/external/selinux/secilc/test/ |
D | bounds.cil | 13 (allow TYPE self (CLASS (PERM))) 50 (allow b_t1 self (CLASS (PERM))) 51 (allow b_t1_c self (CLASS (PERM))) 52 (allow b_t1 b_ta (CLASS (PERM))) 53 (allow b_t1_c b_ta (CLASS (PERM))) 54 (allow b_ta b_t1 (CLASS (PERM))) 55 (allow b_ta b_t1_c (CLASS (PERM))) 59 (allow b_t1 b_tb (CLASS (PERM))) 60 (allow b_t1_c b_tb (CLASS (PERM))) 61 (allow b_tb b_t1 (CLASS (PERM))) [all …]
|
D | in_test.cil | 14 (allow TYPE self (CLASS (PERM))) 28 (allow t1b self (CLASS (PERM1))) 33 (allow t1a self (CLASS (PERM1))) 37 (allow t1a self (CLASS (PERM2))) 38 (allow b1.t1a self (CLASS (PERM3))) 39 (allow .b1.t1a self (CLASS (PERM4))) 41 (allow t1b self (CLASS (PERM2))) 42 (allow b1.t1b self (CLASS (PERM3))) 43 (allow .b1.t1b self (CLASS (PERM4))) 50 (allow t2b self (CLASS (PERM1))) [all …]
|
D | name_resolution_test.cil | 14 (allow TYPE self (CLASS (PERM))) 27 (allow t0 self (CLASS (PERM1))) 28 (allow .t0 self (CLASS (PERM2))) 34 (allow t1a self (CLASS (PERM))) 35 (allow b1b.t1b self (CLASS (PERM))) 38 (allow t1a self (CLASS (PERM1))) 39 (allow t1b self (CLASS (PERM1))) 40 (allow .b1a.t1a self (CLASS (PERM2))) 41 (allow .b1a.b1b.t1b self (CLASS (PERM2))) 44 (allow b1a.t1a self (CLASS (PERM3))) [all …]
|
D | neverallow.cil | 13 (allow TYPE self (CLASS (PERM))) 57 (allow t1 t2 (c1 (p1a))) 60 (allow t3 t4 (c1 (p1a))) 63 (allow t5 t6 (c1 (p1b))) 64 (allow t5 t6 (c2 (p2a))) 67 (allow t1 t1 (CLASS (PERM))) 68 (allow t2 self (CLASS (PERM))) 69 (allow a3 self (CLASS (PERM))) 70 (allow a2 a4 (CLASS (PERM))) 73 (allow t5 t7 (CLASS (PERM))) [all …]
|
D | block_test.cil | 14 (allow TYPE self (CLASS (PERM))) 56 (allow t3a t (CLASS (PERM))) 79 ;; Since block is abstract, allow rule will not be in policy 83 (allow t4 self (CLASS (PERM))) 87 ;; Inherting the abstract block causes the allow rule to be in the policy 91 (allow t5 self (CLASS (PERM))) 100 (allow t6 self (CLASS (PERM1))) 103 (allow t6 self (CLASS (PERM))) 120 ;; allow b3a.t3a b3a.b.t : CLASS { PERM }; 121 ;; allow b3a.t3a b3c.t : CLASS { PERM }; [all …]
|
D | optional_test.cil | 14 (allow TYPE self (CLASS (PERM))) 28 (allow t1 self (CLASS (PERM))) ;; Should not appear in policy 29 (allow UNKNOWN self (CLASS (PERM))) 36 (allow t2 self (CLASS (PERM1))) 42 (allow t2 DNE (CLASS (PERM))) 50 (allow t2 self (CLASS (PERM))) 60 ;; (allow t3 DNE (CLASS (PERM))) 63 ;; (allow t3 self (CLASS (PERM1))) 75 ;; allow b2a.t2 b2a.t2 : CLASS { PERM1 }; 76 ;; allow b2b.t2 b2b.t2 : CLASS { PERM1 }; [all …]
|
D | integration.cil | 57 (allow console_t console_device_t file_rw) 58 (allow console_t console_device_t (files (read))) 86 (allow foo_type self (file (execute))) 87 (allow bin_t device_t (file (execute))) 98 (allow getty_t console_device_t (file (getattr open read write append))) 108 (allow bin_t exec_t (file (execute))) 119 (allow bin_t exec_t (file (execute))) 124 (allow user_t exec_t (bins (execute))) 204 (allow x bin_t (file (execute))) 215 (allow a_t b_t (file (write)))) [all …]
|
D | policy.cil | 5 (handleunknown allow) 102 ;;(allow console_t console_device_t file_rw) 103 (allow console_t console_device_t (files (read))) 150 (allow foo_type self (file (execute))) 151 (allow bin_t device_t (file (execute))) 154 ;;(allow bad_t not_bad_type (file (execute))) 155 ;;(allow bad_t exec_t (file (execute))) 167 (allow getty_t console_device_t (file (getattr open read write append))) 177 (allow bin_t exec_t (file (execute))) 188 (allow bin_t exec_t (file (execute))) [all …]
|
/external/selinux/libsepol/tests/policies/test-cond/ |
D | refpolicy-base.conf | 977 allow bin_t fs_t:filesystem associate; 978 allow bin_t noxattrfs:filesystem associate; 980 allow sbin_t fs_t:filesystem associate; 981 allow sbin_t noxattrfs:filesystem associate; 983 allow ls_exec_t fs_t:filesystem associate; 984 allow ls_exec_t noxattrfs:filesystem associate; 987 allow shell_exec_t fs_t:filesystem associate; 988 allow shell_exec_t noxattrfs:filesystem associate; 990 allow chroot_exec_t fs_t:filesystem associate; 991 allow chroot_exec_t noxattrfs:filesystem associate; [all …]
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/CodeGen/X86/ |
D | cpus.ll | 10 …=i686-unknown-unknown -mcpu=generic 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 16 …ple=i686-unknown-unknown -mcpu=i386 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 17 …ple=i686-unknown-unknown -mcpu=i486 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 18 …ple=i686-unknown-unknown -mcpu=i586 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 19 …=i686-unknown-unknown -mcpu=pentium 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 20 …6-unknown-unknown -mcpu=pentium-mmx 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 21 …ple=i686-unknown-unknown -mcpu=i686 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 22 …86-unknown-unknown -mcpu=pentiumpro 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 23 …i686-unknown-unknown -mcpu=pentium2 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 24 …i686-unknown-unknown -mcpu=pentium3 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty [all …]
|
/external/rust/crates/libc/src/ |
D | lib.rs | 18 #![allow( 45 #[allow(unused_imports)] 47 #[allow(unused_imports)] 55 #[allow(unused_imports)] 57 #[allow(unused_imports)] 59 #[allow(unused_imports)] 61 #[allow(unused_imports)] 63 #[allow(unused_imports)] 66 #[allow(unused_imports)] 69 #[allow(unused_imports)] [all …]
|
D | macros.rs | 9 #[allow(unused_macros)] 65 #[allow(unused_macros)] 77 #[allow(deprecated)] 81 #[allow(deprecated)] 83 #[allow(deprecated)] 90 #[allow(unused_macros)] 153 #[allow(unused_macros)] 168 #[allow(unused_macros)] 184 #[allow(unused_macros)] 199 #[allow(unused_macros)] [all …]
|
/external/llvm/test/CodeGen/X86/ |
D | cpus.ll | 10 …x86_64-unknown-unknown -mcpu=nocona 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 11 …=x86_64-unknown-unknown -mcpu=core2 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 12 …x86_64-unknown-unknown -mcpu=penryn 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 13 …86_64-unknown-unknown -mcpu=nehalem 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 14 …6_64-unknown-unknown -mcpu=westmere 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 15 …4-unknown-unknown -mcpu=sandybridge 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 16 …_64-unknown-unknown -mcpu=ivybridge 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 17 …86_64-unknown-unknown -mcpu=haswell 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 18 …_64-unknown-unknown -mcpu=broadwell 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty 19 …86_64-unknown-unknown -mcpu=bonnell 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty [all …]
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
D | AllowParser.java | 47 public AllowParser(String allow) { in AllowParser() argument 48 super(allow); in AllowParser() 73 Allow allow = new Allow(); in parse() local 74 allow.setHeaderName(SIPHeaderNames.ALLOW); in parse() 79 allow.setMethod(token.getTokenValue()); in parse() 81 list.add(allow); in parse() 87 allow = new Allow(); in parse() 90 allow.setMethod(token.getTokenValue()); in parse() 92 list.add(allow); in parse()
|
/external/crosvm/usb_util/src/ |
D | lib.rs | 6 #![allow(dead_code)] 7 #![allow(non_camel_case_types)] 8 #![allow(non_snake_case)] 9 #![allow(non_upper_case_globals)] 10 #[allow(clippy::all)]
|
/external/icu/android_icu4j/src/main/java/android/icu/impl/ |
D | SortedSetRelation.java | 74 …ds Object & Comparable<? super T>> boolean hasRelation(SortedSet<T> a, int allow, SortedSet<T> b) { in hasRelation() argument 75 if (allow < NONE || allow > ANY) { in hasRelation() 76 throw new IllegalArgumentException("Relation " + allow + " out of range"); in hasRelation() 82 boolean anb = (allow & A_NOT_B) != 0; in hasRelation() 83 boolean ab = (allow & A_AND_B) != 0; in hasRelation() 84 boolean bna = (allow & B_NOT_A) != 0; in hasRelation() 87 switch(allow) { in hasRelation()
|
/external/honggfuzz/examples/bind/ |
D | named.conf | 27 allow-new-zones yes; 46 allow-query { 49 allow-query-cache { 52 allow-recursion { 55 allow-transfer { 58 allow-update-forwarding { 102 allow { 127.0.0.1; } keys { "rndc-key"; };
|
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/ |
D | SortedSetRelation.java | 72 …ds Object & Comparable<? super T>> boolean hasRelation(SortedSet<T> a, int allow, SortedSet<T> b) { in hasRelation() argument 73 if (allow < NONE || allow > ANY) { in hasRelation() 74 throw new IllegalArgumentException("Relation " + allow + " out of range"); in hasRelation() 80 boolean anb = (allow & A_NOT_B) != 0; in hasRelation() 81 boolean ab = (allow & A_AND_B) != 0; in hasRelation() 82 boolean bna = (allow & B_NOT_A) != 0; in hasRelation() 85 switch(allow) { in hasRelation()
|
/external/crosvm/gpu_renderer/src/generated/ |
D | mod.rs | 6 #![allow(dead_code)] 7 #![allow(non_camel_case_types)] 8 #![allow(non_snake_case)] 9 #![allow(non_upper_case_globals)]
|
/external/selinux/libsepol/src/ |
D | assertion.c | 88 …atic int check_extended_permissions(av_extended_perms_t *neverallow, avtab_extended_perms_t *allow) in check_extended_permissions() argument 92 && (allow->specified == AVTAB_XPERMS_IOCTLFUNCTION)) { in check_extended_permissions() 93 if (neverallow->driver == allow->driver) in check_extended_permissions() 94 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions() 96 && (allow->specified == AVTAB_XPERMS_IOCTLDRIVER)) { in check_extended_permissions() 97 rc = xperm_test(neverallow->driver, allow->perms); in check_extended_permissions() 99 && (allow->specified == AVTAB_XPERMS_IOCTLFUNCTION)) { in check_extended_permissions() 100 rc = xperm_test(allow->driver, neverallow->perms); in check_extended_permissions() 102 && (allow->specified == AVTAB_XPERMS_IOCTLDRIVER)) { in check_extended_permissions() 103 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
D | dbus-wpa_supplicant.conf | 6 <allow own="fi.w1.wpa_supplicant1"/> 8 <allow send_destination="fi.w1.wpa_supplicant1"/> 9 <allow send_interface="fi.w1.wpa_supplicant1"/> 10 <allow receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
|
/external/swiftshader/third_party/subzero/tests_lit/asan_tests/ |
D | errors.ll | 7 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \ 10 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \ 15 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \ 18 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \ 23 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \ 26 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2\ 31 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \ 35 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \ 41 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \ 45 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \ [all …]
|
D | quarantine.ll | 7 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \ 10 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \ 15 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \ 18 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \ 23 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \ 25 ; RUN: --allow-empty 27 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \ 29 ; RUN: --allow-empty
|
/external/selinux/secilc/docs/ |
D | cil_reference_guide.md | 8 …t build a policy unless it also has as a minimum: one [`allow`](cil_access_vector_rules.md#allow) … 14 …ning source/target [`allow`](cil_access_vector_rules.md#allow) rules instead of multiple [`allow`]… 84 - `(allow domain process (file (read write))))` - Adds an [`allow`](cil_access_vector_rules.md#al… 114 …onship a dot '`.`' is used, for example the following [`allow`](cil_access_vector_rules.md#allow) … 121 (allow process object (file (open read getattr))) 126 allow example_ns.process example_ns.object : example_ns.file { open read getattr }; 149 (allow tmpfs tmpfs (file (open))) 151 ; allow file.tmpfs file.tmpfs : file.file open; 154 (allow tmpfs .tmpfs (file (read))) 156 ; allow file.tmpfs tmpfs : file.file read; [all …]
|
/external/swiftshader/third_party/llvm-7.0/llvm/test/Transforms/LoopUnroll/ |
D | partial-unroll-const-bounds.ll | 1 …threshold=20 -unroll-threshold=20 -loop-unroll -unroll-allow-partial -unroll-runtime -unroll-allow… 2 …roll-partial-threshold=20 -unroll-threshold=20 -unroll-allow-partial -unroll-runtime -unroll-allow… 4 ; Also check that the simple unroller doesn't allow the partial unrolling. 5 …roll-partial-threshold=20 -unroll-threshold=20 -unroll-allow-partial -unroll-runtime -unroll-allow…
|