/linux-6.6.21/security/apparmor/include/ |
D | perms.h | 68 u32 deny; /* explicit deny, or conflict if allow also set */ member 107 accum->deny |= addend->deny; in aa_perms_accum_raw() 108 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 112 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 113 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 115 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 116 accum->subtree |= addend->subtree & ~addend->deny; in aa_perms_accum_raw() 134 accum->deny |= addend->deny; in aa_perms_accum() 135 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() 139 accum->complain |= addend->complain & ~accum->allow & ~accum->deny; in aa_perms_accum() [all …]
|
D | net.h | 85 u8 deny; member
|
/linux-6.6.21/fs/nfsd/ |
D | nfs4acl.c | 239 unsigned short deny; in _posix_to_nfsv4_one() local 250 deny = ~pas.owner; in _posix_to_nfsv4_one() 255 deny &= pas.users | pas.group | pas.groups | pas.other; in _posix_to_nfsv4_one() 256 if (deny) { in _posix_to_nfsv4_one() 259 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one() 274 deny = ~(pa->e_perm & pas.mask); in _posix_to_nfsv4_one() 275 deny &= pas.groups | pas.group | pas.other; in _posix_to_nfsv4_one() 276 if (deny) { in _posix_to_nfsv4_one() 279 ace->access_mask = deny_mask_from_posix(deny, flags); in _posix_to_nfsv4_one() 327 deny = ~pas.group & pas.other; in _posix_to_nfsv4_one() [all …]
|
D | nfs4state.c | 471 set_deny(u32 deny, struct nfs4_ol_stateid *stp) in set_deny() argument 473 unsigned char mask = 1 << deny; in set_deny() 475 WARN_ON_ONCE(deny > NFS4_SHARE_DENY_BOTH); in set_deny() 481 clear_deny(u32 deny, struct nfs4_ol_stateid *stp) in clear_deny() argument 483 unsigned char mask = 1 << deny; in clear_deny() 485 WARN_ON_ONCE(deny > NFS4_SHARE_DENY_BOTH); in clear_deny() 491 test_deny(u32 deny, struct nfs4_ol_stateid *stp) in test_deny() argument 493 unsigned char mask = 1 << deny; in test_deny() 809 static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny) in nfs4_file_check_deny() argument 812 if (deny) { in nfs4_file_check_deny() [all …]
|
/linux-6.6.21/Documentation/admin-guide/cgroup-v1/ |
D | devices.rst | 25 devices.deny. For instance:: 32 echo a > /sys/fs/cgroup/1/devices.deny 62 a cgroup's devices.deny file, all its children will have that entry removed 75 B deny "c 1:3 rwm", "c 116:2 rwm", "b 3:* rwm" 79 # echo "c 116:* r" > A/devices.deny 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/linux-6.6.21/security/apparmor/ |
D | lib.c | 354 u32 request, int type, u32 *deny, in aa_profile_label_perm() argument 367 *deny |= request & perms.deny; in aa_profile_label_perm() 393 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms()
|
D | net.c | 241 if (rules->secmark[i].deny) in aa_secmark_perm() 242 perms.deny = ALL_PERMS_MASK; in aa_secmark_perm()
|
D | policy_unpack.c | 585 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark() 653 aa_unpack_u32(e, &perm->deny, NULL) && in unpack_perm() 1193 if (perm->allow & perm->deny) in verify_perm() 1197 if (perm->cond & (perm->allow | perm->deny)) in verify_perm() 1201 if (perm->complain & (perm->allow | perm->deny)) in verify_perm() 1203 if (perm->prompt & (perm->allow | perm->deny)) in verify_perm()
|
/linux-6.6.21/rust/alloc/ |
D | lib.rs | 71 test(no_crate_inject, attr(allow(unused_variables), deny(warnings))) 86 #![deny(unsafe_op_in_unsafe_fn)] 87 #![deny(fuzzy_provenance_casts)]
|
/linux-6.6.21/Documentation/ABI/stable/ |
D | o2cb | 7 and can be written into with the strings "allow", "deny", or
|
/linux-6.6.21/Documentation/ABI/obsolete/ |
D | o2cb | 7 and can be written into with the strings "allow", "deny", or
|
/linux-6.6.21/Documentation/devicetree/bindings/soc/renesas/ |
D | renesas,rzg2l-sysc.yaml | 35 - description: CA55 ACE Asynchronous Bridge Master/Slave interface deny request interrupt
|
/linux-6.6.21/drivers/staging/wlan-ng/ |
D | prism2sta.c | 1610 if (hw->deny.modify == 0) { in prism2sta_inf_authreq_defer() 1611 cnt = hw->deny.cnt; in prism2sta_inf_authreq_defer() 1612 addr = hw->deny.addr[0]; in prism2sta_inf_authreq_defer() 1614 cnt = hw->deny.cnt1; in prism2sta_inf_authreq_defer() 1615 addr = hw->deny.addr1[0]; in prism2sta_inf_authreq_defer()
|
D | hfa384x.h | 1162 struct prism2sta_accesslist deny; /* Denied station list. */ member
|
/linux-6.6.21/fs/smb/server/ |
D | smbacl.h | 162 u32 deny; member
|
/linux-6.6.21/security/selinux/ |
D | Kconfig | 34 kernel will start in permissive mode (log everything, deny nothing)
|
/linux-6.6.21/Documentation/usb/ |
D | authorization.rst | 98 There is a similar approach to allow or deny specific USB interfaces.
|
/linux-6.6.21/tools/testing/selftests/bpf/ |
D | README.rst | 32 deny list file, located at ``tools/testing/selftests/bpf/DENYLIST.<arch>``, can 55 that deny lists are not automatically honored.
|
/linux-6.6.21/Documentation/networking/device_drivers/cable/ |
D | sb1000.rst | 179 6. I'm getting *tons* of firewall deny messages in the /var/kern.log, 185 and/or portscanning (UDP connection attempts) attacks! Look over the deny
|
/linux-6.6.21/Documentation/bpf/ |
D | prog_cgroup_sysctl.rst | 100 the result to make decision whether to allow or deny access to sysctl.
|
/linux-6.6.21/Documentation/filesystems/ |
D | tmpfs.rst | 126 be used to deny huge pages on all tmpfs mounts in an emergency, or to
|
/linux-6.6.21/Documentation/ABI/testing/ |
D | sysfs-fs-f2fs | 732 than watermark, then deny caching compress page. The value should be in 740 If cached page percent exceed threshold, then deny caching compress page.
|
/linux-6.6.21/LICENSES/deprecated/ |
D | GPL-1.0 | 39 anyone to deny you these rights or to ask you to surrender the rights.
|
/linux-6.6.21/Documentation/admin-guide/mm/ |
D | transhuge.rst | 276 deny
|
/linux-6.6.21/LICENSES/preferred/ |
D | GPL-2.0 | 48 anyone to deny you these rights or to ask you to surrender the rights.
|