Index: sandbox/linux/seccomp-bpf-helpers/baseline_policy_unittest.cc |
diff --git a/sandbox/linux/seccomp-bpf-helpers/baseline_policy_unittest.cc b/sandbox/linux/seccomp-bpf-helpers/baseline_policy_unittest.cc |
index a71975bb97fc3c159226be1461d377b879120de3..76eef06457818840cae5f74d58c5184800d54914 100644 |
--- a/sandbox/linux/seccomp-bpf-helpers/baseline_policy_unittest.cc |
+++ b/sandbox/linux/seccomp-bpf-helpers/baseline_policy_unittest.cc |
@@ -213,12 +213,15 @@ BPF_TEST_C(BaselinePolicy, EPERM_getcwd, BaselinePolicy) { |
BPF_ASSERT_EQ(EPERM, errno); |
} |
+// TODO(jorgelo): re-enable this after crbug.com/424973 is fixed. |
+#if !defined(OS_CHROMEOS) |
BPF_DEATH_TEST_C(BaselinePolicy, |
SIGSYS_InvalidSyscall, |
DEATH_SEGV_MESSAGE(GetErrorMessageContentForTests()), |
BaselinePolicy) { |
mdempsky
2014/10/20 17:33:47
Can you instead add a DISABLE_ON_CHROMEOS macro to
Jorge Lucangeli Obes
2014/10/20 17:43:23
Done.
|
Syscall::InvalidCall(); |
} |
+#endif |
// A failing test using this macro could be problematic since we perform |
// system calls by passing "0" as every argument. |