/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
D | syscall_parameters_restrictions.cc | 89 using sandbox::bpf_dsl::Allow; 119 return If(IsAndroid() ? android_test : glibc_test, Allow()) in RestrictCloneToThreadsAndEPERMFork() 130 Allow()) in RestrictPrctl() 136 return Switch(request).CASES((TCGETS, FIONREAD), Allow()).Default( in RestrictIoctl() 150 return If((flags & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); in RestrictMmapFlags() 160 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); in RestrictMprotectFlags() 187 Allow()) in RestrictFcntlCommands() 189 If((long_arg & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS())) in RestrictFcntlCommands() 209 Allow()) in RestrictSocketcallCommand() 219 return If(pid == target_pid, Allow()).Else(CrashSIGSYSKill()); in RestrictKillTarget() [all …]
|
D | baseline_policy.cc | 26 using sandbox::bpf_dsl::Allow; 108 return Allow(); in EvaluateSyscallImpl() 114 return Allow(); in EvaluateSyscallImpl() 120 return Allow(); in EvaluateSyscallImpl() 126 return Allow(); in EvaluateSyscallImpl() 165 return If(advice == MADV_DONTNEED, Allow()).Else(Error(EPERM)); in EvaluateSyscallImpl() 191 return If(domain == AF_UNIX, Allow()).Else(CrashSIGSYS()); in EvaluateSyscallImpl()
|
D | syscall_parameters_restrictions_unittests.cc | 38 using sandbox::bpf_dsl::Allow; 53 return Allow(); in EvaluateSyscall() 156 return Allow(); in EvaluateSyscall()
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
D | AllowList.java | 43 public class AllowList extends SIPHeaderList<Allow> { 62 super(Allow.class, AllowHeader.NAME); in AllowList() 82 for ( Iterator<Allow> it = this.hlist.iterator(); it.hasNext();) { in getMethods() 83 Allow a = (Allow)it.next(); in getMethods() 108 Allow allow = new Allow(); in setMethods()
|
D | Allow.java | 40 public final class Allow extends class 53 public Allow() { in Allow() method in Allow 60 public Allow(String m) { in Allow() method in Allow
|
/external/chromium_org/components/nacl/loader/nonsfi/ |
D | nonsfi_sandbox.cc | 39 using sandbox::bpf_dsl::Allow; 67 Allow()).Else(CrashSIGSYS()); in RestrictFcntlCommands() 76 Allow()).Else(CrashSIGSYSClone()); in RestrictClone() 91 Allow()) in RestrictFutexOperation() 108 Allow()).Else(CrashSIGSYS()); in RestrictSocketcall() 117 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); in RestrictMprotect() 129 Allow()).Else(CrashSIGSYS()); in RestrictMmap() 137 return If(domain == AF_UNIX, Allow()).Else(CrashSIGSYS()); in RestrictSocketpair() 237 return Allow(); in EvaluateSyscall() 278 return Allow(); in EvaluateSyscall()
|
/external/sepolicy/ |
D | te_macros | 3 # Allow a transition from olddomain to newdomain 29 # Allow the necessary permissions. 37 # Allow domain to create a file labeled file_type in a 44 # Allow the domain to add entries to the directory. 46 # Allow the domain to create the file. 57 # Allow the necessary permissions. 66 # Allow the specified domain to read directories, files 75 # Allow the specified domain to perform more privileged operations 105 # Allow a base set of permissions required for all apps. 116 # Allow a base set of permissions required for network access. [all …]
|
D | dumpstate.te | 12 # Allow dumpstate to scan through /proc/pid for all processes 18 # Allow executing files on system, such as: 30 # Allow reading /data/system/uiderrors.txt 64 # Allow dumpstate to make binder calls to any binder service 71 # Allow the bugreport service to create a file in
|
D | netd.te | 53 # Allow netd to spawn hostapd in it's own domain 57 # Allow netd to spawn dnsmasq in it's own domain 61 # Allow netd to start clatd in its own domain 67 # Allow netd to operate on sockets that are passed to it.
|
D | binderservicedomain.te | 3 # Allow dumpstate to collect information from binder services 8 # Allow dumpsys to work from adb shell or the serial console
|
/external/chromium_org/content/common/sandbox_linux/ |
D | bpf_cros_arm_gpu_policy_linux.cc | 29 using sandbox::bpf_dsl::Allow; 118 return Allow(); in EvaluateSyscall() 134 return Allow(); in EvaluateSyscall() 146 return Allow(); in EvaluateSyscall() 151 return If(domain == AF_UNIX, Allow()).Else(Error(EPERM)); in EvaluateSyscall() 156 return Allow(); in EvaluateSyscall()
|
D | bpf_gpu_policy_linux.cc | 36 using sandbox::bpf_dsl::Allow; 140 return Allow(); in EvaluateSyscall() 192 return Allow(); in EvaluateSyscall() 200 return Allow(); in EvaluateSyscall()
|
D | bpf_ppapi_policy_linux.cc | 17 using sandbox::bpf_dsl::Allow; 39 return Allow(); in EvaluateSyscall()
|
D | bpf_utility_policy_linux.cc | 17 using sandbox::bpf_dsl::Allow; 52 return Allow(); in EvaluateSyscall()
|
D | bpf_renderer_policy_linux.cc | 17 using sandbox::bpf_dsl::Allow; 55 return Allow(); in EvaluateSyscall()
|
D | sandbox_seccomp_bpf_linux.cc | 40 using sandbox::bpf_dsl::Allow; 91 return Allow(); in EvaluateSyscall() 109 return Allow(); in EvaluateSyscall()
|
/external/chromium_org/sandbox/linux/bpf_dsl/ |
D | bpf_dsl_unittest.cc | 76 return Allow(); in EvaluateSyscall() 105 return Allow(); in EvaluateSyscall() 142 return Allow(); in EvaluateSyscall() 175 return If(addr == kDeadBeefAddr, Error(EPERM)).Else(Allow()); in EvaluateSyscall() 177 return Allow(); in EvaluateSyscall() 199 return Allow(); in EvaluateSyscall() 238 return Allow(); in EvaluateSyscall() 274 return Allow(); in EvaluateSyscall() 304 .Case(F_SETFD, If(long_arg == O_CLOEXEC, Allow()).Else(Error(EINVAL))) in EvaluateSyscall() 308 return Allow(); in EvaluateSyscall()
|
D | bpf_dsl_more_unittest.cc | 121 return Allow(); in EvaluateSyscall() 160 return Allow(); in EvaluateSyscall() 191 return Allow(); in EvaluateSyscall() 231 return Allow(); in EvaluateSyscall() 298 return Allow(); in EvaluateSyscall() 354 return If(arg == 0, Allow()).Else(Error(EPERM)); in EvaluateSyscall() 357 return Allow(); in EvaluateSyscall() 375 return If(arg == 0, Error(EINVAL)).Else(Allow()); in EvaluateSyscall() 378 return Allow(); in EvaluateSyscall() 433 return Allow(); in EvaluateSyscall() [all …]
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
D | AllowParser.java | 73 Allow allow = new Allow(); in parse() 87 allow = new Allow(); in parse()
|
/external/chromium_org/chrome/browser/policy/ |
D | url_blacklist_manager_unittest.cc | 400 blacklist.Allow(allowed.get()); in TEST_F() 427 blacklist.Allow(allowed.get()); in TEST_F() 435 blacklist.Allow(allowed.get()); in TEST_F() 446 blacklist.Allow(allowed.get()); in TEST_F() 458 blacklist.Allow(allowed.get()); in TEST_F() 472 blacklist.Allow(allowed.get()); in TEST_F() 485 blacklist.Allow(allowed.get()); in TEST_F() 501 blacklist.Allow(allowed.get()); in TEST_F() 520 blacklist.Allow(allowed.get()); in TEST_F() 575 blacklist.Allow(allowed.get()); in TEST_F() [all …]
|
/external/chromium_org/content/common/sandbox_linux/android/ |
D | sandbox_bpf_base_policy_android.cc | 10 using sandbox::bpf_dsl::Allow; 55 return Allow(); in EvaluateSyscall()
|
/external/chromium_org/third_party/cython/src/ |
D | ToDo.txt | 42 DONE - Allow extension types to be declared "public" so they 90 Allow 'pass' in struct/union/enum definition. 124 Allow "unsigned" to be used alone as a type name. 126 Allow duplicate declarations, at least in extern-from. 148 Allow ranges of exception values. 152 Allow module-level Python variables to be declared extern. 185 DONE - Allow an extension type to inherit from another type. 221 Allow * in cimport? [John J Lee <jjl@pobox.com>]
|
/external/chromium_org/chrome/ |
D | DEPS | 33 # Allow inclusion of WebKit API files. 37 # Allow inclusion of third-party code:
|
/external/chromium_org/components/nacl/loader/sandbox_linux/ |
D | nacl_bpf_sandbox_linux.cc | 32 using sandbox::bpf_dsl::Allow; 101 return Allow(); in EvaluateSyscall()
|
/external/tagsoup/ |
D | TODO | 11 Allow case sensitivity as a standard feature 13 Allow inline cruft in table bodies and rows
|