| Index: sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc
|
| diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc
|
| index 83e848976b3a7a5b29c84289a07382c6222d315d..c97d95e1fce000707a8502efd38ee0cf70650c7b 100644
|
| --- a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc
|
| +++ b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc
|
| @@ -23,6 +23,7 @@
|
| #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
|
| #include "sandbox/linux/seccomp-bpf/syscall.h"
|
| #include "sandbox/linux/services/linux_syscalls.h"
|
| +#include "sandbox/linux/services/syscall_wrappers.h"
|
| #include "sandbox/linux/tests/unit_tests.h"
|
|
|
| #if !defined(OS_ANDROID)
|
| @@ -163,7 +164,7 @@ void CheckSchedGetParam(pid_t pid, struct sched_param* param) {
|
|
|
| void SchedGetParamThread(base::WaitableEvent* thread_run) {
|
| const pid_t pid = getpid();
|
| - const pid_t tid = syscall(__NR_gettid);
|
| + const pid_t tid = sys_gettid();
|
| BPF_ASSERT_NE(pid, tid);
|
|
|
| struct sched_param current_pid_param;
|
|
|