| /third_party/selinux/secilc/docs/ |
| D | cil_access_vector_rules.md | 22 <td align="left"><p>The flavor of access vector rule. Possible flavors are <code>allow</code>, <cod… 31 …e types of the source. The <code>other</code> keyword may be used as a short-hand way of writing a… 35 …ode>classmap</code>/<code>classmapping</code> identifiers. Used for <code>allow</code>, <code>audi… 44 allow section in Access Vector Rules 45 ----- 52 (allow source_id target_id|self|notself|other classpermissionset_id ...) 57 …examples show a selection of possible permutations of [`allow`](cil_access_vector_rules.md#allow) … 91 (allow type_1 self (property_service (set))) ; anonymous 92 (allow type_2 self (zygote (specifyids))) ; anonymous 93 (allow type_3 self cps_zygote) ; named [all …]
|
| /third_party/rust/rust/tests/ui/lint/ |
| D | crate_level_only_lint.stderr | 1 error: allow(uncommon_codepoints) is ignored unless specified at crate level 2 --> $DIR/crate_level_only_lint.rs:4:10 4 LL | #![allow(uncommon_codepoints)] 8 --> $DIR/crate_level_only_lint.rs:1:30 13 error: allow(uncommon_codepoints) is ignored unless specified at crate level 14 --> $DIR/crate_level_only_lint.rs:9:9 16 LL | #[allow(uncommon_codepoints)] 19 error: allow(uncommon_codepoints) is ignored unless specified at crate level 20 --> $DIR/crate_level_only_lint.rs:17:9 22 LL | #[allow(uncommon_codepoints)] [all …]
|
| D | forbid-group-group-2.stderr | 1 error: allow(nonstandard_style) incompatible with previous forbid 2 --> $DIR/forbid-group-group-2.rs:7:9 5 | -------- `forbid` level set here 7 LL | #[allow(nonstandard_style)] 11 = note: for more information, see issue #81670 <https://github.com/rust-lang/rust/issues/81670> 13 --> $DIR/forbid-group-group-2.rs:5:9 18 error: allow(nonstandard_style) incompatible with previous forbid 19 --> $DIR/forbid-group-group-2.rs:7:9 22 | -------- `forbid` level set here 24 LL | #[allow(nonstandard_style)] [all …]
|
| /third_party/cups/conf/ |
| D | cupsd.conf.in | 6 # Log general information in error_log - change "@CUPS_LOG_LEVEL@" to "debug" 31 # Timeout after cupsd exits if idle (applied only if cupsd runs on-demand - with -l) 36 Order allow,deny 43 Order allow,deny 50 Order allow,deny 57 Order allow,deny 68 # Job-related operations must be done by the owner or an administrator... 69 <Limit Create-Job Print-Job Print-URI Validate-Job> 70 Order deny,allow 73 …-Document Send-URI Hold-Job Release-Job Restart-Job Purge-Jobs Set-Job-Attributes Create-Job-Subsc… [all …]
|
| /third_party/rust/rust/library/std/src/sys/unix/process/ |
| D | zircon.rs | 1 #![allow(non_camel_case_types, unused)] 34 pub fn zx_cvt<T>(t: T) -> io::Result<T> in zx_cvt() 51 pub fn new(raw: zx_handle_t) -> Handle { in new() 55 pub fn raw(&self) -> zx_handle_t { in raw() 79 pub fn zx_job_default() -> zx_handle_t; in zx_job_default() 81 pub fn zx_task_kill(handle: zx_handle_t) -> zx_status_t; in zx_task_kill() 83 pub fn zx_handle_close(handle: zx_handle_t) -> zx_status_t; in zx_handle_close() 89 ) -> zx_handle_t; in zx_handle_duplicate() 96 ) -> zx_status_t; in zx_object_wait_one() 105 ) -> zx_status_t; in zx_object_get_info() [all …]
|
| /third_party/rust/rust/src/tools/clippy/tests/ui/ |
| D | cast.stderr | 2 --> $DIR/cast.rs:14:5 7 = note: `-D clippy::cast-precision-loss` implied by `-D warnings` 10 --> $DIR/cast.rs:16:5 16 --> $DIR/cast.rs:17:5 22 --> $DIR/cast.rs:19:5 28 --> $DIR/cast.rs:21:5 34 --> $DIR/cast.rs:22:5 40 --> $DIR/cast.rs:24:5 45 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ... 46 = note: `-D clippy::cast-possible-truncation` implied by `-D warnings` [all …]
|
| D | useless_attribute.fixed | 1 //@run-rustfix 2 //@aux-build:proc_macro_derive.rs:proc-macro 4 #![allow(unused)] 9 #![allow(dead_code)] 10 #![cfg_attr(feature = "cargo-clippy", allow(dead_code))] 12 #[allow(unused_imports)] 13 #[allow(unused_extern_crates)] 21 #![allow(clippy::almost_swapped)] 28 #[allow(unused_imports)] 32 #[allow(unused)] [all …]
|
| D | useless_attribute.rs | 1 //@run-rustfix 2 //@aux-build:proc_macro_derive.rs:proc-macro 4 #![allow(unused)] 9 #[allow(dead_code)] 10 #[cfg_attr(feature = "cargo-clippy", allow(dead_code))] 12 #[allow(unused_imports)] 13 #[allow(unused_extern_crates)] 21 #[allow(clippy::almost_swapped)] in test_indented_attr() 28 #[allow(unused_imports)] 32 #[allow(unused)] [all …]
|
| D | cast_size_32bit.stderr | 2 --> $DIR/cast_size_32bit.rs:12:5 7 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ... 8 = note: `-D clippy::cast-possible-truncation` implied by `-D warnings` 14 error: casting `isize` to `f64` causes a loss of precision on targets with 64-bit wide pointers (`i… 15 --> $DIR/cast_size_32bit.rs:15:5 20 = note: `-D clippy::cast-precision-loss` implied by `-D warnings` 22 error: casting `usize` to `f64` causes a loss of precision on targets with 64-bit wide pointers (`u… 23 --> $DIR/cast_size_32bit.rs:16:5 29 --> $DIR/cast_size_32bit.rs:17:5 35 --> $DIR/cast_size_32bit.rs:18:5 [all …]
|
| D | cast_size.stderr | 2 --> $DIR/cast_size.rs:12:5 7 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ... 8 = note: `-D clippy::cast-possible-truncation` implied by `-D warnings` 14 error: casting `isize` to `f64` causes a loss of precision on targets with 64-bit wide pointers (`i… 15 --> $DIR/cast_size.rs:15:5 20 = note: `-D clippy::cast-precision-loss` implied by `-D warnings` 22 error: casting `usize` to `f64` causes a loss of precision on targets with 64-bit wide pointers (`u… 23 --> $DIR/cast_size.rs:16:5 29 --> $DIR/cast_size.rs:17:5 35 --> $DIR/cast_size.rs:18:5 [all …]
|
| /third_party/selinux/libsepol/tests/policies/test-neverallow/ |
| D | policy_minus_self.conf | 59 allow test1_t test1_t : file read; 60 neverallow test1_t { test1_t -self } : file read; # nofail 66 allow test2_t self : file read; 67 neverallow test2_t { test1_t -self } : file read; # nofail 73 allow test3_1_t test3_2_t : file read; 74 neverallow test3_1_t { test3_2_t -self } : file read; 81 allow { test4_1_t test4_2_t } { test4_1_t test4_2_t } : file read; 82 neverallow test4_1_t { test4_1_t test4_2_t -self } : file read; 89 allow { test5_1_t test5_2_t } { test5_1_t test5_2_t } : class5 perm; 90 neverallow * { test5_1_t test5_2_t -self } : class5 perm; [all …]
|
| D | policy.conf | 49 allow test1_t test1_t : file { read write }; 56 allow test2_t test2_t : file { read write }; 63 allow test3_t test3_t : file { read write }; 70 allow test4_t test4_t : file { read write }; 77 allow test5_t test5_t : file { read write }; 85 allow { test6_1_t test6_2_t } { test6_1_t test6_2_t } : file { read write }; 93 allow { test7_1_t test7_2_t } { test7_1_t test7_2_t } : file { read write }; 101 allow test8_a test8_a : file read; 102 allow test8_t test8_t : file write; 110 allow test9_a test9_a : file read; [all …]
|
| /third_party/rust/crates/rustix/src/thread/ |
| D | prctl.rs | 1 #![allow(unsafe_code)] 30 /// - [`prctl(PR_GET_KEEPCAPS,...)`] 32 /// [`prctl(PR_GET_KEEPCAPS,...)`]: https://man7.org/linux/man-pages/man2/prctl.2.html 34 pub fn get_keep_capabilities() -> io::Result<bool> { in get_keep_capabilities() 43 /// - [`prctl(PR_SET_KEEPCAPS,...)`] 45 /// [`prctl(PR_SET_KEEPCAPS,...)`]: https://man7.org/linux/man-pages/man2/prctl.2.html 47 pub fn set_keep_capabilities(enable: bool) -> io::Result<()> { in set_keep_capabilities() 60 /// - [`prctl(PR_GET_NAME,...)`] 62 /// [`prctl(PR_GET_NAME,...)`]: https://man7.org/linux/man-pages/man2/prctl.2.html 64 pub fn name() -> io::Result<CString> { in name() [all …]
|
| /third_party/typescript/tests/baselines/reference/ |
| D | collisionArgumentsClassConstructor.errors.txt | 2 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 3 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 4 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 6 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 7 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 8 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 9 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 10 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 12 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 13 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… [all …]
|
| D | collisionArgumentsClassMethod.errors.txt | 2 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 3 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 4 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 6 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 7 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 8 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 9 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 10 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 12 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… 13 …t's strict mode which does not allow this use of 'arguments'. For more information, see https://de… [all …]
|
| /third_party/rust/crates/env_logger/ |
| D | deny.toml | 2 # * deny - An error will be produced and the check will fail 3 # * warn - A warning will be produced, but the check will not fail 4 # * allow - No warning or error will be produced, though in some cases a note 9 # https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html 18 # 2019-12-17 there are no security notice advisories in 19 # https://github.com/rustsec/advisory-db 24 # e.g. "RUSTSEC-0000-0000", 30 # https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html 36 allow = [ 38 "MIT-0", [all …]
|
| /third_party/rust/rust/src/tools/clippy/tests/ui-toml/toml_unknown_key/ |
| D | conf_unknown_key.stderr | 2 accept-comment-above-attributes 3 accept-comment-above-statement 4 allow-dbg-in-tests 5 allow-expect-in-tests 6 allow-mixed-uninlined-format-args 7 allow-one-hash-in-raw-strings 8 allow-print-in-tests 9 allow-private-module-inception 10 allow-unwrap-in-tests 11 allowed-idents-below-min-chars [all …]
|
| /third_party/rust/crates/clap/ |
| D | deny.toml | 6 # http://www.apache.org/licenses/LICENSE-2.0 15 # * deny - An error will be produced and the check will fail 16 # * warn - A warning will be produced, but the check will not fail 17 # * allow - No warning or error will be produced, though in some cases a note 22 # https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html 31 # 2019-12-17 there are no security notice advisories in 32 # https://github.com/rustsec/advisory-db 37 # e.g. "RUSTSEC-0000-0000", 43 # https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html 49 allow = [ [all …]
|
| /third_party/rust/crates/libc/src/ |
| D | lib.rs | 1 //! libc - Raw FFI bindings to platforms' system libraries 4 #![allow( 18 #![cfg_attr(feature = "rustc-dep-of-std", feature(link_cfg, no_core))] 23 #![cfg_attr(not(feature = "rustc-dep-of-std"), no_std)] 24 #![cfg_attr(feature = "rustc-dep-of-std", no_core)] 31 if #[cfg(feature = "rustc-dep-of-std")] { 33 #[allow(unused_imports)] 35 #[allow(unused_imports)] 37 #[allow(unused_imports)] 45 #[allow(unused_imports)] [all …]
|
| /third_party/rust/rust/tests/ui/rfcs/rfc-2565-param-attrs/ |
| D | param-attrs-builtin-attrs.rs | 6 //~^ ERROR expected non-macro attribute, found attribute macro in ffi() 10 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr… in ffi() 14 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr… in ffi() 22 //~^ ERROR expected non-macro attribute, found attribute macro 26 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr… 30 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr… 37 //~^ ERROR expected non-macro attribute, found attribute macro in foo() 41 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr… in foo() 45 …//~^ ERROR allow, cfg, cfg_attr, deny, expect, forbid, and warn are the only allowed built-in attr… in foo() 57 //~^ ERROR expected non-macro attribute, found attribute macro in foo() [all …]
|
| /third_party/selinux/libsepol/tests/policies/test-cond/ |
| D | refpolicy-base.conf | 470 pageexec # Paging based non-executable pages 475 segmexec # Segmentation based non-executable pages 977 allow bin_t fs_t:filesystem associate; 978 allow bin_t noxattrfs:filesystem associate; 980 allow sbin_t fs_t:filesystem associate; 981 allow sbin_t noxattrfs:filesystem associate; 983 allow ls_exec_t fs_t:filesystem associate; 984 allow ls_exec_t noxattrfs:filesystem associate; 987 allow shell_exec_t fs_t:filesystem associate; 988 allow shell_exec_t noxattrfs:filesystem associate; [all …]
|
| /third_party/selinux/libsepol/tests/ |
| D | test-neverallow.c | 3 #include "test-neverallow.h" 6 #include "test-common.h" 35 struct msg_list *n = messages->next; in messages_clean() 36 free(messages->msg); in messages_clean() 47 for (i = 0; i < count; i++, m = m->next) { in messages_check() 54 if (strcmp(expected[i], m->msg) != 0) { in messages_check() 56 fprintf(stderr, "\n<expected: '''%s''', got: '''%s'''>\n", expected[i], m->msg); in messages_check() 62 fprintf(stderr, "\n<expected %u; next message: '''%s'''>\n", count, m->msg); in messages_check() 84 new->msg = msg; in msg_handler() 85 new->next = messages; in msg_handler() [all …]
|
| /third_party/libabigail/tests/ |
| D | test-abidiff-exit.cc | 1 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 2 // -*- Mode: C++ -*- 4 // Copyright (C) 2016-2023 Red Hat, Inc. 26 #include "abg-tools-utils.h" 27 #include "test-utils.h" 53 "data/test-abidiff-exit/test1-voffset-change-v0.o", 54 "data/test-abidiff-exit/test1-voffset-change-v1.o", 62 "--no-default-suppression --no-show-locs", 65 "data/test-abidiff-exit/test1-voffset-change-report0.txt", 66 "output/test-abidiff-exit/test1-voffset-change-report0.txt" [all …]
|
| /third_party/openssl/test/ssl-tests/ |
| D | 03-custom_verify.cnf | 5 test-0 = 0-verify-success 6 test-1 = 1-verify-custom-reject 7 test-2 = 2-verify-custom-allow 8 test-3 = 3-verify-custom-retry 9 test-4 = 4-noverify-success 10 test-5 = 5-noverify-ignore-custom-reject 11 test-6 = 6-noverify-accept-custom-allow 12 test-7 = 7-verify-fail-no-root 13 test-8 = 8-verify-custom-success-no-root 14 test-9 = 9-verify-custom-fail-no-root [all …]
|
| /third_party/rust/rust/src/tools/rustfmt/.github/workflows/ |
| D | integration.yml | 5 - master 9 integration-tests: 10 runs-on: ubuntu-latest 13 …# https://help.github.com/en/actions/getting-started-with-github-actions/about-github-actions#usag… 14 # There's a limit of 60 concurrent jobs across all repos in the rust-lang organization. 17 max-parallel: 4 18 fail-fast: false 22 error-chain, 26 rust-semverver, 28 futures-rs, [all …]
|