BrokerProcess      33 content/common/sandbox_linux/bpf_gpu_policy_linux.cc using sandbox::BrokerProcess;
BrokerProcess      83 content/common/sandbox_linux/bpf_gpu_policy_linux.cc   BrokerProcess* broker_process =
BrokerProcess      84 content/common/sandbox_linux/bpf_gpu_policy_linux.cc       static_cast<BrokerProcess*>(aux_broker_process);
BrokerProcess     253 content/common/sandbox_linux/bpf_gpu_policy_linux.cc   broker_process_ = new BrokerProcess(GetFSDeniedErrno(),
BrokerProcess      15 content/common/sandbox_linux/bpf_gpu_policy_linux.h class BrokerProcess;
BrokerProcess      42 content/common/sandbox_linux/bpf_gpu_policy_linux.h   sandbox::BrokerProcess* broker_process() { return broker_process_; }
BrokerProcess      52 content/common/sandbox_linux/bpf_gpu_policy_linux.h   sandbox::BrokerProcess* broker_process_;
BrokerProcess     686 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc         new BrokerProcess(EPERM, allowed_files, std::vector<std::string>()));
BrokerProcess     704 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BrokerProcess* broker_process = static_cast<BrokerProcess*>(aux);
BrokerProcess     750 sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc   BrokerProcess* broker_process = BPF_AUX.broker_process();
BrokerProcess     137 sandbox/linux/services/broker_process.cc BrokerProcess::BrokerProcess(int denied_errno,
BrokerProcess     153 sandbox/linux/services/broker_process.cc BrokerProcess::~BrokerProcess() {
BrokerProcess     166 sandbox/linux/services/broker_process.cc bool BrokerProcess::Init(
BrokerProcess     216 sandbox/linux/services/broker_process.cc int BrokerProcess::Access(const char* pathname, int mode) const {
BrokerProcess     220 sandbox/linux/services/broker_process.cc int BrokerProcess::Open(const char* pathname, int flags) const {
BrokerProcess     228 sandbox/linux/services/broker_process.cc int BrokerProcess::PathAndFlagsSyscall(enum IPCCommands syscall_type,
BrokerProcess     321 sandbox/linux/services/broker_process.cc bool BrokerProcess::HandleRequest() const {
BrokerProcess     373 sandbox/linux/services/broker_process.cc bool BrokerProcess::HandleRemoteCommand(IPCCommands command_type, int reply_ipc,
BrokerProcess     419 sandbox/linux/services/broker_process.cc void BrokerProcess::AccessFileForIPC(const std::string& requested_filename,
BrokerProcess     442 sandbox/linux/services/broker_process.cc void BrokerProcess::OpenFileForIPC(const std::string& requested_filename,
BrokerProcess     478 sandbox/linux/services/broker_process.cc bool BrokerProcess::GetFileNameIfAllowedToAccess(const char* requested_filename,
BrokerProcess     520 sandbox/linux/services/broker_process.cc bool BrokerProcess::GetFileNameIfAllowedToOpen(const char* requested_filename,
BrokerProcess      29 sandbox/linux/services/broker_process.h class SANDBOX_EXPORT BrokerProcess {
BrokerProcess      39 sandbox/linux/services/broker_process.h   explicit BrokerProcess(int denied_errno,
BrokerProcess      44 sandbox/linux/services/broker_process.h   ~BrokerProcess();
BrokerProcess      99 sandbox/linux/services/broker_process.h   DISALLOW_IMPLICIT_CONSTRUCTORS(BrokerProcess);
BrokerProcess      68 sandbox/linux/services/broker_process_unittest.cc TEST(BrokerProcess, CreateAndDestroy) {
BrokerProcess      72 sandbox/linux/services/broker_process_unittest.cc   scoped_ptr<BrokerProcess> open_broker(
BrokerProcess      73 sandbox/linux/services/broker_process_unittest.cc       new BrokerProcess(EPERM, read_whitelist, std::vector<std::string>()));
BrokerProcess      82 sandbox/linux/services/broker_process_unittest.cc TEST(BrokerProcess, TestOpenAccessNull) {
BrokerProcess      84 sandbox/linux/services/broker_process_unittest.cc   BrokerProcess open_broker(EPERM, empty, empty);
BrokerProcess     112 sandbox/linux/services/broker_process_unittest.cc   BrokerProcess open_broker(denied_errno,
BrokerProcess     235 sandbox/linux/services/broker_process_unittest.cc TEST(BrokerProcess, OpenFilePermsWithClientCheck) {
BrokerProcess     241 sandbox/linux/services/broker_process_unittest.cc TEST(BrokerProcess, OpenOpenFilePermsNoClientCheck) {
BrokerProcess     248 sandbox/linux/services/broker_process_unittest.cc TEST(BrokerProcess, OpenFilePermsWithClientCheckNoEnt) {
BrokerProcess     254 sandbox/linux/services/broker_process_unittest.cc TEST(BrokerProcess, OpenOpenFilePermsNoClientCheckNoEnt) {
BrokerProcess     265 sandbox/linux/services/broker_process_unittest.cc   scoped_ptr<BrokerProcess> open_broker(new BrokerProcess(
BrokerProcess     312 sandbox/linux/services/broker_process_unittest.cc TEST(BrokerProcess, OpenCpuinfoWithClientCheck) {
BrokerProcess     318 sandbox/linux/services/broker_process_unittest.cc TEST(BrokerProcess, OpenCpuinfoNoClientCheck) {
BrokerProcess     324 sandbox/linux/services/broker_process_unittest.cc TEST(BrokerProcess, OpenFileRW) {
BrokerProcess     331 sandbox/linux/services/broker_process_unittest.cc   BrokerProcess open_broker(EPERM, whitelist, whitelist);
BrokerProcess     360 sandbox/linux/services/broker_process_unittest.cc SANDBOX_TEST(BrokerProcess, BrokerDied) {
BrokerProcess     364 sandbox/linux/services/broker_process_unittest.cc   BrokerProcess open_broker(EPERM,
BrokerProcess     392 sandbox/linux/services/broker_process_unittest.cc   BrokerProcess open_broker(EPERM,
BrokerProcess     425 sandbox/linux/services/broker_process_unittest.cc TEST(BrokerProcess, OpenComplexFlagsWithClientCheck) {
BrokerProcess     431 sandbox/linux/services/broker_process_unittest.cc TEST(BrokerProcess, OpenComplexFlagsNoClientCheck) {