summaryrefslogtreecommitdiffhomepage
path: root/test/syscalls/linux/truncate.cc
diff options
context:
space:
mode:
authorAdin Scannell <ascannell@google.com>2021-04-13 15:40:41 -0700
committergVisor bot <gvisor-bot@google.com>2021-04-13 15:42:41 -0700
commite83cc06f1b79dcbae3a0217384985ab32138ca9a (patch)
tree472f5bb0923bfa16513d6b567a654fa6f3a29b24 /test/syscalls/linux/truncate.cc
parent326394b79a62061e3e239ac104c151ca13647439 (diff)
Remove _NoRandomSave tests.
We do not currently run random save tests. PiperOrigin-RevId: 368309921
Diffstat (limited to 'test/syscalls/linux/truncate.cc')
-rw-r--r--test/syscalls/linux/truncate.cc4
1 files changed, 2 insertions, 2 deletions
diff --git a/test/syscalls/linux/truncate.cc b/test/syscalls/linux/truncate.cc
index 17832c47d..5db0b8276 100644
--- a/test/syscalls/linux/truncate.cc
+++ b/test/syscalls/linux/truncate.cc
@@ -208,7 +208,7 @@ TEST(TruncateTest, FtruncateWithOpath) {
// ftruncate(2) should succeed as long as the file descriptor is writeable,
// regardless of whether the file permissions allow writing.
-TEST(TruncateTest, FtruncateWithoutWritePermission_NoRandomSave) {
+TEST(TruncateTest, FtruncateWithoutWritePermission) {
// Drop capabilities that allow us to override file permissions.
ASSERT_NO_ERRNO(SetCapability(CAP_DAC_OVERRIDE, false));
@@ -230,7 +230,7 @@ TEST(TruncateTest, TruncateNonExist) {
EXPECT_THAT(truncate("/foo/bar", 0), SyscallFailsWithErrno(ENOENT));
}
-TEST(TruncateTest, FtruncateVirtualTmp_NoRandomSave) {
+TEST(TruncateTest, FtruncateVirtualTmp) {
auto temp_file = NewTempAbsPathInDir("/dev/shm");
const DisableSave ds; // Incompatible permissions.
const FileDescriptor fd =