Index: sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc |
diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc |
index 264ee4d020b79d4cbd8b5a7daf2a72901a823382..01ad1f21a7ea2e7e6d3a1ee3896837b7c03d9181 100644 |
--- a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc |
+++ b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc |
@@ -227,8 +227,8 @@ class RestrictPrlimit64Policy : public bpf_dsl::Policy { |
}; |
BPF_TEST_C(ParameterRestrictions, prlimit64_allowed, RestrictPrlimit64Policy) { |
- BPF_ASSERT_EQ(0, syscall(__NR_prlimit64, 0, RLIMIT_AS, NULL, NULL)); |
- BPF_ASSERT_EQ(0, syscall(__NR_prlimit64, getpid(), RLIMIT_AS, NULL, NULL)); |
+ BPF_ASSERT_EQ(0, sys_prlimit64(0, RLIMIT_AS, NULL, NULL)); |
+ BPF_ASSERT_EQ(0, sys_prlimit64(getpid(), RLIMIT_AS, NULL, NULL)); |
} |
BPF_DEATH_TEST_C(ParameterRestrictions, |
@@ -237,7 +237,7 @@ BPF_DEATH_TEST_C(ParameterRestrictions, |
RestrictPrlimit64Policy) { |
const pid_t kInitPID = 1; |
BPF_ASSERT_NE(kInitPID, getpid()); |
- syscall(__NR_prlimit64, kInitPID, RLIMIT_AS, NULL, NULL); |
+ sys_prlimit64(kInitPID, RLIMIT_AS, NULL, NULL); |
} |
} // namespace |