diff options
author | Nicolas Lacasse <nlacasse@google.com> | 2019-06-28 15:28:24 -0700 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2019-06-28 15:32:29 -0700 |
commit | cf51e77d6d7cf5302f03812bb726a86e9be572f5 (patch) | |
tree | b4624e72b2d62af64371cd2e66d7596a2327c00f /test/syscalls/linux/chroot.cc | |
parent | 295078fa7ae7893f3deb0e6042e2aecfaba0dd1c (diff) |
Fix suggestions from clang.
PiperOrigin-RevId: 255679603
Diffstat (limited to 'test/syscalls/linux/chroot.cc')
-rw-r--r-- | test/syscalls/linux/chroot.cc | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/test/syscalls/linux/chroot.cc b/test/syscalls/linux/chroot.cc index a4354ff62..498c45f16 100644 --- a/test/syscalls/linux/chroot.cc +++ b/test/syscalls/linux/chroot.cc @@ -273,7 +273,8 @@ TEST(ChrootTest, ProcMemSelfMapsNoEscapeProcOpen) { ASSERT_GT(bytes_read, 0); // Finally we want to make sure the maps don't contain the chroot path - ASSERT_EQ(std::string(buf, bytes_read).find(temp_dir.path()), std::string::npos); + ASSERT_EQ(std::string(buf, bytes_read).find(temp_dir.path()), + std::string::npos); } // Test that mounts outside the chroot will not appear in /proc/self/mounts or |