| Index: sandbox/linux/services/credentials_unittest.cc
|
| diff --git a/sandbox/linux/services/credentials_unittest.cc b/sandbox/linux/services/credentials_unittest.cc
|
| index 355d4ab5e4a61043750247f103e9c3d46ecd1f93..da61cd590dc29eb1da0696bbc8ee6acd6c27704b 100644
|
| --- a/sandbox/linux/services/credentials_unittest.cc
|
| +++ b/sandbox/linux/services/credentials_unittest.cc
|
| @@ -5,6 +5,7 @@
|
| #include "sandbox/linux/services/credentials.h"
|
|
|
| #include <errno.h>
|
| +#include <stdio.h>
|
| #include <unistd.h>
|
|
|
| #include "base/logging.h"
|
| @@ -68,11 +69,13 @@ SANDBOX_TEST(Credentials, MoveToNewUserNS) {
|
| Credentials creds;
|
| creds.DropAllCapabilities();
|
| bool userns_supported = creds.MoveToNewUserNS();
|
| - printf("Unprivileged CLONE_NEWUSER supported: %s\n",
|
| - userns_supported ? "true." : "false.");
|
| + fprintf(stdout, "Unprivileged CLONE_NEWUSER supported: %s\n",
|
| + userns_supported ? "true." : "false.");
|
| + fflush(stdout);
|
| if (!userns_supported) {
|
| - printf("This kernel does not support unprivileged namespaces. "
|
| - "USERNS tests will all pass.\n");
|
| + fprintf(stdout, "This kernel does not support unprivileged namespaces. "
|
| + "USERNS tests will succeed without running.\n");
|
| + fflush(stdout);
|
| return;
|
| }
|
| CHECK(creds.HasAnyCapability());
|
|
|