Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 2333) sorted by relevance

12345678910>>...94

/external/selinux/secilc/test/
Dbounds.cil13 (allow TYPE self (CLASS (PERM)))
50 (allow b_t1 self (CLASS (PERM)))
51 (allow b_t1_c self (CLASS (PERM)))
52 (allow b_t1 b_ta (CLASS (PERM)))
53 (allow b_t1_c b_ta (CLASS (PERM)))
54 (allow b_ta b_t1 (CLASS (PERM)))
55 (allow b_ta b_t1_c (CLASS (PERM)))
59 (allow b_t1 b_tb (CLASS (PERM)))
60 (allow b_t1_c b_tb (CLASS (PERM)))
61 (allow b_tb b_t1 (CLASS (PERM)))
[all …]
Din_test.cil14 (allow TYPE self (CLASS (PERM)))
28 (allow t1b self (CLASS (PERM1)))
33 (allow t1a self (CLASS (PERM1)))
37 (allow t1a self (CLASS (PERM2)))
38 (allow b1.t1a self (CLASS (PERM3)))
39 (allow .b1.t1a self (CLASS (PERM4)))
41 (allow t1b self (CLASS (PERM2)))
42 (allow b1.t1b self (CLASS (PERM3)))
43 (allow .b1.t1b self (CLASS (PERM4)))
50 (allow t2b self (CLASS (PERM1)))
[all …]
Dname_resolution_test.cil14 (allow TYPE self (CLASS (PERM)))
27 (allow t0 self (CLASS (PERM1)))
28 (allow .t0 self (CLASS (PERM2)))
34 (allow t1a self (CLASS (PERM)))
35 (allow b1b.t1b self (CLASS (PERM)))
38 (allow t1a self (CLASS (PERM1)))
39 (allow t1b self (CLASS (PERM1)))
40 (allow .b1a.t1a self (CLASS (PERM2)))
41 (allow .b1a.b1b.t1b self (CLASS (PERM2)))
44 (allow b1a.t1a self (CLASS (PERM3)))
[all …]
Dneverallow.cil13 (allow TYPE self (CLASS (PERM)))
57 (allow t1 t2 (c1 (p1a)))
60 (allow t3 t4 (c1 (p1a)))
63 (allow t5 t6 (c1 (p1b)))
64 (allow t5 t6 (c2 (p2a)))
67 (allow t1 t1 (CLASS (PERM)))
68 (allow t2 self (CLASS (PERM)))
69 (allow a3 self (CLASS (PERM)))
70 (allow a2 a4 (CLASS (PERM)))
73 (allow t5 t7 (CLASS (PERM)))
[all …]
Dblock_test.cil14 (allow TYPE self (CLASS (PERM)))
56 (allow t3a t (CLASS (PERM)))
79 ;; Since block is abstract, allow rule will not be in policy
83 (allow t4 self (CLASS (PERM)))
87 ;; Inherting the abstract block causes the allow rule to be in the policy
91 (allow t5 self (CLASS (PERM)))
100 (allow t6 self (CLASS (PERM1)))
103 (allow t6 self (CLASS (PERM)))
120 ;; allow b3a.t3a b3a.b.t : CLASS { PERM };
121 ;; allow b3a.t3a b3c.t : CLASS { PERM };
[all …]
Doptional_test.cil14 (allow TYPE self (CLASS (PERM)))
28 (allow t1 self (CLASS (PERM))) ;; Should not appear in policy
29 (allow UNKNOWN self (CLASS (PERM)))
36 (allow t2 self (CLASS (PERM1)))
42 (allow t2 DNE (CLASS (PERM)))
50 (allow t2 self (CLASS (PERM)))
60 ;; (allow t3 DNE (CLASS (PERM)))
63 ;; (allow t3 self (CLASS (PERM1)))
75 ;; allow b2a.t2 b2a.t2 : CLASS { PERM1 };
76 ;; allow b2b.t2 b2b.t2 : CLASS { PERM1 };
[all …]
Dintegration.cil57 (allow console_t console_device_t file_rw)
58 (allow console_t console_device_t (files (read)))
86 (allow foo_type self (file (execute)))
87 (allow bin_t device_t (file (execute)))
98 (allow getty_t console_device_t (file (getattr open read write append)))
108 (allow bin_t exec_t (file (execute)))
119 (allow bin_t exec_t (file (execute)))
124 (allow user_t exec_t (bins (execute)))
204 (allow x bin_t (file (execute)))
215 (allow a_t b_t (file (write))))
[all …]
Dpolicy.cil5 (handleunknown allow)
102 ;;(allow console_t console_device_t file_rw)
103 (allow console_t console_device_t (files (read)))
150 (allow foo_type self (file (execute)))
151 (allow bin_t device_t (file (execute)))
154 ;;(allow bad_t not_bad_type (file (execute)))
155 ;;(allow bad_t exec_t (file (execute)))
167 (allow getty_t console_device_t (file (getattr open read write append)))
177 (allow bin_t exec_t (file (execute)))
188 (allow bin_t exec_t (file (execute)))
[all …]
/external/selinux/libsepol/tests/policies/test-cond/
Drefpolicy-base.conf977 allow bin_t fs_t:filesystem associate;
978 allow bin_t noxattrfs:filesystem associate;
980 allow sbin_t fs_t:filesystem associate;
981 allow sbin_t noxattrfs:filesystem associate;
983 allow ls_exec_t fs_t:filesystem associate;
984 allow ls_exec_t noxattrfs:filesystem associate;
987 allow shell_exec_t fs_t:filesystem associate;
988 allow shell_exec_t noxattrfs:filesystem associate;
990 allow chroot_exec_t fs_t:filesystem associate;
991 allow chroot_exec_t noxattrfs:filesystem associate;
[all …]
/external/swiftshader/third_party/llvm-7.0/llvm/test/CodeGen/X86/
Dcpus.ll10 …=i686-unknown-unknown -mcpu=generic 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
16 …ple=i686-unknown-unknown -mcpu=i386 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
17 …ple=i686-unknown-unknown -mcpu=i486 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
18 …ple=i686-unknown-unknown -mcpu=i586 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
19 …=i686-unknown-unknown -mcpu=pentium 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
20 …6-unknown-unknown -mcpu=pentium-mmx 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
21 …ple=i686-unknown-unknown -mcpu=i686 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
22 …86-unknown-unknown -mcpu=pentiumpro 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
23 …i686-unknown-unknown -mcpu=pentium2 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
24 …i686-unknown-unknown -mcpu=pentium3 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
[all …]
/external/llvm/test/CodeGen/X86/
Dcpus.ll10 …x86_64-unknown-unknown -mcpu=nocona 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
11 …=x86_64-unknown-unknown -mcpu=core2 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
12 …x86_64-unknown-unknown -mcpu=penryn 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
13 …86_64-unknown-unknown -mcpu=nehalem 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
14 …6_64-unknown-unknown -mcpu=westmere 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
15 …4-unknown-unknown -mcpu=sandybridge 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
16 …_64-unknown-unknown -mcpu=ivybridge 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
17 …86_64-unknown-unknown -mcpu=haswell 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
18 …_64-unknown-unknown -mcpu=broadwell 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
19 …86_64-unknown-unknown -mcpu=bonnell 2>&1 | FileCheck %s --check-prefix=CHECK-NO-ERROR --allow-empty
[all …]
/external/nist-sip/java/gov/nist/javax/sip/parser/
DAllowParser.java47 public AllowParser(String allow) { in AllowParser() argument
48 super(allow); in AllowParser()
73 Allow allow = new Allow(); in parse() local
74 allow.setHeaderName(SIPHeaderNames.ALLOW); in parse()
79 allow.setMethod(token.getTokenValue()); in parse()
81 list.add(allow); in parse()
87 allow = new Allow(); in parse()
90 allow.setMethod(token.getTokenValue()); in parse()
92 list.add(allow); in parse()
/external/icu/android_icu4j/src/main/java/android/icu/impl/
DSortedSetRelation.java74 …ds Object & Comparable<? super T>> boolean hasRelation(SortedSet<T> a, int allow, SortedSet<T> b) { in hasRelation() argument
75 if (allow < NONE || allow > ANY) { in hasRelation()
76 throw new IllegalArgumentException("Relation " + allow + " out of range"); in hasRelation()
82 boolean anb = (allow & A_NOT_B) != 0; in hasRelation()
83 boolean ab = (allow & A_AND_B) != 0; in hasRelation()
84 boolean bna = (allow & B_NOT_A) != 0; in hasRelation()
87 switch(allow) { in hasRelation()
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/
DSortedSetRelation.java72 …ds Object & Comparable<? super T>> boolean hasRelation(SortedSet<T> a, int allow, SortedSet<T> b) { in hasRelation() argument
73 if (allow < NONE || allow > ANY) { in hasRelation()
74 throw new IllegalArgumentException("Relation " + allow + " out of range"); in hasRelation()
80 boolean anb = (allow & A_NOT_B) != 0; in hasRelation()
81 boolean ab = (allow & A_AND_B) != 0; in hasRelation()
82 boolean bna = (allow & B_NOT_A) != 0; in hasRelation()
85 switch(allow) { in hasRelation()
/external/honggfuzz/examples/bind/
Dnamed.conf27 allow-new-zones yes;
46 allow-query {
49 allow-query-cache {
52 allow-recursion {
55 allow-transfer {
58 allow-update-forwarding {
102 allow { 127.0.0.1; } keys { "rndc-key"; };
/external/selinux/libsepol/src/
Dassertion.c88 …atic int check_extended_permissions(av_extended_perms_t *neverallow, avtab_extended_perms_t *allow) in check_extended_permissions() argument
92 && (allow->specified == AVTAB_XPERMS_IOCTLFUNCTION)) { in check_extended_permissions()
93 if (neverallow->driver == allow->driver) in check_extended_permissions()
94 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions()
96 && (allow->specified == AVTAB_XPERMS_IOCTLDRIVER)) { in check_extended_permissions()
97 rc = xperm_test(neverallow->driver, allow->perms); in check_extended_permissions()
99 && (allow->specified == AVTAB_XPERMS_IOCTLFUNCTION)) { in check_extended_permissions()
100 rc = xperm_test(allow->driver, neverallow->perms); in check_extended_permissions()
102 && (allow->specified == AVTAB_XPERMS_IOCTLDRIVER)) { in check_extended_permissions()
103 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions()
[all …]
/external/flatbuffers/tests/namespace_test/
Dnamespace_test1_generated.rs4 #![allow(dead_code)]
5 #![allow(unused_imports)]
14 #![allow(dead_code)]
15 #![allow(unused_imports)]
23 #![allow(dead_code)]
24 #![allow(unused_imports)]
32 #[allow(non_camel_case_types)]
76 #[allow(non_camel_case_types)]
83 #[allow(non_camel_case_types)]
180 #[allow(unused_mut)]
/external/swiftshader/third_party/subzero/tests_lit/asan_tests/
Derrors.ll7 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \
10 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \
15 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \
18 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \
23 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \
26 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2\
31 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \
35 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \
41 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \
45 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \
[all …]
Dquarantine.ll7 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \
10 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \
15 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \
18 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \
23 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols \
25 ; RUN: --allow-empty
27 ; RUN: --fsanitize-address --sz=-allow-externally-defined-symbols -O2 \
29 ; RUN: --allow-empty
/external/selinux/secilc/docs/
Dcil_reference_guide.md8 …t build a policy unless it also has as a minimum: one [`allow`](cil_access_vector_rules.md#allow) …
14 …ning source/target [`allow`](cil_access_vector_rules.md#allow) rules instead of multiple [`allow`]…
84 - `(allow domain process (file (read write))))` - Adds an [`allow`](cil_access_vector_rules.md#al…
114 …onship a dot '`.`' is used, for example the following [`allow`](cil_access_vector_rules.md#allow) …
121 (allow process object (file (open read getattr)))
126 allow example_ns.process example_ns.object : example_ns.file { open read getattr };
149 (allow tmpfs tmpfs (file (open)))
151 ; allow file.tmpfs file.tmpfs : file.file open;
154 (allow tmpfs .tmpfs (file (read)))
156 ; allow file.tmpfs tmpfs : file.file read;
[all …]
Dcil_access_vector_rules.md4 allow section in Access Vector Rules
11 (allow source_id target_id|self classpermissionset_id ...)
22 <td align="left"><p><code>allow</code></p></td>
23 <td align="left"><p>The <code>allow</code> keyword.</p></td>
43 …examples show a selection of possible permutations of [`allow`](cil_access_vector_rules.md#allow) …
76 (allow type_1 self (property_service (set))) ; anonymous
77 (allow type_2 self (zygote (specifyids))) ; anonymous
78 (allow type_3 self cps_zygote) ; named
79 (allow type_4 self (android_classes (set_3))) ; classmap/classmapping
80 (allow all_types all_types (android_classes (set_2))) ; classmap/classmapping
[all …]
/external/wpa_supplicant_8/wpa_supplicant/dbus/
Ddbus-wpa_supplicant.conf6 <allow own="fi.w1.wpa_supplicant1"/>
8 <allow send_destination="fi.w1.wpa_supplicant1"/>
9 <allow send_interface="fi.w1.wpa_supplicant1"/>
10 <allow receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
/external/v8/src/
Dassert-scope.h55 template <PerIsolateAssertType type, bool allow>
73 template <PerThreadAssertType type, bool allow>
76 PerThreadAssertScope<type, allow> {
86 template <PerIsolateAssertType type, bool allow>
89 PerIsolateAssertScope<type, allow> {
92 : PerIsolateAssertScope<type, allow>(isolate) { } in PerIsolateAssertScopeDebugOnly()
/external/swiftshader/third_party/llvm-7.0/llvm/test/Transforms/LoopUnroll/
Dpartial-unroll-const-bounds.ll1 …threshold=20 -unroll-threshold=20 -loop-unroll -unroll-allow-partial -unroll-runtime -unroll-allow
2 …roll-partial-threshold=20 -unroll-threshold=20 -unroll-allow-partial -unroll-runtime -unroll-allow
4 ; Also check that the simple unroller doesn't allow the partial unrolling.
5 …roll-partial-threshold=20 -unroll-threshold=20 -unroll-allow-partial -unroll-runtime -unroll-allow
/external/webrtc/webrtc/base/
Dfirewallsocketserver.cc126 void FirewallSocketServer::AddRule(bool allow, FirewallProtocol p, in AddRule() argument
131 AddRule(allow, p, any, addr); in AddRule()
134 AddRule(allow, p, addr, any); in AddRule()
139 void FirewallSocketServer::AddRule(bool allow, FirewallProtocol p, in AddRule() argument
143 r.allow = allow; in AddRule()
172 return r.allow; in Check()
234 void FirewallManager::AddRule(bool allow, FirewallProtocol p, in AddRule() argument
239 (*it)->AddRule(allow, p, d, addr); in AddRule()

12345678910>>...94