Home
last modified time | relevance | path

Searched refs:deny (Results 1 – 25 of 33) sorted by relevance

12

/Linux-v4.19/security/apparmor/
Dlib.c352 accum->deny |= addend->deny; in aa_perms_accum_raw()
353 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw()
358 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
359 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
361 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
371 accum->deny |= addend->deny; in aa_perms_accum()
372 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum()
377 accum->complain |= addend->complain & ~accum->allow & ~accum->deny; in aa_perms_accum()
378 accum->cond |= addend->cond & ~accum->allow & ~accum->deny; in aa_perms_accum()
380 accum->prompt |= addend->prompt & ~accum->allow & ~accum->deny; in aa_perms_accum()
[all …]
Dapparmorfs.c793 perms.allow, perms.deny, perms.audit, perms.quiet); in query_label()
/Linux-v4.19/fs/nfsd/
Dnfs4acl.c239 unsigned short deny; in _posix_to_nfsv4_one() local
250 deny = ~pas.owner; in _posix_to_nfsv4_one()
255 deny &= pas.users | pas.group | pas.groups | pas.other; in _posix_to_nfsv4_one()
256 if (deny) { in _posix_to_nfsv4_one()
259 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one()
274 deny = ~(pa->e_perm & pas.mask); in _posix_to_nfsv4_one()
275 deny &= pas.groups | pas.group | pas.other; in _posix_to_nfsv4_one()
276 if (deny) { in _posix_to_nfsv4_one()
279 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one()
327 deny = ~pas.group & pas.other; in _posix_to_nfsv4_one()
[all …]
Dnfs4state.c547 static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny) in nfs4_file_check_deny() argument
550 if (deny) { in nfs4_file_check_deny()
552 if (deny & ~NFS4_SHARE_DENY_BOTH) in nfs4_file_check_deny()
555 if ((deny & NFS4_SHARE_DENY_READ) && in nfs4_file_check_deny()
559 if ((deny & NFS4_SHARE_DENY_WRITE) && in nfs4_file_check_deny()
1097 set_deny(u32 deny, struct nfs4_ol_stateid *stp) in set_deny() argument
1099 unsigned char mask = 1 << deny; in set_deny()
1101 WARN_ON_ONCE(deny > NFS4_SHARE_DENY_BOTH); in set_deny()
1107 clear_deny(u32 deny, struct nfs4_ol_stateid *stp) in clear_deny() argument
1109 unsigned char mask = 1 << deny; in clear_deny()
[all …]
/Linux-v4.19/Documentation/cgroup-v1/
Ddevices.txt21 devices.deny. For instance
28 echo a > /sys/fs/cgroup/1/devices.deny
56 a cgroup's devices.deny file, all its children will have that entry removed
68 B deny "c 1:3 rwm", "c 116:2 rwm", "b 3:* rwm"
71 # echo "c 116:* r" > A/devices.deny
105 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
/Linux-v4.19/security/apparmor/include/
Dperms.h74 u32 deny; /* explicit deny, or conflict if allow also set */ member
155 u32 request, int type, u32 *deny,
/Linux-v4.19/Documentation/ABI/stable/
Do2cb7 and can be written into with the strings "allow", "deny", or
/Linux-v4.19/drivers/staging/wlan-ng/
Dprism2sta.c1635 if (hw->deny.modify == 0) { in prism2sta_inf_authreq_defer()
1636 cnt = hw->deny.cnt; in prism2sta_inf_authreq_defer()
1637 addr = hw->deny.addr[0]; in prism2sta_inf_authreq_defer()
1639 cnt = hw->deny.cnt1; in prism2sta_inf_authreq_defer()
1640 addr = hw->deny.addr1[0]; in prism2sta_inf_authreq_defer()
Dhfa384x.h1365 struct prism2sta_accesslist deny; /* Denied station list. */ member
/Linux-v4.19/drivers/staging/rtl8723bs/core/
Drtw_pwrctrl.c1405 u32 deny; in rtw_ps_deny_get() local
1408 deny = adapter_to_pwrctl(padapter)->ps_deny; in rtw_ps_deny_get()
1410 return deny; in rtw_ps_deny_get()
/Linux-v4.19/security/selinux/
DKconfig69 kernel will start in permissive mode (log everything, deny nothing)
/Linux-v4.19/Documentation/usb/
Dauthorization.txt96 There is a similar approach to allow or deny specific USB interfaces.
/Linux-v4.19/Documentation/networking/
DREADME.sb1000167 6.) I'm getting *tons* of firewall deny messages in the /var/kern.log,
172 and/or portscanning (UDP connection attempts) attacks! Look over the deny
DLICENSE.qlge39 anyone to deny you these rights or to ask you to surrender the rights.
DLICENSE.qlcnic39 anyone to deny you these rights or to ask you to surrender the rights.
/Linux-v4.19/LICENSES/other/
DGPL-1.039 anyone to deny you these rights or to ask you to surrender the rights.
/Linux-v4.19/Documentation/scsi/
DLICENSE.qla2xxx41 anyone to deny you these rights or to ask you to surrender the rights.
DLICENSE.qla4xxx40 anyone to deny you these rights or to ask you to surrender the rights.
/Linux-v4.19/Documentation/admin-guide/mm/
Dtranshuge.rst264 deny
/Linux-v4.19/Documentation/filesystems/caching/
Dcachefiles.txt415 may deny the CacheFiles access to the cache data because under some
/Linux-v4.19/drivers/staging/rtl8192e/
Dlicense35 deny you these rights or to ask you to surrender the rights. These
/Linux-v4.19/drivers/staging/rtl8192u/
Dcopying29 anyone to deny you these rights or to ask you to surrender the rights.
/Linux-v4.19/tools/usb/usbip/
DCOPYING29 anyone to deny you these rights or to ask you to surrender the rights.
/Linux-v4.19/LICENSES/preferred/
DGPL-2.048 anyone to deny you these rights or to ask you to surrender the rights.
/Linux-v4.19/Documentation/driver-api/gpio/
Ddriver.rst356 GPIO line and register for example) it needs to deny certain operations and

12