Home
last modified time | relevance | path

Searched +full:- +full:- +full:allow (Results 1 – 25 of 1185) sorted by relevance

12345678910>>...48

/third_party/selinux/secilc/docs/
Dcil_access_vector_rules.md22 <td align="left"><p>The flavor of access vector rule. Possible flavors are <code>allow</code>, <cod…
31 …e types of the source. The <code>other</code> keyword may be used as a short-hand way of writing a…
35 …ode>classmap</code>/<code>classmapping</code> identifiers. Used for <code>allow</code>, <code>audi…
44 allow section in Access Vector Rules
45 -----
52 (allow source_id target_id|self|notself|other classpermissionset_id ...)
57 …examples show a selection of possible permutations of [`allow`](cil_access_vector_rules.md#allow) …
91 (allow type_1 self (property_service (set))) ; anonymous
92 (allow type_2 self (zygote (specifyids))) ; anonymous
93 (allow type_3 self cps_zygote) ; named
[all …]
/third_party/rust/rust/tests/ui/lint/
Dcrate_level_only_lint.stderr1 error: allow(uncommon_codepoints) is ignored unless specified at crate level
2 --> $DIR/crate_level_only_lint.rs:4:10
4 LL | #![allow(uncommon_codepoints)]
8 --> $DIR/crate_level_only_lint.rs:1:30
13 error: allow(uncommon_codepoints) is ignored unless specified at crate level
14 --> $DIR/crate_level_only_lint.rs:9:9
16 LL | #[allow(uncommon_codepoints)]
19 error: allow(uncommon_codepoints) is ignored unless specified at crate level
20 --> $DIR/crate_level_only_lint.rs:17:9
22 LL | #[allow(uncommon_codepoints)]
[all …]
Dforbid-group-group-2.stderr1 error: allow(nonstandard_style) incompatible with previous forbid
2 --> $DIR/forbid-group-group-2.rs:7:9
5 | -------- `forbid` level set here
7 LL | #[allow(nonstandard_style)]
11 = note: for more information, see issue #81670 <https://github.com/rust-lang/rust/issues/81670>
13 --> $DIR/forbid-group-group-2.rs:5:9
18 error: allow(nonstandard_style) incompatible with previous forbid
19 --> $DIR/forbid-group-group-2.rs:7:9
22 | -------- `forbid` level set here
24 LL | #[allow(nonstandard_style)]
[all …]
/third_party/cups/conf/
Dcupsd.conf.in6 # Log general information in error_log - change "@CUPS_LOG_LEVEL@" to "debug"
31 # Timeout after cupsd exits if idle (applied only if cupsd runs on-demand - with -l)
36 Order allow,deny
43 Order allow,deny
50 Order allow,deny
57 Order allow,deny
68 # Job-related operations must be done by the owner or an administrator...
69 <Limit Create-Job Print-Job Print-URI Validate-Job>
70 Order deny,allow
73-Document Send-URI Hold-Job Release-Job Restart-Job Purge-Jobs Set-Job-Attributes Create-Job-Subsc…
[all …]
/third_party/rust/rust/library/std/src/sys/unix/process/
Dzircon.rs1 #![allow(non_camel_case_types, unused)]
34 pub fn zx_cvt<T>(t: T) -> io::Result<T> in zx_cvt()
51 pub fn new(raw: zx_handle_t) -> Handle { in new()
55 pub fn raw(&self) -> zx_handle_t { in raw()
79 pub fn zx_job_default() -> zx_handle_t; in zx_job_default()
81 pub fn zx_task_kill(handle: zx_handle_t) -> zx_status_t; in zx_task_kill()
83 pub fn zx_handle_close(handle: zx_handle_t) -> zx_status_t; in zx_handle_close()
89 ) -> zx_handle_t; in zx_handle_duplicate()
96 ) -> zx_status_t; in zx_object_wait_one()
105 ) -> zx_status_t; in zx_object_get_info()
[all …]
/third_party/rust/rust/src/tools/clippy/tests/ui/
Dcast.stderr2 --> $DIR/cast.rs:14:5
7 = note: `-D clippy::cast-precision-loss` implied by `-D warnings`
10 --> $DIR/cast.rs:16:5
16 --> $DIR/cast.rs:17:5
22 --> $DIR/cast.rs:19:5
28 --> $DIR/cast.rs:21:5
34 --> $DIR/cast.rs:22:5
40 --> $DIR/cast.rs:24:5
45 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
46 = note: `-D clippy::cast-possible-truncation` implied by `-D warnings`
[all …]
Duseless_attribute.fixed1 //@run-rustfix
2 //@aux-build:proc_macro_derive.rs:proc-macro
4 #![allow(unused)]
9 #![allow(dead_code)]
10 #![cfg_attr(feature = "cargo-clippy", allow(dead_code))]
12 #[allow(unused_imports)]
13 #[allow(unused_extern_crates)]
21 #![allow(clippy::almost_swapped)]
28 #[allow(unused_imports)]
32 #[allow(unused)]
[all …]
Duseless_attribute.rs1 //@run-rustfix
2 //@aux-build:proc_macro_derive.rs:proc-macro
4 #![allow(unused)]
9 #[allow(dead_code)]
10 #[cfg_attr(feature = "cargo-clippy", allow(dead_code))]
12 #[allow(unused_imports)]
13 #[allow(unused_extern_crates)]
21 #[allow(clippy::almost_swapped)] in test_indented_attr()
28 #[allow(unused_imports)]
32 #[allow(unused)]
[all …]
Dcast_size_32bit.stderr2 --> $DIR/cast_size_32bit.rs:12:5
7 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
8 = note: `-D clippy::cast-possible-truncation` implied by `-D warnings`
14 error: casting `isize` to `f64` causes a loss of precision on targets with 64-bit wide pointers (`i…
15 --> $DIR/cast_size_32bit.rs:15:5
20 = note: `-D clippy::cast-precision-loss` implied by `-D warnings`
22 error: casting `usize` to `f64` causes a loss of precision on targets with 64-bit wide pointers (`u…
23 --> $DIR/cast_size_32bit.rs:16:5
29 --> $DIR/cast_size_32bit.rs:17:5
35 --> $DIR/cast_size_32bit.rs:18:5
[all …]
Dcast_size.stderr2 --> $DIR/cast_size.rs:12:5
7 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
8 = note: `-D clippy::cast-possible-truncation` implied by `-D warnings`
14 error: casting `isize` to `f64` causes a loss of precision on targets with 64-bit wide pointers (`i…
15 --> $DIR/cast_size.rs:15:5
20 = note: `-D clippy::cast-precision-loss` implied by `-D warnings`
22 error: casting `usize` to `f64` causes a loss of precision on targets with 64-bit wide pointers (`u…
23 --> $DIR/cast_size.rs:16:5
29 --> $DIR/cast_size.rs:17:5
35 --> $DIR/cast_size.rs:18:5
[all …]
/third_party/selinux/libsepol/tests/policies/test-neverallow/
Dpolicy_minus_self.conf59 allow test1_t test1_t : file read;
60 neverallow test1_t { test1_t -self } : file read; # nofail
66 allow test2_t self : file read;
67 neverallow test2_t { test1_t -self } : file read; # nofail
73 allow test3_1_t test3_2_t : file read;
74 neverallow test3_1_t { test3_2_t -self } : file read;
81 allow { test4_1_t test4_2_t } { test4_1_t test4_2_t } : file read;
82 neverallow test4_1_t { test4_1_t test4_2_t -self } : file read;
89 allow { test5_1_t test5_2_t } { test5_1_t test5_2_t } : class5 perm;
90 neverallow * { test5_1_t test5_2_t -self } : class5 perm;
[all …]
Dpolicy.conf49 allow test1_t test1_t : file { read write };
56 allow test2_t test2_t : file { read write };
63 allow test3_t test3_t : file { read write };
70 allow test4_t test4_t : file { read write };
77 allow test5_t test5_t : file { read write };
85 allow { test6_1_t test6_2_t } { test6_1_t test6_2_t } : file { read write };
93 allow { test7_1_t test7_2_t } { test7_1_t test7_2_t } : file { read write };
101 allow test8_a test8_a : file read;
102 allow test8_t test8_t : file write;
110 allow test9_a test9_a : file read;
[all …]
/third_party/rust/crates/rustix/src/thread/
Dprctl.rs1 #![allow(unsafe_code)]
30 /// - [`prctl(PR_GET_KEEPCAPS,...)`]
32 /// [`prctl(PR_GET_KEEPCAPS,...)`]: https://man7.org/linux/man-pages/man2/prctl.2.html
34 pub fn get_keep_capabilities() -> io::Result<bool> { in get_keep_capabilities()
43 /// - [`prctl(PR_SET_KEEPCAPS,...)`]
45 /// [`prctl(PR_SET_KEEPCAPS,...)`]: https://man7.org/linux/man-pages/man2/prctl.2.html
47 pub fn set_keep_capabilities(enable: bool) -> io::Result<()> { in set_keep_capabilities()
60 /// - [`prctl(PR_GET_NAME,...)`]
62 /// [`prctl(PR_GET_NAME,...)`]: https://man7.org/linux/man-pages/man2/prctl.2.html
64 pub fn name() -> io::Result<CString> { in name()
[all …]
/third_party/typescript/tests/baselines/reference/
DcollisionArgumentsClassConstructor.errors.txt2 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
3 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
4 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
6 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
7 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
8 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
9 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
10 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
12 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
13 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
[all …]
DcollisionArgumentsClassMethod.errors.txt2 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
3 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
4 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
6 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
7 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
8 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
9 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
10 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
12 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
13 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de…
[all …]
/third_party/rust/crates/env_logger/
Ddeny.toml2 # * deny - An error will be produced and the check will fail
3 # * warn - A warning will be produced, but the check will not fail
4 # * allow - No warning or error will be produced, though in some cases a note
9 # https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html
18 # 2019-12-17 there are no security notice advisories in
19 # https://github.com/rustsec/advisory-db
24 # e.g. "RUSTSEC-0000-0000",
30 # https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
36 allow = [
38 "MIT-0",
[all …]
/third_party/rust/rust/src/tools/clippy/tests/ui-toml/toml_unknown_key/
Dconf_unknown_key.stderr2 accept-comment-above-attributes
3 accept-comment-above-statement
4 allow-dbg-in-tests
5 allow-expect-in-tests
6 allow-mixed-uninlined-format-args
7 allow-one-hash-in-raw-strings
8 allow-print-in-tests
9 allow-private-module-inception
10 allow-unwrap-in-tests
11 allowed-idents-below-min-chars
[all …]
/third_party/rust/crates/clap/
Ddeny.toml6 # http://www.apache.org/licenses/LICENSE-2.0
15 # * deny - An error will be produced and the check will fail
16 # * warn - A warning will be produced, but the check will not fail
17 # * allow - No warning or error will be produced, though in some cases a note
22 # https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html
31 # 2019-12-17 there are no security notice advisories in
32 # https://github.com/rustsec/advisory-db
37 # e.g. "RUSTSEC-0000-0000",
43 # https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html
49 allow = [
[all …]
/third_party/rust/crates/libc/src/
Dlib.rs1 //! libc - Raw FFI bindings to platforms' system libraries
4 #![allow(
18 #![cfg_attr(feature = "rustc-dep-of-std", feature(link_cfg, no_core))]
23 #![cfg_attr(not(feature = "rustc-dep-of-std"), no_std)]
24 #![cfg_attr(feature = "rustc-dep-of-std", no_core)]
31 if #[cfg(feature = "rustc-dep-of-std")] {
33 #[allow(unused_imports)]
35 #[allow(unused_imports)]
37 #[allow(unused_imports)]
45 #[allow(unused_imports)]
[all …]
/third_party/rust/rust/tests/ui/rfcs/rfc-2565-param-attrs/
Dparam-attrs-builtin-attrs.rs6 //~^ ERROR expected non-macro attribute, found attribute macro in ffi()
10 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr… in ffi()
14 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr… in ffi()
22 //~^ ERROR expected non-macro attribute, found attribute macro
26 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr…
30 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr…
37 //~^ ERROR expected non-macro attribute, found attribute macro in foo()
41 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr… in foo()
45 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr… in foo()
57 //~^ ERROR expected non-macro attribute, found attribute macro in foo()
[all …]
/third_party/selinux/libsepol/tests/policies/test-cond/
Drefpolicy-base.conf470 pageexec # Paging based non-executable pages
475 segmexec # Segmentation based non-executable pages
977 allow bin_t fs_t:filesystem associate;
978 allow bin_t noxattrfs:filesystem associate;
980 allow sbin_t fs_t:filesystem associate;
981 allow sbin_t noxattrfs:filesystem associate;
983 allow ls_exec_t fs_t:filesystem associate;
984 allow ls_exec_t noxattrfs:filesystem associate;
987 allow shell_exec_t fs_t:filesystem associate;
988 allow shell_exec_t noxattrfs:filesystem associate;
[all …]
/third_party/selinux/libsepol/tests/
Dtest-neverallow.c3 #include "test-neverallow.h"
6 #include "test-common.h"
35 struct msg_list *n = messages->next; in messages_clean()
36 free(messages->msg); in messages_clean()
47 for (i = 0; i < count; i++, m = m->next) { in messages_check()
54 if (strcmp(expected[i], m->msg) != 0) { in messages_check()
56 fprintf(stderr, "\n<expected: '''%s''', got: '''%s'''>\n", expected[i], m->msg); in messages_check()
62 fprintf(stderr, "\n<expected %u; next message: '''%s'''>\n", count, m->msg); in messages_check()
84 new->msg = msg; in msg_handler()
85 new->next = messages; in msg_handler()
[all …]
/third_party/libabigail/tests/
Dtest-abidiff-exit.cc1 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
2 // -*- Mode: C++ -*-
4 // Copyright (C) 2016-2023 Red Hat, Inc.
26 #include "abg-tools-utils.h"
27 #include "test-utils.h"
53 "data/test-abidiff-exit/test1-voffset-change-v0.o",
54 "data/test-abidiff-exit/test1-voffset-change-v1.o",
62 "--no-default-suppression --no-show-locs",
65 "data/test-abidiff-exit/test1-voffset-change-report0.txt",
66 "output/test-abidiff-exit/test1-voffset-change-report0.txt"
[all …]
/third_party/openssl/test/ssl-tests/
D03-custom_verify.cnf5 test-0 = 0-verify-success
6 test-1 = 1-verify-custom-reject
7 test-2 = 2-verify-custom-allow
8 test-3 = 3-verify-custom-retry
9 test-4 = 4-noverify-success
10 test-5 = 5-noverify-ignore-custom-reject
11 test-6 = 6-noverify-accept-custom-allow
12 test-7 = 7-verify-fail-no-root
13 test-8 = 8-verify-custom-success-no-root
14 test-9 = 9-verify-custom-fail-no-root
[all …]
/third_party/rust/rust/src/tools/rustfmt/.github/workflows/
Dintegration.yml5 - master
9 integration-tests:
10 runs-on: ubuntu-latest
13 …# https://help.github.com/en/actions/getting-started-with-github-actions/about-github-actions#usag…
14 # There's a limit of 60 concurrent jobs across all repos in the rust-lang organization.
17 max-parallel: 4
18 fail-fast: false
22 error-chain,
26 rust-semverver,
28 futures-rs,
[all …]

12345678910>>...48