SANDBOX_TEST 260 sandbox/linux/seccomp-bpf/codegen_unittest.cc SANDBOX_TEST(CodeGen, MakeInstruction) { SANDBOX_TEST 323 sandbox/linux/seccomp-bpf/codegen_unittest.cc SANDBOX_TEST(CodeGen, FindBranchTargets) { ForAllPrograms(FindBranchTargets); } SANDBOX_TEST 366 sandbox/linux/seccomp-bpf/codegen_unittest.cc SANDBOX_TEST(CodeGen, CutGraphIntoBasicBlocks) { SANDBOX_TEST 450 sandbox/linux/seccomp-bpf/codegen_unittest.cc SANDBOX_TEST(CodeGen, MergeTails) { SANDBOX_TEST 534 sandbox/linux/seccomp-bpf/codegen_unittest.cc SANDBOX_TEST(CodeGen, All) { SANDBOX_TEST 14 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SANDBOX_TEST(ErrorCode, ErrnoConstructor) { SANDBOX_TEST 29 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SANDBOX_TEST(ErrorCode, Trap) { SANDBOX_TEST 41 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SANDBOX_TEST(ErrorCode, Equals) { SANDBOX_TEST 61 sandbox/linux/seccomp-bpf/errorcode_unittest.cc SANDBOX_TEST(ErrorCode, LessThan) { SANDBOX_TEST 68 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(CallSupportsTwice)) { SANDBOX_TEST 96 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(VerboseAPITesting)) { SANDBOX_TEST 500 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc SANDBOX_TEST(SandboxBPF, EnableUnsafeTrapsInSigSysHandler) { SANDBOX_TEST 13 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, Monotonous) { SANDBOX_TEST 32 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, PublicSyscallRange) { SANDBOX_TEST 49 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, ARMPrivateSyscallRange) { SANDBOX_TEST 64 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, ARMHiddenSyscallRange) { SANDBOX_TEST 80 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, Invalid) { SANDBOX_TEST 106 sandbox/linux/seccomp-bpf/syscall_iterator_unittest.cc SANDBOX_TEST(SyscallIterator, InvalidOnly) { SANDBOX_TEST 360 sandbox/linux/services/broker_process_unittest.cc SANDBOX_TEST(BrokerProcess, BrokerDied) { SANDBOX_TEST 98 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, DropAllCaps) { SANDBOX_TEST 104 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, GetCurrentCapString) { SANDBOX_TEST 111 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, MoveToNewUserNS) { SANDBOX_TEST 130 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, SupportsUserNS) { SANDBOX_TEST 138 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, UidIsPreserved) { SANDBOX_TEST 171 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, NestedUserNS) { SANDBOX_TEST 193 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, DropFileSystemAccessIsSafe) { SANDBOX_TEST 208 sandbox/linux/services/credentials_unittest.cc SANDBOX_TEST(Credentials, CannotRegainPrivileges) { SANDBOX_TEST 99 sandbox/linux/services/yama_unittests.cc SANDBOX_TEST(Yama, RestrictPtraceSucceedsWhenYamaPresent) { SANDBOX_TEST 136 sandbox/linux/services/yama_unittests.cc SANDBOX_TEST(Yama, RestrictPtraceIsDefault) { SANDBOX_TEST 68 sandbox/linux/tests/unit_tests.h #define SANDBOX_TEST(test_case_name, test_name) \