Home
last modified time | relevance | path

Searched refs:deny (Results 1 – 25 of 36) sorted by relevance

12

/kernel/linux/linux-5.10/security/apparmor/
Dlib.c350 accum->deny |= addend->deny; in aa_perms_accum_raw()
351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw()
356 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
359 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
369 accum->deny |= addend->deny; in aa_perms_accum()
370 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum()
375 accum->complain |= addend->complain & ~accum->allow & ~accum->deny; in aa_perms_accum()
376 accum->cond |= addend->cond & ~accum->allow & ~accum->deny; in aa_perms_accum()
378 accum->prompt |= addend->prompt & ~accum->allow & ~accum->deny; in aa_perms_accum()
[all …]
Dnet.c231 if (profile->secmark[i].deny) in aa_secmark_perm()
232 perms.deny = ALL_PERMS_MASK; in aa_secmark_perm()
Dpolicy_unpack.c593 if (!unpack_u8(e, &profile->secmark[i].deny, NULL)) in unpack_secmark()
/kernel/linux/linux-5.10/fs/nfsd/
Dnfs4acl.c239 unsigned short deny; in _posix_to_nfsv4_one() local
250 deny = ~pas.owner; in _posix_to_nfsv4_one()
255 deny &= pas.users | pas.group | pas.groups | pas.other; in _posix_to_nfsv4_one()
256 if (deny) { in _posix_to_nfsv4_one()
259 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one()
274 deny = ~(pa->e_perm & pas.mask); in _posix_to_nfsv4_one()
275 deny &= pas.groups | pas.group | pas.other; in _posix_to_nfsv4_one()
276 if (deny) { in _posix_to_nfsv4_one()
279 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one()
327 deny = ~pas.group & pas.other; in _posix_to_nfsv4_one()
[all …]
Dnfs4state.c596 static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny) in nfs4_file_check_deny() argument
599 if (deny) { in nfs4_file_check_deny()
601 if (deny & ~NFS4_SHARE_DENY_BOTH) in nfs4_file_check_deny()
604 if ((deny & NFS4_SHARE_DENY_READ) && in nfs4_file_check_deny()
608 if ((deny & NFS4_SHARE_DENY_WRITE) && in nfs4_file_check_deny()
1232 set_deny(u32 deny, struct nfs4_ol_stateid *stp) in set_deny() argument
1234 unsigned char mask = 1 << deny; in set_deny()
1236 WARN_ON_ONCE(deny > NFS4_SHARE_DENY_BOTH); in set_deny()
1242 clear_deny(u32 deny, struct nfs4_ol_stateid *stp) in clear_deny() argument
1244 unsigned char mask = 1 << deny; in clear_deny()
[all …]
/kernel/linux/linux-5.10/Documentation/admin-guide/cgroup-v1/
Ddevices.rst25 devices.deny. For instance::
32 echo a > /sys/fs/cgroup/1/devices.deny
62 a cgroup's devices.deny file, all its children will have that entry removed
75 B deny "c 1:3 rwm", "c 116:2 rwm", "b 3:* rwm"
79 # echo "c 116:* r" > A/devices.deny
120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
/kernel/linux/linux-5.10/security/apparmor/include/
Dperms.h70 u32 deny; /* explicit deny, or conflict if allow also set */ member
151 u32 request, int type, u32 *deny,
Dnet.h84 u8 deny; member
/kernel/linux/linux-5.10/Documentation/ABI/stable/
Do2cb7 and can be written into with the strings "allow", "deny", or
/kernel/linux/linux-5.10/drivers/staging/wlan-ng/
Dprism2sta.c1629 if (hw->deny.modify == 0) { in prism2sta_inf_authreq_defer()
1630 cnt = hw->deny.cnt; in prism2sta_inf_authreq_defer()
1631 addr = hw->deny.addr[0]; in prism2sta_inf_authreq_defer()
1633 cnt = hw->deny.cnt1; in prism2sta_inf_authreq_defer()
1634 addr = hw->deny.addr1[0]; in prism2sta_inf_authreq_defer()
Dhfa384x.h1367 struct prism2sta_accesslist deny; /* Denied station list. */ member
/kernel/linux/linux-5.10/Documentation/usb/
Dauthorization.rst101 There is a similar approach to allow or deny specific USB interfaces.
/kernel/linux/linux-5.10/security/selinux/
DKconfig58 kernel will start in permissive mode (log everything, deny nothing)
/kernel/linux/linux-5.10/Documentation/networking/device_drivers/cable/
Dsb1000.rst179 6. I'm getting *tons* of firewall deny messages in the /var/kern.log,
185 and/or portscanning (UDP connection attempts) attacks! Look over the deny
/kernel/linux/linux-5.10/Documentation/bpf/
Dprog_cgroup_sysctl.rst100 the result to make decision whether to allow or deny access to sysctl.
/kernel/linux/linux-5.10/LICENSES/deprecated/
DGPL-1.039 anyone to deny you these rights or to ask you to surrender the rights.
/kernel/linux/linux-5.10/Documentation/admin-guide/mm/
Dtranshuge.rst271 deny
/kernel/linux/linux-5.10/Documentation/filesystems/caching/
Dcachefiles.rst394 may deny the CacheFiles access to the cache data because under some
/kernel/linux/build/
DLICENSE29 anyone to deny you these rights or to ask you to surrender the rights.
/kernel/linux/linux-5.10/LICENSES/preferred/
DGPL-2.048 anyone to deny you these rights or to ask you to surrender the rights.
/kernel/linux/config/
DLICENSE29 anyone to deny you these rights or to ask you to surrender the rights.
/kernel/linux/linux-5.10/tools/usb/usbip/
DCOPYING29 anyone to deny you these rights or to ask you to surrender the rights.
/kernel/linux/common_modules/newip/third_party/linux-5.10/LICENSES/
DGPL-2.048 anyone to deny you these rights or to ask you to surrender the rights.
/kernel/linux/common_modules/
DLICENSES-GPL-2.048 anyone to deny you these rights or to ask you to surrender the rights.
/kernel/linux/patches/
DLICENSE29 anyone to deny you these rights or to ask you to surrender the rights.

12