chromium/sandbox/linux/bpf_dsl/syscall_set_unittest.cc

// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#ifdef UNSAFE_BUFFERS_BUILD
// TODO(crbug.com/351564777): Remove this and convert code to safer constructs.
#pragma allow_unsafe_buffers
#endif

#include "sandbox/linux/bpf_dsl/syscall_set.h"

#include <stddef.h>
#include <stdint.h>

#include <algorithm>

#include "sandbox/linux/bpf_dsl/linux_syscall_ranges.h"
#include "sandbox/linux/tests/unit_tests.h"

namespace sandbox {

namespace {

const SyscallSet kSyscallSets[] =;

SANDBOX_TEST(SyscallSet, Monotonous) {}

// AssertRange checks that SyscallIterator produces all system call
// numbers in the inclusive range [min, max].
void AssertRange(uint32_t min, uint32_t max) {}

SANDBOX_TEST(SyscallSet, ValidSyscallRanges) {

SANDBOX_TEST(SyscallSet, InvalidSyscalls) {}

SANDBOX_TEST(SyscallSet, ValidOnlyIsOnlyValid) {}

SANDBOX_TEST(SyscallSet, InvalidOnlyIsOnlyInvalid) {}

SANDBOX_TEST(SyscallSet, AllIsValidOnlyPlusInvalidOnly) {}

}  // namespace

}  // namespace sandbox