/external/libchrome/sandbox/linux/bpf_dsl/ |
H A D | syscall_set_unittest.cc | 23 SANDBOX_TEST(SyscallSet, Monotonous) { function in namespace:sandbox::__anon9239 59 SANDBOX_TEST(SyscallSet, ValidSyscallRanges) { function in namespace:sandbox 67 SANDBOX_TEST(SyscallSet, InvalidSyscalls) { function in namespace:sandbox 98 SANDBOX_TEST(SyscallSet, ValidOnlyIsOnlyValid) { 104 SANDBOX_TEST(SyscallSet, InvalidOnlyIsOnlyInvalid) { 110 SANDBOX_TEST(SyscallSet, AllIsValidOnlyPlusInvalidOnly) {
|
/external/libchrome/sandbox/linux/services/ |
H A D | resource_limits_unittests.cc | 30 SANDBOX_TEST(ResourceLimits, MAYBE_NoFork) { function in namespace:sandbox::__anon9260
|
H A D | credentials_unittest.cc | 64 SANDBOX_TEST(Credentials, DropAllCaps) { function in namespace:sandbox::__anon9253 69 SANDBOX_TEST(Credentials, MoveToNewUserNS) { function in namespace:sandbox::__anon9253 87 SANDBOX_TEST(Credentials, CanCreateProcessInNewUserNS) { function in namespace:sandbox::__anon9253 94 SANDBOX_TEST(Credentials, UidIsPreserved) { function in namespace:sandbox::__anon9253 125 SANDBOX_TEST(Credentials, NestedUserNS) { function in namespace:sandbox::__anon9253 139 SANDBOX_TEST(Credentials, CanDetectRoot) { function in namespace:sandbox::__anon9253 147 SANDBOX_TEST(Credentials, DISABLE_ON_ASAN(DropFileSystemAccessIsSafe)) { function in namespace:sandbox::__anon9253 162 SANDBOX_TEST(Credentials, DISABLE_ON_ASAN(CannotRegainPrivileges)) { function in namespace:sandbox::__anon9253 176 SANDBOX_TEST(Credentials, SetCapabilities) { function in namespace:sandbox::__anon9253 198 SANDBOX_TEST(Credential function in namespace:sandbox::__anon9253 217 SANDBOX_TEST(Credentials, SetCapabilitiesMatchesLibCap2) { function in namespace:sandbox::__anon9253 249 SANDBOX_TEST(Credentials, DISABLE_ON_ASAN(DropFileSystemAccessPreservesTLS)) { function in namespace:sandbox::__anon9253 [all...] |
H A D | namespace_utils_unittest.cc | 23 SANDBOX_TEST(NamespaceUtils, KernelSupportsUnprivilegedNamespace) { function in namespace:sandbox::__anon9258 35 SANDBOX_TEST(NamespaceUtils, WriteToIdMapFile) { function in namespace:sandbox::__anon9258
|
H A D | thread_helpers_unittests.cc | 70 SANDBOX_TEST(ThreadHelpers, AssertSingleThreaded) { function in namespace:sandbox::__anon9265 112 SANDBOX_TEST(ThreadHelpers, AssertSingleThreadedAfterThreadStopped) { function in namespace:sandbox::__anon9265
|
H A D | yama_unittests.cc | 118 SANDBOX_TEST(Yama, RestrictPtraceSucceedsWhenYamaPresent) { function in namespace:sandbox::__anon9267 156 SANDBOX_TEST(Yama, RestrictPtraceIsDefault) { function in namespace:sandbox::__anon9267
|
H A D | namespace_sandbox_unittest.cc | 174 SANDBOX_TEST(ForkInNewPidNamespace, BasicUsage) { function in namespace:sandbox::__anon9256 196 SANDBOX_TEST(ForkInNewPidNamespace, ExitWithSignal) { function in namespace:sandbox::__anon9256 227 SANDBOX_TEST(InstallTerminationSignalHandler, DoesNotOverrideExistingHandlers) { function in namespace:sandbox::__anon9256
|
/external/libchrome/sandbox/linux/syscall_broker/ |
H A D | broker_file_permission_unittest.cc | 39 SANDBOX_TEST(BrokerFilePermission, CreateGood) { function in namespace:sandbox::syscall_broker::__anon9268 44 SANDBOX_TEST(BrokerFilePermission, CreateGoodRecursive) { function in namespace:sandbox::syscall_broker::__anon9268
|
H A D | broker_process_unittest.cc | 418 // SANDBOX_TEST because the process could die with a SIGPIPE 420 SANDBOX_TEST(BrokerProcess, BrokerDied) { function in namespace:sandbox::syscall_broker
|