Index: sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
diff --git a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
index 66669e796c69dbba717395c2a4772c96f5716aa3..5d1809ef58fe84c0d867f5e8e39f0dcc9511cceb 100644 |
--- a/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
+++ b/sandbox/linux/bpf_dsl/bpf_dsl_more_unittest.cc |
@@ -81,7 +81,7 @@ TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupports)) { |
// We check that we don't crash, but it's ok if the kernel doesn't |
// support it. |
bool seccomp_bpf_supported = |
- SandboxBPF::SupportsSeccompSandbox(-1) == SandboxBPF::STATUS_AVAILABLE; |
+ SandboxBPF::SupportsSeccompSandbox() == SandboxBPF::STATUS_AVAILABLE; |
// We want to log whether or not seccomp BPF is actually supported |
// since actual test coverage depends on it. |
RecordProperty("SeccompBPFSupported", |
@@ -93,8 +93,8 @@ TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupports)) { |
} |
SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupportsTwice)) { |
- SandboxBPF::SupportsSeccompSandbox(-1); |
- SandboxBPF::SupportsSeccompSandbox(-1); |
+ SandboxBPF::SupportsSeccompSandbox(); |
+ SandboxBPF::SupportsSeccompSandbox(); |
} |
// BPF_TEST does a lot of the boiler-plate code around setting up a |
@@ -131,7 +131,7 @@ class VerboseAPITestingPolicy : public Policy { |
}; |
SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(VerboseAPITesting)) { |
- if (SandboxBPF::SupportsSeccompSandbox(-1) == |
+ if (SandboxBPF::SupportsSeccompSandbox() == |
sandbox::SandboxBPF::STATUS_AVAILABLE) { |
static int counter = 0; |
@@ -2069,7 +2069,7 @@ class TraceAllPolicy : public Policy { |
}; |
SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(SeccompRetTrace)) { |
- if (SandboxBPF::SupportsSeccompSandbox(-1) != |
+ if (SandboxBPF::SupportsSeccompSandbox() != |
sandbox::SandboxBPF::STATUS_AVAILABLE) { |
return; |
} |