@@ -554,7 +554,7 @@ impl SeccompRule {
554554 offset : & mut u8 ,
555555 ) {
556556 // Tries to detect whether prepending the current condition will produce an unjumpable
557- // offset (since BPF jumps are a maximum of 255 instructions, which is std:: u8::MAX).
557+ // offset (since BPF jumps are a maximum of 255 instructions, which is u8::MAX).
558558 if offset. checked_add ( CONDITION_MAX_LEN + 1 ) . is_none ( ) {
559559 // If that is the case, three additional helper jumps are prepended and the offset
560560 // is reset to 1.
@@ -1010,15 +1010,15 @@ mod tests {
10101010 let rules = vec ! [ allow_syscall_if(
10111011 libc:: SYS_ioctl ,
10121012 vec![ SeccompRule :: new(
1013- vec![ Cond :: new( 2 , SeccompCmpArgLen :: Qword , Eq , std :: u64 :: MAX ) . unwrap( ) ] ,
1013+ vec![ Cond :: new( 2 , SeccompCmpArgLen :: Qword , Eq , u64 :: MAX ) . unwrap( ) ] ,
10141014 SeccompAction :: Allow ,
10151015 ) ] ,
10161016 ) ] ;
10171017 // check syscalls that are supposed to work
10181018 validate_seccomp_filter (
10191019 rules. clone ( ) ,
10201020 || unsafe {
1021- libc:: ioctl ( 0 , 0 , std :: u64:: MAX ) ;
1021+ libc:: ioctl ( 0 , 0 , u64:: MAX ) ;
10221022 } ,
10231023 false ,
10241024 ) ;
@@ -1064,16 +1064,16 @@ mod tests {
10641064 let rules = vec ! [ allow_syscall_if(
10651065 libc:: SYS_ioctl ,
10661066 vec![ SeccompRule :: new(
1067- vec![ Cond :: new( 2 , SeccompCmpArgLen :: Qword , Ge , u64 :: from( std :: u32 :: MAX ) ) . unwrap( ) ] ,
1067+ vec![ Cond :: new( 2 , SeccompCmpArgLen :: Qword , Ge , u64 :: from( u32 :: MAX ) ) . unwrap( ) ] ,
10681068 SeccompAction :: Allow ,
10691069 ) ] ,
10701070 ) ] ;
10711071 // check syscalls that are supposed to work
10721072 validate_seccomp_filter (
10731073 rules. clone ( ) ,
10741074 || unsafe {
1075- libc:: ioctl ( 0 , 0 , u64:: from ( std :: u32:: MAX ) ) ;
1076- libc:: ioctl ( 0 , 0 , u64:: from ( std :: u32:: MAX ) + 1 ) ;
1075+ libc:: ioctl ( 0 , 0 , u64:: from ( u32:: MAX ) ) ;
1076+ libc:: ioctl ( 0 , 0 , u64:: from ( u32:: MAX ) + 1 ) ;
10771077 } ,
10781078 false ,
10791079 ) ;
@@ -1118,29 +1118,23 @@ mod tests {
11181118 let rules = vec ! [ allow_syscall_if(
11191119 libc:: SYS_ioctl ,
11201120 vec![ SeccompRule :: new(
1121- vec![ Cond :: new(
1122- 2 ,
1123- SeccompCmpArgLen :: Qword ,
1124- Gt ,
1125- u64 :: from( std:: u32 :: MAX ) + 10 ,
1126- )
1127- . unwrap( ) ] ,
1121+ vec![ Cond :: new( 2 , SeccompCmpArgLen :: Qword , Gt , u64 :: from( u32 :: MAX ) + 10 ) . unwrap( ) ] ,
11281122 SeccompAction :: Allow ,
11291123 ) ] ,
11301124 ) ] ;
11311125 // check syscalls that are supposed to work
11321126 validate_seccomp_filter (
11331127 rules. clone ( ) ,
11341128 || unsafe {
1135- libc:: ioctl ( 0 , 0 , u64:: from ( std :: u32:: MAX ) + 11 ) ;
1129+ libc:: ioctl ( 0 , 0 , u64:: from ( u32:: MAX ) + 11 ) ;
11361130 } ,
11371131 false ,
11381132 ) ;
11391133 // check syscalls that are not supposed to work
11401134 validate_seccomp_filter (
11411135 rules,
11421136 || unsafe {
1143- libc:: ioctl ( 0 , 0 , u64:: from ( std :: u32:: MAX ) + 10 ) ;
1137+ libc:: ioctl ( 0 , 0 , u64:: from ( u32:: MAX ) + 10 ) ;
11441138 } ,
11451139 true ,
11461140 ) ;
@@ -1178,30 +1172,24 @@ mod tests {
11781172 let rules = vec ! [ allow_syscall_if(
11791173 libc:: SYS_ioctl ,
11801174 vec![ SeccompRule :: new(
1181- vec![ Cond :: new(
1182- 2 ,
1183- SeccompCmpArgLen :: Qword ,
1184- Le ,
1185- u64 :: from( std:: u32 :: MAX ) + 10 ,
1186- )
1187- . unwrap( ) ] ,
1175+ vec![ Cond :: new( 2 , SeccompCmpArgLen :: Qword , Le , u64 :: from( u32 :: MAX ) + 10 ) . unwrap( ) ] ,
11881176 SeccompAction :: Allow ,
11891177 ) ] ,
11901178 ) ] ;
11911179 // check syscalls that are supposed to work
11921180 validate_seccomp_filter (
11931181 rules. clone ( ) ,
11941182 || unsafe {
1195- libc:: ioctl ( 0 , 0 , u64:: from ( std :: u32:: MAX ) + 10 ) ;
1196- libc:: ioctl ( 0 , 0 , u64:: from ( std :: u32:: MAX ) + 9 ) ;
1183+ libc:: ioctl ( 0 , 0 , u64:: from ( u32:: MAX ) + 10 ) ;
1184+ libc:: ioctl ( 0 , 0 , u64:: from ( u32:: MAX ) + 9 ) ;
11971185 } ,
11981186 false ,
11991187 ) ;
12001188 // check syscalls that are not supposed to work
12011189 validate_seccomp_filter (
12021190 rules,
12031191 || unsafe {
1204- libc:: ioctl ( 0 , 0 , u64:: from ( std :: u32:: MAX ) + 11 ) ;
1192+ libc:: ioctl ( 0 , 0 , u64:: from ( u32:: MAX ) + 11 ) ;
12051193 } ,
12061194 true ,
12071195 ) ;
@@ -1238,29 +1226,23 @@ mod tests {
12381226 let rules = vec ! [ allow_syscall_if(
12391227 libc:: SYS_ioctl ,
12401228 vec![ SeccompRule :: new(
1241- vec![ Cond :: new(
1242- 2 ,
1243- SeccompCmpArgLen :: Qword ,
1244- Lt ,
1245- u64 :: from( std:: u32 :: MAX ) + 10 ,
1246- )
1247- . unwrap( ) ] ,
1229+ vec![ Cond :: new( 2 , SeccompCmpArgLen :: Qword , Lt , u64 :: from( u32 :: MAX ) + 10 ) . unwrap( ) ] ,
12481230 SeccompAction :: Allow ,
12491231 ) ] ,
12501232 ) ] ;
12511233 // check syscalls that are supposed to work
12521234 validate_seccomp_filter (
12531235 rules. clone ( ) ,
12541236 || unsafe {
1255- libc:: ioctl ( 0 , 0 , u64:: from ( std :: u32:: MAX ) + 9 ) ;
1237+ libc:: ioctl ( 0 , 0 , u64:: from ( u32:: MAX ) + 9 ) ;
12561238 } ,
12571239 false ,
12581240 ) ;
12591241 // check syscalls that are not supposed to work
12601242 validate_seccomp_filter (
12611243 rules,
12621244 || unsafe {
1263- libc:: ioctl ( 0 , 0 , u64:: from ( std :: u32:: MAX ) + 10 ) ;
1245+ libc:: ioctl ( 0 , 0 , u64:: from ( u32:: MAX ) + 10 ) ;
12641246 } ,
12651247 true ,
12661248 ) ;
@@ -1307,8 +1289,8 @@ mod tests {
13071289 vec![ Cond :: new(
13081290 2 ,
13091291 SeccompCmpArgLen :: Qword ,
1310- MaskedEq ( u64 :: from( std :: u32 :: MAX ) ) ,
1311- std :: u64 :: MAX ,
1292+ MaskedEq ( u64 :: from( u32 :: MAX ) ) ,
1293+ u64 :: MAX ,
13121294 )
13131295 . unwrap( ) ] ,
13141296 SeccompAction :: Allow ,
@@ -1318,8 +1300,8 @@ mod tests {
13181300 validate_seccomp_filter (
13191301 rules. clone ( ) ,
13201302 || unsafe {
1321- libc:: ioctl ( 0 , 0 , u64:: from ( std :: u32:: MAX ) ) ;
1322- libc:: ioctl ( 0 , 0 , std :: u64:: MAX ) ;
1303+ libc:: ioctl ( 0 , 0 , u64:: from ( u32:: MAX ) ) ;
1304+ libc:: ioctl ( 0 , 0 , u64:: MAX ) ;
13231305 } ,
13241306 false ,
13251307 ) ;
@@ -1364,7 +1346,7 @@ mod tests {
13641346 let rules = vec ! [ allow_syscall_if(
13651347 libc:: SYS_ioctl ,
13661348 vec![ SeccompRule :: new(
1367- vec![ Cond :: new( 2 , SeccompCmpArgLen :: Qword , Ne , std :: u64 :: MAX ) . unwrap( ) ] ,
1349+ vec![ Cond :: new( 2 , SeccompCmpArgLen :: Qword , Ne , u64 :: MAX ) . unwrap( ) ] ,
13681350 SeccompAction :: Allow ,
13691351 ) ] ,
13701352 ) ] ;
@@ -1380,7 +1362,7 @@ mod tests {
13801362 validate_seccomp_filter (
13811363 rules,
13821364 || unsafe {
1383- libc:: ioctl ( 0 , 0 , std :: u64:: MAX ) ;
1365+ libc:: ioctl ( 0 , 0 , u64:: MAX ) ;
13841366 } ,
13851367 true ,
13861368 ) ;
0 commit comments