/external/chromium_org/sandbox/linux/seccomp-bpf/ |
H A D | syscall_iterator_unittest.cc | 16 SANDBOX_TEST(SyscallIterator, Monotonous) { function in namespace:sandbox::__anon10559 36 SANDBOX_TEST(SyscallIterator, PublicSyscallRangeMIPS) { 53 SANDBOX_TEST(SyscallIterator, PublicSyscallRangeIntelArm) { 71 SANDBOX_TEST(SyscallIterator, ARMPrivateSyscallRange) { 86 SANDBOX_TEST(SyscallIterator, ARMHiddenSyscallRange) { 102 SANDBOX_TEST(SyscallIterator, Invalid) { 129 SANDBOX_TEST(SyscallIterator, InvalidOnlyMIPS) { 148 SANDBOX_TEST(SyscallIterator, InvalidOnlyIntelArm) {
|
H A D | errorcode_unittest.cc | 17 SANDBOX_TEST(ErrorCode, ErrnoConstructor) { function in namespace:sandbox::__anon10553 43 SANDBOX_TEST(ErrorCode, Trap) { function in namespace:sandbox::__anon10553 55 SANDBOX_TEST(ErrorCode, Equals) { function in namespace:sandbox::__anon10553 75 SANDBOX_TEST(ErrorCode, LessThan) { function in namespace:sandbox::__anon10553
|
H A D | codegen_unittest.cc | 261 SANDBOX_TEST(CodeGen, MakeInstruction) { function in namespace:sandbox 324 SANDBOX_TEST(CodeGen, FindBranchTargets) { ForAllPrograms(FindBranchTargets); } function in namespace:sandbox 367 SANDBOX_TEST(CodeGen, CutGraphIntoBasicBlocks) { function in namespace:sandbox 451 SANDBOX_TEST(CodeGen, MergeTails) { function in namespace:sandbox 535 SANDBOX_TEST(CodeGen, All) {
|
/external/chromium_org/sandbox/linux/services/ |
H A D | credentials_unittest.cc | 110 SANDBOX_TEST(Credentials, DropAllCaps) { function in namespace:sandbox::__anon10576 116 SANDBOX_TEST(Credentials, GetCurrentCapString) { function in namespace:sandbox::__anon10576 123 SANDBOX_TEST(Credentials, MoveToNewUserNS) { function in namespace:sandbox::__anon10576 142 SANDBOX_TEST(Credentials, SupportsUserNS) { function in namespace:sandbox::__anon10576 150 SANDBOX_TEST(Credentials, UidIsPreserved) { function in namespace:sandbox::__anon10576 183 SANDBOX_TEST(Credentials, NestedUserNS) { function in namespace:sandbox::__anon10576 205 SANDBOX_TEST(Credentials, DISABLE_ON_LSAN(DropFileSystemAccessIsSafe)) { function in namespace:sandbox::__anon10576 220 SANDBOX_TEST(Credentials, DISABLE_ON_LSAN(CannotRegainPrivileges)) { function in namespace:sandbox::__anon10576
|
H A D | yama_unittests.cc | 116 SANDBOX_TEST(Yama, RestrictPtraceSucceedsWhenYamaPresent) { function in namespace:sandbox::__anon10584 156 SANDBOX_TEST(Yama, RestrictPtraceIsDefault) { function in namespace:sandbox::__anon10584
|
H A D | unix_domain_socket_unittest.cc | 109 SANDBOX_TEST(UnixDomainSocketTest, Fork) { function in namespace:sandbox::__anon10582 137 SANDBOX_TEST(UnixDomainSocketTest, Namespace) { function in namespace:sandbox::__anon10582 171 SANDBOX_TEST(UnixDomainSocketTest, DoubleNamespace) { function in namespace:sandbox::__anon10582 237 SANDBOX_TEST(UnixDomainSocketTest, ImpossiblePid) { function in namespace:sandbox::__anon10582
|
H A D | broker_process_unittest.cc | 337 // SANDBOX_TEST because the process could die with a SIGPIPE 339 SANDBOX_TEST(BrokerProcess, BrokerDied) { function in namespace:sandbox
|
/external/chromium_org/sandbox/linux/tests/ |
H A D | unit_tests.h | 71 // A SANDBOX_DEATH_TEST is just like a SANDBOX_TEST (see below), but it assumes 87 #define SANDBOX_TEST(test_case_name, test_name) \ macro 90 // SANDBOX_TEST_ALLOW_NOISE is just like SANDBOX_TEST, except it does not 111 // directly. It is automatically invoked by SANDBOX_TEST(). Most sandboxing 123 // Report a useful error message and terminate the current SANDBOX_TEST(). 124 // Calling this function from outside a SANDBOX_TEST() is unlikely to do 137 // This is the default test mode for SANDBOX_TEST(). The "aux" parameter
|
/external/chromium_org/sandbox/linux/bpf_dsl/ |
H A D | bpf_dsl_more_unittest.cc | 92 SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupportsTwice)) { function in namespace:sandbox::bpf_dsl::__anon10543 130 SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(VerboseAPITesting)) { function in namespace:sandbox::bpf_dsl::__anon10543 566 SANDBOX_TEST(SandboxBPF, EnableUnsafeTrapsInSigSysHandler) { function in namespace:sandbox::bpf_dsl::__anon10543 2065 SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(SeccompRetTrace)) { 2263 SANDBOX_TEST(SandboxBPF, Tsync) {
|