Home
last modified time | relevance | path

Searched full:allow (Results 1 – 25 of 8517) sorted by relevance

12345678910>>...341

/third_party/selinux/secilc/test/
Dbounds.cil13 (allow TYPE self (CLASS (PERM)))
50 (allow b_t1 self (CLASS (PERM)))
51 (allow b_t1_c self (CLASS (PERM)))
52 (allow b_t1 b_ta (CLASS (PERM)))
53 (allow b_t1_c b_ta (CLASS (PERM)))
54 (allow b_ta b_t1 (CLASS (PERM)))
55 (allow b_ta b_t1_c (CLASS (PERM)))
59 (allow b_t1 b_tb (CLASS (PERM)))
60 (allow b_t1_c b_tb (CLASS (PERM)))
61 (allow b_tb b_t1 (CLASS (PERM)))
[all …]
Dname_resolution_test.cil14 (allow TYPE self (CLASS (PERM)))
27 (allow t0 self (CLASS (PERM1)))
28 (allow .t0 self (CLASS (PERM2)))
34 (allow t1a self (CLASS (PERM)))
35 (allow b1b.t1b self (CLASS (PERM)))
38 (allow t1a self (CLASS (PERM1)))
39 (allow t1b self (CLASS (PERM1)))
40 (allow .b1a.t1a self (CLASS (PERM2)))
41 (allow .b1a.b1b.t1b self (CLASS (PERM2)))
44 (allow b1a.t1a self (CLASS (PERM3)))
[all …]
Din_test.cil14 (allow TYPE self (CLASS (PERM)))
28 (allow t1b self (CLASS (PERM1)))
33 (allow t1a self (CLASS (PERM1)))
37 (allow t1a self (CLASS (PERM2)))
38 (allow b1.t1a self (CLASS (PERM3)))
39 (allow .b1.t1a self (CLASS (PERM4)))
41 (allow t1b self (CLASS (PERM2)))
42 (allow b1.t1b self (CLASS (PERM3)))
43 (allow .b1.t1b self (CLASS (PERM4)))
50 (allow t2b self (CLASS (PERM1)))
[all …]
Ddeny_rule_test2.cil23 (allow TYPE self (CLASS (PERM)))
94 (allow ta notself (ca (pa1)))
99 (allow aab notself (ca (pa2)))
104 (allow ta notself (ca (pa3)))
109 (allow aab notself (ca (pa4)))
115 (allow ta notself (cb (pb1)))
121 (allow ta tb (cb (pb2)))
126 (allow aab notself (cb (pb3)))
133 (allow ta tb (cb (pb4)))
138 (allow aab notself (cb (pb5)))
[all …]
Ddeny_rule_test1.cil23 (allow TYPE self (CLASS (PERM)))
116 (allow ta tb (ca (pa1)))
121 (allow ta tb (ca (pa2 pa3)))
127 (allow tc td (ca (pa2)))
132 (allow aab acd (ca (pa4)))
137 (allow ta tc (ca (pa5)))
142 (allow aab acd (ca (pa6)))
148 (allow ta self (ca (pa7)))
153 (allow ta self (ca (pa8)))
158 (allow ta ta (ca (pa9)))
[all …]
Dblock_test.cil14 (allow TYPE self (CLASS (PERM)))
56 (allow t3a t (CLASS (PERM)))
79 ;; Since block is abstract, allow rule will not be in policy
83 (allow t4 self (CLASS (PERM)))
87 ;; Inheriting the abstract block causes the allow rule to be in the policy
91 (allow t5 self (CLASS (PERM)))
100 (allow t6 self (CLASS (PERM1)))
103 (allow t6 self (CLASS (PERM)))
119 ;; Allow rules:
120 ;; allow b3a.t3a b3a.b.t : CLASS { PERM };
[all …]
Dneverallow.cil13 (allow TYPE self (CLASS (PERM)))
57 (allow t1 t2 (c1 (p1a)))
60 (allow t3 t4 (c1 (p1a)))
63 (allow t5 t6 (c1 (p1b)))
64 (allow t5 t6 (c2 (p2a)))
67 (allow t1 t1 (CLASS (PERM)))
68 (allow t2 self (CLASS (PERM)))
69 (allow a3 self (CLASS (PERM)))
70 (allow a2 a4 (CLASS (PERM)))
73 (allow t5 t7 (CLASS (PERM)))
[all …]
/third_party/selinux/libsepol/tests/policies/test-cond/
Drefpolicy-base.conf977 allow bin_t fs_t:filesystem associate;
978 allow bin_t noxattrfs:filesystem associate;
980 allow sbin_t fs_t:filesystem associate;
981 allow sbin_t noxattrfs:filesystem associate;
983 allow ls_exec_t fs_t:filesystem associate;
984 allow ls_exec_t noxattrfs:filesystem associate;
987 allow shell_exec_t fs_t:filesystem associate;
988 allow shell_exec_t noxattrfs:filesystem associate;
990 allow chroot_exec_t fs_t:filesystem associate;
991 allow chroot_exec_t noxattrfs:filesystem associate;
[all …]
/third_party/rust/rust/src/tools/clippy/tests/ui/
Drename.fixed7 #![allow(clippy::almost_complete_range)]
8 #![allow(clippy::disallowed_names)]
9 #![allow(clippy::blocks_in_if_conditions)]
10 #![allow(clippy::box_collection)]
11 #![allow(clippy::redundant_static_lifetimes)]
12 #![allow(clippy::cognitive_complexity)]
13 #![allow(clippy::derived_hash_with_manual_eq)]
14 #![allow(clippy::disallowed_methods)]
15 #![allow(clippy::disallowed_types)]
16 #![allow(clippy::mixed_read_write_in_expression)]
[all …]
Drename.rs7 #![allow(clippy::almost_complete_range)]
8 #![allow(clippy::disallowed_names)]
9 #![allow(clippy::blocks_in_if_conditions)]
10 #![allow(clippy::box_collection)]
11 #![allow(clippy::redundant_static_lifetimes)]
12 #![allow(clippy::cognitive_complexity)]
13 #![allow(clippy::derived_hash_with_manual_eq)]
14 #![allow(clippy::disallowed_methods)]
15 #![allow(clippy::disallowed_types)]
16 #![allow(clippy::mixed_read_write_in_expression)]
[all …]
Duseless_attribute.fixed4 #![allow(unused)]
9 #![allow(dead_code)]
10 #![cfg_attr(feature = "cargo-clippy", allow(dead_code))]
12 #[allow(unused_imports)]
13 #[allow(unused_extern_crates)]
21 #![allow(clippy::almost_swapped)]
28 #[allow(unused_imports)]
32 #[allow(unused)]
40 #[allow(deprecated)]
51 #[allow(dead_code)]
[all …]
Duseless_attribute.rs4 #![allow(unused)]
9 #[allow(dead_code)]
10 #[cfg_attr(feature = "cargo-clippy", allow(dead_code))]
12 #[allow(unused_imports)]
13 #[allow(unused_extern_crates)]
21 #[allow(clippy::almost_swapped)] in test_indented_attr()
28 #[allow(unused_imports)]
32 #[allow(unused)]
40 #[allow(deprecated)]
51 #[allow(dead_code)]
[all …]
Dcast.stderr45 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
54 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
70 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
78 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
90 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
102 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
110 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
124 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
136 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
150 …= help: if this is intentional allow the lint with `#[allow(clippy::cast_possible_truncation)]` ...
[all …]
/third_party/rust/rust/tests/ui/lint/
Dcrate_level_only_lint.stderr1 error: allow(uncommon_codepoints) is ignored unless specified at crate level
4 LL | #![allow(uncommon_codepoints)]
13 error: allow(uncommon_codepoints) is ignored unless specified at crate level
16 LL | #[allow(uncommon_codepoints)]
19 error: allow(uncommon_codepoints) is ignored unless specified at crate level
22 LL | #[allow(uncommon_codepoints)]
25 error: allow(uncommon_codepoints) is ignored unless specified at crate level
28 LL | #![allow(uncommon_codepoints)]
31 error: allow(uncommon_codepoints) is ignored unless specified at crate level
34 LL | #[allow(uncommon_codepoints)]
[all …]
Dcrate_level_only_lint.rs4 #![allow(uncommon_codepoints)]
5 //~^ ERROR allow(uncommon_codepoints) is ignored unless specified at crate level [unused_attributes]
6 //~| ERROR allow(uncommon_codepoints) is ignored unless specified at crate level [unused_attributes]
7 //~| ERROR allow(uncommon_codepoints) is ignored unless specified at crate level [unused_attributes]
9 #[allow(uncommon_codepoints)]
10 //~^ ERROR allow(uncommon_codepoints) is ignored unless specified at crate level [unused_attributes]
11 //~| ERROR allow(uncommon_codepoints) is ignored unless specified at crate level [unused_attributes]
12 //~| ERROR allow(uncommon_codepoints) is ignored unless specified at crate level [unused_attributes]
17 #[allow(uncommon_codepoints)]
18 //~^ ERROR allow(uncommon_codepoints) is ignored unless specified at crate level [unused_attributes]
[all …]
/third_party/selinux/secilc/docs/
Dcil_access_vector_rules.md22 <td align="left"><p>The flavor of access vector rule. Possible flavors are <code>allow</code>, <cod…
35 …ode>classmap</code>/<code>classmapping</code> identifiers. Used for <code>allow</code>, <code>audi…
44 allow section in Access Vector Rules
52 (allow source_id target_id|self|notself|other classpermissionset_id ...)
57 …examples show a selection of possible permutations of [`allow`](cil_access_vector_rules.md#allow) …
91 (allow type_1 self (property_service (set))) ; anonymous
92 (allow type_2 self (zygote (specifyids))) ; anonymous
93 (allow type_3 self cps_zygote) ; named
94 (allow type_4 self (android_classes (set_3))) ; classmap/classmapping
95 (allow all_types all_types (android_classes (set_2))) ; classmap/classmapping
[all …]
/third_party/rust/rust/library/std/src/sys/unix/process/
Dzircon.rs1 #![allow(non_camel_case_types, unused)]
152 #[allow(unused)]
157 #[allow(unused)]
162 #[allow(unused)]
167 #[allow(unused)]
172 #[allow(unused)]
177 #[allow(unused)]
182 #[allow(unused)]
186 #[allow(unused)]
192 #[allow(unused)]
[all …]
/third_party/selinux/libsepol/tests/policies/test-neverallow/
Dpolicy.conf49 allow test1_t test1_t : file { read write };
56 allow test2_t test2_t : file { read write };
63 allow test3_t test3_t : file { read write };
70 allow test4_t test4_t : file { read write };
77 allow test5_t test5_t : file { read write };
85 allow { test6_1_t test6_2_t } { test6_1_t test6_2_t } : file { read write };
93 allow { test7_1_t test7_2_t } { test7_1_t test7_2_t } : file { read write };
101 allow test8_a test8_a : file read;
102 allow test8_t test8_t : file write;
110 allow test9_a test9_a : file read;
[all …]
Dpolicy_not_self.conf59 allow test1_t test1_t : file read;
66 allow test2_t self : file read;
74 allow test3_1_t test3_2_t : file read;
82 allow { test4_1_t test4_2_t } { test4_1_t test4_2_t } : file read;
90 allow { test5_1_t test5_2_t } { test5_1_t test5_2_t } : class5 perm;
98 allow { test6_1_t test6_2_t } { test6_1_t test6_2_t } : class6 perm;
106 allow { test7_1_t test7_2_t } { test7_1_t test7_2_t } : class7 perm;
115 allow test8_a test8_a : file read;
124 allow test9_1_t test9_a : file read;
134 allow test10_1_a test10_1_a : file read;
[all …]
Dpolicy_minus_self.conf59 allow test1_t test1_t : file read;
66 allow test2_t self : file read;
73 allow test3_1_t test3_2_t : file read;
81 allow { test4_1_t test4_2_t } { test4_1_t test4_2_t } : file read;
89 allow { test5_1_t test5_2_t } { test5_1_t test5_2_t } : class5 perm;
97 allow { test6_1_t test6_2_t } { test6_1_t test6_2_t } : class6 perm;
105 allow { test7_1_t test7_2_t } test7_2_t : class7 perm;
114 allow test8_a test8_a : file read;
123 allow test9_1_t test9_a : file read;
133 allow test10_1_a test10_1_a : file read;
[all …]
/third_party/rust/rust/tests/ui/issues/
Dissue-21546.rs3 #[allow(non_snake_case)]
6 #[allow(dead_code)]
10 #[allow(non_snake_case)]
13 #[allow(dead_code)]
18 #[allow(dead_code)]
21 #[allow(non_snake_case)]
26 #[allow(dead_code)]
29 #[allow(non_snake_case)]
34 #[allow(dead_code)]
37 #[allow(non_snake_case)]
[all …]
/third_party/cups/conf/
Dcupsd.conf.in36 Order allow,deny
43 Order allow,deny
50 Order allow,deny
57 Order allow,deny
70 Order deny,allow
75 Order deny,allow
81 Order deny,allow
88 Order deny,allow
95 Order deny,allow
101 Order deny,allow
[all …]
/third_party/rust/rust/tests/ui/span/
Dlint-unused-unsafe.rs13 #![allow(dead_code)]
64 #[allow(unused_unsafe)] fn allowed() { unsafe {} } in allowed()
75 #[allow(unused_unsafe)] in inner_ignored()
108 #[allow(unused_unsafe)] in top_level_ignored()
125 #[allow(unused_unsafe)] in inner_ignored_1()
162 #[allow(unused_unsafe)] in top_level_ignored_1()
176 #[allow(unsafe_op_in_unsafe_fn)]
179 #[allow(unused_unsafe)] in inner_ignored_2()
186 #[allow(unsafe_op_in_unsafe_fn)]
194 #[allow(unsafe_op_in_unsafe_fn)]
[all …]
/third_party/typescript/tests/baselines/reference/
DcollisionArgumentsClassConstructor.errors.txt2 …tained in a class is evaluated in JavaScript's strict mode which does not allow this use of 'argum…
3 …tained in a class is evaluated in JavaScript's strict mode which does not allow this use of 'argum…
4 …tained in a class is evaluated in JavaScript's strict mode which does not allow this use of 'argum…
6 …tained in a class is evaluated in JavaScript's strict mode which does not allow this use of 'argum…
7 …tained in a class is evaluated in JavaScript's strict mode which does not allow this use of 'argum…
8 …tained in a class is evaluated in JavaScript's strict mode which does not allow this use of 'argum…
9 …tained in a class is evaluated in JavaScript's strict mode which does not allow this use of 'argum…
10 …tained in a class is evaluated in JavaScript's strict mode which does not allow this use of 'argum…
12 …tained in a class is evaluated in JavaScript's strict mode which does not allow this use of 'argum…
13 …tained in a class is evaluated in JavaScript's strict mode which does not allow this use of 'argum…
[all …]
/third_party/rust/crates/libc/src/
Dlib.rs4 #![allow(
33 #[allow(unused_imports)]
35 #[allow(unused_imports)]
37 #[allow(unused_imports)]
45 #[allow(unused_imports)]
47 #[allow(unused_imports)]
49 #[allow(unused_imports)]
51 #[allow(unused_imports)]
53 #[allow(unused_imports)]
56 #[allow(unused_imports)]
[all …]

12345678910>>...341