Home
last modified time | relevance | path

Searched refs:Allow (Results 1 – 25 of 302) sorted by relevance

12345678910>>...13

/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
Dsyscall_parameters_restrictions.cc89 using sandbox::bpf_dsl::Allow;
119 return If(IsAndroid() ? android_test : glibc_test, Allow()) in RestrictCloneToThreadsAndEPERMFork()
130 Allow()) in RestrictPrctl()
136 return Switch(request).CASES((TCGETS, FIONREAD), Allow()).Default( in RestrictIoctl()
150 return If((flags & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); in RestrictMmapFlags()
160 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); in RestrictMprotectFlags()
187 Allow()) in RestrictFcntlCommands()
189 If((long_arg & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS())) in RestrictFcntlCommands()
209 Allow()) in RestrictSocketcallCommand()
219 return If(pid == target_pid, Allow()).Else(CrashSIGSYSKill()); in RestrictKillTarget()
[all …]
Dbaseline_policy.cc26 using sandbox::bpf_dsl::Allow;
108 return Allow(); in EvaluateSyscallImpl()
114 return Allow(); in EvaluateSyscallImpl()
120 return Allow(); in EvaluateSyscallImpl()
126 return Allow(); in EvaluateSyscallImpl()
165 return If(advice == MADV_DONTNEED, Allow()).Else(Error(EPERM)); in EvaluateSyscallImpl()
191 return If(domain == AF_UNIX, Allow()).Else(CrashSIGSYS()); in EvaluateSyscallImpl()
Dsyscall_parameters_restrictions_unittests.cc38 using sandbox::bpf_dsl::Allow;
53 return Allow(); in EvaluateSyscall()
156 return Allow(); in EvaluateSyscall()
/external/nist-sip/java/gov/nist/javax/sip/header/
DAllowList.java43 public class AllowList extends SIPHeaderList<Allow> {
62 super(Allow.class, AllowHeader.NAME); in AllowList()
82 for ( Iterator<Allow> it = this.hlist.iterator(); it.hasNext();) { in getMethods()
83 Allow a = (Allow)it.next(); in getMethods()
108 Allow allow = new Allow(); in setMethods()
DAllow.java40 public final class Allow extends class
53 public Allow() { in Allow() method in Allow
60 public Allow(String m) { in Allow() method in Allow
/external/chromium_org/components/nacl/loader/nonsfi/
Dnonsfi_sandbox.cc39 using sandbox::bpf_dsl::Allow;
67 Allow()).Else(CrashSIGSYS()); in RestrictFcntlCommands()
76 Allow()).Else(CrashSIGSYSClone()); in RestrictClone()
91 Allow()) in RestrictFutexOperation()
108 Allow()).Else(CrashSIGSYS()); in RestrictSocketcall()
117 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); in RestrictMprotect()
129 Allow()).Else(CrashSIGSYS()); in RestrictMmap()
137 return If(domain == AF_UNIX, Allow()).Else(CrashSIGSYS()); in RestrictSocketpair()
237 return Allow(); in EvaluateSyscall()
278 return Allow(); in EvaluateSyscall()
/external/sepolicy/
Dte_macros3 # Allow a transition from olddomain to newdomain
29 # Allow the necessary permissions.
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
57 # Allow the necessary permissions.
66 # Allow the specified domain to read directories, files
75 # Allow the specified domain to perform more privileged operations
105 # Allow a base set of permissions required for all apps.
116 # Allow a base set of permissions required for network access.
[all …]
Ddumpstate.te12 # Allow dumpstate to scan through /proc/pid for all processes
18 # Allow executing files on system, such as:
30 # Allow reading /data/system/uiderrors.txt
64 # Allow dumpstate to make binder calls to any binder service
71 # Allow the bugreport service to create a file in
Dnetd.te53 # Allow netd to spawn hostapd in it's own domain
57 # Allow netd to spawn dnsmasq in it's own domain
61 # Allow netd to start clatd in its own domain
67 # Allow netd to operate on sockets that are passed to it.
Dbinderservicedomain.te3 # Allow dumpstate to collect information from binder services
8 # Allow dumpsys to work from adb shell or the serial console
/external/chromium_org/content/common/sandbox_linux/
Dbpf_cros_arm_gpu_policy_linux.cc29 using sandbox::bpf_dsl::Allow;
118 return Allow(); in EvaluateSyscall()
134 return Allow(); in EvaluateSyscall()
146 return Allow(); in EvaluateSyscall()
151 return If(domain == AF_UNIX, Allow()).Else(Error(EPERM)); in EvaluateSyscall()
156 return Allow(); in EvaluateSyscall()
Dbpf_gpu_policy_linux.cc36 using sandbox::bpf_dsl::Allow;
140 return Allow(); in EvaluateSyscall()
192 return Allow(); in EvaluateSyscall()
200 return Allow(); in EvaluateSyscall()
Dbpf_ppapi_policy_linux.cc17 using sandbox::bpf_dsl::Allow;
39 return Allow(); in EvaluateSyscall()
Dbpf_utility_policy_linux.cc17 using sandbox::bpf_dsl::Allow;
52 return Allow(); in EvaluateSyscall()
Dbpf_renderer_policy_linux.cc17 using sandbox::bpf_dsl::Allow;
55 return Allow(); in EvaluateSyscall()
Dsandbox_seccomp_bpf_linux.cc40 using sandbox::bpf_dsl::Allow;
91 return Allow(); in EvaluateSyscall()
109 return Allow(); in EvaluateSyscall()
/external/chromium_org/sandbox/linux/bpf_dsl/
Dbpf_dsl_unittest.cc76 return Allow(); in EvaluateSyscall()
105 return Allow(); in EvaluateSyscall()
142 return Allow(); in EvaluateSyscall()
175 return If(addr == kDeadBeefAddr, Error(EPERM)).Else(Allow()); in EvaluateSyscall()
177 return Allow(); in EvaluateSyscall()
199 return Allow(); in EvaluateSyscall()
238 return Allow(); in EvaluateSyscall()
274 return Allow(); in EvaluateSyscall()
304 .Case(F_SETFD, If(long_arg == O_CLOEXEC, Allow()).Else(Error(EINVAL))) in EvaluateSyscall()
308 return Allow(); in EvaluateSyscall()
Dbpf_dsl_more_unittest.cc121 return Allow(); in EvaluateSyscall()
160 return Allow(); in EvaluateSyscall()
191 return Allow(); in EvaluateSyscall()
231 return Allow(); in EvaluateSyscall()
298 return Allow(); in EvaluateSyscall()
354 return If(arg == 0, Allow()).Else(Error(EPERM)); in EvaluateSyscall()
357 return Allow(); in EvaluateSyscall()
375 return If(arg == 0, Error(EINVAL)).Else(Allow()); in EvaluateSyscall()
378 return Allow(); in EvaluateSyscall()
433 return Allow(); in EvaluateSyscall()
[all …]
/external/nist-sip/java/gov/nist/javax/sip/parser/
DAllowParser.java73 Allow allow = new Allow(); in parse()
87 allow = new Allow(); in parse()
/external/chromium_org/chrome/browser/policy/
Durl_blacklist_manager_unittest.cc400 blacklist.Allow(allowed.get()); in TEST_F()
427 blacklist.Allow(allowed.get()); in TEST_F()
435 blacklist.Allow(allowed.get()); in TEST_F()
446 blacklist.Allow(allowed.get()); in TEST_F()
458 blacklist.Allow(allowed.get()); in TEST_F()
472 blacklist.Allow(allowed.get()); in TEST_F()
485 blacklist.Allow(allowed.get()); in TEST_F()
501 blacklist.Allow(allowed.get()); in TEST_F()
520 blacklist.Allow(allowed.get()); in TEST_F()
575 blacklist.Allow(allowed.get()); in TEST_F()
[all …]
/external/chromium_org/content/common/sandbox_linux/android/
Dsandbox_bpf_base_policy_android.cc10 using sandbox::bpf_dsl::Allow;
55 return Allow(); in EvaluateSyscall()
/external/chromium_org/third_party/cython/src/
DToDo.txt42 DONE - Allow extension types to be declared "public" so they
90 Allow 'pass' in struct/union/enum definition.
124 Allow "unsigned" to be used alone as a type name.
126 Allow duplicate declarations, at least in extern-from.
148 Allow ranges of exception values.
152 Allow module-level Python variables to be declared extern.
185 DONE - Allow an extension type to inherit from another type.
221 Allow * in cimport? [John J Lee <jjl@pobox.com>]
/external/chromium_org/chrome/
DDEPS33 # Allow inclusion of WebKit API files.
37 # Allow inclusion of third-party code:
/external/chromium_org/components/nacl/loader/sandbox_linux/
Dnacl_bpf_sandbox_linux.cc32 using sandbox::bpf_dsl::Allow;
101 return Allow(); in EvaluateSyscall()
/external/tagsoup/
DTODO11 Allow case sensitivity as a standard feature
13 Allow inline cruft in table bodies and rows

12345678910>>...13