Index: sandbox/linux/bpf_dsl/syscall_set_unittest.cc |
diff --git a/sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc b/sandbox/linux/bpf_dsl/syscall_set_unittest.cc |
similarity index 88% |
rename from sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc |
rename to sandbox/linux/bpf_dsl/syscall_set_unittest.cc |
index 3bc1eaa5b75a6551f3468ba51eeb2d0558820081..5730dc4584521aaa20c335bbe53b8396ebdbdd80 100644 |
--- a/sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc |
+++ b/sandbox/linux/bpf_dsl/syscall_set_unittest.cc |
@@ -2,7 +2,7 @@ |
// Use of this source code is governed by a BSD-style license that can be |
// found in the LICENSE file. |
-#include "sandbox/linux/seccomp-bpf/syscall_iterator.h" |
+#include "sandbox/linux/bpf_dsl/syscall_set.h" |
#include <stdint.h> |
@@ -18,7 +18,7 @@ const SyscallSet kSyscallSets[] = { |
SyscallSet::InvalidOnly(), |
}; |
-SANDBOX_TEST(SyscallIterator, Monotonous) { |
+SANDBOX_TEST(SyscallSet, Monotonous) { |
for (const SyscallSet& set : kSyscallSets) { |
uint32_t prev = 0; |
bool have_prev = false; |
@@ -54,7 +54,7 @@ void AssertRange(uint32_t min, uint32_t max) { |
SANDBOX_ASSERT(prev == max); |
} |
-SANDBOX_TEST(SyscallIterator, ValidSyscallRanges) { |
+SANDBOX_TEST(SyscallSet, ValidSyscallRanges) { |
AssertRange(MIN_SYSCALL, MAX_PUBLIC_SYSCALL); |
#if defined(__arm__) |
AssertRange(MIN_PRIVATE_SYSCALL, MAX_PRIVATE_SYSCALL); |
@@ -62,7 +62,7 @@ SANDBOX_TEST(SyscallIterator, ValidSyscallRanges) { |
#endif |
} |
-SANDBOX_TEST(SyscallIterator, InvalidSyscalls) { |
+SANDBOX_TEST(SyscallSet, InvalidSyscalls) { |
static const uint32_t kExpected[] = { |
#if defined(__mips__) |
0, |
@@ -93,19 +93,19 @@ SANDBOX_TEST(SyscallIterator, InvalidSyscalls) { |
} |
} |
-SANDBOX_TEST(SyscallIterator, ValidOnlyIsOnlyValid) { |
+SANDBOX_TEST(SyscallSet, ValidOnlyIsOnlyValid) { |
for (uint32_t sysnum : SyscallSet::ValidOnly()) { |
SANDBOX_ASSERT(SyscallSet::IsValid(sysnum)); |
} |
} |
-SANDBOX_TEST(SyscallIterator, InvalidOnlyIsOnlyInvalid) { |
+SANDBOX_TEST(SyscallSet, InvalidOnlyIsOnlyInvalid) { |
for (uint32_t sysnum : SyscallSet::InvalidOnly()) { |
SANDBOX_ASSERT(!SyscallSet::IsValid(sysnum)); |
} |
} |
-SANDBOX_TEST(SyscallIterator, AllIsValidOnlyPlusInvalidOnly) { |
+SANDBOX_TEST(SyscallSet, AllIsValidOnlyPlusInvalidOnly) { |
std::vector<uint32_t> merged; |
const SyscallSet valid_only = SyscallSet::ValidOnly(); |
const SyscallSet invalid_only = SyscallSet::InvalidOnly(); |