Chromium Code Reviews| Index: sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
| diff --git a/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc b/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
| index ae35677de2b9046e8bb55cd23916952f6ae6d383..3ca859440752a57bb09e55337a47ea99846e1a0b 100644 |
| --- a/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
| +++ b/sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc |
| @@ -1995,7 +1995,7 @@ SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(SeccompRetTrace)) { |
| BPF_ASSERT_EQ(kTraceData, data); |
| regs_struct regs; |
| - BPF_ASSERT_NE(-1, ptrace(PTRACE_GETREGS, pid, NULL, ®s)); |
| + BPF_ASSERT_NE(-1, ptrace(static_cast<enum __ptrace_request>(PTRACE_GETREGS), pid, NULL, ®s)); |
|
Jorge Lucangeli Obes
2016/11/18 19:54:00
This line is longer than 80 cols.
|
| switch (SECCOMP_PT_SYSCALL(regs)) { |
| case __NR_write: |
| // Skip writes to stdout, make it return kExpectedReturnValue. Allow |
| @@ -2003,7 +2003,7 @@ SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(SeccompRetTrace)) { |
| if (SECCOMP_PT_PARM1(regs) == STDOUT_FILENO) { |
| BPF_ASSERT_NE(-1, SetSyscall(pid, ®s, -1)); |
| SECCOMP_PT_RESULT(regs) = kExpectedReturnValue; |
| - BPF_ASSERT_NE(-1, ptrace(PTRACE_SETREGS, pid, NULL, ®s)); |
| + BPF_ASSERT_NE(-1, ptrace(static_cast<enum __ptrace_request>(PTRACE_SETREGS), pid, NULL, ®s)); |
|
Jorge Lucangeli Obes
2016/11/18 19:54:00
And this one.
|
| } |
| break; |
| @@ -2011,7 +2011,7 @@ SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(SeccompRetTrace)) { |
| // Rewrite to exit(kExpectedReturnValue). |
| BPF_ASSERT_NE(-1, SetSyscall(pid, ®s, __NR_exit)); |
| SECCOMP_PT_PARM1(regs) = kExpectedReturnValue; |
| - BPF_ASSERT_NE(-1, ptrace(PTRACE_SETREGS, pid, NULL, ®s)); |
| + BPF_ASSERT_NE(-1, ptrace(static_cast<enum __ptrace_request>(PTRACE_SETREGS), pid, NULL, ®s)); |
|
Jorge Lucangeli Obes
2016/11/18 19:54:00
And this one too.
|
| break; |
| default: |