Index: sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc |
diff --git a/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc b/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc |
index 26675792fb0b63b0a6758a9c9a670fa87ee81618..ab1a2c85ab5ac88b6b35b3ee18796c27b5427ec4 100644 |
--- a/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc |
+++ b/sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc |
@@ -134,6 +134,10 @@ class PolicyEmulator { |
EXPECT_EQ(SECCOMP_RET_ERRNO | err, Emulate(data)); |
} |
+ void ExpectKill(const struct arch_seccomp_data& data) const { |
+ EXPECT_EQ(SECCOMP_RET_KILL, Emulate(data)); |
+ } |
+ |
private: |
CodeGen::Program program_; |
FakeTrapRegistry traps_; |
@@ -152,7 +156,7 @@ class BasicPolicy : public Policy { |
} |
if (sysno == __NR_setuid) { |
const Arg<uid_t> uid(0); |
- return If(uid != 42, Error(ESRCH)).Else(Error(ENOMEM)); |
+ return If(uid != 42, Kill()).Else(Allow()); |
} |
return Allow(); |
} |
@@ -168,8 +172,8 @@ TEST(BPFDSL, Basic) { |
emulator.ExpectErrno(EPERM, FakeSyscall(__NR_getpgid, 0)); |
emulator.ExpectErrno(EINVAL, FakeSyscall(__NR_getpgid, 1)); |
- emulator.ExpectErrno(ENOMEM, FakeSyscall(__NR_setuid, 42)); |
- emulator.ExpectErrno(ESRCH, FakeSyscall(__NR_setuid, 43)); |
+ emulator.ExpectAllow(FakeSyscall(__NR_setuid, 42)); |
+ emulator.ExpectKill(FakeSyscall(__NR_setuid, 43)); |
} |
/* On IA-32, socketpair() is implemented via socketcall(). :-( */ |