Lines Matching refs:Allow
113 using sandbox::bpf_dsl::Allow;
144 return If(IsAndroid() ? android_test : glibc_test, Allow()) in RestrictCloneToThreadsAndEPERMFork()
186 Allow()) in RestrictPrctl()
192 return Switch(request).CASES((TCGETS, FIONREAD), Allow()).Default( in RestrictIoctl()
206 return If((flags & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); in RestrictMmapFlags()
216 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); in RestrictMprotectFlags()
243 Allow()) in RestrictFcntlCommands()
245 If((long_arg & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS())) in RestrictFcntlCommands()
265 Allow()) in RestrictSocketcallCommand()
275 return If(pid == target_pid, Allow()).Else(CrashSIGSYSKill()); in RestrictKillTarget()
291 Allow()) in RestrictFutex()
299 Switch(who).CASES((0, target_pid), Allow()).Default(Error(EPERM))) in RestrictGetSetpriority()
316 .CASES((0, target_pid), Allow()) in RestrictSchedTarget()
327 return Switch(pid).CASES((0, target_pid), Allow()).Default(CrashSIGSYS()); in RestrictPrlimit64()
332 return If(who == RUSAGE_SELF, Allow()).Else(CrashSIGSYS()); in RestrictGetrusage()
350 Allow()) in RestrictClockID()