Home
last modified time | relevance | path

Searched refs:ALLOW (Results 1 – 9 of 9) sorted by relevance

/base/startup/init/services/modules/seccomp/seccomp_policy/
Dspawn.seccomp.policy24 setresuid: if arg0 >= APP_UID_START && arg1 >= APP_UID_START && arg2 >= APP_UID_START; return ALLOW
25 setresgid: if arg0 >= APP_UID_START && arg1 >= APP_UID_START && arg2 >= APP_UID_START; return ALLOW
26 …= APP_UID_START && arg1 >= APP_UID_START && arg2 >= APP_UID_START; return ALLOW; else return TRAP;…
27 …= APP_UID_START && arg1 >= APP_UID_START && arg2 >= APP_UID_START; return ALLOW; else return TRAP;…
28 setuid: if arg0 >= APP_UID_START; return ALLOW; else return TRAP;all
29 setgid: if arg0 >= APP_UID_START; return ALLOW; else return TRAP;all
30 setuid32: if arg0 >= APP_UID_START; return ALLOW; else return TRAP;arm
31 setgid32: if arg0 >= APP_UID_START; return ALLOW; else return TRAP;arm
32 setreuid: if arg0 >= APP_UID_START && arg1 >= APP_UID_START; return ALLOW; else return TRAP;all
33 setregid: if arg0 >= APP_UID_START && arg1 >= APP_UID_START; return ALLOW; else return TRAP;all
[all …]
Dnwebspawn.seccomp.policy26 …TART_UID_FOR_RENDER_PROCESS && arg2 <= END_UID_FOR_RENDER_PROCESS; return ALLOW; else return TRAP;…
27 …TART_UID_FOR_RENDER_PROCESS && arg2 <= END_UID_FOR_RENDER_PROCESS; return ALLOW; else return TRAP;…
28 …TART_UID_FOR_RENDER_PROCESS && arg2 <= END_UID_FOR_RENDER_PROCESS; return ALLOW; else return TRAP;…
29 …TART_UID_FOR_RENDER_PROCESS && arg2 <= END_UID_FOR_RENDER_PROCESS; return ALLOW; else return TRAP;…
30 setuid: if arg0 >= START_UID_FOR_RENDER_PROCESS && arg0 <= END_UID_FOR_RENDER_PROCESS; return ALLOW
31 setgid: if arg0 >= START_UID_FOR_RENDER_PROCESS && arg0 <= END_UID_FOR_RENDER_PROCESS; return ALLOW
32 …TART_UID_FOR_RENDER_PROCESS && arg0 <= END_UID_FOR_RENDER_PROCESS; return ALLOW; else return TRAP;…
33 …TART_UID_FOR_RENDER_PROCESS && arg0 <= END_UID_FOR_RENDER_PROCESS; return ALLOW; else return TRAP;…
34 …TART_UID_FOR_RENDER_PROCESS && arg1 <= END_UID_FOR_RENDER_PROCESS; return ALLOW; else return TRAP;…
35 …TART_UID_FOR_RENDER_PROCESS && arg1 <= END_UID_FOR_RENDER_PROCESS; return ALLOW; else return TRAP;…
[all …]
Dsystem_uid_filter.seccomp.policy20 setuid: if arg0 != 0; return ALLOW; else return TRAP;all
21 setreuid: if arg0 != 0 && arg1 != 0; return ALLOW; else return TRAP;all
22 setfsuid: if arg0 != 0; return ALLOW; else return TRAP;all
23 setresuid: if arg0 != 0 && arg1 != 0 && arg2 != 0; return ALLOW; else return TRAP;all
24 setuid32: if arg0 != 0; return ALLOW; else return TRAP;arm
25 setreuid32: if arg0 != 0 && arg1 != 0; return ALLOW; else return TRAP;arm
26 setfsuid32: if arg0 != 0; return ALLOW; else return TRAP;arm
27 setresuid32: if arg0 != 0 && arg1 != 0 && arg2 != 0; return ALLOW; else return TRAP;arm
Drenderer.seccomp.policy173 getrusage:if arg0 == RUSAGE_SELF || arg0 == RUSAGE_THREAD; return ALLOW; else return TRAP;all
174 clock_getres:if arg0 >= CLOCK_REALTIME && arg0 <= CLOCK_BOOTTIME; return ALLOW; else return TRAP;all
175 clock_gettime:if arg0 >= CLOCK_REALTIME && arg0 <= CLOCK_BOOTTIME; return ALLOW; else return TRAP;a…
176 clock_nanosleep:if arg0 >= CLOCK_REALTIME && arg0 <= CLOCK_BOOTTIME; return ALLOW; else return TRAP…
177 socketpair:if arg0 == AF_UNIX; return ALLOW; else return TRAP;all
178 getsockopt:if arg1 == SOL_SOCKET || arg2 == SO_PEEK_OFF; return ALLOW; else return TRAP;all
/base/customization/enterprise_device_management/common/native/include/plugin_utils/
Diptables_utils.h30 enum class Action { INVALID = -1, ALLOW, DENY }; enumerator
/base/customization/enterprise_device_management/services/edm_plugin/src/
Diptables_rule_plugin.cpp203 if (action == IPTABLES::Action::ALLOW && direction == IPTABLES::Direction::INPUT) { in ConvertChainCommand()
205 } else if (action == IPTABLES::Action::ALLOW && direction == IPTABLES::Direction::OUTPUT) { in ConvertChainCommand()
240 case IPTABLES::Action::ALLOW: in ConvertActionCommand()
/base/customization/enterprise_device_management/common/native/src/plugin_utils/
Diptables_utils.cpp77 if (type >= static_cast<int32_t>(Action::ALLOW) && type <= static_cast<int32_t>(Action::DENY)) { in ProcessFirewallAction()
/base/customization/enterprise_device_management/test/unittest/edm_plugin/src/
Diptables_rule_plugin_test.cpp291 …bool ret = plugin->ConvertChainCommand(IPTABLES::Action::ALLOW, IPTABLES::Direction::INPUT, comman…
293 … ret = plugin->ConvertChainCommand(IPTABLES::Action::ALLOW, IPTABLES::Direction::OUTPUT, command);
341 bool ret = plugin->ConvertActionCommand(IPTABLES::Action::ALLOW, command1);
/base/customization/enterprise_device_management/interfaces/kits/network_manager/src/
Dnetwork_manager_addon.cpp31 …NAPI_CALL_RETURN_VOID(env, napi_create_int32(env, static_cast<int32_t>(IPTABLES::Action::ALLOW), &… in CreateFirewallActionObject()