/Linux-v4.19/security/apparmor/ |
D | lib.c | 352 accum->deny |= addend->deny; in aa_perms_accum_raw() 353 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 358 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 359 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 361 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 371 accum->deny |= addend->deny; in aa_perms_accum() 372 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() 377 accum->complain |= addend->complain & ~accum->allow & ~accum->deny; in aa_perms_accum() 378 accum->cond |= addend->cond & ~accum->allow & ~accum->deny; in aa_perms_accum() 380 accum->prompt |= addend->prompt & ~accum->allow & ~accum->deny; in aa_perms_accum() [all …]
|
D | apparmorfs.c | 793 perms.allow, perms.deny, perms.audit, perms.quiet); in query_label()
|
/Linux-v4.19/fs/nfsd/ |
D | nfs4acl.c | 239 unsigned short deny; in _posix_to_nfsv4_one() local 250 deny = ~pas.owner; in _posix_to_nfsv4_one() 255 deny &= pas.users | pas.group | pas.groups | pas.other; in _posix_to_nfsv4_one() 256 if (deny) { in _posix_to_nfsv4_one() 259 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one() 274 deny = ~(pa->e_perm & pas.mask); in _posix_to_nfsv4_one() 275 deny &= pas.groups | pas.group | pas.other; in _posix_to_nfsv4_one() 276 if (deny) { in _posix_to_nfsv4_one() 279 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one() 327 deny = ~pas.group & pas.other; in _posix_to_nfsv4_one() [all …]
|
D | nfs4state.c | 547 static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny) in nfs4_file_check_deny() argument 550 if (deny) { in nfs4_file_check_deny() 552 if (deny & ~NFS4_SHARE_DENY_BOTH) in nfs4_file_check_deny() 555 if ((deny & NFS4_SHARE_DENY_READ) && in nfs4_file_check_deny() 559 if ((deny & NFS4_SHARE_DENY_WRITE) && in nfs4_file_check_deny() 1097 set_deny(u32 deny, struct nfs4_ol_stateid *stp) in set_deny() argument 1099 unsigned char mask = 1 << deny; in set_deny() 1101 WARN_ON_ONCE(deny > NFS4_SHARE_DENY_BOTH); in set_deny() 1107 clear_deny(u32 deny, struct nfs4_ol_stateid *stp) in clear_deny() argument 1109 unsigned char mask = 1 << deny; in clear_deny() [all …]
|
/Linux-v4.19/Documentation/cgroup-v1/ |
D | devices.txt | 21 devices.deny. For instance 28 echo a > /sys/fs/cgroup/1/devices.deny 56 a cgroup's devices.deny file, all its children will have that entry removed 68 B deny "c 1:3 rwm", "c 116:2 rwm", "b 3:* rwm" 71 # echo "c 116:* r" > A/devices.deny 105 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/Linux-v4.19/security/apparmor/include/ |
D | perms.h | 74 u32 deny; /* explicit deny, or conflict if allow also set */ member 155 u32 request, int type, u32 *deny,
|
/Linux-v4.19/Documentation/ABI/stable/ |
D | o2cb | 7 and can be written into with the strings "allow", "deny", or
|
/Linux-v4.19/drivers/staging/wlan-ng/ |
D | prism2sta.c | 1635 if (hw->deny.modify == 0) { in prism2sta_inf_authreq_defer() 1636 cnt = hw->deny.cnt; in prism2sta_inf_authreq_defer() 1637 addr = hw->deny.addr[0]; in prism2sta_inf_authreq_defer() 1639 cnt = hw->deny.cnt1; in prism2sta_inf_authreq_defer() 1640 addr = hw->deny.addr1[0]; in prism2sta_inf_authreq_defer()
|
D | hfa384x.h | 1365 struct prism2sta_accesslist deny; /* Denied station list. */ member
|
/Linux-v4.19/drivers/staging/rtl8723bs/core/ |
D | rtw_pwrctrl.c | 1405 u32 deny; in rtw_ps_deny_get() local 1408 deny = adapter_to_pwrctl(padapter)->ps_deny; in rtw_ps_deny_get() 1410 return deny; in rtw_ps_deny_get()
|
/Linux-v4.19/security/selinux/ |
D | Kconfig | 69 kernel will start in permissive mode (log everything, deny nothing)
|
/Linux-v4.19/Documentation/usb/ |
D | authorization.txt | 96 There is a similar approach to allow or deny specific USB interfaces.
|
/Linux-v4.19/Documentation/networking/ |
D | README.sb1000 | 167 6.) I'm getting *tons* of firewall deny messages in the /var/kern.log, 172 and/or portscanning (UDP connection attempts) attacks! Look over the deny
|
D | LICENSE.qlge | 39 anyone to deny you these rights or to ask you to surrender the rights.
|
D | LICENSE.qlcnic | 39 anyone to deny you these rights or to ask you to surrender the rights.
|
/Linux-v4.19/LICENSES/other/ |
D | GPL-1.0 | 39 anyone to deny you these rights or to ask you to surrender the rights.
|
/Linux-v4.19/Documentation/scsi/ |
D | LICENSE.qla2xxx | 41 anyone to deny you these rights or to ask you to surrender the rights.
|
D | LICENSE.qla4xxx | 40 anyone to deny you these rights or to ask you to surrender the rights.
|
/Linux-v4.19/Documentation/admin-guide/mm/ |
D | transhuge.rst | 264 deny
|
/Linux-v4.19/Documentation/filesystems/caching/ |
D | cachefiles.txt | 415 may deny the CacheFiles access to the cache data because under some
|
/Linux-v4.19/drivers/staging/rtl8192e/ |
D | license | 35 deny you these rights or to ask you to surrender the rights. These
|
/Linux-v4.19/drivers/staging/rtl8192u/ |
D | copying | 29 anyone to deny you these rights or to ask you to surrender the rights.
|
/Linux-v4.19/tools/usb/usbip/ |
D | COPYING | 29 anyone to deny you these rights or to ask you to surrender the rights.
|
/Linux-v4.19/LICENSES/preferred/ |
D | GPL-2.0 | 48 anyone to deny you these rights or to ask you to surrender the rights.
|
/Linux-v4.19/Documentation/driver-api/gpio/ |
D | driver.rst | 356 GPIO line and register for example) it needs to deny certain operations and
|