Index: sandbox/linux/services/credentials_unittest.cc |
diff --git a/sandbox/linux/services/credentials_unittest.cc b/sandbox/linux/services/credentials_unittest.cc |
index 355d4ab5e4a61043750247f103e9c3d46ecd1f93..da61cd590dc29eb1da0696bbc8ee6acd6c27704b 100644 |
--- a/sandbox/linux/services/credentials_unittest.cc |
+++ b/sandbox/linux/services/credentials_unittest.cc |
@@ -5,6 +5,7 @@ |
#include "sandbox/linux/services/credentials.h" |
#include <errno.h> |
+#include <stdio.h> |
#include <unistd.h> |
#include "base/logging.h" |
@@ -68,11 +69,13 @@ SANDBOX_TEST(Credentials, MoveToNewUserNS) { |
Credentials creds; |
creds.DropAllCapabilities(); |
bool userns_supported = creds.MoveToNewUserNS(); |
- printf("Unprivileged CLONE_NEWUSER supported: %s\n", |
- userns_supported ? "true." : "false."); |
+ fprintf(stdout, "Unprivileged CLONE_NEWUSER supported: %s\n", |
+ userns_supported ? "true." : "false."); |
+ fflush(stdout); |
if (!userns_supported) { |
- printf("This kernel does not support unprivileged namespaces. " |
- "USERNS tests will all pass.\n"); |
+ fprintf(stdout, "This kernel does not support unprivileged namespaces. " |
+ "USERNS tests will succeed without running.\n"); |
+ fflush(stdout); |
return; |
} |
CHECK(creds.HasAnyCapability()); |