SANDBOX_TEST      260 sandbox/linux/seccomp-bpf/codegen_unittest.cc SANDBOX_TEST(CodeGen, MakeInstruction) {
SANDBOX_TEST      323 sandbox/linux/seccomp-bpf/codegen_unittest.cc SANDBOX_TEST(CodeGen, FindBranchTargets) { ForAllPrograms(FindBranchTargets); }
SANDBOX_TEST      366 sandbox/linux/seccomp-bpf/codegen_unittest.cc SANDBOX_TEST(CodeGen, CutGraphIntoBasicBlocks) {
SANDBOX_TEST      450 sandbox/linux/seccomp-bpf/codegen_unittest.cc SANDBOX_TEST(CodeGen, MergeTails) {
SANDBOX_TEST      534 sandbox/linux/seccomp-bpf/codegen_unittest.cc SANDBOX_TEST(CodeGen, All) {
SANDBOX_TEST       14 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SANDBOX_TEST(ErrorCode, ErrnoConstructor) {
SANDBOX_TEST       29 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SANDBOX_TEST(ErrorCode, Trap) {
SANDBOX_TEST       41 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SANDBOX_TEST(ErrorCode, Equals) {
SANDBOX_TEST       61 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SANDBOX_TEST(ErrorCode, LessThan) {
SANDBOX_TEST       68 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupportsTwice)) {
SANDBOX_TEST       96 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(VerboseAPITesting)) {
SANDBOX_TEST      500 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, EnableUnsafeTrapsInSigSysHandler) {
SANDBOX_TEST       13 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, Monotonous) {
SANDBOX_TEST       32 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, PublicSyscallRange) {
SANDBOX_TEST       49 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, ARMPrivateSyscallRange) {
SANDBOX_TEST       64 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, ARMHiddenSyscallRange) {
SANDBOX_TEST       80 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, Invalid) {
SANDBOX_TEST      106 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, InvalidOnly) {
SANDBOX_TEST      360 sandbox/linux/services/broker_process_unittest.cc SANDBOX_TEST(BrokerProcess, BrokerDied) {
SANDBOX_TEST       98 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, DropAllCaps) {
SANDBOX_TEST      104 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, GetCurrentCapString) {
SANDBOX_TEST      111 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, MoveToNewUserNS) {
SANDBOX_TEST      130 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, SupportsUserNS) {
SANDBOX_TEST      138 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, UidIsPreserved) {
SANDBOX_TEST      171 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, NestedUserNS) {
SANDBOX_TEST      193 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, DropFileSystemAccessIsSafe) {
SANDBOX_TEST      208 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, CannotRegainPrivileges) {
SANDBOX_TEST       99 sandbox/linux/services/yama_unittests.cc SANDBOX_TEST(Yama, RestrictPtraceSucceedsWhenYamaPresent) {
SANDBOX_TEST      136 sandbox/linux/services/yama_unittests.cc SANDBOX_TEST(Yama, RestrictPtraceIsDefault) {
SANDBOX_TEST       68 sandbox/linux/tests/unit_tests.h #define SANDBOX_TEST(test_case_name, test_name) \