoNothing));
|
|
|
| if (Yama::IsEnforcing()) {
|
| // Check that process1 is protected by Yama, even though it has
|
|
|