Lines Matching refs:Allow
102 using sandbox::bpf_dsl::Allow;
133 return If(IsAndroid() ? android_test : glibc_test, Allow()) in RestrictCloneToThreadsAndEPERMFork()
149 Allow()) in RestrictPrctl()
155 return Switch(request).CASES((TCGETS, FIONREAD), Allow()).Default( in RestrictIoctl()
169 return If((flags & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); in RestrictMmapFlags()
179 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); in RestrictMprotectFlags()
206 Allow()) in RestrictFcntlCommands()
208 If((long_arg & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS())) in RestrictFcntlCommands()
228 Allow()) in RestrictSocketcallCommand()
238 return If(pid == target_pid, Allow()).Else(CrashSIGSYSKill()); in RestrictKillTarget()
259 Allow()) in RestrictFutex()
267 Switch(who).CASES((0, target_pid), Allow()).Default(Error(EPERM))) in RestrictGetSetpriority()
284 .CASES((0, target_pid), Allow()) in RestrictSchedTarget()
295 return Switch(pid).CASES((0, target_pid), Allow()).Default(CrashSIGSYS()); in RestrictPrlimit64()
300 return If(who == RUSAGE_SELF, Allow()).Else(CrashSIGSYS()); in RestrictGetrusage()
310 Allow()) in RestrictClockID()