| Index: sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc
|
| diff --git a/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc b/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc
|
| index 2d337c6ec97695cf6cedff533fe6ce0547b5c8db..75d439d6e5f359c16a247cd14571dbe672d4ce03 100644
|
| --- a/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc
|
| +++ b/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc
|
| @@ -557,11 +557,11 @@ SANDBOX_TEST(SandboxBPF, EnableUnsafeTrapsInSigSysHandler) {
|
| Die::SuppressInfoMessages(true);
|
|
|
| unsetenv(kSandboxDebuggingEnv);
|
| - SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false);
|
| + SANDBOX_ASSERT(Trap::Registry()->EnableUnsafeTraps() == false);
|
| setenv(kSandboxDebuggingEnv, "", 1);
|
| - SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == false);
|
| + SANDBOX_ASSERT(Trap::Registry()->EnableUnsafeTraps() == false);
|
| setenv(kSandboxDebuggingEnv, "t", 1);
|
| - SANDBOX_ASSERT(Trap::EnableUnsafeTrapsInSigSysHandler() == true);
|
| + SANDBOX_ASSERT(Trap::Registry()->EnableUnsafeTraps() == true);
|
| }
|
|
|
| intptr_t PrctlHandler(const struct arch_seccomp_data& args, void*) {
|
|
|