Index: sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc |
diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc |
index dd5ece024acb37b951d1368cc81204fee5b14dd7..90ec8ffbdb74f1ea35ae4b90524e362963efc84d 100644 |
--- a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc |
+++ b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc |
@@ -451,19 +451,21 @@ BPF_TEST(SandboxBpf, SigMask, RedirectAllSyscallsPolicy) { |
// entirely in the kernel. |
sigset_t mask0, mask1, mask2; |
- // Call sigprocmask() to verify that SIGUSR1 wasn't blocked, if we didn't |
+ // Call sigprocmask() to verify that SIGUSR2 wasn't blocked, if we didn't |
// change the mask (it shouldn't have been, as it isn't blocked by default |
// in POSIX). |
+ // |
+ // Use SIGUSR2 because Android seems to use SIGUSR1 for some purpose. |
sigemptyset(&mask0); |
BPF_ASSERT(!sigprocmask(SIG_BLOCK, &mask0, &mask1)); |
- BPF_ASSERT(!sigismember(&mask1, SIGUSR1)); |
+ BPF_ASSERT(!sigismember(&mask1, SIGUSR2)); |
// Try again, and this time we verify that we can block it. This |
// requires a second call to sigprocmask(). |
- sigaddset(&mask0, SIGUSR1); |
+ sigaddset(&mask0, SIGUSR2); |
BPF_ASSERT(!sigprocmask(SIG_BLOCK, &mask0, NULL)); |
BPF_ASSERT(!sigprocmask(SIG_BLOCK, NULL, &mask2)); |
- BPF_ASSERT( sigismember(&mask2, SIGUSR1)); |
+ BPF_ASSERT( sigismember(&mask2, SIGUSR2)); |
} |
BPF_TEST(SandboxBpf, UnsafeTrapWithErrno, RedirectAllSyscallsPolicy) { |