| Index: sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| index 075604de7b8f1c10a0135bfbd6afdb6432136dcd..9f026025b8b764856417ac5f6576310d5e893c58 100644
|
| --- a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| +++ b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| @@ -1204,7 +1204,7 @@ class EqualityStressTest {
|
| // based on the system call number and the parameters that we decided
|
| // to pass in. Verify that this condition holds true.
|
| BPF_ASSERT(
|
| - SandboxSyscall(
|
| + Syscall::Call(
|
| sysno, args[0], args[1], args[2], args[3], args[4], args[5]) ==
|
| -err);
|
| }
|
| @@ -1279,18 +1279,18 @@ ErrorCode EqualityArgumentWidthPolicy::EvaluateSyscall(SandboxBPF* sandbox,
|
| }
|
|
|
| BPF_TEST_C(SandboxBPF, EqualityArgumentWidth, EqualityArgumentWidthPolicy) {
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, 0, 0x55555555) == -1);
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, 0, 0xAAAAAAAA) == -2);
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, 0, 0x55555555) == -1);
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, 0, 0xAAAAAAAA) == -2);
|
| #if __SIZEOF_POINTER__ > 4
|
| // On 32bit machines, there is no way to pass a 64bit argument through the
|
| // syscall interface. So, we have to skip the part of the test that requires
|
| // 64bit arguments.
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x55555555AAAAAAAAULL) == -1);
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x5555555500000000ULL) == -2);
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x5555555511111111ULL) == -2);
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x11111111AAAAAAAAULL) == -2);
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, 1, 0x55555555AAAAAAAAULL) == -1);
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, 1, 0x5555555500000000ULL) == -2);
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, 1, 0x5555555511111111ULL) == -2);
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, 1, 0x11111111AAAAAAAAULL) == -2);
|
| #else
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, 1, 0x55555555) == -2);
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, 1, 0x55555555) == -2);
|
| #endif
|
| }
|
|
|
| @@ -1302,7 +1302,7 @@ BPF_DEATH_TEST_C(SandboxBPF,
|
| EqualityArgumentUnallowed64bit,
|
| DEATH_MESSAGE("Unexpected 64bit argument detected"),
|
| EqualityArgumentWidthPolicy) {
|
| - SandboxSyscall(__NR_uname, 0, 0x5555555555555555ULL);
|
| + Syscall::Call(__NR_uname, 0, 0x5555555555555555ULL);
|
| }
|
| #endif
|
|
|
| @@ -1330,9 +1330,9 @@ class EqualityWithNegativeArgumentsPolicy : public SandboxBPFPolicy {
|
| BPF_TEST_C(SandboxBPF,
|
| EqualityWithNegativeArguments,
|
| EqualityWithNegativeArgumentsPolicy) {
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, 0xFFFFFFFF) == -1);
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, -1) == -1);
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, -1LL) == -1);
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, 0xFFFFFFFF) == -1);
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, -1) == -1);
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, -1LL) == -1);
|
| }
|
|
|
| #if __SIZEOF_POINTER__ > 4
|
| @@ -1343,7 +1343,7 @@ BPF_DEATH_TEST_C(SandboxBPF,
|
| // When expecting a 32bit system call argument, we look at the MSB of the
|
| // 64bit value and allow both "0" and "-1". But the latter is allowed only
|
| // iff the LSB was negative. So, this death test should error out.
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, 0xFFFFFFFF00000000LL) == -1);
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, 0xFFFFFFFF00000000LL) == -1);
|
| }
|
| #endif
|
| class AllBitTestPolicy : public SandboxBPFPolicy {
|
| @@ -1433,10 +1433,10 @@ ErrorCode AllBitTestPolicy::EvaluateSyscall(SandboxBPF* sandbox,
|
| // to make changes to these values, you will have to edit the
|
| // test policy instead.
|
| #define BITMASK_TEST(testcase, arg, op, mask, expected_value) \
|
| - BPF_ASSERT(SandboxSyscall(__NR_uname, (testcase), (arg)) == (expected_value))
|
| + BPF_ASSERT(Syscall::Call(__NR_uname, (testcase), (arg)) == (expected_value))
|
|
|
| // Our uname() system call returns ErrorCode(1) for success and
|
| -// ErrorCode(0) for failure. SandboxSyscall() turns this into an
|
| +// ErrorCode(0) for failure. Syscall::Call() turns this into an
|
| // exit code of -1 or 0.
|
| #define EXPECT_FAILURE 0
|
| #define EXPECT_SUCCESS -1
|
| @@ -1866,7 +1866,7 @@ ErrorCode PthreadPolicyBitMask::EvaluateSyscall(SandboxBPF* sandbox,
|
|
|
| static void* ThreadFnc(void* arg) {
|
| ++*reinterpret_cast<int*>(arg);
|
| - SandboxSyscall(__NR_futex, arg, FUTEX_WAKE, 1, 0, 0, 0);
|
| + Syscall::Call(__NR_futex, arg, FUTEX_WAKE, 1, 0, 0, 0);
|
| return NULL;
|
| }
|
|
|
| @@ -1885,7 +1885,7 @@ static void PthreadTest() {
|
| BPF_ASSERT(!pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED));
|
| BPF_ASSERT(!pthread_create(&thread, &attr, ThreadFnc, &thread_ran));
|
| BPF_ASSERT(!pthread_attr_destroy(&attr));
|
| - while (SandboxSyscall(__NR_futex, &thread_ran, FUTEX_WAIT, 0, 0, 0, 0) ==
|
| + while (Syscall::Call(__NR_futex, &thread_ran, FUTEX_WAIT, 0, 0, 0, 0) ==
|
| -EINTR) {
|
| }
|
| BPF_ASSERT(thread_ran);
|
| @@ -1896,11 +1896,11 @@ static void PthreadTest() {
|
| // run-time libraries other than glibc might call __NR_fork instead of
|
| // __NR_clone, and that would introduce a bogus test failure.
|
| int pid;
|
| - BPF_ASSERT(SandboxSyscall(__NR_clone,
|
| - CLONE_CHILD_CLEARTID | CLONE_CHILD_SETTID | SIGCHLD,
|
| - 0,
|
| - 0,
|
| - &pid) == -EPERM);
|
| + BPF_ASSERT(Syscall::Call(__NR_clone,
|
| + CLONE_CHILD_CLEARTID | CLONE_CHILD_SETTID | SIGCHLD,
|
| + 0,
|
| + 0,
|
| + &pid) == -EPERM);
|
| }
|
|
|
| BPF_TEST_C(SandboxBPF, PthreadEquality, PthreadPolicyEquality) {
|
|
|