| Index: sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| index 988e29544b0d5b21a0b532749c7a68296f9d9fa2..d05878cc91cbd1a47fbec0c1f76a1436c70ac882 100644
|
| --- a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| +++ b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| @@ -20,6 +20,7 @@
|
|
|
| #include <ostream>
|
|
|
| +#include "base/bind.h"
|
| #include "base/memory/scoped_ptr.h"
|
| #include "build/build_config.h"
|
| #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
|
| @@ -670,6 +671,8 @@ BPF_TEST(SandboxBPF, UnsafeTrapWithErrno, RedirectAllSyscallsPolicy) {
|
| BPF_ASSERT(errno == 0);
|
| }
|
|
|
| +bool NoOpCallback() { return true; }
|
| +
|
| // Test a trap handler that makes use of a broker process to open().
|
|
|
| class InitializedOpenBroker {
|
| @@ -682,7 +685,7 @@ class InitializedOpenBroker {
|
| broker_process_.reset(
|
| new BrokerProcess(EPERM, allowed_files, std::vector<std::string>()));
|
| BPF_ASSERT(broker_process() != NULL);
|
| - BPF_ASSERT(broker_process_->Init(NULL));
|
| + BPF_ASSERT(broker_process_->Init(base::Bind(&NoOpCallback)));
|
|
|
| initialized_ = true;
|
| }
|
|
|