Searched refs:SANDBOX_TEST (Results 1 - 9 of 9) sorted by relevance

/external/libchrome/sandbox/linux/bpf_dsl/
H A Dsyscall_set_unittest.cc23 SANDBOX_TEST(SyscallSet, Monotonous) { function in namespace:sandbox::__anon9239
59 SANDBOX_TEST(SyscallSet, ValidSyscallRanges) { function in namespace:sandbox
67 SANDBOX_TEST(SyscallSet, InvalidSyscalls) { function in namespace:sandbox
98 SANDBOX_TEST(SyscallSet, ValidOnlyIsOnlyValid) {
104 SANDBOX_TEST(SyscallSet, InvalidOnlyIsOnlyInvalid) {
110 SANDBOX_TEST(SyscallSet, AllIsValidOnlyPlusInvalidOnly) {
/external/libchrome/sandbox/linux/services/
H A Dresource_limits_unittests.cc30 SANDBOX_TEST(ResourceLimits, MAYBE_NoFork) { function in namespace:sandbox::__anon9260
H A Dcredentials_unittest.cc64 SANDBOX_TEST(Credentials, DropAllCaps) { function in namespace:sandbox::__anon9253
69 SANDBOX_TEST(Credentials, MoveToNewUserNS) { function in namespace:sandbox::__anon9253
87 SANDBOX_TEST(Credentials, CanCreateProcessInNewUserNS) { function in namespace:sandbox::__anon9253
94 SANDBOX_TEST(Credentials, UidIsPreserved) { function in namespace:sandbox::__anon9253
125 SANDBOX_TEST(Credentials, NestedUserNS) { function in namespace:sandbox::__anon9253
139 SANDBOX_TEST(Credentials, CanDetectRoot) { function in namespace:sandbox::__anon9253
147 SANDBOX_TEST(Credentials, DISABLE_ON_ASAN(DropFileSystemAccessIsSafe)) { function in namespace:sandbox::__anon9253
162 SANDBOX_TEST(Credentials, DISABLE_ON_ASAN(CannotRegainPrivileges)) { function in namespace:sandbox::__anon9253
176 SANDBOX_TEST(Credentials, SetCapabilities) { function in namespace:sandbox::__anon9253
198 SANDBOX_TEST(Credential function in namespace:sandbox::__anon9253
217 SANDBOX_TEST(Credentials, SetCapabilitiesMatchesLibCap2) { function in namespace:sandbox::__anon9253
249 SANDBOX_TEST(Credentials, DISABLE_ON_ASAN(DropFileSystemAccessPreservesTLS)) { function in namespace:sandbox::__anon9253
[all...]
H A Dnamespace_utils_unittest.cc23 SANDBOX_TEST(NamespaceUtils, KernelSupportsUnprivilegedNamespace) { function in namespace:sandbox::__anon9258
35 SANDBOX_TEST(NamespaceUtils, WriteToIdMapFile) { function in namespace:sandbox::__anon9258
H A Dthread_helpers_unittests.cc70 SANDBOX_TEST(ThreadHelpers, AssertSingleThreaded) { function in namespace:sandbox::__anon9265
112 SANDBOX_TEST(ThreadHelpers, AssertSingleThreadedAfterThreadStopped) { function in namespace:sandbox::__anon9265
H A Dyama_unittests.cc118 SANDBOX_TEST(Yama, RestrictPtraceSucceedsWhenYamaPresent) { function in namespace:sandbox::__anon9267
156 SANDBOX_TEST(Yama, RestrictPtraceIsDefault) { function in namespace:sandbox::__anon9267
H A Dnamespace_sandbox_unittest.cc174 SANDBOX_TEST(ForkInNewPidNamespace, BasicUsage) { function in namespace:sandbox::__anon9256
196 SANDBOX_TEST(ForkInNewPidNamespace, ExitWithSignal) { function in namespace:sandbox::__anon9256
227 SANDBOX_TEST(InstallTerminationSignalHandler, DoesNotOverrideExistingHandlers) { function in namespace:sandbox::__anon9256
/external/libchrome/sandbox/linux/syscall_broker/
H A Dbroker_file_permission_unittest.cc39 SANDBOX_TEST(BrokerFilePermission, CreateGood) { function in namespace:sandbox::syscall_broker::__anon9268
44 SANDBOX_TEST(BrokerFilePermission, CreateGoodRecursive) { function in namespace:sandbox::syscall_broker::__anon9268
H A Dbroker_process_unittest.cc418 // SANDBOX_TEST because the process could die with a SIGPIPE
420 SANDBOX_TEST(BrokerProcess, BrokerDied) { function in namespace:sandbox::syscall_broker

Completed in 167 milliseconds