/linux/security/apparmor/ |
A D | lib.c | 350 accum->deny |= addend->deny; in aa_perms_accum_raw() 351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 359 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 369 accum->deny |= addend->deny; in aa_perms_accum() 370 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() 376 accum->cond |= addend->cond & ~accum->allow & ~accum->deny; in aa_perms_accum() 378 accum->prompt |= addend->prompt & ~accum->allow & ~accum->deny; in aa_perms_accum() 396 u32 request, int type, u32 *deny, in aa_profile_label_perm() argument 407 *deny |= request & perms.deny; in aa_profile_label_perm() [all …]
|
A D | net.c | 231 if (profile->secmark[i].deny) in aa_secmark_perm() 232 perms.deny = ALL_PERMS_MASK; in aa_secmark_perm()
|
A D | policy_unpack.c | 593 if (!unpack_u8(e, &profile->secmark[i].deny, NULL)) in unpack_secmark()
|
A D | apparmorfs.c | 798 perms.allow, perms.deny, perms.audit, perms.quiet); in query_label()
|
/linux/fs/nfsd/ |
A D | nfs4acl.c | 239 unsigned short deny; in _posix_to_nfsv4_one() local 250 deny = ~pas.owner; in _posix_to_nfsv4_one() 256 if (deny) { in _posix_to_nfsv4_one() 276 if (deny) { in _posix_to_nfsv4_one() 328 if (deny) { in _posix_to_nfsv4_one() 340 deny &= pas.other; in _posix_to_nfsv4_one() 341 if (deny) { in _posix_to_nfsv4_one() 423 u32 deny; member 583 a->aces[i].perms.deny = state->everyone.deny; in find_uid() 600 a->aces[i].perms.deny = state->everyone.deny; in find_gid() [all …]
|
A D | nfs4state.c | 422 unsigned char mask = 1 << deny; in set_deny() 432 unsigned char mask = 1 << deny; in clear_deny() 442 unsigned char mask = 1 << deny; in test_deny() 706 if (deny) { in nfs4_file_check_deny() 1300 if ((i & deny) != i) { in reset_union_bmap_deny() 2495 unsigned int access, deny; in nfs4_show_open() local 6562 if (!deny->ld_owner.data) in nfs4_set_lock_denied() 6568 deny->ld_owner.len = 0; in nfs4_set_lock_denied() 6569 deny->ld_owner.data = NULL; in nfs4_set_lock_denied() 6571 deny->ld_clientid.cl_id = 0; in nfs4_set_lock_denied() [all …]
|
/linux/Documentation/admin-guide/cgroup-v1/ |
A D | devices.rst | 25 devices.deny. For instance:: 32 echo a > /sys/fs/cgroup/1/devices.deny 62 a cgroup's devices.deny file, all its children will have that entry removed 75 B deny "c 1:3 rwm", "c 116:2 rwm", "b 3:* rwm" 79 # echo "c 116:* r" > A/devices.deny 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/linux/security/apparmor/include/ |
A D | perms.h | 70 u32 deny; /* explicit deny, or conflict if allow also set */ member 151 u32 request, int type, u32 *deny,
|
A D | net.h | 84 u8 deny; member
|
/linux/Documentation/ABI/stable/ |
A D | o2cb | 7 and can be written into with the strings "allow", "deny", or
|
/linux/Documentation/ABI/obsolete/ |
A D | o2cb | 7 and can be written into with the strings "allow", "deny", or
|
/linux/Documentation/devicetree/bindings/power/ |
A D | renesas,rzg2l-sysc.yaml | 33 - description: CA55 ACE Asynchronous Bridge Master/Slave interface deny request interrupt
|
/linux/drivers/staging/wlan-ng/ |
A D | prism2sta.c | 1631 if (hw->deny.modify == 0) { in prism2sta_inf_authreq_defer() 1632 cnt = hw->deny.cnt; in prism2sta_inf_authreq_defer() 1633 addr = hw->deny.addr[0]; in prism2sta_inf_authreq_defer() 1635 cnt = hw->deny.cnt1; in prism2sta_inf_authreq_defer() 1636 addr = hw->deny.addr1[0]; in prism2sta_inf_authreq_defer()
|
A D | hfa384x.h | 1354 struct prism2sta_accesslist deny; /* Denied station list. */ member
|
/linux/fs/ksmbd/ |
A D | smbacl.h | 161 u32 deny; member
|
/linux/Documentation/usb/ |
A D | authorization.rst | 101 There is a similar approach to allow or deny specific USB interfaces.
|
/linux/security/selinux/ |
A D | Kconfig | 58 kernel will start in permissive mode (log everything, deny nothing)
|
/linux/Documentation/networking/device_drivers/cable/ |
A D | sb1000.rst | 179 6. I'm getting *tons* of firewall deny messages in the /var/kern.log, 185 and/or portscanning (UDP connection attempts) attacks! Look over the deny
|
/linux/Documentation/bpf/ |
A D | prog_cgroup_sysctl.rst | 100 the result to make decision whether to allow or deny access to sysctl.
|
/linux/LICENSES/deprecated/ |
A D | GPL-1.0 | 39 anyone to deny you these rights or to ask you to surrender the rights.
|
/linux/Documentation/admin-guide/mm/ |
A D | transhuge.rst | 271 deny
|
/linux/Documentation/filesystems/caching/ |
A D | cachefiles.rst | 394 may deny the CacheFiles access to the cache data because under some
|
/linux/tools/usb/usbip/ |
A D | COPYING | 29 anyone to deny you these rights or to ask you to surrender the rights.
|
/linux/LICENSES/preferred/ |
A D | GPL-2.0 | 48 anyone to deny you these rights or to ask you to surrender the rights.
|
/linux/Documentation/driver-api/gpio/ |
A D | driver.rst | 564 resource (a certain GPIO line and register for example) it needs to deny
|