LinuxSandbox 161 content/browser/renderer_host/render_sandbox_host_linux.cc } else if (kind == LinuxSandbox::METHOD_GET_FONT_FAMILY_FOR_CHAR) { LinuxSandbox 163 content/browser/renderer_host/render_sandbox_host_linux.cc } else if (kind == LinuxSandbox::METHOD_LOCALTIME) { LinuxSandbox 165 content/browser/renderer_host/render_sandbox_host_linux.cc } else if (kind == LinuxSandbox::METHOD_GET_CHILD_WITH_INODE) { LinuxSandbox 167 content/browser/renderer_host/render_sandbox_host_linux.cc } else if (kind == LinuxSandbox::METHOD_GET_STYLE_FOR_STRIKE) { LinuxSandbox 169 content/browser/renderer_host/render_sandbox_host_linux.cc } else if (kind == LinuxSandbox::METHOD_MAKE_SHARED_MEMORY_SEGMENT) { LinuxSandbox 171 content/browser/renderer_host/render_sandbox_host_linux.cc } else if (kind == LinuxSandbox::METHOD_MATCH_WITH_FALLBACK) { LinuxSandbox 28 content/common/child_process_sandbox_support_impl_linux.cc request.WriteInt(LinuxSandbox::METHOD_GET_FONT_FAMILY_FOR_CHAR); LinuxSandbox 57 content/common/child_process_sandbox_support_impl_linux.cc request.WriteInt(LinuxSandbox::METHOD_GET_STYLE_FOR_STRIKE); LinuxSandbox 99 content/common/child_process_sandbox_support_impl_linux.cc request.WriteInt(LinuxSandbox::METHOD_MATCH_WITH_FALLBACK); LinuxSandbox 15 content/common/child_process_sandbox_support_impl_shm_linux.cc request.WriteInt(LinuxSandbox::METHOD_MAKE_SHARED_MEMORY_SEGMENT); LinuxSandbox 102 content/common/sandbox_linux/sandbox_linux.cc LinuxSandbox::LinuxSandbox() LinuxSandbox 115 content/common/sandbox_linux/sandbox_linux.cc LinuxSandbox::~LinuxSandbox() { LinuxSandbox 118 content/common/sandbox_linux/sandbox_linux.cc LinuxSandbox* LinuxSandbox::GetInstance() { LinuxSandbox 119 content/common/sandbox_linux/sandbox_linux.cc LinuxSandbox* instance = Singleton<LinuxSandbox>::get(); LinuxSandbox 129 content/common/sandbox_linux/sandbox_linux.cc void LinuxSandbox::PreinitializeSandbox() { LinuxSandbox 166 content/common/sandbox_linux/sandbox_linux.cc bool LinuxSandbox::InitializeSandbox() { LinuxSandbox 167 content/common/sandbox_linux/sandbox_linux.cc LinuxSandbox* linux_sandbox = LinuxSandbox::GetInstance(); LinuxSandbox 171 content/common/sandbox_linux/sandbox_linux.cc void LinuxSandbox::StopThread(base::Thread* thread) { LinuxSandbox 172 content/common/sandbox_linux/sandbox_linux.cc LinuxSandbox* linux_sandbox = LinuxSandbox::GetInstance(); LinuxSandbox 176 content/common/sandbox_linux/sandbox_linux.cc int LinuxSandbox::GetStatus() { LinuxSandbox 207 content/common/sandbox_linux/sandbox_linux.cc bool LinuxSandbox::IsSingleThreaded() const { LinuxSandbox 233 content/common/sandbox_linux/sandbox_linux.cc bool LinuxSandbox::seccomp_bpf_started() const { LinuxSandbox 238 content/common/sandbox_linux/sandbox_linux.cc LinuxSandbox::setuid_sandbox_client() const { LinuxSandbox 243 content/common/sandbox_linux/sandbox_linux.cc bool LinuxSandbox::StartSeccompBPF(const std::string& process_type) { LinuxSandbox 255 content/common/sandbox_linux/sandbox_linux.cc bool LinuxSandbox::InitializeSandboxImpl() { LinuxSandbox 264 content/common/sandbox_linux/sandbox_linux.cc base::Bind(&LinuxSandbox::SealSandbox, base::Unretained(this))); LinuxSandbox 268 content/common/sandbox_linux/sandbox_linux.cc base::Bind(&LinuxSandbox::CheckForBrokenPromises, LinuxSandbox 318 content/common/sandbox_linux/sandbox_linux.cc void LinuxSandbox::StopThreadImpl(base::Thread* thread) { LinuxSandbox 323 content/common/sandbox_linux/sandbox_linux.cc bool LinuxSandbox::seccomp_bpf_supported() const { LinuxSandbox 328 content/common/sandbox_linux/sandbox_linux.cc bool LinuxSandbox::LimitAddressSpace(const std::string& process_type) { LinuxSandbox 368 content/common/sandbox_linux/sandbox_linux.cc bool LinuxSandbox::HasOpenDirectories() const { LinuxSandbox 372 content/common/sandbox_linux/sandbox_linux.cc void LinuxSandbox::SealSandbox() { LinuxSandbox 380 content/common/sandbox_linux/sandbox_linux.cc void LinuxSandbox::CheckForBrokenPromises(const std::string& process_type) { LinuxSandbox 395 content/common/sandbox_linux/sandbox_linux.cc void LinuxSandbox::StopThreadAndEnsureNotCounted(base::Thread* thread) const { LinuxSandbox 24 content/common/sandbox_linux/sandbox_linux.h class LinuxSandbox { LinuxSandbox 40 content/common/sandbox_linux/sandbox_linux.h static LinuxSandbox* GetInstance(); LinuxSandbox 86 content/common/sandbox_linux/sandbox_linux.h friend struct DefaultSingletonTraits<LinuxSandbox>; LinuxSandbox 121 content/common/sandbox_linux/sandbox_linux.h ~LinuxSandbox(); LinuxSandbox 122 content/common/sandbox_linux/sandbox_linux.h DISALLOW_IMPLICIT_CONSTRUCTORS(LinuxSandbox); LinuxSandbox 429 content/gpu/gpu_main.cc LinuxSandbox::StopThread(watchdog_thread); LinuxSandbox 433 content/gpu/gpu_main.cc res = LinuxSandbox::InitializeSandbox(); LinuxSandbox 125 content/ppapi_plugin/ppapi_plugin_main.cc LinuxSandbox::InitializeSandbox(); LinuxSandbox 53 content/renderer/renderer_main_platform_delegate_linux.cc LinuxSandbox::InitializeSandbox(); LinuxSandbox 71 content/renderer/renderer_main_platform_delegate_linux.cc class LinuxSandbox* linux_sandbox = LinuxSandbox::GetInstance(); LinuxSandbox 39 content/utility/utility_main.cc LinuxSandbox::InitializeSandbox(); LinuxSandbox 54 content/worker/worker_main.cc LinuxSandbox::InitializeSandbox(); LinuxSandbox 379 content/zygote/zygote_linux.cc request.WriteInt(LinuxSandbox::METHOD_GET_CHILD_WITH_INODE); LinuxSandbox 68 content/zygote/zygote_main_linux.cc request.WriteInt(LinuxSandbox::METHOD_LOCALTIME); LinuxSandbox 431 content/zygote/zygote_main_linux.cc static void EnterLayerOneSandbox(LinuxSandbox* linux_sandbox) { LinuxSandbox 454 content/zygote/zygote_main_linux.cc LinuxSandbox* linux_sandbox = LinuxSandbox::GetInstance();